CONTRACT CLAUSES INCORPORATED BY REFERENCE 52 Clause Samples
CONTRACT CLAUSES INCORPORATED BY REFERENCE 52. 252-2 Clauses Incorporated by Reference (Feb 1998) Clause Title Date Homeland Security Acquisition Regulation (HSAR) Clauses / Provisions Clause Title Date B. FAR CLAUSES INCORPORATED IN FULL TEXT FAR 52.217-8 Option to Extend Services (Nov 1999) 52.217-9 -- Option to Extend the Term of the Contract (Mar 2000)
(a) The Government may extend the term of this contract by written notice to the Contractor within 30 days; provided that the Government gives the Contractor a preliminary written notice of its intent to extend at least 60 days before the contract expires. The preliminary notice does not commit the Government to an extension.
(b) If the Government exercises this option, the extended contract shall be considered to include this option clause.
(c) The total duration of this contract, including the exercise of any options under this clause, shall not exceed 36 months.
CONTRACT CLAUSES INCORPORATED BY REFERENCE 52. 252-2 Clauses Incorporated by Reference (Feb 1998) B. HSAR CLAUSES INCORPORATED IN FULL TEXT HSAR 3052.204-70 Security Requirements for Unclassified Information Technology Resources (Jun 2006)
(a) The Contractor shall be responsible for Information Technology (IT) security for all systems connected to a DHS network or operated by the Contractor for DHS, regardless of location. This clause applies to all or any part of the contract that includes information technology resources or services for which the Contractor must have physical or electronic access to sensitive information contained in DHS unclassified systems that directly support the agency’s mission.
(b) The Contractor shall provide, implement, and maintain an IT Security Plan. This plan shall describe the processes and procedures that will be followed to ensure appropriate security of IT resources that are developed, processed, or used under this contract.
(1) Within 60 days after contract award, the Contractor shall submit for approval its IT Security Plan, which shall be consistent with and further detail the approach contained in the quotation. The plan, as approved by the Contracting Officer, shall be incorporated into the contract as a compliance document.
(2) The Contractor’s IT Security Plan shall comply with Federal laws that include, but are not limited to, the Computer Security Act of 1987 (40 U.S.C. 1441 et seq.); the Government Information Security Reform Act of 2000; and the Federal Information Security Management Act of 2002; and with Federal policies and procedures that include, but are not limited to, OMB Circular A-130.
(3) The security plan shall specifically include instructions regarding handling and protecting sensitive information at the Contractor’s site (including any information stored, processed, or transmitted using the Contractor’s computer systems), and the secure management, operation, maintenance, programming, and system administration of computer systems, networks, and telecommunications systems.
(c) Examples of tasks that require security provisions include--
(1) Acquisition, transmission or analysis of data owned by DHS with significant replacement cost should the Contractor’s copy be corrupted; and
(2) Access to DHS networks or computers at a level beyond that granted the public (e.g., such as bypassing a firewall).
(d) At the expiration of the contract, the Contractor shall return all sensitive DHS information and IT resources provided to the Contractor during th...
