washington dc 20555-0001 - nrc

61
AWARD/CONTRACT 11, THIS CONTRACT IS A RATED ORDER UNDER DPAS (15 CFR 700\ IRATING I PAGE OF PAGES 1 , I 2 2, CONTRACT {Proc, lnsUoonl) NO, t EFFECTIVE DATE k, REQUISITION/PURCHASE REQUEST/PROJECT NO, NRC-HQ-10-16-C-0003 See Block 20COCI0-16-0214 5. ISSUED BY cooel NRCHQ 6, ADMINISTERED BY (If other than coDel US NRC - HQ ACQUISIT:rON MANAGEMENT DIVISION MAIL STOP TWFN-5E03 WASHINGTON DC 20555-0001 7. NAME AND ADDRESS OF CONTRACTOR (No .. Slmet, City, Countty, Slate and ZIP Coda) 8. DELIVERY 0FOBORIGIN l8J OTHER (See below) BUSINESS INTEGRA TECHNOLOGY SOLUTIONS INC 9, DISCOUNT FOR PROMPT PAYMENT - 6550 ROCK SPRING DR STE 450 BETHESDA MD 20817-1112 10. SUBMIT INVOICES ITEM (4 aip<es unless olherwise epedfilld) TO THE ADDRESS SHOWN IN CODE 114425536 I FACILITY CODE 11. SHIP TO/MARK FOR coDEI NRCHQ 12. PAYMENT 'MLL BE MADE BY CODE NRCPAYMENTS US NUCLEAR REGULATORY COMMISSION- US NUCLEAR REGULATORY COMI-llSSION MAIL PROCESSING CENTER TWO WHITE FLINT NORTH 4930 BOILING BROOK PARKWAY 11545 ROCKVILLE PIKE ROCKVILLE MD 20852 MAILSTOP T9-B07 ROCKVILLE MD 20852-2738 13, AUTHORITY FOR USING OTHER THAN FULL AND OPEN COMPETITION: 14. ACCOUNTING ANO APPROPRIATION DATA O 10 U.S,C, 2304 (c) ( ) 041 u.s.c. 253 (c) I ) See Schedule 15A.ITEMNO 15B. SUPPLIES/SERVICES 15C. 15D. 15E. UNIT PRICE 15F,AMOUNT QUANTITY UNIT Continued 15G, TOTALAMOUNT OF CONTRACT $3,045,640.00 16. TABLEOFCON'reNTS (X) SEC. DESCRIPTION PAGE(S) (X) SEC, DESCRIPTION PART I - THE SCHEDULE PART 11 - CONTRACT CLAUSES A SOLICITATION/CONTRACT FORM I CONTRACT CLAUSES B SUPPLIES OR SERVICES AND PRICES/COSTS PART Ill - LIST OF DOCUMENTS. EXHIBITS AND OTHER ATI'ACH, c OESCRIPTIONISPECS,M'ORK STATEMENT J LIST OF ATTACHMEr.rrs D PACKAGING ANO MARKING " PART IV· REPRESENTATIONS ANO INSTRUCTIONS E INSPECTION ANO ACCEPTANCE K REPRESENTATIONS, CERTIFICATIONS AND F DELIVERIES OR PERFORMANCE OTHER STATEMENTS OF OFFERORS G CONTRACT ADMINISTRATION DATA L INSTRS,, CONOS,. AND NOTICES TO OFFERORS H SPECIAL CONTRACT REQUIREMENTS M EVALUATION FACTORS FOR AWARD CONTRACTING OFFICER WILL COMPLETE ITEM 17 (SEALED.SID OR NEGOTIATED PROCUREMENT! OR 1a (SEALED-810 PRCCUREMENn AS APPLICABLE 17, S NEGOTIATED AGREEMENT (Contractor is required to sign this 18, 0 SEALEO·BID AWARD (Contractor is not requ1md to SJfln this document) Your bid on dOcvment and mtum 1 CXJpi98 to iss.Jing allfce.) Contraaor egrees lo Solicitation Number llmlsh and deliver all ilern:> or perfonn ell !he SB!Vlces set forth or o!herwise Identified induding lhe additions or changes made by you oodilicns ""changes sm set fOrth above end on eny amllnuatlon eheelll for the oonsideraUon staled herein, The rtghta and in full allOve, is hereby aa:epted es to the !Isled above and on any continuation obhgotlons al the panies to tnls contmct 511811 be subject to end governed by the following document5: (a) this eward/oonlnlcl, (b) lh9 eolicitstion, lf any, end (c) such pmvillions, mpresenlations. certlficalions, and spedficationu, es ere alteched or incorporated by reference herein, l'\ttachments are I/sled herein) 19A, NAME ANO TITLE OF SIGNER (Type or print) Prathiba Rsmados&, President and CEO sheets, This award c:onsummates tr.e contrad \\hleh consi51!1 of the following document&: (a) IN! Govommant's ?l"'lcitatlon and your bid, and (b) thi& awardloonlioQ, No funher a>.11radual document is necessary. (Block 18 should be checked only wh6n awarding a sealed-tlid contract) OA.NA NT AC I MATTHEW BUCHER l?AGE(S) I 198, NAME OF CONTRACTOR 19C. DATE SIGNED 208, UNITED STATE OF AMERiCA CC, DATE SIGNED BY .. (Signature of person to Sl!Jn) AUTHORIZEOFORLOCALREPROOUCTION Previous edition lo NOT usable TEMPI.ATE 'A iiDMnm .. :.·:·, --· .·· .... .. 09/0712016 11 JINDAROF lG(Rov.11120111 PrMatt>od b1 GSA- 53214(8) SEP 1 9. 20tm OOMPli!V! AbM002

Upload: others

Post on 04-Dec-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

AWARD/CONTRACT 11, THIS CONTRACT IS A RATED ORDER UNDER DPAS (15 CFR 700\

• IRATING I PAGE OF PAGES 1 , I 2

2, CONTRACT {Proc, lnsUoonl) NO, t EFFECTIVE DATE k, REQUISITION/PURCHASE REQUEST/PROJECT NO,

NRC-HQ-10-16-C-0003 See Block 20COCI0-16-0214 5. ISSUED BY cooel NRCHQ 6, ADMINISTERED BY (If other than Item.~) coDel

US NRC - HQ ACQUISIT:rON MANAGEMENT DIVISION MAIL STOP TWFN-5E03 WASHINGTON DC 20555-0001

7. NAME AND ADDRESS OF CONTRACTOR (No .. Slmet, City, Countty, Slate and ZIP Coda) 8. DELIVERY

0FOBORIGIN l8J OTHER (See below)

BUSINESS INTEGRA TECHNOLOGY SOLUTIONS INC 9, DISCOUNT FOR PROMPT PAYMENT -6550 ROCK SPRING DR STE 450 BETHESDA MD 20817-1112

10. SUBMIT INVOICES ITEM (4 aip<es unless olherwise epedfilld)

~ TO THE ADDRESS SHOWN IN

CODE 114425536 I FACILITY CODE

11. SHIP TO/MARK FOR coDEI NRCHQ 12. PAYMENT 'MLL BE MADE BY CODE NRCPAYMENTS

US NUCLEAR REGULATORY COMMISSION- US NUCLEAR REGULATORY COMI-llSSION MAIL PROCESSING CENTER TWO WHITE FLINT NORTH 4930 BOILING BROOK PARKWAY 11545 ROCKVILLE PIKE ROCKVILLE MD 20852 MAILSTOP T9-B07

ROCKVILLE MD 20852-2738

13, AUTHORITY FOR USING OTHER THAN FULL AND OPEN COMPETITION: 14. ACCOUNTING ANO APPROPRIATION DATA

O 10 U.S,C, 2304 (c) ( ) 041 u.s.c. 253 (c) I ) See Schedule

15A.ITEMNO 15B. SUPPLIES/SERVICES 15C. 15D. 15E. UNIT PRICE 15F,AMOUNT QUANTITY UNIT

Continued 15G, TOTALAMOUNT OF CONTRACT ~I $3,045,640.00

16. TABLEOFCON'reNTS

(X) SEC. DESCRIPTION PAGE(S) (X) SEC, DESCRIPTION

PART I - THE SCHEDULE PART 11 - CONTRACT CLAUSES

A SOLICITATION/CONTRACT FORM I CONTRACT CLAUSES

B SUPPLIES OR SERVICES AND PRICES/COSTS PART Ill - LIST OF DOCUMENTS. EXHIBITS AND OTHER ATI'ACH,

c OESCRIPTIONISPECS,M'ORK STATEMENT J LIST OF ATTACHMEr.rrs

D PACKAGING ANO MARKING " PART IV· REPRESENTATIONS ANO INSTRUCTIONS

E INSPECTION ANO ACCEPTANCE K REPRESENTATIONS, CERTIFICATIONS AND

F DELIVERIES OR PERFORMANCE OTHER STATEMENTS OF OFFERORS

G CONTRACT ADMINISTRATION DATA L INSTRS,, CONOS,. AND NOTICES TO OFFERORS

H SPECIAL CONTRACT REQUIREMENTS M EVALUATION FACTORS FOR AWARD

CONTRACTING OFFICER WILL COMPLETE ITEM 17 (SEALED.SID OR NEGOTIATED PROCUREMENT! OR 1a (SEALED-810 PRCCUREMENn AS APPLICABLE 17, ~CONTRACTOR' S NEGOTIATED AGREEMENT (Contractor is required to sign this 18, 0 SEALEO·BID AWARD (Contractor is not requ1md to SJfln this document) Your bid on

dOcvment and mtum 1 CXJpi98 to iss.Jing allfce.) Contraaor egrees lo Solicitation Number

llmlsh and deliver all ilern:> or perfonn ell !he SB!Vlces set forth or o!herwise Identified induding lhe additions or changes made by you ~lch oodilicns ""changes sm set fOrth above end on eny amllnuatlon eheelll for the oonsideraUon staled herein, The rtghta and in full allOve, is hereby aa:epted es to the ~ems !Isled above and on any continuation

obhgotlons al the panies to tnls contmct 511811 be subject to end governed by the following document5: (a) this eward/oonlnlcl, (b) lh9 eolicitstion, lf any, end (c) such pmvillions, mpresenlations. certlficalions, and spedficationu, es ere alteched or incorporated by reference herein, l'\ttachments are I/sled herein) 19A, NAME ANO TITLE OF SIGNER (Type or print)

Prathiba Rsmados&, President and CEO

sheets, This award c:onsummates tr.e contrad \\hleh consi51!1 of the following document&: (a) IN! Govommant's ?l"'lcitatlon and your bid, and (b) thi& awardloonlioQ, No funher a>.11radual document is necessary. (Block 18 should be checked only wh6n awarding a sealed-tlid contract) OA.NA NT AC I

MATTHEW BUCHER

l?AGE(S)

I

198, NAME OF CONTRACTOR 19C. DATE SIGNED 208, UNITED STATE OF AMERiCA CC, DATE SIGNED

BY \~~r .. ~· (Signature of person auth~rized to Sl!Jn)

AUTHORIZEOFORLOCALREPROOUCTION Previous edition lo NOT usable

TEMPI.ATE 'A iiDMnm .. :.·:·, --· .·· .... ~".:;_, ·.~·. ~ .. ·-~,.(.,~:~~

09/0712016

11 JINDAROF lG(Rov.11120111 PrMatt>od b1 GSA- FAR(~4CFRJ 53214(8)

SEP 1 9. 20tm

·~-REVIEW OOMPli!V! AbM002

CONTlfiJUATION SHEET REFERENCE NO. OF DOCUMENT BEING CONTINUED

NRC-HQ-10-16-C-0003

NAME OF OFFEROR OR CONTRACTOR

BUSINESS INTEGRA TECHNOLOGY SOLUTIONS INC

ITEM NO.

(A)

00001

01001

02001

03001

SUPPLIES/SERVICES

(8)

The purpose of this Labor Hour contract is to procure te9hnical services ~elating to ~yber Monitoring and Incident Responses. A complete pricing schedule can be found on page two (2) of this contract.

Total Obligation amount: $250,000.00 Base and Exercised Options: $742,262.40 Base and All Options: $3,045,640.00 Accounting Info: 2016-X0200-FEEBASED-10-10D009-51-J-145-6092-252A Period of Performance: 10/01/2016 to 09/30/2020

Award new contract for the Cyber Monitoring and Incident Response Contract. SSG has approved. See attached SOW, IGCE, Requisition Checklist, Evaluation· Factors, and Form 187.

Cyber security services and incident response support for base year Total Obligated Amount$742,262.40 Incrementally Funded Amount: $250,000.00

Delivery: 07/22/2016

Cyber Security and Incident Response Services Option.Year 1 Amount: $754,875.ZO(Option Line Item) Anticipated Exercise Date09/.01/2017

Cyber Security and Incident Response Services Option Period 2 Amount: $767,728.00(0ption Line Item) Anticipated Exercise Date09/01/2018

Cyber Security and Incident Response Services Option Period 3 Amount: $780,774.40(0ption Line Item) Anticipated Exercise Date09/0l/2019 .

The obligated amount of award: $250,000.00. The total for this award is shown in box 15G.

AUTHORIZED FOR LOCAl REPR~ •.

, ... - ..

QUANTITY UNIT UNIT PRICE

(C) (D) (E)

PAGE OF

2 2

AMOUNT

(F)

742,262.40

OPTIC»W. FORM 335 (4-1111) Sponsored by GSA FAR (411CFR)53.110

o.oo

0.00

o.oo

SECTION B - Supplies or Services/Prices

NRCB010 BRIEF PROJECT TITLE AND WORK DESCRIPTION

(a) The title of this project is: Cyber Security and Incident Response Services

(b) Summary work description: The objective of this Statement of Work (SOW) is for the Contractor to provide direct support of Computer Information Security Directorate/Cyber Security Situational Awareness, Analysis and Response Team ISD/CSAART activities and initiatives. The contractor will assist ISO in developing, establishing and maintaining a robust cybersecurity program thafincludes but is not limited to the IT Security Service domain requirements.

(End of Clause)

NRCB084 CONSIDERATION AND OBLIGATION- LABOR-HOUR CONTRACT

I

(a) The ceiling price to the Government tor full performance under this contract is $7 42,262.40.

(b) The contract includes direct labor hours at specified fixed hourly rates, inclusive of wages, fringe, overhead, general and administrative expenses, and profit.

(c) It is estimated that the amount currently obligated will cover performance through 9/30/2017.

(d) This is an incrementally-funded contract and FAR 52.232~22 - "Limitation of Funds" applies.

(End of Clause)

Pricing Structure

Base Period: 09/30/2016-09/30/2017 CUN Labor Category Number

0001 0001aa 0001ab 0001ac 0001ad 0001ae

Hours (Estimated)

Rate Total (Not-To-Exceed Ceil in

Page 1 of 59 ·

0 ti on Period I: I 0/01 /2017-09/30/2018 CUN Labor Category Hours Rate Total Number (Estimated) (Not-To-Exceed

Ceilin 0002 0002aa 0002ab 0002ac 0002ad 0002ae

0 tion Period 2: 10/01 /2018-09/30/2019 CLIN Labor Category Hours Rate Total Number (Estimated) (Not-To-Exceed

Ceiiin 0003 0003aa 0003ab 0003ac 0003ad Securit Coordinator 0003ae Pro'ect Mana er.

