ࡱ> M ~bjbjcc 4 we weuF F 8|Sd@ Ts ,a@c@c@c@c@c@c@$CTFp@  @4@c$c$c$ Fa@c$ a@c$c$+02@ 0 F26M@@0@E2~F+!Fl22"F3h c$ @@" @ F F Q: Where necessary, to identify the applicable parties under the following clauses, Contractor shall mean Seller, Contracting Officer shall mean ϰſֱ Procurement Representative, Contract means this subcontract and Government means ϰſֱ. However, the words Government and Contracting Officer do not change: (1) when a right, act, authorization or obligation can be granted or performed only by the Government or the Prime Contract Contracting Officer or duly authorized representative, including but not limited to (i) audit rights to Sellers proprietary business records or (ii) any indemnification or limitation of liability obligation, which obligation shall remain with the Government; (2) when title to property is to be transferred directly to the Government, and (3) when the Government is granted ownership or other rights to Sellers intellectual property or technical data. Full Text Clauses Section C Clauses Description/Specifications: Acknowledgement of Sponsorship (Applicable for all purchase orders/subcontracts.) (a) As used in DFARS 252.235-7010, 'Acknowledgement of Support and Disclaimer,' "material" also includes but is not limited to, news releases, letters to the editor, articles, abstracts, manuscripts, brochures, advertisements, photos, films, videos, slides, charts, graphs, drawings, speeches, trade association meetings, symposia, etc. (b) Nothing in the foregoing shall affect compliance with the requirements of the clauses of this contract entitled "Disclosure of Information" (252.204-7000) and "Security Requirements" (FAR 52.204-2 and Alternate I) if such clause is a part of the contract (c) The Contractor further agrees to include this provision in any subcontract awarded as a result of this contract. Section D Clauses Packaging and Marking: Packaging and Marking Preservation, packaging, packing and marking of all deliverable contract line items shall conform to normal commercial packing standards to assure safe delivery at destination. Report Preparation Scientific or technical reports prepared by the Contractor and deliverable under the terms of this contract will be prepared in accordance with format requirements contained in ANSI/NISO Z39.18-2005 (R2010), entitled, "Scientific and Technical Reports - Preparation, Presentation and Preservation". [NOTE: All National Information Standards Organization (NISO) American National Standards are available as free, downloadable pdf(s) at  HYPERLINK "http://www.niso.org/standards/index.html" http://www.niso.org/standards/index.html.] (a) All scientific and technical reports delivered pursuant to the terms of this contract shall identify units of measurement in accordance with the International System of Units (SI) commonly referred to as the "Metric System". Conversion to U.S. customary units may also be given where additional clarity is deemed necessary. Guidance for application of the metric system is contained in the American Society of Testing Materials document entitled "Standard Practice for Use of the International System of Units (The Modernized Metric System)" (ASTM Designation E380-89A). (b) This provision also applies to journal article preprints, reprints, commercially published books or chapters of books, theses or dissertations submitted in lieu of a scientific and/or technical report. Section H Clauses Special Contract Requirements: Enterprise-Wide Contractor Manpower Reporting Application (ECMRA) (Applicable to all purchase orders/subcontracts that involve the performance of services as defined below. Communications with the Government under this clause will be made through ϰſֱ.) The contractor shall report ALL contractor labor hours (including subcontractor labor hours) required for performance of services provided under this contract for the Office of Naval Research via a secure data collection site. Contracted services excluded from reporting are based on Product Service Codes (PSCs). The excluded PSCs are: (1) W, Lease/Rental of Equipment; (2) X, Lease/Rental of Facilities; (3) Y, Construction of Structures and Facilities; (4) S, Utilities ONLY; (5) V, Freight and Shipping ONLY. The contractor is required to completely fill in all required data fields using the following web address  HYPERLINK "http://www.ecmra.mil" www.ecmra.mil. Reporting inputs will be for the labor executed during the period of performance during each Government fiscal year (FY), which runs October 1 through September 30. While inputs may be reported any time during the FY, all data shall be reported no later than October 31 of each calendar year. Contractors may direct questions to the help desk at  HYPERLINK "mailto:dod.ecmra.support.desk@mail.mil" dod.ecmra.support.desk@mail.mil. Section I Clauses Contract Clauses: FAR 52.244-6, Subcontracts for Commercial Items (Nov 2017) (Applicable for all purchase orders/ subcontracts.) (a) Definitions. As used in this clause Commercial item and commercially available off-the-shelf item have the meanings contained in Federal Acquisition Regulation 