FAR Companion Change
| Date Detected | 2026-03-11 09:24 UTC |
| Type | COMPANION_MODIFIED |
| Entity | PART_39 |
Summary
PART_39 updated: 223 lines added, 2 lines removed
Diff
--- previous +++ current @@ -1,2 +1,227 @@ -Part 39 - Acquisition of Information and Communication Technology -FC 39.001 Applicability.+FAR part 39 emphasizes strategies that promote faster acquisition and secure deployment for +information and communication technology (ITC) including information technology (IT), +operational technology, emerging technology, and information systems. The definition for +information and communication technology is in FAR part 2. However, the following context may +be helpful in navigating the diverse ICT marketplace: +● Operational technology includes programmable systems or devices that interact with +the physical environment or manage devices that interact with the physical environment. +These systems or devices detect or cause a direct change through the monitoring and/or +control of devices, processes, and events. +● Emerging technology includes any evolving or innovative capability (whether +hardware, software, or service) that introduces new methods, tools, or efficiencies in +support of mission needs. This includes technologies undergoing rapid advancement or +change, and those with the potential to significantly improve operations, service delivery, +and security (such as the Internet of Things, or IoT). +● Information systems can combine information technology, operational technology, and +emerging technology. +○ Information systems can be deployed on premises or in the cloud. +○ Cloud deployments can be performed either as infrastructure, platform, or +software as a service. +FC 39.001(a)(2) Strategic planning for ICT acquisitions. +Successful ICT acquisitions begin with thoughtful planning that extends beyond immediate +technical requirements to consider long-term strategic objectives, organizational, and +operational factors consistent with OMB Circular A-130, “Managing Information as a Strategic +Resource.” These planning approaches establish the foundation for technology solutions that +remain viable and valuable throughout their lifecycle while meeting Federal information +governance requirements. +OMB Circular A-130 establishes general policy for information governance, acquisitions, records +management, open data, workforce, security, and privacy and represents a shift from viewing +security and privacy requirements as compliance exercises to understanding security and +privacy as crucial elements of a comprehensive, strategic, and continuous risk-based program +at Federal agencies. ICT acquisition planning must align with this strategic framework by +treating information as a valuable strategic resource requiring comprehensive lifecycle +management. +97 +Federal Acquisition Regulation (FAR) Companion +● Align acquisitions to the agency’s technology roadmap: Align the procurement to +the agency’s strategic technology roadmap that extends beyond immediate needs. This +approach permits the agency to plan systemically for technology evolution, integration +requirements, and capability maturation over time. This planning helps prevent isolated, +incompatible systems and reduces total ownership costs by facilitating smoother +technology transitions throughout the lifecycle. Where practical and appropriate, +technology roadmaps may rely on integration with shared services that scale cost +savings and value across larger Federal technology infrastructure and platforms. To +ensure alignment with your agency’s technology roadmap, the acquisition planner +should coordinate with your agency’s Chief Information Officer’s Office (or similar). The +agency CIO plays a central role in ensuring ICT acquisitions align with enterprise +architecture, information governance policies, and strategic technology planning as +mandated by A-130's framework for managing information as a strategic resource. +● Integrate Federal information governance requirements: ICT acquisitions must +incorporate the comprehensive information governance framework established by OMB +Circular A-130. This includes ensuring acquisitions support the agency's information +lifecycle management, from creation and collection through processing, dissemination, +and disposal. Acquisition planning should address how proposed systems will contribute +to the agency's strategic information management objectives, enable appropriate +information sharing, and support data-driven decision making while maintaining security +and privacy protections throughout the information lifecycle. +● Implement continuous risk-based security and privacy management: OMB Circular +A-130 emphasizes the role of both privacy and security in the Federal information life +cycle through a continuous, risk-based approach rather than periodic compliance +exercises. ICT acquisition planning must incorporate security and privacy considerations +from the earliest planning stages, ensuring that systems are designed with appropriate +safeguards and can adapt to evolving threats and requirements. This includes +conducting Privacy Impact Assessments (PIAs) when acquiring systems that handle +personally identifiable information and implementing the Risk Management Framework +throughout the system development lifecycle. +● Consider non-functional requirements: Balance functional capabilities with critical +non-functional requirements: security, scalability, interoperability, maintainability, +accessibility, and performance metrics. These requirements often determine whether a +system will not only meet user needs, but also integrate with enterprise architecture and +remain viable throughout its lifecycle. Clearly articulating non-functional requirements in +solicitations helps vendors propose appropriate solutions and prevents expensive +modifications later. +Being familiar with key statutory requirements related to the acquisition of ICT is critical to a +compliant acquisition. In