0 tion Period 3: 10/01 /2019-09/30/2020 CUN Labor Category Hours Rate Total Number (Estimated) (Not-To-Exceed

Ceilin 0004 0004aa 0004ab 0004ac 0004ad 0004ae

Page 2 of 59

SECTION C - Description/Specifications

DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

(Level-of-Effort)

Table of Contents:

C.1 Title of Project C.2 Background C.3 Objective C.4 Scope of Work!Tasks C.5 Estimated Labor Categories, Key Personnel and Levels of Effort C.6 Certification and License Requirements C.7 Reporting Requirements

C.7.1 Kick-off Meeting C.7.1 Monthly Letter Status Report (MLSR) C.7.2 Bi-Weekly Report C.7.3 Project Plan C.7.4 Ad Hoc Documents and Reports C.7.5 Final Report

C.8 List of Deliverables C.9 Required Materials/Facilities C.1 O Release of Publications C.11 Place of Performance · C.12 Recognized Holidays C.13 Hours of Operation C.14 Contractor Travel C.15 Data Rights C.16 Section 508 - Electronic and Information Technology Standards C.17 Applicable Publications (Current Editions)

Page 3 of 59

C.1 Title of Project

This is a non-personal services contract to provide C.yber Monitoring and Incident Response (CMIR) to the Office of Chief Information Officer/ Information Security Direct9rate (OCIO/ISD).

C.2 Background

The Nuclear Regulatory Commission (NRG) was created as an independent Agency by Congress in 197 4 to enable the nation to safely use radioactive materials for beneficial civilian purposes while ensuring that people and the environment are protected. It regulates commercial nuclear power plants and other uses of nuclear materials, such as in nuclear medicine, through licensing, inspection and enforcement of its requirements. The NRC's headquarters are in Rockville, Maryland, and it has a number of other offices around the United States.

The Information Security Directorate (ISO) and Cyber Situational Awareness, Analysis and Response Team (CSAART) are the focal points for receiving, tracking, monitoring, and reporting NRC's computer security incidents; monitoring NRC's IT security vulnerabilities, maintaining an awareness of the threat to NRC's IT infrastructure, and providing appropriate information to senior NRG officials so they maintain an up to date awareness of the threat and NRC's vulnerability to that threat. The ISD/CSAART also monitors NRG intrusion detection and intrusion prevention systems, conducts trend analysis of events and recommending actions to minimize or prevent releases of information. The CSAART also communicates relevant computer security information such as security alerts, advisories, and bulletins to NRG staff;- acts-as the reporting authority to the US Computer Emergency Readiness Team (CERT), OMS, law enforcement, and criminal investigation groups for cyber related attacks against the NRG. CSAART performs forensics on external media, identifying malware and vulnerabilities. CSAART performs annual agency wide Incident Response testing. ISO maintains a stand-alone test lab to support these initiatives.

The NRC currently uses a small business contract to provide cyber security support for the Office of Chief Information Officer (OCIO), Information Security Directorate (ISO). The final option year for the order ends on September 20, 2016.

C.3 Objective

The objective of this Statement of Work (SOW) is for the Contractor to provide direct support of Computer Information Security Directorate/Cyber Security Situational Awareness, Analysis and Response Team ISD/CSAART activities and initiatives. The contractor will assist ISO in developing, establishing and maintaining a robust cybersecurity program that includes but is not limited to the IT Security Service domain requirements listed below:

Mandatory Tasks 1) Cyber Security system/application development and deployment - Incident Response .Database (IRDB). 2) Computer Security Incident Response Analysis 3) Suspect File Analysis/Malware Analysis/ Ad-hoc analysis

Page 4 of 59

4) Digital Forensic Analysis 5) Cyber Security Monitoring 6) Cyber Security Situational Awareness Reporting 7) Cyber Security Process and Assessment Documentation 8) Bi-annual Incident Response Testing 9) Project Management Support Optional Tasks 10) Cyber Situational Awareness ISO Laboratory

C.4 Scope of WorkfTasks

The following are. mandatory tasks that shall be performed by the contractor:

C.4.1 Cyber Security system/application development and deployment - Incident Response Database.

The contractor shall maintain, modify, and enhance the IRDB application and generate and create reports on the ISO Incident Response database, which is built on the Archer Platform. The contractor shall have knowledge of and the ability to add, modify, and delete fields to the application and create, modify and generate reports as required. The deliverable or outcome is the proper maintenance, operation and upgrade of the IRDB'. The IRDB has an average of 1 major and 3 minor upgrades per year and ongoing maintenance. ·

C.4.2 Computer Security Incident Response Analysis

The contractor shall perform in depth analyses of computer security incidents in relation to the threat vector, cause, vulnerability type, containment action, remediation actions, eradication efforts, and recovery. The contractor shall analyse suspicious emails, email senders, the Data Loss Prevention application, and perform analyses of suspected malware and suspect web sites. The deliverable or outcome is the successful and proper diagnosis and remediation of computer security incidents and identification of the root cause of the various threats and threat vectors. The NRG creates about 400 computer security incidents per year.

C.4.3 Suspect File/Malware/Ad Hoc Analysis

The contractor shall perform Suspect File Analysis (SFA) on all foreign presented (i.e. gifts, media and devices) given during conferences to protect the Confidentiality, Integrity and Availability (CIA) of data within the NRG. These devices may contain potentially malicious content that will require analysis to determine its existence. The contractor shall perform in depth analysis of all files and determine if malware exists and if so; identify the malware used and any Indicators of Compromise. NRG processes about 50 SFA cases per year.

The contractor shall perform Malware Analysis (MA) to determine what has been modified on the victim or target system to understand how the malware operates and the harm it could perform. The contractor shall perform in depth analysis of all files and determine if malware exists and if so, identify the malware used and any Indicators of Compromise The deliverable or outcome is successful examination of all media provided to ISO and

Page 5 of 59

the report of the analyses. ISO performs about 6 MA cases per year.

The contractor shall analyze miscellaneous and ad-hoc analysis on files, media, or potentially malicious emails/attachments when needed. The Government Furnished Property tools that will be housed in the lab will allow for a broad range of in depth analysis to determine the nature of suspicious files. The contractor shall use the tools effectively and provide results of the analyses. The NRG performs about 1 O ad-hoc analyses per year.

C.4.4 Digital Forensic Analysis

The contractor shall have the ability to run digital forensics, have the ability to conduct comprehensive and forensically sound investigations on suspicious hard drives and other media devices and keep redundant backup of case files. This will allow ISO to fulfil its duty as an agency-level liaison with external entities in the case of digital forensics; such as the Federal Bureau of Investigations (FBI), National Security Agency (NSA), and Department of Homeland Security (DHS). The contractor shall perform in depth analysis of all files and determine if malware or other anomalies exists and if so, identify the malware or anomaly and any Indicators of Compromise. The deliverable or outcome is successful forensics examination of all files provided to ISO and the report of the analyses. ISD performs about 3 Digital Forensic cases per year.

C.4.5 NRG Cyber Security Monitoring (using agency provided monitoring tools and other sources).·

The contractor shall have the ability to use the N~C network monitoring tools and extract pertinen_t data as required. The deliverable or outcome is successful use of the ISD and

. Operations network tools such as Intrusion Detection System, Intrusion Pr~vention System, Firewalls, Data Loss Prevention, Security Information and Event Management and other tools and the resulting written analyses. ISO regularly monitors networking monitoring tool about 2 hours per work day.

C.4.6 NRG Cyber Security Situational Awareness Reporting (relative to agency resiliency against periodic assessment of the threat as it pertains to the NRC's mission · and that of the federal government). ' The contractor shall perform Cyber Security Metrics Reporting in support of ISO situational awareness tracking and reporting using the I ROB and other reporting tools as provided for by the Government. The deliverable or outcome is successful creation of monthly, quarterly and annual incident report statistics and other reporting criteria as required by ISD or external entities such as GAO or OMB and the monthly reporting to ISO of the IRDB incident totals and other statistics as required from ISO for other reports like the ISO, cyberscope or COM dashboard. ISD performs an average of 3 metrics reports per month. C.4.7 Cyber Security Process and Assessment Documentation. The contractor shall create and provide tec,hnical documentation including but not limited to: security authorization process artifacts and cyber security capability assessments and recommendations to improve agency cyber security: Other documentation to capture and report on the security posture of the agency or to document cyber situational awareness security capabilities. ISO will also require the documentation of internal cyber situational awareness, analysis and response processes, procedures and policy recommendations to record and sustain cyber situational awareness. Other

Page 6 of 59

documentation to capture and report on the security posture of the agency or to document cyber situational awareness capabilities will be required such as provide input into a Management :dashboard the reflects cyber security incidents and real time cyber security status and ad hoc reports. The deliverable or outcome is the completion of acceptable reports and approved by the COR. ISO creates 5-1 O documents per year, and updates between 1 O documents per year. C.4.8 Bi-Annual Incident Response Testing The contractor shall formulate the Bi-annual agency-wide Incident Response Test Plan, run the required tests, gather and report on the test results in the required format. The deliverable or outcome is the creation of the Bi-annual agency-wide test plan, conducting

·of the tests and creating a test results report and the acceptance of the documents by the COR. ISO creates 2 test plans per year, conducts 2 tests per years, and provides 2 test reports per year. C.4.9 Project Management Support The contractor project manager will provide be responsible for the deliverables listed in section 'C.7 and managing all contractor tasks and deliverables as well as submitting and verifying contractor invoices. The deliverable or outcome is the creation of the monthly status report, the bi-monthly status report, the Project Schedule, Ad Hoc documents and reports and the final report and have them accepted by the COR. The contractor shall provide status reports including self-evaluations and management briefings to document support services activities, summarize accomplishments, present analyses of major challenges and offer innovative solutions to improve weaknesses based on established performance measures. The Project Manager will be required to attend various meeting and coordinate efforts with the COR and other Government personnel. The following are optional tasks to be performed by the contractor as the need arises during the course of the contract. · C.4.1 O Cyber Situational Awareness ISO Laboratory

The contractor will support the capability of the ISO to implement securitY testing and analysis to provide a virtualized environment for web application and infrastructure security testing using Government Furnished Equipment (GFE) or other authorized components in support of the existing and target security architecture.

The contractor shall set up, administrate and maintain the ISO Computer L;:ib and all of its hardware, software and~applications. Contractor personnel are directly involved with the planning, development, engineering, and maintenance of the ISO Computer Lab. Lab support entails but is not limited to the following tasks: , 1) Perform various field related tasks such as digital forensics investigations, malware analysis and identification, penetration testing, intelligence gathering operations, and software stress testing and analysis. 2) Set up configure and maintain the Lab equipment and software including the lab network 3) Assess the potential effect of certain applications and programs by running them in a virtualized enterprise environment and monitoring effects/load balancing on systems and network. 4) Allow users authorized by the systems ISSO to test and train on computer security related tools to effectively support the NRC's mission. 5) Support additional NRC offices and contractors with computer security related requests. 6) Engage in Continuous Diagnostic and Monitoring activities with OCIO personnel. 7) Perform system administrative duties as data entry, statistic gathering, reporting and

Page 7 of 59

document creation and updating. 8) Compliance Scanning & Analysis. The contractor in the ISO lab shall perform hardening checks and vulnerability remediation on NRG systems, including the lab components and other components as required. 9) TrainingfTool Analysis and Evaluation The contractor in the Lab shall assist ISO personnel to harness and expand their knowledge of security tools and skills by providing an environment for training and learning current as well as new security tools. The Lab will also provide virtual environments that will permit ISO to load new security tools to evaluate, test and recommend as security enhancements

Maintaining and supporting the lab is a continuous role that takes several hours per day.

Note 1: The Contractor must ensure that any system or application meets federally mandated and NRG defined security requirements. The NRG follows National Institute of Standards and Technology (NIST) guidance provided in the NIST SP-800 publications. Also, the Contractor will use industry best practices whenever feasible while executing the tasks outlined in this Statement of Work.

Note 2: The Contractor performs Incident Response, Forensics and other capabilities and therefore, must be dedicated to the CSO cyber situational awareness support role. As such, the contractor acknowledges that they are not authorized to enter into an IT or IT security role for the development, operation or maintenance of non-ISO information system at the U.S. Nuclear Regulatory Commission without prior written approval from an authorized agency COR. C.5 Estimated Labor Categories, Key Personnel and Levels of Effort.

This is a Level of Effort contract which includes provisions for award of a Level of Effort. contract.

Labor Categories, Requirements and Key Personnel. Personnel working under this contact/order shall meet the minimum requirements for experience and education, as follows:

The Contractor's personnel shall have an in depth understanding of the cu~rent tools and skills listed below, including but not limited to; ·

•Information Assurance Applications: Encase, Nessus, Fidelis, RSA Archerlncident Management

• Security Expertise: computer and network forensics, secure baseline configurations, network engineering , network monitoring, Intrusion Detection Systems (IDS), log capture and edit, Firewalls, Virtual Private Networking (VPN), network routers, switches and infrastructure, Wireless network technologies (802 .11 x, Bluetooth) as well as Citrix, Mobility Solutions, Malware, and Spyware.

TheJContractor's personnel shall have an understanding latest and previous version of the following IT elements:

• Operating systems: VMware, Linux, Solaris, Microsoft Windows, Microsoft Windows

Page 8 of 59

\.

Servers. Contractors should also have an understanding and a level of experience working with virtualization techniques and operating system images.

•Software Applications: SQL, Exchange, Microsoft Internet Information Services (llS), . Oracle, and Citrix,

The Contractor personnel shall keep current with advances in relevant technology and share this knowledge with other contractor and Government NRC personnel: Act in a consultive manner, proactively searching for creative solutions and strategies: Respond promptly, professionally and courteously to Government requests for assistance and advice on in-scope NRC cybers"ecurity topics: freely provide knowledge transfer of work products and technology expertise associated with contracted services.

The number of Contractor personnel will vary during the course of the contract. The government reserves the right to review resumes for all of the proposed candidates and accept or reject any or all of the candidates. Contractor key personnel is the part time Project Manager.

Labor Category Position Minimum Requirements Key Personnel* (ves or no)

Information Analyzes and defines security requirement no Assurance for computer systems which may include Development servers, network appliances and Engineer workstations. Designs, develops,

engineers, and implements solutions that meet security requirements. ·Provides integration and implementation of the computer system security solution.

Information Analyzes general information no Assurance assurance-related technical problems and Systems/Network provides basic engineering and technical Specialist support in solving these problems.

./ Designs, develops, engineers, and implements solutions that meet network S$curity requirements. Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.

Data Security Interfaces with user community to no Analyst - understand security needs and implements Intermediate procedures to accommodate them.

Conducts accurate evaluation of the level of security required. Provides management with status reoorts

Security Coordinates, develops, and evaluates no Coordinator security programs for an organization and

authors documents. Project Manager Responsible for all aspects of the yes

development and implementation of

Page 9 of 59

assigned projects and Provides a single point of contact for those projects. Takes projects from original concept through final implementation. Interfaces with all areas affected by the project including end users, computer services and client services.

*See NRCAR 2052.215-70, "Key Personnel"

Level-of-Effort (in hours) Estimate the number of hours required for each labor category, including base and option periods.

Task

C.4.1 Cyber Security system/application development and deployment -Incident Response Database C.4.2 Computer Security Incident Response Analysis Suspect File/Malware/ Ad Hoc Analysis

C.4.4 Digital Forensic Analysis C.4.5 NRC Cyber Security Monitoring C.4.6 NRC Cyber Security Situational Awareness Re ortin C.4.7 Cyber Security Process and Assessment Documentation C.4.8 Bi-Annual Incident Response Testing

Base Year Estimated Hours

0 tion 1 Option 2 Option·3 Total Estimated Estimated Estimated Hours Hours Hours -

Page 10 of 59

C.4.9 Project Management Su ort C.4.1 O Cyber Situational Awareness !SD Laborator

-C.6 Certification and License Reauirements

The contractor is responsible for ensuring that one or more of the employees assigned to this Government contract/order possess and maintain the following professional certifications and/or licenses:

CISSP at the beginning of the contract.

The Project Manager must have the Project Management Professional (PMP) Certification.

C.7 Reoorting Reauirements

C.7.1 Kick-Off Meeting The contractor shall hold a technical kickoff meeting within ten (10) business days following contract award. The Contractor shall be present, and present for review and approval by the Government, the details of the intended Contract approach, work plan, and the plan for staffing of the contract.