2.101, Definitions. Subcontract includes a transfer of commercial items between divisions, subsidiaries, or affiliates of the Contractor or subcontractor at any tier. (b) To the maximum extent practicable, the Contractor shall incorporate, and require its subcontractors at all tiers to incorporate, commercial items or nondevelopmental items as components of items to be supplied under this contract. (c) (1) The Contractor shall insert the following clauses in subcontracts for commercial items: (i) 52.203-13, Contractor Code of Business Ethics and Conduct (OCT 2015) (41 U.S.C. 3509), if the subcontract exceeds $5.5 million and has a performance period of more than 120 days. In altering this clause to identify the appropriate parties, all disclosures of violation of the civil False Claims Act or of Federal criminal law shall be directed to the agency Office of the Inspector General, with a copy to the Contracting Officer. (ii) 52.203-15, Whistleblower Protections Under the American Recovery and Reinvestment Act of 2009 (JUN 2010) (Section 1553 of Pub. L. 111-5), if the subcontract is funded under the Recovery Act. (iii) 52.203-19, Prohibition on Requiring Certain Internal Confidentiality Agreements or Statements (JAN 2017). (iv) 52.219-8, Utilization of Small Business Concerns (NOV 2016) (15 U.S.C. 637(d)(2) and (3)), if the subcontract offers further subcontracting opportunities. (v) 52.219-8, Utilization of Small Business Concerns (OCT 2014) (15 U.S.C. 637(d)(2) and (3)), if the subcontract offers further subcontracting opportunities. If the subcontract (except subcontracts to small business concerns) exceeds $700,000 ($1.5 million for construction of any public facility), the subcontractor must include 52.219-8 in lower tier subcontracts that offer subcontracting opportunities. (vi) 52.222-21, Prohibition of Segregated Facilities (APR 2015). (vii) 52.222-26, Equal Opportunity (SEP 2016) (E.O. 11246). (viii) 52.222-35, Equal Opportunity for Veterans (OCT 2015)(38 U.S.C. 4212(a)); (ix) 52.222-36, Equal Opportunity for Workers with Disabilities (JUL 2014) (29 U.S.C. 793). (x) 52.222-37, Employment Reports on Veterans (FEB 2016) (38 U.S.C. 4212). (xi) 52.222-40, Notification of Employee Rights Under the National Labor Relations Act (DEC 2010) (E.O. 13496), if flow down is required in accordance with paragraph (f) of FAR clause 52.222-40. (xii) (A) 52.222-50, Combating Trafficking in Persons (MAR 2015) (22 U.S.C. chapter 78 and E.O. 13627). (B) Alternate I (MAR 2015) of 52.222-50 (22 U.S.C. chapter 78 and E.O. 13627). (xiii) 52.222-55, Minimum Wages under Executive Order 13658 (DEC 2015), if flowdown is required in accordance with paragraph (k) of FAR clause 52.22255. (xiv) (A) 52.224-3, Privacy Training (JAN 2017) (5 U.S.C. 552a) if flow down is required in accordance with 52.224-3(f). (B) Alternate I (JAN 2017) of 52.224-3, if flow down is required in accordance with 52.224-3(f) and the agency specifies that only its agency-provided training is acceptable). (xv) 52.222-62, Paid Sick Leave Under Executive Order 13706 (JAN 2017) (E.O. 13706), if flowdown is required in accordance with paragraph (m) of FAR clause 52.222-62. (xvi) 52.225-26, Contractors Performing Private Security Functions Outside the United States (Oct 2016) (Section 862, as amended, of the National Defense Authorization Act for Fiscal Year 2008; 10 U.S.C. 2302 Note). (xvii) 52.232-40, Providing Accelerated Payments to Small Business Subcontractors (DEC 2013), if flow down is required in accordance with paragraph (c) of FAR clause 52.232-40. (xviii) 52.247-64, Preference for Privately Owned U.S.-Flag Commercial Vessels (FEB 2006) (46 U.S.C. App. 1241 and 10 U.S.C. 2631), if flow down is required in accordance with paragraph (d) of FAR clause 52.247-64. (2) While not required, the Contractor may flow down to subcontracts for commercial items a minimal number of additional clauses necessary to satisfy its contractual obligations. (d) The Contractor shall include the terms of this clause, including this paragraph (d), in subcontracts awarded under this contract. DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (Oct 2016) (Applicable if this purchase order/subcontract is for operationally critical support or for which performance will involve covered defense information. Seller shall furnish ϰſֱ copies of notices provided to the Contracting Officer at the time such notices are sent.) Adequate security means protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to, or modification of information. Compromise means disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media may have occurred. Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company. Controlled technical information means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information would meet the criteria, if disseminated, for distribution statements B through F using the criteria set forth in DoD Instruction 5230.24, Distribution Statements on Technical Documents. The term does not include information that is lawfully publicly available without restrictions. Covered contractor information system means an unclassified information system that is owned, or operated by or for, a contractor and that processes, stores, or transmits covered defense information. Covered defense information means unclassified controlled technical information or other information, as described in the Controlled Unclassified Information (CUI) Registry at  HYPERLINK "http://www.archives.gov/cui/registry/category-list.html" http://www.archives.gov/cui/registry/category-list.html, that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and Governmentwide policies, and is (1) Marked or otherwise identified in the contract, task order, or delivery order and provided to the contractor by or on behalf of DoD in support of the performance of the contract; or (2) Collected, developed, received, transmitted, used, or stored by or on behalf of the contractor in support of the performance of the contract. Cyber incident means actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein. Forensic analysis means the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data. Information system means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Malicious software means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code-based entity that infects a host, as well as spyware and some forms of adware. Media means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which covered defense information is recorded, stored, or printed within a covered contractor information system. Operationally critical support means supplies or services designated by the Government as critical for airlift, sealift, intermodal transportation services, or logistical support that is essential to the mobilization, deployment, or sustainment of the Armed Forces in a contingency operation. Rapidly report means within 72 hours of discovery of any cyber incident. Technical information means technical data or computer software, as those terms are defined in the clause at DFARS 252.227-7013, Rights in Technical Data-Noncommercial Items, regardless of whether or not the clause is incorporated in this solicitation or contract. Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code. (b) Adequate security. The Contractor shall provide adequate security on all covered contractor information systems. To provide adequate security, the Contractor shall implement, at a minimum, the following information security protections: (1) For covered contractor information systems that are part of an information technology (IT) service or system operated on behalf of the Government, the following security requirements apply: (i) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract. (ii) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract. (2) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1) of this clause, the following security requirements apply: (i) Except as provided in paragraph (b)(2)(ii) of this clause, the covered contractor information system shall be subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, "Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations" (available via the internet at  HYPERLINK "http://dx.doi.org/10.6028/NIST.SP.800-171" http://dx.doi.org/10.6028/NIST.SP.800-171) in effect at the time the solicitation is issued or as authorized by the Contracting Officer. (ii) (A) The Contractor shall implement NIST SP 800-171, as soon as practical, but not later than December 31, 2017. For all contracts awarded prior to October 1, 2017, the Contractor shall notify the DoD Chief Information Officer (CIO), via email at  HYPERLINK "mailto:osd.dibcsia@mail.mil" osd.dibcsia@mail.mil, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award. (B) The Contractor shall submit requests to vary from NIST SP 800171 in writing to the Contracting Officer, for consideration by the DoD CIO. The Contractor need not implement any security requirement adjudicated by an authorized representative of the DoD CIO to be nonapplicable or to have an alternative, but equally effective, security measure that may be implemented in its place. (C) If the DoD CIO has previously adjudicated the contractor's requests indicating that a requirement is not applicable or that an alternative security measure is equally effective, a copy of that approval shall be provided to the Contracting Officer when requesting its recognition under this contract. (D) If the Contractor intends to use an external cloud service provider to store, process, or transmit any covered defense information in performance of this contract, the Contractor shall require and ensure that the cloud service provider meets security requirements equivalent to those established by the Government for the Federal Risk and Authorization Management Program (FedRAMP) Moderate baseline ( HYPERLINK "https://www.fedramp.gov/resources/documents/" https://www.fedramp.gov/resources/documents/) and that the cloud service provider complies with requirements in paragraphs (c) through (g) of this clause for cyber incident reporting, malicious software, media preservation and protection, access to additional information and equipment necessary for forensic analysis, and cyber incident damage