addition to FAR part 39, it is important to be familiar with prohibitions as +they pertain to the acquisition of ICT detailed in FAR part 40. Further applicable guidance, such +as that related to the Federal Information Security Management Act (FISMA) or Section 508 of +the Rehabilitation Act of 1973, can be found on CIO.gov, Section508.gov, and the National +Institute of Standards and Technology Information Technology page (e.g., Federal Information +Security Management Act (FISMA) requirements). Information pertaining to statutorily required +purchasing programs relevant to ICT can be found on the statutory purchasing programs page. +98 +Federal Acquisition Regulation (FAR) Companion +FC 39.001(a)(2) Streamlined timeline techniques. +Accelerating the acquisition timeline ensures that implemented solutions remain technologically +relevant and meet current mission needs. These techniques maintain procurement integrity +while eliminating unnecessary delays that can undermine program success. +● Streamlined source selection. Design evaluation processes that enable award +decisions within 180 days or less from solicitation release. Techniques include limiting +proposal page counts; focusing on differentiating evaluation factors; using oral +presentations, demonstrations, or other real-time assessments to replace written +portions of the proposal; and implementing concurrent rather than sequential evaluation +phases. Establish dedicated review teams with scheduled evaluation sessions rather +than rely on part-time evaluators. These approaches maintain thoroughness while +eliminating unnecessary delays that can render solutions outdated before +implementation begins. +● Consensus-only documentation. Implement a streamlined consensus approach that +eliminates individual evaluator write-ups in favor of direct team consensus +documentation. This technique reduces administrative burden and timeline by having +evaluators first discuss their assessments collaboratively, then document only the team's +consensus findings. Instead of detailed narratives for each proposal, focus on capturing +discriminating factors between proposals and clear reasons for ratings (or rankings). +This approach can cut weeks from the evaluation timeline while improving evaluation +quality through collaborative assessment that uses the entire team's expertise. +● Agile acquisition techniques. Apply agile principles to the acquisition process itself, +not just the development methodology. Break the procurement into smaller, more +manageable chunks with shorter timelines. Consider techniques like rolling admissions +for vendor qualification, regular on-/off-ramping for multiple-award vehicles, and +streamlined ordering procedures for prequalified providers. Capture lessons learned and +continually refine acquisition approaches based on results. This creates a more +responsive procurement system that can adapt to changing technology and mission +needs. +FC 39.101 Management of ICT contract risk. +Information and communication technology acquisitions present unique challenges that can +significantly impact mission success and taxpayer value. Unlike traditional procurements, ICT +projects involve rapidly evolving technologies, complex integrations, and cascading +dependencies that can create costly problems if not properly managed. Effective risk +management enables agencies to identify potential issues early and respond proactively, +protecting against cost overruns, schedule delays, technical obsolescence, and solutions that +fail to meet user needs. +Modern ICT acquisitions face new risks beyond traditional concerns. Schedule risks may +include Artificial Intelligence (AI) integration delays and supply chain disruptions. Cost risks +often stem from evolving cybersecurity requirements and frequent technology updates. +Technical risks have grown with AI implementations where agencies may lack expertise to +evaluate performance or detect bias. Contract decisions typically involve balancing AI security, +federal design requirements, and third-party vendor risks, while AI systems can face data +99 +Federal Acquisition Regulation (FAR) Companion +poisoning attacks. These challenges tend to multiply when agencies manage multiple high-risk +projects with limited oversight resources. +Effective acquisition risk management often combines proven contracting techniques with +modern planning approaches. Acquisition planning should consider the government’s “realistic” +plan B in the event a contractor fails to perform. Modular contracting can help manage such risk. +Modular contracts can also break complex IT projects into smaller, manageable increments that +deliver value while reducing overall risk exposure. Agencies may benefit from thorough +acquisition planning that coordinates program, financial, and contracting perspectives early in +the process. Many find success incorporating specific contract language for AI governance, +cybersecurity attestations, and vendor risk assessments. Prototyping line items or contract +structures can allow testing of technical approaches before committing to full-scale +implementation. Outcome-focused contracting that emphasizes collaboration between +government and contractor teams helps ensure both parties work together toward mission +success rather than simply meeting contract specifications. +FC 39.102 Modular contracting. +Breaking down initiatives into manageable components reduces risk while increasing flexibility, +competition, and opportunities for innovation. These strategies enable incremental capability +delivery while maintaining system coherence and preventing vendor lock-in. Modular contracting +is especially critical for piloting, learning from, and iterating with emerging technologies. +● Managing complex requirements. Prioritize logical separation of concerns, well- +defined interfaces, and appropriate data exchange standards. This approach reduces +risk by allowing incremental delivery and creating more