C.7 .2 Monthly Letter Status Reports (MLSR) The contractor shall provide a Monthly Status Report which consists of a technical progress report and financial status report. This report will be used by the Government to assess the adequacy of the resources proposed by the contractor to accomplish the work contained in this SOW and provide status of contractor progress in achieving tasks and producing deliverables. The report shall include contract/order summary information, work completed during the specified period, milestone schedule information, problem resolution, travel

. plans, and staff hour summary. Each report must include the following for each discrete task/task order:

(a) A listing of the efforts completed during the period, and milestones reached or, if missed, an explanation provided;

(b) Any problems or delays encountered or anticipated and recommendations for resolution. If the recommended resolution involves a contract modification, e.g., change in work requirements, level of effort (cost) or schedule delay, the contractor shall submit a separate letter to the contracting officer identifying the required change and estimated cost impact.

(c) A summ~ry of progress to date; and

(d) Plans for the next reporting period.

Page 11 of 59

C.7.3 Bi-Weekly Reports The contractor shall also provide a bi-weekly status report in a format similar to the monthly report.

C.7.4 Project Plan (includes Level 3 WBS). The Contractor shall develop and maintain a Project Plan using Microsoft Project and provide electronic copies of the Project Plan to the NRG COR bi~weekly. The Project Plan shall be based on a Level 3 Work Breakdown Structure (WBS) and use the Project Plan template found in PMM. The WBS shall include a definition of the work to be conducted decomposed into distinct discrete manageable tasks or groups of tasks (Work Packages) with decisive outputs and specific measurable entry and exit criteria. Each Work Package shall have a short duration (not to exceed one hundred twenty (120) hours), or can be divided into a series of milestones whose status can be objectively measured. Each Work Package shall be assigned a start and finish date, a budget value, and can be integrated with higher-level schedules.

The Project Plan shall specify a schedule and budget to accomplish the work and identify the resources needed to complete the work. Resources include manpower, hardware, software, equipment, travel, etc.

C.7.5 Ad Hoc Documents and Reports The contractor will be tasked to provide vario'Us technical documents and reports as described above including sections C.4.

C.7.6 Final Report The contractor shall provide a final report summarizing the work performed and the results and conclusions under this contract/order.

C.8 List of Deliverables

Section# Deliverable Due Date Format Submit to C.7.1 Kick-off Meeting 1 0 days after Word COR/SITSO

contract award Document C.7.2 Monthly Report 1th of the month Word COR/SITSO

MLSR Document C.7.3 Project plan with 5th of the following · MS Project COR/SITSO

milestones month C.7.4 Bi-Weekly Report 15th of the month Word COR/SITSO

Document C.7.5 Ad Hoc As required Word COR/SITSO

Documents and Document Reports

C.7.6 Final report 30 days prior to Word COR/SITSO contract expiration Document

C.9 Required Materials/Facilities

Not Applicable

Page12of59

C.1 O Release of Publications

Any documents generated by the contractor under this contract/order shall not be released for publication or dissemination without CO and COR prior written approval.

C.11 Place of Performance

The work to be performed under this contract/order will be primarily performed at NRC Headquarters. U.S NRC, 11545 Rockville Pike, Rockville MD.

C.12 Recognized Holidays

The contractor is not required to perform services on federal holidays.

New Year's Day Martin Luther King Jr.'s Birthday President's Day Memorial Day Independence Day

C.13 Hours of Operation

Labor Day Columbus Day Veteran's Day Thanksgiving Day Christmas Day

The contractor shall provide required support between the hours of 8:00 AM to 7:00 PM, Monday thru Friday except Federal holidays or when the Government facility is closed due to local or national emergencies, administrative closings, or similar Government directed facility closings. For other than firm fixed price contracts, the contractor will not be reimbursed when the government facility is closed for the above reasons. The contractor must at all times maintain an adequate workforce for the uninterrupted performance of all tasks defined within this SOW when the Government facility is not closed for the above reasons. When hiring personnel, the contactor shall keep in mind that the stability and continuity of the workforce are essential.

C.14 Contractor Travel

Not Applicable, local travel to the NRG is the responsibility of the contractor.

Contractor will be authorized travel expenses consistent with the Federal Travel Regulation (FTR} and the limitation of funds specified in the travel line item of this contract/order. All travel requires prior written Government approval from the CO, unless otherwise delegated to the COR.

C.15 Data Rights

The NRC shall have unlimited rights to and ownership of all deliverables provided under this contract/order, including reports, recommendations, briefings, work plans and all other deliverables. All documents and materials, to include the source codes of any software, produced under this contract/order are the property of the Government with all rights and privileges of ownership/copyright belonging exclusively to the Government. These documents and materials may not be used or sold by the contractor without prior written authorization from the COR. All materials supplied to the Government shall be

Page 13 of 59

the sole property of the Government and may not be used for any other purpose. This right does not abrogate any other Government rights.

/

C.16 Section 508 - Electronic and Information Technology Standards

The following standards are applicable to this contract/order (Check those that fil2J2}yJ.:

Subpart B- Technical Standards D Software Applications and Operating Systems (1194.21) 0 Web-based Intranet and Internet Information and Applications (1194.22) D Telecommunications Products (1194.23) O Video and Multimedia Products (1194.24) D Self-Contained, Closed Products (1194.25) O Desktop and Portable Computers (1194.26)

Subpart C - Functional Performance Criteria D Functional Performance Criteria (1194.31)

Subpart D - Information, Documentation, and Support D Information, Documentation, and Support (1194.41)

EIT purchased under this contract/order must ,be accessible to persons with disabilities, unless otherwise stipulated in the contract/order. Any product replacements contemplated under this contract/order must be equally as 508 compliant as (or more compliant than) the original product purchased. Also, the .Government reserves the right to conduct hands-on testing to validate contractor 508 compliance claims.

A Voluntary Product Accessibility Template (VPAT) shall be provided along with EIT deliverables submitted to the Government, if available.

C.17 Applicable Publications (Current Editions) The contractor shall comply with the following applicable regulations, publications, manuals, and local policies and procedures:

The Contractor shall have knowledge and experience with, but not limited to the following federal regulations, standards and guidelines:

•The Federal Information Security Management Act of 2002 and 2014 • The E-Government Act of 2002 •The Clinger-Cohen Act of 1996 •The Financial Management Improvement Act of 1996 •The Financial Management Integrity Act of 1982 • The Privacy Act of 197 4 • Federal Enterprise Architecture (FEA) • Cyber Security relevant OMB Memorandums • OMB Circulars

· • Presidential Directives • Department of Homeland Security - USCERT Incident Response Directives .. National Security Directives ·

Page 14 of 59

• Executive Orders •Intelligence Reform and Terrorism Prevention Act • Director of Central Intelligence Directives •NIST Federal Information Processing Standards (FIPS) •NIST SP 800 series • CNSS publications • NIST Guide for Information Security Program Assessments and System Reporting Form · •Department of Homeland Security National Strategy to Secure Cyberspace

(

Page 15 of 59

SECTION D - Packaging and Marking

N/A

Page 16 of 59

SECTION E - Inspection and Acceptance

NRCE010 INSPECTION AND ACCEPTANCE BY THE NRC (SEP 2013)

Inspection and acceptance of the deliverable items to be furnished hereunder shall be made by the NRC Contracting Officer's Representative (COR) at the destination, accordance with FAR 52.247-34 - F.o.b. Destination.

Contract Deliverables: The deliverables associated with this contract are spelled out in the.SOW. See Section C for more information.

(End of Clause)

/

Page 17 of 59

i

SECTION F- Deliveries·or Performance

NRCF030 PERIOD OF PERFORMANCE

This contract shall commence on 09/30/202016 and will expire on 09/30/2017. ' '

(End of Clause)

NRCF010 PLACE OF DELIVERY-REPORTS

The items to be furnished hereunder shall be delivered, with all charges paid by the Contractor, to:

a. Name: Charles Watkins (1 hard copy) b. Contracting Officer's Representative (COR) c. U.S. Nuclear Regulatory Commission d. Address: 11555 Rockville Pike Rockville MD 20852-27 46 e. Electronic copies to: [email protected] g. Name: Matthew Bucher (1 hard copy) h. Contracting Officer (CO) i. U.S. Nuclear Regulatory Commission j. Address: 11555 Rockville Pike Rockville MD 20852

(End of Clause)

Page 18 of 59

SECTION G - Contract Administration Data

NRCG030 ELECTRONIC PAYMENT (SEP 2014)

The Debt Collection Improvement Act of 1996 requires that all payments except IRS tax refunds be made by Electronic Funds Transfer. Payment shall be made in accordance with FAR 52.232-33, entitled "Payment by Electronic Funds-Central Contractor Registration".

To receive payment, the contractor shall prepare invoices in accordance with NRC's Billing Instructions. Claims shall be submitted on the payee's letterhead, invoice, or on the Government's Standard Form 1034, "Public Voucher for Purchases and Services Other than Personal," and Standard Form 1035, "Publi~ Voucher for Purchases Other than Personal - Continuation Sheet." The preferred method of submitting invoices is electronically to: [email protected].

(End of Clause)

Page 19 of 59

' '

SECTION H - Special Contract Requirements

2052.204-70 SECURITY. (OCT 1999)

(a) Security/Classification Requirements Form. The attached NRC Form 187 (See List of Attachments) furnishes the basis for providing security and classification requirements to prime contractors, subcontractors, or others (e.g., bidders) who have or may have an NRC contractual relationship that requires access to classified information or matter, access on a continuing basis (in excess of 90 or more days) to NRC Headquarters controlled buildings, or otherwise requires NRC photo identification or card-key badges.

(b) It is the contractor's duty to safeguard National Security Information, Restricted Data, and Formerly Restricted Data. The contractor shall, in accordance with the Commission's security regulations and requirements, be responsible for safeguarding National Security Information, Restricted Data, and Formerly Restricted Data, and for protecting against sabotage, espionage, loss, and theft, the classified documents and material in the contractor's possession in connection with the perfo~mance of work under this contract. Except as otherwise expressly provided in this contract, the contractor shall transmit to the Commission any classified matter in the possession of the contractor or any person under the contractor's control in connection with performance of this contract upon completion or termination of this contract.

(1) The contractor shall complete a certificate of possession to be furnished to the Commission specifying the classified matter to be retained if the retention is:

(i) Required after the completion or termination of the contract; and

(ii) Approved by the contracting officer.

(2) Tl;le certification must identify the items and types or categories of matter retained, the conditions governing the retention of the matter and their period of retention, if known. If the retention is approved by the contracting officer, the security provisions of the contract continue to be applicable to the matter retained.

(c) In connection with the performance of the work under this contract, the contractor may be furnished, or may develop or acquire, proprietary data (trade secrets) or confidential or privileged technical, business, or- financial information, including Commission plans, policies, reports, financial plans, internal data protected by the Privacy Act of 1974 (Pub. L. 93-579), or other information which has not been released to the public or has been determined by the Commission to be otherwise exempt from disclosure to the public. The contractor agrees to hold the information in confidence and not to directly or indirectly duplicate, disseminate, or disclose the information, in whole or in part, to any other person or organization except as necessary to perform the work under this contract. The contractor agrees to return the information to the Commission or otherwise dispose of it at the direction of the contracting officer. Failure to comply with this clause is grounds for termination of this contract.

(d) Regulations. The contractor agrees to conform to all security regulations and requirements of the Commission which are subject to change as directed by the NRC Division of Facilities and Security and the Contracting Officer. These changes will be

Page 20 of 59

under the authority of the FAR Changes clause referenced in Section I of this document.

(e) Definition of National Security Information. As used in this clause, the term National Security Information means information that has been determined pursuant to Executive Order 12958 or any predecessor order to require protection against unauthorized disclosure and that is so designated.

(f) Definition of Restricted Data. As used in this clause, the term Restricted Data means all data concerning design, manufacture, or utilization of atomic weapons; the production of special nuclear material; or the use of special nuclear material in the production of energy, but does not include data declassified or removed from the Restricted Data category under to Section 142 of the Atomic Energy Act of 1954, as amended.·

(g) Definition of Formerly Restricted Data. As used in this clause the term Formerly Restricted Data means all data removed from the Restricted Data category under Section 142-d of the Atomic Energy Act of 1954, as amended.

(h) Security clearance personnel. The contractor may not permit any individual to have access to Restricted Data, Formerly Restricted Data, or other classified information, except in accordance with ttie Atomic Energy Act of 1954, as amended, and the Commission's regulations or requirements applicable to the particular type or category of classified information to which access is required. The contractor shall also execute a Standard Form 312, Classified Information Nondisclosure Agreement, when access to classified information is required.

(i) Criminal liabilities. Disclosure of National Security Information, Restricted Data, and Formerly Restricted Data relating to the work or services ordered hereunder to any person not entitled to receive it, or failure to safeguard any Restricted Data, Formerly Restrictecj Data, or any other classified matter that may come to the contractor or any person under the contractor's control in connection with work under this contract, may subject the contractor, its agents, employees, or subcontractors to criminal liability under the laws of the United States. (See the Atomic Energy Act of 1954, as amended, 42 U.S.C. 2011 et seq.; 18 U.S.C. 793 and 794; and Executive Order 12958.)

U) Subcontracts and purchase orders. Except as otherwise authorized, in writing, by the contracting officer, the contractor shall insert provisions similar to the foregoing in all subcontracts and purchase orders under this contract.

(k) In performing contract work, the contractor shall classify all documents, material, and equipment originated or generated by the contractor in accordance with guidance issued by the Commission. Every subcontract and purchase order issued under the contract that involves originating or generating classified documents, material, and equipment must provide that the subcontractor or supplier assign the proper classification to all documents, material, and equipment in accordance with guidance furnished by the contractor.

(End of Clause)

2052.204-71 SITE ACCESS BADGE REQUIREMENTS. (JAN 1993)

Page 21 of 59

During the life of this contract, the rights of ingress and egress for contractor personnel must be made available as required. In this regard, all contractor personnel whose duties under this contract require their presence on-site shall be clearly identifiable by a distinctive badge furnished by the Government. The Project Officer shall assist the contractor in obtaining the badges for contractor personnel. It is the sole responsibility of the contractor to ensure that each employee has proper identification at all times. All prescribed identification must be immediately delivered to the Security Office for cancellation or disposition upon the termination of employment of any contractor personnel. Contractor personnel shall have this identification in their possession during on-site performance under this contract. It is the contractor's duty to assure that contractor personnel enter only those work areas necessary for performance of contract work and to assure the safeguarding of any Government records or data that contractor personnel may come into contact with.

(End of Clause)

2052.211-70 PREPARATION OF TECHNICAL REPORTS. (JAN 1993)

2052.211-72 FINANCIAL STATUS REPORT. (OCT 1999)

2052.215-70 KEY PERSONNEL. (JAN 1993)

2052.215-71.PROJECT OFFICER AUTHORITY. (OCT 1999)

(a) The contracting officer's authorized ·representative hereinafter referred to as the project officer for this contract is:

Name: Charles Watkins Address: 11555 Rockville Pike

Rockville, MD Telephone Number: 301-415-6199

(b) Performance of the work under this contract is subject to the technical direction of the NRG project officer. The term technical direction is defined to include the following:

(1) Technical direction to the contractor which shifts work emphasis between areas of work or tasks, authorizes travel which was unanticipated in the Schedule (i.e., travel not contemplated in the Statement of Work or changes to specific travel identified in the Statement of Work), fills in details, or otherwise serves to accomplish the contractual statement of work.

(2) Provide advice and guidance to the contractor in the preparation of drawings, specifications, or technical portions of the work description.

(3) Review and, where required by the contract, approve technical reports, drawings, specifications, and technical information to be delivered by the contractor to the Government under the contract.

(c) Technical .direction must be within the general statement of work stated in the contract. The project officer does not h_ave the authority to and may not issue any

Page 22 of 59

,--------------------

technical direction which:

(1) Constitutes an assignment of work outside the general scope of the contract.

(2) Constitutes a change as defined in the "Changes" clause of this contract.