assessment. (3) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraphs (b)(1) and (2) of this clause, may be required to provide adequate security in a dynamic environment or to accommodate special circumstances (e.g., medical devices) and any individual, isolated, or temporary deficiencies based on an assessed risk or vulnerability. These measures may be addressed in a system security plan. (c) Cyber incident reporting requirement. (1) When the Contractor discovers a cyber incident that affects a covered contractor information system or the covered defense information residing therein, or that affects the contractor's ability to perform the requirements of the contract that are designated as operationally critical support and identified in the contract, the Contractor shall (i) Conduct a review for evidence of compromise of covered defense information, including, but not limited to, identifying compromised computers, servers, specific data, and user accounts. This review shall also include analyzing covered contractor information system(s) that were part of the cyber incident, as well as other information systems on the Contractor's network(s), that may have been accessed as a result of the incident in order to identify compromised covered defense information, or that affect the Contractor's ability to provide operationally critical support; and (ii) Rapidly report cyber incidents to DoD at  HYPERLINK "http://dibnet.dod.mil" http://dibnet.dod.mil. (2) Cyber incident report. The cyber incident report shall be treated as information created by or for DoD and shall include, at a minimum, the required elements at  HYPERLINK "http://dibnet.dod.mil" http://dibnet.dod.mil. (3) Medium assurance certificate requirement. In order to report cyber incidents in accordance with this clause, the Contractor or subcontractor shall have or acquire a DoD approved medium assurance certificate to report cyber incidents. For information on obtaining a DoD-approved medium assurance certificate, see  HYPERLINK "http://iase.disa.mil/pki/eca/Pages/index.aspx" http://iase.disa.mil/pki/eca/Pages/index.aspx. (d) Malicious software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer. (e) Media preservation and protection. When a Contractor discovers a cyber incident has occurred, the Contractor shall preserve and protect images of all known affected information systems identified in paragraph (c)(1)(i) of this clause and all relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow DoD to request the media or decline interest. (f) Access to additional information or equipment necessary for forensic analysis. Upon request by DoD, the Contractor shall provide DoD with access to additional information or equipment that is necessary to conduct a forensic analysis. (g) Cyber incident damage assessment activities. If DoD elects to conduct a damage assessment, the Contracting Officer will request that the Contractor provide all of the damage assessment information gathered in accordance with paragraph (e) of this clause. (h) DoD safeguarding and use of contractor attributional/proprietary information. The Government shall protect against the unauthorized use or release of information obtained from the contractor (or derived from information obtained from the contractor) under this clause that includes contractor attributional/proprietary information, including such information submitted in accordance with paragraph (c). To the maximum extent practicable, the Contractor shall identify and mark attributional/proprietary information. In making an authorized release of such information, the Government will implement appropriate procedures to minimize the contractor attributional/proprietary information that is included in such authorized release, seeking to include only that information that is necessary for the authorized purpose(s) for which the information is being released. (i) Use and release of contractor attributional/proprietary information not created by or for DoD. Information that is obtained from the contractor (or derived from information obtained from the contractor) under this clause that is not created by or for DoD is authorized to be released outside of DoD (1) To entities with missions that may be affected by such information; (2) To entities that may be called upon to assist in the diagnosis, detection, or mitigation of cyber incidents; (3) To Government entities that conduct counterintelligence or law enforcement investigations; (4) For national security purposes, including cyber situational awareness and defense purposes (including with Defense Industrial Base (DIB) participants in the program at 32 CFR part 236); or (5) To a support services contractor ("recipient") that is directly supporting Government activities under a contract that includes the clause at 252.204-7009, Limitations on the Use or Disclosure of Third-Party Contractor Reported Cyber Incident Information. (j) Use and release of contractor attributional/proprietary information created by or for DoD. Information that is obtained from the contractor (or derived from information obtained from the contractor) under