This site optimized for Chrome V43, FireFox V38, Safari V8, and IE9 and later.
Rules of Behavior
This is a Federal computer system and is the property of the United States Government. It is for authorized use only. Unauthorized use of this system is prohibited and may constitute a violation of 18 U.S.C. C B' 1030 or other Federal laws and regulations and may result in criminal, civil, and/or administrative action.
Only Federal employees are authorized to use this system. It is intended for use by Federal acquisition personnel, including but not limited to procurement officials and program offices conducting market research. Contractors, even those assisting the Federal Government with an acquisition, are not authorized to use this system or otherwise obtain information from this system because it may contain contractor information considered to be company confidential. Unauthorized disclosure of company confidential information is subject to the penalties set forth in 18 U.S.C. C B' 1905 and 41 U.S.C. C B' 2105. Information downloaded or otherwise obtained from the system must be protected in accordance with this agreement and may also be considered source selection sensitive pursuant to 41 USC 2101(7) and FAR part 3 in accordance with agency procedures.
By accessing and continuing to use this system, you indicate your awareness of, and consent to, these terms and conditions and acknowledge that there is no reasonable expectation of privacy in the access or use of this computer system. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy in anything viewed, created, downloaded, or stored on this system, including e-mail, Internet, and Intranet use. Any or all uses of this system (including all peripheral devices and output media) and all files on this system may be intercepted, monitored, read, captured, recorded, disclosed, copied, audited, and/or inspected by authorized agency personnel, the Office of Inspector General (OIG),and/or other law enforcement personnel, as well as authorized officials of other agencies. Access or use of this computer by any person, whether authorized or unauthorized, constitutes consent to such interception, monitoring, reading, capturing, recording, disclosure, copying, auditing, and/or inspection at the discretion of authorized agency personnel, law enforcement personnel (including the OIG),and/or authorized officials other agencies.