(3) In any way causes an increase or decrease in the total estimated contract cost, the fixed fee, if any, or the time required for contract performance.

(4) Changes any of the expressed terms, conditions, or specifications of the contract.

(5) Terminates the contract, settles any claim or dispute arising under the contract, or issues any unilateral directive whatever.

(d) All technical directions must be issued in writing by the project officer or must be confirmed by the project officer in writing within ten (10) working days after verbal issuance. A copy of the written direction must be furnished to the contracting officer. A copy of NRC Form 445, Request for Approval of Official Foreign Travel, which has received final approval from the NRC must be furnished to the contracting officer.

(e) The contractor shall proceed promptly with the performance of technical directions duly issued by the project officer in the manner prescribed by this clause and within the project officer's authority under the provisions of this clause.

(f) If, in the opinion of the contractor, any instruction or direction issued by the project officer is within one of the categories defined in paragraph (c) of this section, the · contractor may not proceed but shall notify the contracting officer in writing within five (5) working days after the receipt of any instruction or direction and shall request that contracting officer to modify the contract accordingly. Upon receiving the notification from the contractor, the contracting officer shall issue an appropriate contract modification or advise the contractor in writing that, in the contracting officer's opinion, the technical direction is within the scope of this article and does not constitute a change

· under the "Changes" clause.

(g) Any unauthorized commitment or direction issued by the project officer may result in an unnecessary delay in the contractor's performance and may even result in the contractor expending funds for unallowable costs under the contract.

(h) A failure of the parties to agree up9n the nature of the instruction or direction or upon .. the contract action to be taken with respect to the instruction or direction is subject to

52.233-1 - Disputes.

(i) In addition to providing technical direction as defined in paragraph (b) of the section, the project officer shall:

(1) Monitor the contractor's technical progress, including surveillance and assessment of performance, and recommend to the contracting officer changes in requirements.

(2) Assist the contractor in the resolution of technical problems encountered during performance.

Page 23 of 59

(3) Review all costs requested for reimbursement by the contractor and submit to the contracting officer recommendations for approval, disapproval, or suspension of payment for supplies and services required under this contract.

(End of Clause)

NRCH440 CONTRACTOR RESPONSIBILITY FOR PROTECTING PERSONALLY IDENTIFIABLE INFORMATION (Pll)

In accordance with the Office of Management and Budget's guidance to Federal agencies and the Nuclear Regulatory Commission's (NRC) implementing policy and procedures, a contractor (including subcontractors and contractor employees), who performs work on behalf of the NRC, is responsible for protecting, from unauthorized access or disclosure, personally identifiable information (Pll) that may be provided, developed, maintained, collected, used, or disseminated, whether in paper, electronic, or other format, during performance of this contract.

A contractor who has access to NRC owned or controlled Pll, whether provided to the contractor by the NRC or developed, maintained, collected, used, or disseminated by the contractor during the course of contract performance, must comply with the following requirements:

·(1) General. In addition to implementing the specific requirements set forth ln this clause, the contractor must adhere to all other applicable NRC guidance, policy and requirements for the handling and protection of NRC owned or controlled Pll. The contractor is responsible for making sure that it has an adequate understanding of such guidance, policy and requirements.

(2) Use, Ownership, and Nondisclosure. A contractor may use NRC owned or controlled Pll solely for purposes of this contract, and may not collect or use such Pll for any purpose outside the contract without the prior written approval of the NRC Contracting Officer. The contractor must restrict access to such information to only those contractor employees who need the information to perform work under this contract, and must ensure that each such contractor employee (including subcontractors' employees) signs a nondisclosure agreement, in a form suitable to the NRG Contracting Officer, prior to being granted access to the information. The NRC retains sole ownership and rights to its Pll. Unless the contract states otherwise, upon completion of the contract, the contractor must turn over ali Pll in its possession to the NRC, and must

\

certify in writing that it has not retained any NRC owned or controlled Pll except as otherwise authorized in writing by the NRC Contracting Officer.

(3) Security Plan. When applicable, and unless waived in writing by the NRC Contracting Officer, the contractor must work with the NRC to develop and implement a security plan setting forth adequate procedures for the protection of NRC owned or controlled Pll as well as the procedures which the contractor must follow for notifying the NRC in the event of any security breach. The plan will be incorporated into the contract and must be implemented and followed by the contractor once it has been approved by the NRG Contracting Officer. If the contract does not include a security plan at the time of contract award, a plan must be submitted for the approval of the NRC Contracting Officer within 30 days after contract award.

Page 24 of 59

! (4) Breach Notification. The contractor must immediately notify the NRC Contracting Officer and the NRC Contracting Officer's Representative (COR) upon discovery of any suspected or confirmed breach in the security of NRC owned or controlled Pll.

(5) Legal Demands for Information. If a legal demand is made for NRC owned or controlled Pll (such as by subpoena), the contractor must immediately notify the NRC Contracting Officer and the NRC Contracting Officer's Representative (COR). After notification, the NRC will determine whether and to what extent to comply with the legal demand. The Contracting Officer will then notify the contractor in writing of the determination and such notice will indicate the extent of disclosure authorized, if any. The contractor may only release the information specifically demanded with the written permission of the NRC Contracting Officer.

(6) Audits. The NRC may audit the contractor's compliance with the requirements of this clause, including through the use of online compliance software.

(7) Flow-down. The prime contractor will flow this clause down to subcontractors that would be covered by any portion of this clause, as if they were the prime contractor.

(8) Remedies:

(a) The contractor is responsible for implementing and maintaining adequate security controls to prevent the loss of control or unauthorized disclosure of NRC owned or controlled Pll in its possession. Furthermore, the contractor is responsible for reporting any known or suspected loss of control or unauthorized access to Pll to the NRC in accordance with the provisions set forth in Article 4 above.

(b) Should the contractor fail to meet its responsibilities under this clause, the NRC reserves the right to take appropriate steps to mitigate the contractor's violation of this clause. This may include, at the sole discretion of the NRC, termination of the subject contract.

(9) Indemnification. Notwithstanding any other remedies available to the NRC, the contractor will indemnify the NRC against all liability (including costs and fees) for any damages arising out of violations of this clause.

(End of Clause)

NRCH430 DRUG FREE WORKPLACE TESTING: UNESCORTED ACCESS TO NUCLEAR FACILITIES, ACCESS TO CLASSIFIED INFORMATION-OR SAFEGUARDS INFORMATION, OR PERFORMING IN SPECIALLY SENSITIVE POSITIONS (OCT 2014)

All contractor employees, subcontractor employees, applicants, and consultants proposed for performance or performing under this contract shall be subject to pre-assignment, random, reasonable suspicion, and post-accident drug testing applicable to: (1) individuals who require unescorted access to nuclear power plants, (2) individuals who have access to classified or safeguards information, (3) individuals who are required to carry firearms in performing security services for the NRC, (4) individuals who are required to operate government vehicles or transport passengers for the NRC, (5) individuals who are required to operate hazardous equipment at NRC

Page 25 of 59

facilities, or (6) individuals who admit to recent illegal drug use or those who are found through other means to be using drugs illegally.

The NRG Drug Program Manager will schedule the drug testing for all contractor employees, subcontractor employees, applicants, and consultants who are subject to testing under this clause. The consequences of refusing to undergo drug testing or a refusal to cooperate in such testing, including not appearing at the scheduled appointment time, will result in the Agency's refusal of the contractor employee to work under any NRG contract. Any NRG contractor employee found.to be using, distributing or possessing illegal drugs, or any contractor employee who fails to receive a verified negative drug test result under this program while in a duty status will immediately be removed from working under the NRG contract. The contractor's employer will be notified of the denial or revocation of the individual's authorization to have access to . information and ability to perform under the contract. The individual may not work on any NRG contract for a period of not less than one year from the date of the failed, positive drug test and will not be considered for reinstatement unless evidence of rehabilitation, as determined by the NRG "drug testing contractor's" Medical Review Officer, is provided.

Contractor drug testing records are protected under the NRG Privacy Act Systems of Records, System 35, "Drug Testing Program Records - NRG" found at: http://www.nrc.gov/reading-rm/foia/privacy-systems.html

(End of Clause)

NRCH410 WHISTLEBLOWER PROTECTION FOR NRC CONTRACTOR AND SUBCONTRACTOR EMPLOYEES

(a) The U.S. Nuclear Regulatory Commission (NRG) contractor and its subcontractor are subject to the Whistleblower Employee Protection public law provisions as codified at 42 U.S.C. 5851. NRG contractor(s) and subcontractor(s) shall comply with the requirements of this Whistleblower Employee Protection law, and the implementing regulations of the NRG and the Department of Labor (DOL). See, for example, DOL Procedures on Handling Complaints· at 29 C.F.R. Part 24 concerning the employer obligations, prohibited acts, DOL procedures and the requirement for prominent posting of notice of Employee Rights at Appendix A to Part 24 entitled: "Your Rights Under the Energy Reorganization Act".

(b) Under this Whistleblower Employee Protection law, as implemented by regulations, NRG contractor and subcontractor employees are protected from discharge, reprisal, threats, intimidation, coercion, blacklisting or other employment discrimination practices with respect to compensation, terms, conditions or privileges of their employment because the contractor or subcontractor employee(s) has provided notice to the employer, refused to engage in unlawful practices, assisted in proceedings or testified on activities concerning alleged violations of the Atomic Energy Act of 1954 (as amended) and the Energy Reorganization Act of 1974 (as amended).

(c) The contractor shall insert this or the substance of this clause in any subcontracts involving work performed under this contract.

(End of Clause)

Page 26 of 59

NRCH400 SECURITY REQUIREMENTS RELATING TO THE PRODUCTION OF REPORTS OR THE PUBLICATION OF RESULTS UNDER CONTRACTS,· AGREEMENTS, AND GRANTS (JUL 2016)

Review and Approval of Reports

(a) Reporting Requirements. The contractor/grantee shall comply with the terms and conditions of the contract/grant regarding the contents of the draft and final report, summaries, data, and related documents, to include correcting, deleting, editing, revising, modifying, formatting, and supplementing any of the information contained therein, at no additional cost to the NRC. Performance under the contract/grant will not be deemed accepted or completed until it complies with the NRC's directions, as applicable. The reports, summaries, data, and related documents will be considered draft until approved by the NRC. The contractor/grantee agrees that the direction, determinations, and decisions on approval or disapproval of reports, summaries, data,

· and related documents created under this contract/grant remain solely within the discretion of the NRC.

(b) Publication of Results. Prior to any dissemination, display, publication, or release of articles, reports, summaries, data, or related documents developed under the contract/grant, the contractor/grantee shall submit them to the NRC for review and approval. The contractor/ grantee shall not release, disseminate, display or publish articles, reports, summaries, data, and related documents, or the contents therein, that have not been reviewed ari·d.approved by the NRC for release, display, dissemination or publication. The contractor/grantee agrees to conspicuously place any disclaimers, markings or notices, directed by the NRC, on any articles, reports, summaries, data, and related documents that the contractor/grantee intends to release, display, disseminate or publish to other persons, the public, or any other entities. The contractor/grantee agrees, and grants, a royalty-free, nonexclusive, irrevocable worldwide license ·to the government, to use, reproduce, modify, distribute, prepare derivative works, release, display or disclose the articles, reports, summaries, data, and related documents developed under the contract/grant, for any governmental purpose and to have or authorize others to do so.

(c) Identification/Marking of Sensitive Unclassified Non-Safeguards Information (SUNSI) and Safeguards Information (SGI). The decision, determination, or direction by the NRC that information possessed, formulated or produced by the contractor/grantee constitutes SUNSI or SGI is solely Within the authority and discretion of the NRC. In performing the contract/grant, the contractor/grantee shall clearly mark SUNSI and SGI, to include for example, QUO-Allegation Information or QUO-Security Related Information on any reports, documents, designs, data, materials, and written information, as directed by the NRC. In addition to marking the information as directed by the NRC, the contractor shall use the applicable NRC cover sheet (e.g., NRC Form 461 Safeguards Information) in maintaining these records and documents. The contractor/grantee shall ensure that SUNSI and SGI is handled, maintained and protected from unauthorized disclosure, consistent with NRC policies and directions. The contractor/grantee shall comply with the requirements to mark, maintain, and protect all information, including documents, summaries, reports, data, designs, and materials in accordance with the provisions of Section 147 of the Atomic Energy Act of 1954 as amended, its implementing regulations (1 O CFR 73.21 ), Sensitive Unclassified

Page 27 of 59

Non-Safeguards and Safeguards Information policies, and NRC Management Directives and Handbooks 12.5, 12.6 and 12.7.

(d) Remedies. In addition to any civil, criminal, and contractual remedies available under the applicable laws and regulations, failure to comply with the above provisions, and/or NRC directions, may result in suspension, withholding, or offsetting of any payments invoiced or claimed by the contractor/grantee.

(e) Flowdown. If the contractor/grantee intends to enter into any subcontracts or other agreements to perform this contract/grant, the contractor/grantee shall include all of the above provisions in any subcontracts or agreements.

NRCH380 SECURITY REQUIREMENTS FOR ACCESS TO CLASSIFIED MATTER OR INFORMATION (SEP 2013)

Performance under this contract will require access to classified matter or information (National Security Information or Restricted Data) in accordance with the attached NRC Form 187 (See List of Attachments). Prime Contractor personnel, subcontractors or others performing work under this contract shall require a "Q" security clearance (allows access to Top Secret, Secret, and Confidential National Security Information and Restricted Data) or an "L" security clearance (allows access to Secret and Confidential National Security Information and/or Confidential Restricted Data).

The Contractor must identify all individuals to work under this contract. The NRC sponsoring office shall rriake the final determination of the type of $_ecurity clearance required for all individuals working under this contract.

The Contractor shall conduct a preliminary security interview or review for each of its employees, subcontractor employees and consultants, and submit to the Government only the names of candidates that have a reasonable probability of obtaining the level of security clearance for which the candidate has been proposed. The Contractor will . pre-screen applicants for the following:

(a) pending criminal charges or proceedings; (b) felony arrest records including 'alcohol related arrest within the last seven (7) years; (c) record of any military courts-martial charges and proceedings in the last seven (7) years and courts-martial convictions in the last ten (1 O) years; (d )any involvement in hate crimes; (e) involvement in any group or organization that espouses extra-legal violence as a legitimate means to an end; (f) dual or multiple citizenship including the issuance of a foreign passport in the last seven (7) years; (g) illegal use possession, or distribution of narcotics or other controlled substances within the last seven (7) years; (h) financial issues regarding delinquent debts, liens, garnishments, bankruptcy and civil court actions in the last seven (7) years.

The Contractor will make a written record of their pre-screening interview or review (including any information to mitigate the responses to items listed in (a) - (h)), and have the candidate verify the record, sign and date it. Two (2) copies of the signed interview record or review will be supplied to DFS/PSB with the applicant's completed security

, application package.

The Contractor will further ensure that all Contractor employees, subcontractor employees and consultants for classified information access approval complete all

Page 28 of 59

I

security applications required by this clause within fourteen (14) calendar days of notification by DFS/PSB of initiation of the application process. Timely receipt of properly completed security applications (submitted for candidates that have a reasonable probability of obtaining the level of security clearance for yvhich the candidate has been proposed) is a contract requirement. Failure of the Contractor to comply with this condition may be a basis to cancel the award, or terminate the contract for default, or offset from the contract's invoiced cost or price the NRC's incurred costs or delays as a result-of inadequate pre-screening by the Contractor. In the event of terrriination or cancellation, the Government may select another firm for contract award.

Such Contractor personnel shall be subject to the NRG Contractor personnel security requirements of NRC Management Directive (MD) 12.3, Part I and 1 O CFR Part 10.11, which is hereby incorporated by reference and made a part of this contract as though fully set forth herein~ and will require a favorably adjudicated Single Scope Background Investigation (SSBI) for "Q" clearances or a favorably adjudicated Access National Agency Check and Inquiries (ANACI), or higher level investigation depending on the position the individual will occupy, for "L" clearances.