opportunities for small, emerging +technology business participation. +● Implementing modular contracting. Structure acquisitions into separate, interoperable +modules rather than monolithic systems. This approach, consistent with FAR 39.102, +enables incremental development and deployment of functionality, reduces risk +exposure, and increases opportunities for innovation. Establish a family of contracts with +complementary scopes that can be awarded to different contractors while maintaining +integration. This strategy prevents vendor lock-in while providing flexibility to adopt new +technologies or approaches for individual modules. +FC 39.70 Innovative solicitation approaches. +Modernizing solicitation practices make it easier for government and industry partners to +communicate more clearly and understand each other more deeply. Innovative solicitation +approaches like challenge-based acquisitions, simplified pitches, and rapid feedback loops help +attract tech startups and new market entrants. These methods reduce barriers, spark fresh +ideas, and make it easier for emerging companies to bring cutting-edge solutions into the +government space. +● Pre-proposal discovery sessions. Schedule one-on-one discovery sessions after +solicitation release, but before proposal submission, to clarify requirements and answer +vendor-specific questions. Conduct these sessions after an appropriate down-select +process to minimize burden and focus time efficiently. These sessions allow vendors to +explore their unique solution approaches while learning about agency needs. To +100 +Federal Acquisition Regulation (FAR) Companion +maintain fairness, establish clear ground rules prohibiting discussions of pricing, ensure +consistent time allocations for all offerors, and document session protocols in the +solicitation. These interactions result in complete proposals that better address agency +requirements and result in fewer assumptions and exceptions in proposals. +● Oral presentations. Add oral presentations to the evaluation process to assess vendor +understanding, team capabilities, and solution approaches more effectively than written +proposals alone. Structure these as scenario-based problem-solving exercises where +the vendor might best show their approach to realistic challenges. This technique +provides valuable insights into how teams think and work together while reducing +proposal preparation burden and potential AI bias. +● Technical demonstrations and challenges. Request working prototypes or technical +demonstrations that show vendors' actual capabilities rather than promised functionality. +Establish technical challenges that all offerors address under consistent conditions, +allowing side-by-side comparison of approaches and capabilities. This method reduces +reliance on written claims and provides evidence of technical competence and +innovation potential. However, in structuring technical demonstrations and challenges, it +is important to understand the level of effort they require for industry partners, especially +small businesses. Therefore, ensure the approach is appropriately structured based on +the complexity, value and importance of the requirement. Regardless, ensure the +evaluation criteria clearly communicate how demonstrations will influence award +decisions. +FC 39.70 Evaluation and negotiation innovations. +Modern evaluation approaches recognize that success depends on people, capabilities, and +contractual commitments more than written proposals or corporate history. These techniques +help agencies identify partners with the right capabilities and motivations for project success. +Examples of these or similar techniques are described in the Periodic Table of Acquisition +Innovations (PTAI). +● Phased down-select processes. Consider multi-phase evaluation processes that +progressively narrow the competitive field through increasingly detailed assessments. +Initial phases might evaluate high-level solution approaches and team qualifications, +while later phases examine technical details, pricing, and implementation plans from +down-selected offerors. This approach reduces the proposal preparation burden for +industry while allowing agencies to focus evaluation resources on the most promising +solutions. It particularly benefits IT acquisitions where in-depth technical evaluation (for +instance, of coding challenges or demonstrations) may be more resource intensive. +● Evaluate team capabilities. Assess the specific capabilities the team brings to the +contract. Request demos of team problem-solving abilities through technical challenges, +interviews, or scenario-based exercises. This approach recognizes that in rapidly +evolving technology areas, the specific knowledge and adaptability of the team members +matter. Consider how you structure the contract and incentives that maintain strong +teams under contract performance. +● Look beyond contract dollars equating to experience. When evaluating a +contractor’s experience, don’t simply use the size of past contracts or the length of a +contract as measures for how a contractor may perform on your requirement without +101 +Federal Acquisition Regulation (FAR) Companion +understanding what you might lose out on. +● Negotiate performance commitments into the offer. During negotiations, transform +vendor claims into contractual commitments with associated metrics and acceptance +criteria, turning them from promises into part of the contractually binding offer you +accept. In today's AI-enhanced proposal environment, written claims are increasingly +polished but may not reflect actual capabilities. In negotiations, test the depth of vendor +understanding and willingness to stand behind their assertions. Consider implementing +proof periods with defined acceptance criteria before full deployment under contract. +This approach protects the government from exaggerated capabilities while giving +vendors appropriate flexibility in implementation approaches.