A Contractor employee shall not have access to classified information until he/ she is granted a security clearance by DFS/PSB, based on a favorably adjudicated investigation. In the event the Contractor employee's investigation cannot be favorably adjudicated, any interim access approval could possibly be revoked and the individual could be subsequently removed from performing under the contract. If interim approval access is revoked or denied, the Contractor is responsible for assigning another individual to. perform the necessary work under this contract without delay to the contract's performance schedule, or without adverse impact to any other terms or conditions of the .contract. The individual will be subject to a reinvestigation every five (5)

_years for "Q" clearances. and every ten (10) years for "L" clearances. I I

CORs are responsible for submitting the completed access/clearance request package as well as other documentation that is necessary to DFS/PSB. The contractor shall submit a completed security forms packet, including the OPM Standard Form (SF) 86 (o'nline 9ue!:ltionnaire for National Security Positions), two (2) copies of the Contractor's signed pre-screening record and two (2) FD 258 fingerp·rint charts, to DFS/PSB for review and adjudication, prior to submission to the Office of Personnel Management tor investigation. The individual may start working under this contract before a final clearance is granted if a temporary access determination can be made by DFS/PSB after the review of the security package. If the individual is granted a temporary access authorization, the individual may not have access to classified information under this contract until DFS/PSB has granted them the _appropriate security clearance, and the Contractor has read, understood, and signed the SF 312, "Classified Information Nondisclosure Agreement."- The _Contractor shall assure that all forms are accurate, complete, and legible (except for Part 2 of the questionnaire, which is required to be -completed in private and submitted by the individual to the Contrgctor in a sealed envelope),-as set forth in NRC MD 12.3. Based on DFS/PSB review of the applicant's investigation, the individual may be denied his/her security clearance in accordance with the due process procedures set forth in MD 12.3, E.O. 12968, and 1 O CFR Part 10.11.

In accordance with NRCAR 2052.204-70 cleared Contractors shall be subject to the attached NRC Form 187 (See Section J for List of Attachments), MD 12.3, SF- 86 and Contractor's signed record or review of the pre-screening which furnishes the basis for

Page 29 of 59

providing security requirements to prime Contractors, subcontractors or others who have or may have an NRC contractual relationship which requires access to classified information.

CANCELLATION OR TERMINATION OF SECURITY CLEARANCE ACCESS/REQUEST

When a request for clearance investigation is to be withdrawn or.canceled, the Contractor shall immediately notify the COR by telephone so that the investigation ,may be promptly discontinued. The notification shall contain the full name of the individual, and the date of the request. Telephone notifications must be promptly confirmed in , writing by the Contractor to the COR who will forward the confirmation via email to , DFS/PSB. Additionally, DFS/PSB must be immediately notified in writing when an individual no longer requires access to Government classified information, including the voluntary or involuntary separation of employment of an individual who has been approved for or is being processed for access under the NRC "Personnel Security Program."

(End of Clause)

NRCH370 SAFETY OF ON-SITE CONTRACTOR PERSONNEL

· Ensuring the safety of occupants of Federal buildings is a responsibility· shared by the professionals implementing our security and safety programs and the persons being protected. The NRC's Office of Administration (ADM) Division of Facilities and Security (DFS) has cqordinated an Occupant Emergency Plan (OEP) for NRC Headquarters buildings with local authorities. The OEP has been approved by the Montgomery County Fire and Rescue Service. It is designed to improve building occupants' chances of survival, minimize damage to property, and promptly account for building occupants when necessary. .:

The contractor's Project Director shall ensure that all personnel working full time on-site at NRC Headquarters read the NRC's OEP, provided electronically on the NRC Intranet at http://www.internal.nrc.gov/ADM/OEP.pdf. The contractor's Project Director also shall emphasize to.each staff member that they are to be familiar with and guided by the OEP, as well as by instructions given by emergency response personnel in situations which pose an immediate health or safety threat to building occupants.

The NRC Contracting Officer's Representative (COR) shall ensure that the contractor's Project Director has communicated the requirement for on-site contractor staff to follow the guidance in the OEP. The NRC Contracting Officer's Representative (COR) also will assist in accounting for on-site contract persons in the event of a major emergency (e.g., explosion occurs and casualties or injuries are suspected) during which a full evacuation will be required, including the assembly and accountability of occup~nts. The NRC DFS will conduct drills periodically to train occupants and assess these procedures.

(End of Clause)

NRCH039 IT SECURITY REQUIREMENTS - NRC AND CONTRACTOR (NON-NRC) FACILITIES (APR 2014) .

Page 30 of 59

Backups

The contractor shall ensure that backup media is created, encrypted (in accordance with information sensitivity) and verified to ensure that data can be retrieved and is restorable to NRC systems based on information sensitivity levels. Backups shall be executed to create readable media that allows successful file/data re~toration at the following frequencies:

• At least every 1 calendar day for a high sensitivity system • At least every 1 calendar day for a moderate sensitivity system • At least every 7 calendar days for a low sensitivity system

Perimeter Protection

The Contractor must employ perimeter protection mechanisms, such as firewalls and routers, to deny all communications unless explicitly allowed by exception.

The contractor must deploy and monitor intrusion detection capability and have an always deployed and actively engaged security monitoring capability in place for systems placed in operation for the NRC. Intrusion detection and monitoring reports will made available to the NRC upon request for following security categorizations and reporting timeframes:

• 5 calendar days after being requested for a high sensitivity system • 1 O calendar days after being requested for a moderate sensitivity system • 15 calendar days after being requested for a low sensitivity system

(End of Clause)

NRCH038 IT SECURITY REQUIREMENTS-CERTIFICATION AND ACCREDITATION

SECURITY RISK ASSESSMENT

The contractor shall work with the NRC Contracting Officer's Representative (COR) in performing Risk Assessment activities according to NRC policy, standards, and guidance. The contractor shall perform Risk Assessment activities that include analyzing how the architecture implements the NRC documented security policy for the system, assessing how management, operational, and technical security control features are planned or implemented and how the system interconnects to other ·systems or networks while maintaining security.

SYSTEM SECURITY PLAN

The contractor shall develop the system security plan (SSP) according to NRC policy, standards, and guidance to define the implementation of IT security controls necessary to meet both the functional assurance and security requirements. The contractor will ensure that all controls required to be implemented are documented in the SSP.

ASSESSMENT PROCEDURES - SECURITY TEST & EVALUATION

Page 31 of 59

The contractor shall follow NRC policy, standards, and guidance for execution of the test procedures. These procedures shall be supplemented and augmented by tailored test procedures based on the control objective as it applies to NRC. The contractor shall include verification and validation to ensure that appropriate corrective action was taken on identified security weaknesses.

The contractor shall perform ST&E activities, including but not limited to, coordinating the ST&E and developing the ST&E Plan, execution ST&E test cases and documentation of test results. The contractor shall prepare the Plan of Action and Milestones (POA&M) based on the ST&E results.

PLAN OF ACTION AND MILEST<?NES (POA&M) MAINTENANCE & REPORTING

The contractor shall provide a determination, in a written form agreed to by the NRC Contracting Officer's Representative (COR) and Computer Security Office, on whether the implemented corrective action was adequate to resolve the identified information security weaknesses and provide the reasons for ary exceptions or risked-based

· decisions. The contractor shall document any vulnerabilities indicating which portions of the security control have not been implemented or applied.

The contractor shall develop and implement solutions that provide a means of planning and monitoring corrective actions; define roles and responsibilities for risk mitigation; assist in identifying security funding requirements; track and prioritize resources; and inform decision-makers of progress of open POA&M items.

The contractor shall perform verification of IT security weaknesses to ensure that all weaknesses identified through third party (e.g., OIG) audits are included in the POA&Ms that the quarterly reporting to OMB is accurate, and the reasons for any exceptions or

. risked-based decisions are reasonable and clearly documented. This verification process will be done in conjunction with the continuous monitoring activities.

CERTIFICATION & ACCREDITATION DOCUMENTATION

The contractor shall create, update maintain all Certification and Accreditation (C&A) documentation in accordance with the following NRC Certification and Accreditation procedures and guidance:

-C&A Non-SGI Unclassified Systems -C&A SGI Unclassified Systems -C&A Classified Systems

The Contractor must develop contingency plan and ensure annual contingency testing is completed within one year of previous test and provide an updated security plan and test report according to NRC's policy and procedure.

The Contractor must conduct annual security control testing according to NRC's policy and procedure and update POA&M, SSP, etc. to reflect any findings or changes to management, operational and technical controls.

(End of Clause)

Page 32 of 59

NRCH036 IT SECURITY REQUIREMENTS - DEVELOPMENT AND OPERATIONS AND MAINTENANCE REQUIREMENTS (APR 2014)

O&M Security Requirements

All system modifications to classified systems must comply with NRC security policies and procedures for classified systems, as well as federal laws, guidance, and standards to ensure Federal Information Security Management Act (FISMA) compliance.

The Contractor shall correct errors in contractor developed software and applicable documentation that are not commercial off-the-shelf which are discovered by the NRC or the contractor. Inability of the parties to determine the cause of software errors shall be resolved in accordance with the Disputes clause in Section I, FAR 52.233-1, incorporated by reference in the contract.

The Contractor shall adhere to the guidance outlined in NIST, SP 800-53, FIPS 200 and NRC guidance for the identification and documentation of minimum security controls.

The contractor shall provide the system requirements traceability matrix at the end of the initiation phase, development/acquisition phase, implementation/assessment phase, operation & maintenance phase and disposal phase that provides the security requirements in a separate section so that they can be traced through the development life cycle. The contractor shall also provide the software and hardware designs and test plan documentation, and sou.rce code upon request to the NRC for review.

All development and testing of the systems shall be protected at their assigned system sensitivity level and shall be performed on a network separate and isolated from the NRC operational network.

All system computers must be properly configured and hardened according to NRC policies, guidance, and standards and comply with all NRC security policies and procedures as commensurate with the system security categorization.

All contractor provided deliverables identified in the project plan will be subject to the review and approval of NRC Management. The contractor will make the necessary modifications to project deliverables to resolve any identified issues. Project · deliverables include but are not limited to: requirements, architectures, design documents, test plans, and test reports.

Access Controls

The contractor shall not hardcode any passwords into the software unless the password only appears on the server side (e.g. using server-side technology such as ASP, PHP, or JSP).

The contractor shall ensure that the software does not contain undocumented functions and undocumented methods for gaining access to the software or to the computer system on which it is installed. This includes, but is not limited to, master access keys,

· back doors, or trapdoors.

Cryptography

Page 33 of 59

Cryptographic modules provided as part of the system shall be validated under the Cryptographic Module Validation Program to conform to NIST FIPS 140-2 and must be operated in FIPS mode. The contractor shall provide the FIPS 140-2 cryptographic module certificate number and a brief description of the encryption module that includes the encryption algorithm(s) used, the key length, and the vendor of the product.

Configuration Management and Control

The contractor must ensure that the system will be divided into configuration items (Cls). Cls are parts of a system that can be individually managed and versioned. The system shall be managed at the Cl level.

The contractor must have a configuration management plan that includes all hardware and software that is part of the system and contains at minimum the following sections:

a. Introduction i. Purpose & Scope ii. Definitions iii. References b. Configuration Management i. Organization ii. Responsibilities iii. Tools and Infrastructure c. Configuration Management Activities i. Specification Identification ii. Change control form identification iii. Project baselines d. Configuration and Change Control i. Change Request Processing and Approval ii. Change Control Board e. Milestones· i. Define baselines, reviews, audits ii. Training and Resources

The Information System Security Officer's (ISSO's) role in the change management process must be described. The 1880 is responsible for the security posture of the system. Any changes to the system security posture must be approved by the 18SO. The contractor should not have the ability to make changes to the system's security posture without the appropriate involvement and approval of the 1880.

The contractor shall track and record information specific to proposed and approved changes that minimally include:

a. Identified configuration change b. Testing of the configuration change c. Scheduled implementation the configuration change d. Track system impact of the configuration change e. Track the implementation of the configuration change f. Recording & reporting of configuration change to the appropriate party g. Back out/Fall back plan

Page 34 of 59

-------------- -------------

h. Weekly Change Reports and meeting minutes i. Emergency change procedures j. List of team members from key functional areas

The contractor shall provide a list of software and hardware changes in advance of placing them into operation within the following timeframes:

• 30 calendar days for a classified, SGI, or high sensitivity system • 20 calendar days for a moderate sensitivity system • 1 O calendar days for a low sensitivity system

The contractor must maintain all system documentation that is current to within:

• 1 O calendar days for a classified, SGI, or high sensitivity system • 20 calendar days for a moderate sensitivity system. • 30 calendar days for a low sensitivity system

Modified code, tests performed and test results, issue resolution documentation, and updated system documentation shall be deliverables on the contract.

Any proposed changes to the system must have written approval from the,NRC Contracting Officer's Representative (COR).

The contractor shall maintain a list of hardware, firmware and software changes that is current to within: · ·

• 15 calendar days fora classified, SGI or high sensitivity system • 20 calendar days for a moderate sensitivity system

. • 30 calendar days for a low sensitivity system

The contractor shall analyze proposed hardware and software configurations and modification as well as addressed security vulnerabilities in advance of NRG accepted operational deployment dates within:

• 15 calendar days for a classified, SGI, or high sensitivity system • 20 calendar days for a moderate sensitivity system • 30 calendar days for a low sensitivity system

The contractor shall provide the above analysis with the proposed hardware and software .for NRG testing in advance of NRG accepted operational deployment dates within:

• 15 calendar days for a classified, SGI, or high sensitivity system • 20 calendar days for a moderate sensitivity system • 30 calendar days for a low sensitivity system

Control of Hardware and Software

The contractor shall demonstrate that all hardware and software meet security requirements prior to being placed into the NRG production environment.

Page 35 of 59

The contractor shall ensure that the development environment is separated from the operational environment using NRG CSO approved controls.

The contractor shall only use licensed software and in~house developed authorized software (including NRG and contractor developed) on the system and for processing NRG information. Public domqin, shareware, or freeware shall only be installed after prior written approval is obtained from the NRG Chief Information Security Officer (CISO). The contractor shall provide proof of valid software licensing upon request of the Contracting Officer, the NRG COR, a Senior Information Technology Security Officer (SITSO), or the Designated Approving Authorities (DAAs).

Information Security Training and Awareness Training

The contractor shall ensure that its employees, in performance of the contract, receive Information Technology (IT) security training in their role at the contractor's expense. The Contractor must provide the NRG written certification that training is complete, along with the title of the course and dates of training as a prerequisite to start of work on the contract.

The IT security role and associated type of training course and periodicity required to be completed are as follows:

Role ·Type of Training Required Frequency of Training AuditorVendor specific operating system and.application security training, database security training Prior to appointment and then every three years IT Functional Manager , /Vendor specific operating system· and application security training, database security training Prior to appointment and then every two years

Additional system specific training upon a major system update/change System Administrator Vendor specific operating system and application security training

Prior to appointment and then every year:

• Training in operating system security in the area of responsibility occurs every 2 years

·• Training in application security in the area of responsibility occurs every 2 years Information Systems Security Officer ISSO role specific training (not awareness) provided by a government agency or by a vendor such as SANS Vendor specific operating system and application security training Prior to appointment and then every year: ·

• · Training in the ISSO role occurs every 3 years

• Training in operating system security in the area of responsibility occurs every 3 years

• Training in application security in the area of responsibility occurs every 3 years Database Administrator Vendor specific database security training

Prior to appointment and then every 2 years:

Page 36 of 59

• Training in database security in the area of responsibility occurs every 2 years Network Administrator Network administrator role specific training (not awareness) provided by a government agency or by a vendor such as SANS Network specific security training Prior to appointment and then every year:

• Training in the Network administrator role occurs every 3 years

• Training in network security in the area of responsibility occurs every year where network administrator role training does not occur IT Managers

Vendor specific operating system and application security training, database security training. Prior to appointment and then every two years

Additional system specific training upon a major system update/change IT System Developer Vendor specific operating system and application security training, database security training Prior to appointment and then every year

- training with system-specific training (ISS LoB or commercial) upon assuming the role, to become biannual with NRC provided training every other year.

The contractor must ensure that required refresher training is accomplished in accordance with the required frequency specifically associated with the IT security role.

Auditing

The system shall be able to create, maintain and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected so that read access to it is limited to those who are authorized.

The system shall be able to record the following types ·of events: use of identification and authentication mechanisms, introduction of objects into a user's address space (e.g., file open, program initiation), deletion of objects, and actions taken by computer operators and system administrators or system security officers and other security relevant events. The system shall be able to audit any override of security controls.

The Contractor shall ensure auditing is implemented on the following:

• Operating System • Application • Web Server • Web Services • Network Devices • Database • Wireless

The contractor shall perform audit log reviews daily using automated analysis tools.

Contractor must log at least the following events on systems that process NRC information:

Page 37 of 59

• Audit all failures • Successful logon attempt • Failure of logon attempt • Permission Changes • Unsuccessful File Access • Creating users & objects • Deletion & modification of system files • Registry Key/Kernel changes • Startup & shutdown • Authentication • Authorization/permission granting • Actions by trusted users • Process invocation • Controlled access to data by individually authenticated user • Unsuccessful data access attempt • Data deletion • Data transfer • Application configuration change • Application of confidentiality or integrity labels to data • Override or modification of data labels or markings • '. Output to removable media • Output to a printer

(Erid of Clause)

NRCH034 INFORMATION TECHNOLOGY (IT) SECURITY REQUIREMENTS -GENERAL EXCEPTIONS (JUL 2016)

All pLJrchases shall comply with the latest version of policy, procedures and standards. Individual task orders will reference latest versions of policy, procedures, standards or exceptions as necessary. These policy, procedures and standards include: NRC Management Directive (MD) volume 12 Security, Information Security Directorate policies, procedures and standards, National Institute of Standards and Technology (NIST) guidance and Federal Information Processing Standards (FIPS), and Committee on National Security Systems (CNSS) policy, directives, instructions, and guidance. This information is available at the following links: ·

All procurements must be certified and accredited prior to being placed into an operational state.

All electronic processing of NRC sensitive information, including all system development and operations and maintenance activities performed at non-NRC facilities shall be in facilities, networks, and computers that have been accredited by NRC for processing information at the highest sensitivity of the information that is processed or will ultimately be processed.

All systems used to process NRC sensitive information shall meet NRC configuration standards available at: http://www. internal. n re. gov/CSO/standards. html.

Exceptions to or deviations from MD 12.5 rhay be granted by the NRC DAA, except for those areas in which the responsibility or authority is vested solely with the EDO or ADM

Page 38 of 59

and cannot be delegated, or for matters specifically required by law, Executive Order, or directive to be referred to other management officials. For national security systems, nothing in MD 12.5 shall supersede any authority of the DNI, NSA, Secretary of Defense, or other agency head, as authorized by law and as directed by the President, with regard to the operation, control, or management of national security systems. Nothing in this directive or handbook shall supersede any requirement made by or under the Atomic Energy Act of 1954. Restricted data or formerly restricted data shall be handled, protected, classified, downgraded, and declassified in conformity with the Atomic Energy Act of 1954.

(End of Clause)

NRCH032 INFORMATION TECHNOLOGY (IT) SECURITY REQUIREMENTS­GENERAL (JUL 2016)

Basic Contract IT Security Requirements

The contractor agrees to insert terms that conform substantially to the language of the IT security requirements, excluding any reference to the Changes clause of this contract, into all subcontracts under this contract.

For unclassified information used for the effort, the contractor shall provide an information security categorization document indicating the sensitivity of the information processed as part of this contract if the information security categorization was not provided in the statement of work. The determination shall be made using National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 and must be approved by the Office of the Chief Information Officer (OCIO). The NRC contracting officer (CO) and Contracting Officer's Representative (COR) shall be notified immediately before the contractor begins to process information at a higher sensitivity level.

If the effort includes use or processing of classified information, the NRC CO and COR shall be notified before the contractor begins to process information at a more restrictive classification level.

All work under this contract shall comply with the latest version of policy, procedures and. standards. Individual task orders will reference latest versions of standards or exceptions as necessary. These policy, procedures and standards include: NRC Management Directive (MD) volume 12, Security; Computer Security Office policies, procedures and standards; National Institute of Standards and Technology (NIST) guidance and Federal Information Processing Standards (FIPS); and Committee on National Security Systems (CNSS) policy, directives, instructions, and guidance. This information is available at the following links:

NRC Policies, Procedures and Standards (OCIO/ISD - Director, Information Security Directorate, internal website): http://www.internal.nrc.gov/CSO/policies.html

All NRC Management Directives (public website): http://www.nrc.gov/reading-rm/doc-collections/management-directives/

Page 39 of 59

NIST SP and FIPS documentation is located at: http://csrc.nist.gov/

CNSS documents are located at: http://www.cnss.gov/

When e-mail is used, the contractors shall only use NRC provided e-mail accounts to send and receive sensitiverinformation (information that is not releasable to the public) or mechanisms to protect the information during transmission to NRC that have been approved by OCIO/ISD.

All contractor employees must sign the NRC Agency-Wide Rules of Behavior for Authorized Computer Use prior to being granted access to NRC computing resources.

The contracto,r shall adhere to following NRC policies, including but not limited to:

Must meet all federally mandated and NRC defined cybersecurity requirements.

• Management Directive 12.5, NRC Cybersecurity Program • Computer Security Policy for Encryption of Sensitive Data When Outside of Agency Facilities • Policy for Copying, Scanning, Printing, and Faxing SGI & Classified Information • Computer Security Information Protection Policy • Remote Access Policy • Laptop Security Policy • , Computer Security Incident Response Policy

Contractor will adhere to NRC's use of personal devices to process and store NRC sensitive information. The NRC's BYOD program allows NRC employees and contractors to conduct official government business using supported personal smart phones and tablets.

All work perforrried at non-NRC facilities shall be in facilities, networks, and computers that have been accredited by NRC for processing information at the sensitivity level of the information being processed.

Contract Performance and Closeout

The contractor shall ensure that the NRC data processed during the performance of this contract shall be purged from all data storage components of the contractor's computer facility, and the contractor will retain no NRC data within 30 calendar days after contract is completed. Until all data is purged, the contractor shall ensure that any NRC data remaining in any storage component will be protected to prevent unauthorized disclosure.

When a contractor employee no longer requires access to an NRC system, the contractor shall notify the COR within 24 hours.

Upon contract completion, the contractor shall provide a status list of all contractor employees who were users of NRG systems and shall note if any users still require access to the system to perform work if a follow-on contract or task order has been

Page 40 of 59

issued by NRG.

Control of Information and Data

The contractor shall not publish or disclose in any manner, without the CO's written consent, the details of any security controls or countermeasures either designed or developed by the contractor under this contract or otherwise provided by the NRG.

Any IT system used to process NRG sensitive information shall:

• Include a mechanism to require users to uniquely identify themselves to the system before beginning to perform any other actions that the system is expected to provide. • Be able to authenticate data that includes information for verifying the claimed

·identity of individual users (e.g., passwords). • Protect authentication data so that it cannot be accessed by any unauthorized user. • Be able to enforce individual accountability by providing the capability to uniquely identify each individual computer system user. • Report to appropriate security personnel when attempts are made to guess the authentication data whether inadvertently or deliberately.

Access Controls

Any contractor system being used to process NRG data shall be able to define and enforce access privileges for individual users. The discretionary access controls mechanisms shall be configurable to protect objects (e.g., files, folders) from unauthorized access.

The contractor system being used to process NRG data shall provide only essential capabilities and specifically prohibit and/or restrict the use of functions, ports, protocols, and/or services, as specified in the contract/grant.

The contractors shall only use NRG approved methods to send and receive information considered sensitive or classified. Specifically,

• Classified Information - All NRG Classified data being transmitted over a network shall use NSA approved encryption and adhere to guidance in MD 12.2, NRG Classified Information Security Program; MD 12.5, NRG Cybersecurity Program; and any classified encryption guidance provided by the Committee on National Security Systems. Classified processing shall be only within facilities, computers, and spaces that have been specifically approved for classified processing. All NRG personnel who have been or will be granted an account to access any system or network (to include a stand-alone system or network) on which classified information resides must be an NRG authorized classifier. Contractors must follow the above guidance and procedures when requiring access to or handling classified information. Only designated and authorized classifiers of the contractor may have access to classified information or systems.

• SGI Information -All SGI being transmitted over a network shall adhere to guidance in MD 12.7, NRG Safeguards Information Security Program; and MD 12.5, NRG Cybersecurity Program. SGI processing shall be only within facilities, computers,

Page 41 of 59

and spaces that have been specifically approved for SGI processing. Cryptographic modules provided as,part of the system shall be validated under the Cryptographic Module Validation Program to conform to NIST FIPS 140-2 overall level 2 and must be operated in· FIPS mode. The contractor shall provide the FIPS 140-2 cryptographic module certificate number and a brief description of the encryption module that includes the encryption algorithm(s) used, the key length, and the vendor of the product. • All NRG personnel who have been or will be granted an account to access any system or network (to include a stand-alone system or network) on which SGI resides must be an NRG authorized classifier.

The most restrictive set of rights/privileges or accesses needed by users (or processes acting on behalf of users) for the performance of specified ·tasks must be enforced by the system through assigned access authorizations.

Separation of duties for contractor systems used to process NRG information must be enforced by the system through assigned access authorizations.

The mechanisms within the contractor system or application that enforces access control and other security features shall be continuously protected against tampering and/or unauthorized changes.

Configuration Standards I

All systems used to process NRG sensitive information shall meet NRG configuration standards available at: http://www.internal.nrc.gov/CSO/standards.html.

Information Security Training and Awareness Training

Contractors shall ensure that their employees, consultants, and subcontractors that have , significant IT responsibilities (e.g., IT administrators, developers, project leads) receive

in-depth IT security training in their area of responsibility. This training is at the employer's expense.

In compliance with OMS policy, individuals with significant cybersecurity responsibilities (e.g., ISSOs, System Administrators) must complete required role-based training before assuming the role. NRG contractors must ensure that their staff receives the requisite role-based cybersecurity training at the contractor's expense.

Media Handling

All media used by the contractor to store or process NRG information shall be controlled in accordance with the sensitivity level.

The contractor shall not perform sanitization or destruction of media approved for processing NRG information designated as SGI or Classified. The contractor must provide the media to NRG for destruction ..

Vulnerability Management

The Contractor must adhere to NRG patch management processes for all systems used to process NRG information. Patch Management reports will made available to the NRG

Page 42 of 59

upon request for following security categorizations and reporting timeframes:

• 5 calendar days after being requested for a high sensitivity system • 1 O calendar days after being requested for a moderate sensitivity system • 15 calendar days after being requested for a low sensitivity system

For any contractor system used to process NRG information, the contractor must ensure that information loaded into the system is scanned for viruses prior to posting; servers are scanned for malware, including viruses, adware, and spyware, on a regular basis; and virus signatures are updated at the following frequency:

• 1 calendar day for a high sensitivity system • 3 calendar days for a moderate sensitivity system • 7 calendar days for a low sensitivity system

For any contractor deliverables or information loaded on external hard drives or other electronic devices, the contractor .must ensure that, prior to delivery to the NRG, the device, including software and files, is free of malware, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, browser hijacking software, mobile code, or other malicious code.

(End of Clause)

NRCH030 SECURITY REQUIREMENTS FOR INFORMATION TECHNOLOGY LEVEL I OR LEVEL 11 ACCESS APPROVAL (JUL 2016)

The contractor must identify all individuals selected to work under this contract. The NRC Contracting Officer's Representative (COR) shall make the final determination of the level, if any, of IT access approval required for all individuals working under this contract/order using the following guidance. The Government shall have full and complete control and discretion over granting·, denying, withholding, or terminating IT access approvals for contractor personnel performing work under this contract/order.

The contractor shall conduct a preliminary security interview or review for each employee requiring IT level I or II access and submit to the Government only the names of candidates that have a reasonable probability of obtaining the level of IT access approval for,which the employee has been proposed. The contractor shall pre..:screen its applicants for the following:

(a) felony arrest in the last seven (7) years; (b) alcohol related arrest within the last five (5) years; (c) record of any military courts-martial convictions in the past ten (10) years; (d) illegal use of narcotics or other controlled substances possession in the past year, or illegal purchase, production, transfer, or distribution of narcotics or other controlled substances in the last seven (7) years; and (e) delinquency on any federal debts or bankruptcy in the last seven (7) years.

The contractor shall make a written record of its pre-screening interview or review (including any information to mitigate the responses to items listed in (a) - (e)), and have the employee verify the pre-screening record or review, sign and date it. The contractor shall supply two (2) copies of the signed contractor's pre-screening record or review to the NRC Contracting Officer's Representative (COR), who will then provide them to the

Page 43 of 59

NRC Office of Administration, Division of Facilities and Security, Personnel Security · Branch with the employee's completed IT access application package.

The contractor shall further ensure that its personnel complete all IT access approval security applications required by this clause within fourteen (14) calendar days of notification by the NRG Contracting Officer's Representative (COR) of initiation of the application process. Timely receipt of properly completed records of the pre-screening record and IT access approval applications (submitted for candidates that have a · reasonable probability of obtaining the level of security assurance necessary for access to NRC's IT systems/data) is a requirement of this contract/order. Failure of the contractor to comply with this requirement may be a basis to terminate the contract/order for cause, or to offset from the contract's invoiced cost or price the NRC's incurred costs or delays as a result of inadequate pre-screening by the contractor.

SECURITY REQUIREMENTS FOR IT LEVEL I

Performance under this contract/order will involve contractor personnel who perform services requiring direct access to or operation of agency sensitive information technology systems or data (IT Level I). The IT Level I involves responsibility for: (a) the planning, direction, and implementation of a computer security program; (b) major responsibility for the direction, planning, and design of a computer system, including hardware and software; (c) the capability to access a computer system during its operation or maintenance in such a way that could cause or that has a relatively high risk of causing grave damage; or ( d) the capability to realize a significant personal gain from computer access.

Contractor personnel shall not have access to sensitive information technology systems or data until they are approved by DFS/PSB and they have been so informed in writing by the NRC Contracting Officer's Representative (COR). Temporary IT access may be approved by DFS/PSB based on a favorable review or adjudication of their security forms and checks. Final IT access may be approved by DFS/PSB based on a favorably review or adjudication of a completed background investigation. However, temporary access authorization approval will be revoked and the employee may subsequently be denied IT access in the event the employee's investigation cannot be favorably adjudicated. Such an employee will not be authorized to work under any NRC contract/order requiring IT access without the approval of DFS/PSB, as communicated in writing to the contractor by the NRC Contracting Officer's Representative (COR). Where temporary access authorization has been revoked or denied by DFS/PSB, the contractor shall assign another contractor employee to perform the necessary work under this contract/order without delay to the contract/order performance schedule, or without adverse impact to any other terms or conditions of the contract/order. When an individual receives final IT access approval from DFS/PSB, the individual will be subject to a reinvestigation every ten (10) years thereafter (assuming continuous performance under contracts/orders at NRC) or more frequently in the event of noncontinuous performance under contracts/orders at NRC.

CORs are responsible for submitting the completed access/clearance request package as well as other documentation that is necessary to DFS/PSB. The contractor shall submit a completed security forms packet, including the OPM Standard Form (SF) 86 (online Questionnaire for National Security Positions), two (2) copies of the Contractor's signed pre-screening record, and two (2) FD 258 fingerprint charts, to DFS/PSB for

Page 44 of 59

review and adjudication, prior to the individual being authorized to perform work under this contract/order requiring access to sensitive information technology systems or data. Non-U.S. citizens must provide official documentation to the DFS/PSB, as' proof of their legal residency. This documentation can be a Permanent Resident Card, Temporary Work Visa, Employment Authorization Card, or other official documentation issued by the U.S. Citizenship and Immigration Services. Any applicant with less than seven (7) years residency in the U.S. will not be approved for IT Level I access. The Contractor shall submit the documents to the NRC Contracting Officer's Representative (COR) who will give them to DFS/PSB. The contractor shall ensure that all forms are accurate, complete, and legible. Based on DFS/PSB review of the contractor employee's security forms and/or the receipt of adverse information by NRC, the contractor individual may be denied access to NRC facilities and sensitive information technology systems or data until a final determination is made by DFS/PSB. The contractor individual's clearance status will thereafter be communicated to the contractor by the NRC Contracting Officer's Representative (COR) regarding the contractor person's eligibility.

In accordance with NACAR 2052.204-70 "Security," IT Level I contractors shall be subject to the attached NRC Form 187 and SF-86. Together, these furnish the basis for providing security requirements to contractors that have or may have an NRC contractual relationship which requires access to or operation of agency sensitive information technology systems, remote development and/or analysis of sensitive information technology systems or data, or other access to such systems and data; access on a continuing1basis (in excess more than 30 calendar days) to NRC buildings; or otherwise requires issuance of an unescorted NRC badge.

SECURITY REQUIREMENTS FOR IT LEVEL II

Performance under this contract/order will involve contractor personnel that develop and/or analyze sensitive information technology· systems or data" or otherwise have access to such systems or data (IT Level II).

The IT Level II involves responsibility for the planning, design, operation, ?r maintenance of a computer system and all other computer or IT posi~ions.

Contractor personnel shall not have access to sensitive information technology systems or data until-they are approved by DFS/PSB and they have been so informed in writing by the NRC Contracting Officer's Representative (COR). Temporary access may be approved by DFS/PSB based .on a favorable review of their security forms and checks. Final IT access may be approved by DFS/PSB based on a favorably adjudication. However, temporary access authorization approval will be revoked and the. contractor employee may subsequently be denied IT access in the event the employee's· investigation cannot be favorably adjudicated. Such an employee will not be authorized to work under any NRC contract/order requiring IT access without the approval of DFS/PSB, as communicated in writing to the contractor by the NRC Contracting Officer's Representative .(COR). Where temporary access authorization has been revoked or denied by DFS/PSB, the contractor is responsible for assigning another contractor employee to perform the necessary work under this contract/order without delay to the contract/order performance schedule, or without adverse impact to any other terms or conditions of the contract/order. When a contractor employee receives final IT access approval from DFS/PSB, the individual will be subject to a review or reinvestigation every ten (10) years (assuming continuous performance under contract/order at NRC) ,ar

Page 45 of 59.

more frequently in the event of noncontinuous performance under contract/order at NRC.

CORs are responsible for submitting the completed access/clearance request package as well as other documentation that is necessary to DFS/PSB. The contractor shall submit a completed security forms packet, including the OPM Standard Form (SF) 86 (online' Questionnaire for National Security Positions), two (2) copies of the Contractor's signed pre-screening record and two (2) FD 258 fingerprint charts, to DFS/PSB for review and adjudication, prior to the contractor employee being authorized to perform work under this contract/order. Non-U.S. citizens must provide official documentation to the DFS/PSB, as proof of their legal residency. This documentation can be a Permanent Resident Card, Temporary Work Visa, Employment Authorization Card, or other official documentation issued by the U.S. Citizenship and Immigration Services. Any applicant with less than seven (7) years residency in the U.S. will not be approved for IT Level II access. The Contractor shall submit the documents to the NRC Contracting Officer's Representative (COR) who will give them to DFS/PSB. The contractor shall ensure that all forms are accurate, complete, and legible. Based on DFS/PSB review of the contractor employee's security forms and/or the receipt of adverse information by NRC, the contractor employee may be denied access to NRC facilities, sensitive information technology systems or data until a final determination is made by DFS/PSB regarding the contractor person's eligibility. ·

In accordance with NRCAR 2052.204-70 "Security," IT Level II contractors shall be subject to the attached NRC Form 187, SF~86, and contractor's record of the pre-screening. Together, these furnish the basis for providing security requirements to contractors that have or may have an NRC contractual relationship which requires access to or operation of agency sensitive information technology systems, remote development and/or analysis of sensitive information technology systems or data, or other access to such systems or data; access on a continuing basis (in excess of more than 30 calendar days) to NRC buildings; or otherwise requires issuance of an unescorted NRC badge.

CANCELLATION OR TERMINATION OF IT ACCESS/REQUEST

When a request for IT access is to be withdrawn or canceled, the contractor shall immediately notify the f':IRC Contracting Officer's Representative (COR) by telephone so that the access review may be promptly discontinued. The notification shall contain the full name· of the contractor employee and the date of the request. Telephone notifications must be promptly confirmed by the contractor in writing to the NRC Contracting Officer's Representative (COR), who will forward the confirmation to DFS/PSB. Additionally, the contractor shall immediately notify the NRC Contracting Officer's Representative (COR) in writing, who will in turn notify DFS/PSB, when a contractor employee no longer requires access to NRC sensitive automated information technology systems or data, including the voluntary or involuntary separation of employment of a contractor employee who has been approved for or is being processed for IT access.

The contractor shall flow the requirements of this clause down into all subcontracts and agreements with consultants for work that requires them to access NRC IT resources.

(End of Clause)

Page ~6 of 59 .J

NRCH020 SECURITY REQUIREMENTS FOR BUILDING ACCESS APPROVAL (SEP 2013)

The Contractor shall ensure that all its employees, subcontractor employees or consult.ants who are assigned to perform the work herein for contract performance for periods of more than 30 calendar days at NRC facilities, are approved by the NRC for unescorted NRC building access. ·

The Contractor shall conduct a preliminary federal facilities security screening interview or review for each of its employees, subcontractor employees, and consultants and submit to the NRC only the names of candidates for contract performance that have a reasonable probability of obtaining approval necessary for access to NRC's federal facilities. The Contractor shall pre-screen its applicants for the following:

(a) felony arrest in the last seven (7) years; (b) alcohol related arrest within the last five (5) years; (c) record of any military courts-martial convictions in the past ten (10) years; (d) illegal use of narcotics or other controlled substances possession in the past year, or illegal purchase, production, transfer, or distribution of narcotics or other controlled substances in the last seven (7) years; and (e) delinquency on any federal debts or bankruptcy in the last seven (7) years.

The Contractor shall make a written record of its pre-screening interview or review (including any information to mitigate the responses to items listed in (a) - (e)), and have the applicant verify the pre-screening record or review, sign and date it. Two (2) copies bf the pre-screening signed record or review shall be supplied to the Division of Facilities and Security, Personnel Security Branch (DFS/PSB) with the Contractor employee's completed building access application package.

The Contractor shall further ensure that its employees, any subcontractor employees and consultants complete all building access security applications required by this clause within fourteen (14) calendar days of notification by DFS/PSB of initiation of the application process. Timely receipt of properly completed records of the Contractor's signed pre-screening record or review and building access security applications (submitted for candidates that have a reasonable probability of obtaining the level of access authorization necessary for access to NRC's facilities) is a contract requirement. Failure of the Contractor to comply with this contract administration requirement may be a basis to cancel the award; or terminate the contract for default, or offset from the contract's invoiced cost or price the NRC's incurred costs or delays as a result of inadequate pre-screening by the Contractor. In the event of cancellation or termination, the NRC may select another firm for contract award.

A Contractor, subcontractor employee or consultant shall not have access to NRC facilities until he/she is approved by DFS/PSB. Temporary access may be approved based on a favorable NRC review and discretionary determination of their building access security forms. Final building access will be approved based on favorably adjudicated checks by the Government. However, temporary access approval will be revoked and the Contractor's employee may subsequently be denied access in the event the employee's investigation cannot be favorably determined by the NRC. Such employee will not be authorized to work under any NRC contract requiring building access without the approval of DFS/PSB. When an individual receives final access, the individual will be subject to a review or reinvestigation every five (5) or ten (10) years,

\ Page 47 of 59

depending on their job responsibilities at the NRG.

The Government shall have and exercise full and complete control and discretion over granting, denying, withholding, or terminating building access approvals for individuals performing work under this contract. Individuals performing work under this contract at NRG facilities for a period of more than 30 calendar days shall be required to complete and submit to the Contractor representative an acceptable OPM Standard Form 85 (Questionnaire for Non-Sensitive Positions), and two (2) FD 258 (Fingerprint Charts). Non-U.S. citizens must provide official documentation to the DFS/PSB, as proof of their legal residency. This documentation can be a Permanent Resident Card, Temporary Work Visa, Employment Authorization Card, or other official documentation issued by the U.S. Citizenship and Immigration Services. Any applicant with less than five (5) years residency in the U.S. will not be approved for building access. The Contractor

. shall submit the documents to the NRG Contracting Officer's Representative (COR) who will give them to DFS/PSB.

DFS/PSB may, among other things, grant or deny temporary unescorted building access approval to an individual based upon its review of the information contained in the OPM Standard Form 85 and the Contractor's pre-screening record. Also, in the exercise of its authority, the Government may, among other things, grant or deny permanent building access approval based on the results of its review or investigation. This submittal requirement also applies to the officers of the firm who, for any reason, may visit the NRG work sites for an extended period of time during the term of the contract. In the event that DFS/PSB are unable to grant a temporary or permanent building access approval, to any individual performing work under this contract, the Contractor is responsible for assigning another individual to perform the necessary function without any delay in the contract's performance schedule, or without adverse impact to any other terms or conditions of the contract. The Contractor is responsible for informing those affected by this procedure of the required building access approval process (i.e., temporary and permanent determinations), and the possibility that individuals may be required to wait until permanent building access approvals are granted before beginning work in NRC's buildings.

CANCELLATION OR TERMINATION OF BUILDING ACCESS/ REQUEST

The Contractor shall immediately notify the COR when a Contractor or subcontractor employee or consultant's need for NRG building access approval is withdrawn or the need by the Contractor employee's for building access terminates. The COR will immediately notify DFS/PSB (via e-mail) when a Contractor employee no longer requires building access. The Contractor shall be required to return any NRG issued badges to the COR for return to DFS/FSB (Facilities Security Branch) within three (3) days after their termination.

(End of Clause)

Page 48 of 59

SECTION I - Contract Clauses

52.203-17 CONTRACTOR EMPLOYEE WHISTLEBLOWER RIGHTS AND REQUIREMENT TO INFORM EMPLOYEES OF WHISTLEBLOWER RIGHTS. (APR 2014)

52.204-4 PRINTED OR COPIED DOUBLE-SIDED ON POSTCONSUMER FIBER CONTENT PAPER. (MAY 2011)

52.204-9 PERSONAL IDENTITY VERIFICATION OF CONTRACTOR PERSONNEL (JAN 2011)

52.204-13 SYSTEM FOR AWARD MANAGEMENT MAINTENANCE. (JUL 2013)

52.212-5 CONTRACT TERMS AND CONDITIONS REQUIRED TO IMPLEMENT STATUTES OR EXECUTIVE ORDERS- COMMERCIAL ITEMS. (JUN 2016)­ALTERNATE II (MAR 2016)

(a) The Contractor shall comply with the following Federal Acquisition Regulation (FAR) clauses, which are incorporated in this contract by reference, to implement provisions of law or Executive orders applicable to acquisitions of commercial items:

(1) 52.209-10, Prohibition on Contracting with Inverted Domestic Corporations (NOV 2015).

(2) 52.233-3, Protest After Award (AUG 1996) (31 U.S.C. 3553).

(3) 52.233-4, Applicable Law for Breach of Contract Claim (OCT 2004) (Public Laws 108-77 and 108-78 (19 U.S.C. 3805 note)).

(b) The Contractor shall comply with the FAR clauses in this paragraph (b) that the Contracting Officer has indicated as being incorporated in this contract by reference to implement provisions of law or Executive, orders applicable to acquisitions of commercial items: (Contracting Officer check as appropriate.)

· [] (1) 52.203-6, Restrictions on Subcontractor Sales to the Government (SEP 2006), with Alternate I (OCT 1995) (41 U.S.C. 4704 and 10 U.S.C. 2402).

[X] (2) 52.203-13, Contractor Code of Business Ethics and Conduct (OCT 2015) (41 U.S.C. 3509).

[] (3) 52.203-15, Whistleblower Protections under the American Recovery and Reinvestment Act of 2009 (JUN 2010) (Section 1553 of Pub. L. 111-5). (Applies to contracts funded by the American Recovery and Reinvestment Act of 2009.)

[] (4) 52.204-10, Reporting Executive Compensation and First-Tier Subcontract Awards (OCT 2015) (Pub. L. 109-282) (31 U.S.C. 6101

Page 49 of 59 I

I I

_j

note).

(5) (Reserved)

[] (6) 52.204-14, Service Contract Reporting Requirements (.JAN 2014) (Pub. L.111-117, section 743 of Div. C).

[] (7) 52.204-15, Service Contract Reporting Requirements for Indefinite-Delivery Contracts (JAN 2014) (Pub. L.111-117, section 743 of Div. C) ..

[] (8) 52.209-6, Protecting the Government's Interest When Subcontracting with Contractors Debarred, Susp_ended, or Proposed for Debarment. (OCT 2015) (31 U.S.C. 6101 note).

[] (9) 52.209-9, Updates of Publicly Available Information Regarding Responsibility Matters (JUL 2013) (41 U.S.C. 2313).

[] (10) (Reserved)

[X] (11 )(i) 52.219-3, Notice of HUBZone Set-Aside or Sole-Source Award (NOV 2011) (15 U.S.C. 657a).

[] (ii) Alternate I (NOV 2011) of 52.219-3.

[] (12)(i) 52.219-4, Notice of Price Evaluation Preference for HUBZone Small Business Concerns (OCT 2014) (if the offeror elects to waive the preference, it shall so indicate in its offer) (15 U.S.C. 657a).

[] (ii) Alternate I (JAN 2011) of 52.219-4.

[] (13) (Reserved)

[] (14)(i) 52.219-6, Notice of Total Small Business Set-Aside (NOV 2011) (15 U.S.C. 644). _

[] (ii) Alternate I (NOV 2011 ).

[] (iii) Alternate II (NOV 2011 ).

[] (15)(i) 52.219-7, Notice of Partial Small Business Set-Aside (JUN 2003) (15 U.S.C. 644). I

[] (ii) Alternate I (OCT 1995) of 52.219-7.

[] (iii) Alternate II (MAR 2004) of 52.219-7.

[] (16) 52.219-8, Utilization of Small Business Concerns (OCT 2014) (15 U.S.C. 637(d)(2) and (3)).

[]-(17)(i) 52.219-9, Small Business Subcontracting Plan (OCT 2015) (15

Page 50 of 59

U.S.C. 637(d)(4)).

[] (ii) Alternate I (OCT 2001) of 52.219-9.

[] (iii) Alternate II (OCT 2001) of 52.219-9.

[] (iv) Alternate 111 (OCT 2015) of 52.219-9.

[] (18) 52.219-13, Notice of Set-Aside of Orders (NOV 2011) (15 U.S.C. 644(r)).

[] (19) 52.219-14, Limitations on Subcontracting (NOV 2011) (15 U.S.C. 637(a)(14)).

[] (20) 52.219-16, Liquidated Damages-Subcontracting Plan (JAN 1999) (15 U.S.C. 637(d)(4)(F)(i)).

[] (21} 52.219-27, Notice of Service-Disabled Veteran-Owned Small Business Set~Aside (NOV 2011) (15 U.S.C. 657f).

[] (22) 52.219-28, Post Award Small Business Program Rerepresentation (JUL 2013) (15 U.S.C. 632(a)(2)).

[] (23) 52.219-29, Notice of Set-Aside for, or Sole Source Award to, Economically Disadvantaged Women-Owned Small Business Concerns (DEC 2015) (15 U.S.C. 637(m)). .

[] (24) 52.219-30, Notice of Set-Aside for, or Sole Source Award to, Women-Owned Small Business Concerns Eligible Under the Women-Owned Small Business Program (DEC 2015) (15 U.S.C. 637(m)).

[X] (25) 52.222-3, Convict Labor (JUN 2003) (E.O. 11755).

[] (26) 52.222-19, Child Labor-Cooperation with Authorities and Remedies (FEB 2016) (E.O. 13126). .

[X] (27) 52.222-21, Prohibition of Segregated Facilities (APR 2015).

[X] (28) 52.222-26, Equal Opportunity (APR 2015) (E.O. 11246).

[] (29) 52.222-35, Equal Opportunity for Veterans (OCT 2015) (38 U.S.C. 4212).

[] (30) 52.222-36, Equal Opportunity for Workers with Disabilities (JUL 2014) (29 U.S.C. 793).

[] (31) 52.222-37, Employment Reports on Veterans (FEB 2016) (38 U.S.C. 4212).

[] (32) 52.222-40, Notification of Employee Rights Under the National

Page 51 of 59

Labor Relations Act (DEC 2010) (E.O. 13496).

[] (33)(i) 52.222-50, Combating Trafficking in Persons (MAR 2015) (22 U.S.C. chapter 78 and E.O. 13627). ,

[] (ii) Alternate I (MAR 2015) of 52.222-50 (22 U.S.C. chapter 78 and E.O. 13627).

[] (34) 52.222-54, Employment Eligibility Verification (OCT 2015). (E. 0. 12989). (Not applicable to the acquisition of commercially available off-the-shelf items or certain other types of commercial items as prescribed in 22.1803.)

[] (35)(i) 52.223-9, Estimate of Percentage of Recovered Material Content for EPA-Designated Items (MAY 2008) (42 U.S.C. 6962(c)(3)(A)(ii)). (Not applicable to the acquisition of commercially available off-the-shelf items.)

[] (ii) Alternate I (MAY 2008) of 52.223-9 (42 U.S.C. 6962(i)(2)(C)). (Not applicable to the acquisition of commercially available off-the-shelf items.)

[] (36) 52.223-11, Ozone-Depleting Substances and High Global Warming Potential Hydrofluorocarbons (JUN 2016) (E.O. 13693).

[] (37) 52.223-12, Maintenance, Service, Repair, or Disposal of Refrigeration Equipment and Air Conditioners (JUN 2016) (E.O. 13693).

[] (38)(i) 52.223-13, Acquisition of EPEAT®-Registered Imaging Equipment (JUN 2014) (E.O.s 13423 and 13514).

[] (ii) Alternate I (OCT 2015) of 52.223-13.

[] (39)(i) 52.223~14, Acquisition of EPEAT®-Registered Televisions (JUN 2014) (E.O.s 13423 and 13514).

(ii) Alternate I (JUN 2014) of 52.223-14.

[] (40) 52.223-15, Energy Efficiency in Energy-Consuming Products (DEC 2007) (42 u.s.c. 8259b).

[] (41)(i) 52.223-16, Acquisition of EPEAT®-Registered Personal Computer Products (OCT 2015) (E.O.s 13423 and 13514).

[](ii) Alternate I (JUN 2014) of 52.223-16.

[] (42) 52.223-18, Encouraging Contractor Policies to Ban Text Messaging While Driving (AUG 2011)

[] (43) 52.223-20, Aerosols (JUN 2016) (E.O. 13693).

[] (44) 52.223-21, Foams (JUN 2016) (E.0. 13693).

Page 52 of 59

[] (45) 52.225-1, Buy American-Supplies (MAY 2014) (41 U.S.C. chapter 83).

[] (46)(i) 52.225-3, Buy American-Free Trade Agreements-Israeli Trade Act (MAY 2014) (41 U.S.C. chapter 83, 19 U.S.C .. 3301 note, 19 U.S.C. 2112 note, 19 U.S.C. 3805 note, 19 U.S.C. 4001 note, Pub. L.103-182, 108-77, 108-78, 108-286, 108-302, 109-53,. 109-169, 109-283, 110-138, 112-41, 112-42, and 112-43.

[](ii) Alternate I (MAY 2014) of 52.225-3.

[] (iii) Alternate II (MAY 2014) of 52.225-3.

[](iv) Alternate Ill (MAY 2014) of 52.225-3.

[] (47) 52.225-5, Trade Agreements (FEB 2016) (19 U.S.C. 2501, et seq., 19 U.S.C. 3301 note).

· [] (48) 52.225-13, Restrictions on Certain Foreign Purchases (JUN 2008) (E.O.'s, proclamations, and statutes administered by the Office of Foreign

.Assets Control of the Department of the Treasury).

[] (49) 52.225-26, Contractors Performing Private Security Functions Outside the United States (JUL 2013) (Section 862, as amended, of the National Defense Authorization Act for Fiscal Year 2008; 1 O U.S.C. 2302 Note).

· [] (50) 52.226-4, Notice of Disaster or Emergency Area Set-Aside (NOV· 2007) (42 U.S.C. 5150).

[] (51) 52.226-5, Restrictions on Subcontracting Outside Disaster or Emergency Area (NOV 2007) (42 U.S.C. 5150).

· [] (52) 52.232-29, Terms for Financing of Purchases of Commercial Items (FEB 2002) (41 U.S.C. 4505, 10 U.S.C. 2307(f)).

[] (53) 52.232-30, Installment Payments for Commercial Items (OCT 1995) (41 U.S.C. 4505, 10 U.S.C. 2307(f)).

[X] (54) 52.232-33, Payment by Electronic Funds Transfer-System for Award Management (JUL 2013) (31 U.S.C. 3332).

[] (55) 52.232-34, Payment by Electronic Funds Transfer - Other than System for Award Management (JUL 2013) (31 U.S.C. 3332).

[] (56) 52.232-36, Payment by Third Party (MAY 2014) (31 U.S.C. 3332).

[] (57) 52.239-1, Privacy or Security Safeguards (AUG 1996) (5 U.S.C. 552a).

Page 53 of 59

(

[] (58)(i) 52.247-64, Preference for Privately Owned U.S.-Flag Commercial Vessels (FEB 2006) (46 U.S.C. Appx. 1241(b) and 10 U.S.C. 2631 ).

[] (ii) Alternate I (APR 2003) of 52.247-64.

(c) The Contractor shall comply with the FAR clauses in this paragraph (c), applicable to commercial services, that the Contracting Officer has indicated as being incorporated in this contract by reference to implement provisions of law or Executive orders applicable to acquisitions of commercial items: (Contracting Officer check as appropriate.)

[] (1) 52.222-17, Nondisplacement of Qualified Workers (MAY 2014) (E.O. 13495).

[] (2) 52.222-41, Service Contract Labor Standards (MAY 2014) ( 41 U.S.C. chapter.67).

[] (3) 52.222-42, Statement of Equivalent Rates for Federal Hires (MAY . 2014) (29 U.S.C. 206 and 41 U.S.C. chapter 67).

[] (4) 52.222-43, Fair Labor Standards Act and Service Contract Labor Standards-Price Adjustment (Multiple Year and Option Contracts) (MAY 2014) (29 U.S.C. 206 and 41 U.S.C. chapter 67).

[] (5) 52.222-44, Fair Labor Standards Act and Service Contract Labor Standards-Price Adjustment (MAY 2014) (29 U.S.C 206 and 41 U.S.C. chapter 67).

[] (6) 52.222-51, Exemption from Application of the Service Contract Labor Standards to Contracts for Maintenance, Calibration, or Repair of Certain Equipment-Requirements (MAY 2014) (41 U.S.C. chapter 67).

[] (7) 52.222-53, Exemption from Application of the Service Contract Labor Standards to Contracts for Certain Services-Requirements (MAY 2014) (41 U.S.C. chapter 67).

[] (8) 52.222-55, Minimum Wages Under Executive Order 13658 (DEC 2015).

[] (9) 52.226-6, Promoting Excess Food Donation to Nonprofit Organizations (MAY 2014) (42 U.S.C. 1792).

[] (1 O) 52.237-11, Accepting and Dispensing of $1 Coin (SEP 2008) (31 u.s.c. 5112(p)(1)).

(d)(1) The Comptroller General of the United States, an appropriate Inspector General appointed under section 3 or BG of the Inspector General Act of 1978 (5 U.S.C. App.), or an authorized representative of either of the foregoing officials shall have access to and right to-

Page 54 of 59

(i) Examine any of the Contractor's or any subcontractors' records that pertain to, and involve transactions relating to, this contract; and

(ii) Interview any officer or employee regarding such transactions.

(e)(1) Notwithstanding the requirements of the' clauses in paragraphs (a), (b), and (c}, of this clause, the Contractor is not required to flow down any FAR clause in a subcontract for commercial items, other than-

(i) Paragraph (d) of this clause. This paragraph flows down to all subcontracts, except the authority of the Inspector General under paragraph (d)(1 )(ii) does not flow down; and

(ii) Those clauses listed in this paragraph (e)(1 ). Unless otherwise indicated below, the extent of the flow down shall be as required by the clause-

(A) 52.203-13, Contractor Code of Business Ethics and Conduct (OCT 2015) (41 U.S.C. 3509).

(B) 52.203-15, Whistleblower Protections Under the. American Recovery and Reinvestment Act of 2009 (JUN 2010) (Section 1553 of Pub. L. 111-5).

(C) 52.219-8, Utilization of Small Business Concerns (OCT 2014) (15 U.S.C. 637(d)(2) and (3)), in all subcontracts that offer further subcontracting opportunities. If the subcontract (except subcontracts to small business concerns) exceeds $700,000 ($1.5 million for construction of any public facility), the subcontractor must include 52.219-8 in lower tier subcontracts that offer subcontracting opportunities.

(D) 52.222-21, Prohibition of-Segregated Facilities '(APR 2015).

(E) 52.222-26, Equal Opportunity (APR 2015) (E.O. 11246).

(F) 52.222-35, Equal Opportunity for Veterans (OCT 2015) (38 U.S.C. 4212).

(G) 52.222-36, Equal Opportunity for Workers with Disabilities (JUL 2014) (29 U.S.C. 793).

(H) 52.222-40, Notification of Employee Rights Under the National Labor Relations Act (DEC 2010) (E.O. 13496). Flow down required in accordance with paragraph (f) of FAR clause 52.222-40.

(I) 52.222-41, Service Contract Labor Standards (MAY

Page 55 of 59

2014) (41 U.S.C. chapter 67).

(J) [] ( 1) 52.222-50, Combating Trafficking in Persons (MAR 2015) (22 U:S.C. chapter 78 and E.O. 13627).

[] (2) Alternate I (MAR 2015) of 52.222-50 (22 · U.S.C. chapter 78 and E.O. 13627).

(K) 52.222-51, Exemption from Application of the Service Contract Labor Standards to Contracts for Maintenance, Calibration, or Repair of Certain Equipment-Requirements

. (MAY 2014) (41 U.S.C. chapter 67).

(L) 52.222-53, Exemptio~' from Application of the Service Contract Labor Standards to Contracts for Certain Services-Requirements (MAY 2014) (41 U.S.C. chapter 67).

(M) 52.222-54, Employment Eligibility Verification (OCT 2015) (Executive Order 12989).

(N) 52.222-55, Minimum Wages Under Executive Order 13658 (DEC 2015).

(0) 52.226-6, Promoting Excess Food Donation to Nonprofit Organizations. (MAY 2014) (42 U.S.C. 1792). Flow down required in accordance with paragraph (e) of FAR clause 52.226-6.

(P) 52.247-64, Preference for Privately Owned,U.S.-Flag Commercial Vessels (FEB 2006) (46 U.S.C. Appx. 1241 (b) and 1 O U.S.C. 2631 ). Flow down required in accordance with paragraph (d) of FAR clause 52.247-64.

52.217-9 -- Option to Extend the Term of the Contract.

Option to Extend the Term of the Contract (Mar 2000)

(a) The Government may extend the term of this contract by written notice to the Contractor within 15 days of contract expiration provided that the Government gives the Contractor a preliminary written notice of its intent to extend at least 30days before the contract expires. The preliminary notice does not commit the Government to an extension.

(b) If the Government exercises this option, the extended contract shall be considered to include this option clause. ·

(c) The total duration of this contract, including the exercise of any options under this clause, shall not exceed four years and six months.

Page 56 of 59

52.219-11 -- Special 8(a) Contract Conditions.

Special 8(a) Contract Conditions (Feb 1990)

The Small Business Administration (SBA) agrees to the following:

(a) To furnish the supplies or services set forth in this contract according to the specifications and the terms and conditions hereof by subcontracting with an eligible concern pursuant to the provisions of section 8(a) of the Small Business Act, as amended (15 U.S.C. 637(a)).

(b) That in the event SBA does not award a subcontract for all or a pa,rt of the work hereunder, this contract may be terminated either in whole or in part without cost to either party.

( c) Except for novation agreements and advance payments, delegate to the NRC the responsibility for administering the subcontract to be awarded heteunder with complete authority to take any action on behalf of the Government under the terms and conditions of the subcontract; provided, however, that the NRC shall give advance notice to the SBA before it issues a final notice terminating the right of a subcontractor to proceed with further performance, either in whole or in part, under the subcontract for default or for the convenience of the Government.

(d) That payments to be made under any subcontract awarded under this contract will be made directly to the subcontractor by the NRC.

( e) That the subcontractor awarded a subcontract hereunder shall have the right of appeal from decisions of the Contracting Officer cognizable under the "Disputes" clause of said subcontract.

(f) To notify the NRC Contracting Officer immediately upon notification by the subcontractor that the owner or owners upon whom 8(a) eligibility was based plan to relinquish ownership or control of the concern.

52.219-3 NOTICE OF HUBZONE SET-ASIDE OR SOLE SOURCE AWARD. (NOV 2011)

52.222-21 PROHIBITION OF SEGREGATED FACILITIES. (APR 2015)

52.222-26 EQUAL OPPORTUNITY. (APR 2015)

52.222-35 EQUAL OPPORTUNITY FOR VETERANS. (OCT 2015)

(a) Definitions. As used in this clause-

Page 57 of 59

"Active duty wartime or campaign badge veteran," "Armed Forces service medal . veteran," "disabled veteran," "protected veteran," "qualified disabled veteran," and "recently separated veteran" have the meanings given at FAR 22.1301.

(b) Equal opportunity clause. The Contractor shall abide by the requirements of the equal opportunity clause at 41 CFR 60-300.5(a), as of March 24, 2014. This clause prohibits discrimination against qualified protected veterans, and requires affirmative action by the Contractor to employ and advance in employment qualified protected veterans.

(c) Subcontracts. The Contractor shall insert the terms of this clause in subcontracts of $150,000 or more unless exempted by rules, regulations, or orders of the Secretary of Labor. The Contractor shall act as specified by the Director, Office of Federal Contract Compliance Programs, to enforce the terms, including action for noncompliance. Such necessary changes in language may be made as shall be appropriate to identify properly the parties and their undertakings.

(End of clause)

52.223-18 ENCOURAGING CONTRACTOR POLICIES TO BAN TEXT MESSAGING WHILE DRIVING. (AUG 2011) .

52.225-13 RESTRICTIONS ON CERTAIN FOREIGN PURCHASES. (JUN 2008)

52.232-33 PAYMENT BY ELECTRONIC FUNDS TRANSFER- SYSTEM FOR AWARD MANAGEMENT. (JUL 2013)

52.232-39 UNENFORCEABILITY OF UNAUTHORIZED OBLIGATIONS. (JUN 2013)

52.233-4 APPLICABLE LAW FOR BREACH OF CONTRACT CLAIM. (OCT 2004)

Page 58 of 59

SECTION J - List of Documents, Exhibits and Other Attachments

1. Billing Instructions for a Labor Hours Contract

Page 59 of 59