this clause that is created by or for DoD (including the information submitted pursuant to paragraph (c) of this clause) is authorized to be used and released outside of DoD for purposes and activities authorized by paragraph (i) of this clause, and for any other lawful Government purpose or activity, subject to all applicable statutory, regulatory, and policy based restrictions on the Government's use and release of such information. (k) The Contractor shall conduct activities under this clause in accordance with applicable laws and regulations on the interception, monitoring, access, use, and disclosure of electronic communications and data. (l) Other safeguarding or reporting requirements. The safeguarding and cyber incident reporting required by this clause in no way abrogates the Contractor's responsibility for other safeguarding or cyber incident reporting pertaining to its unclassified information systems as required by other applicable clauses of this contract, or as a result of other applicable U.S. Government statutory or regulatory requirements. (m) Subcontracts. The Contractor shall-- (1) Include this clause, including this paragraph (m), in subcontracts, or similar contractual instruments, for operationally critical support, or for which subcontract performance will involve covered defense information, including subcontracts for commercial items, without alteration, except to identify the parties. The Contractor shall determine if the information required for subcontractor performance retains its identity as covered defense information and will require protection under this clause, and, if necessary, consult with the Contracting Officer; and (2) Require subcontractors to-- (i) Notify the prime Contractor (or next higher-tier subcontractor) when submitting a request to vary from a NIST SP 800-171 security requirement to the Contracting Officer, in accordance with paragraph (b)(2)(ii)(B) of this clause; and (ii) Provide the incident report number, automatically assigned by DoD, to the prime Contractor (or next higher-tier subcontractor) as soon as practicable, when reporting a cyber incident to DoD as required in paragraph (c) of this clause. FAR Clauses 52.203-7, Anti-Kickback Procedures (May 2014) 52.215-23, Limitations on Pass-Through Charges. (Oct 2009) and Alternate I (Oct 2009) (Alternate I will also apply.) 52.227-1, Authorization and Consent (Dec 2007) and Alternate I (Apr 1984) (Alternate I will also apply.) 52.230-2, Cost Accounting Standards (DEVIATION) (May 2018) (The version of the clause in DoD Class Deviation  HYPERLINK "https://www.acq.osd.mil/dpap/policy/policyvault/USA000864-18-DPAP.pdf" 2018-O0012 applies in lieu of the standard FAR version of the clause.) 52.230-3, Disclosure and Consistency of Cost Accounting Practices (DEVIATION) (May 2018) (The version of the clause in DoD Class Deviation  HYPERLINK "https://www.acq.osd.mil/dpap/policy/policyvault/USA000864-18-DPAP.pdf" 2018-O0012 applies in lieu of the standard FAR version of the clause.) 52.230-4, Disclosure and Consistency of Cost Accounting Practices - Foreign Concerns (DEVIATION) (May 2018) (The version of the clause in DoD Class Deviation  HYPERLINK "https://www.acq.osd.mil/dpap/policy/policyvault/USA000864-18-DPAP.pdf" 2018-O0012 applies in lieu of the standard FAR version of the clause.) 52.232-17, Interest (May 2014) (Applicable if this purchase order/subcontract contains any clauses which refers to an Interest clause. Government means ϰſֱ.) 52.232-39, Unenforceability of Unauthorized Obligations (Jun 2013) (Applicable for all purchase orders/ subcontracts, including purchase orders/subcontracts for commercial items, where software or services will be retransferred to the Government.) 52.243-2, Changes Cost Reimbursement (Aug 1987) and Alternate V (Apr 1984) (Alternate V will apply if this purchase order/subcontract is for research and development.) 52.245-9, Use and Charges (Aug 2012) (Applicable for all purchase orders/subcontracts where FAR 52.245-1 is inserted. Communications with the Government under this clause will be made through ϰſֱ.) 52.246-9, Inspection of Research and Development (Short Form) (Apr 1984) (Applicable if Seller does not have a cost reimbursable purchase order/subcontract and will be performing research and development work. "Government" means "ϰſֱ and the Government.") DFARS Clauses: 252.204-7000, Disclosure of Information (Oct 2016) (Applicable for all purchase orders/subcontracts. In paragraph (b) "Contracting Officer" means "ϰſֱ" and "10 days" means "20 days.") 252.211-7007, Reporting of Government-Furnished Property (Aug 2012) (Applicable if Seller will be in possession of Government property for the performance of this purchase order/subcontract, including purchase orders/subcontracts for commercial items.) 252.219-7003, Small Business Subcontracting Plan (DoD Contracts) -- Basic (DEVIATION) (Dec 2017) (The version of the clause in DoD Class Deviation  HYPERLINK "https://www.acq.osd.mil/dpap/policy/policyvault/USA003779-17-DPAP.pdf" 2018-O0007 applies in lieu of the standard DFARS version of the clause.) 252.219-7004, Small Business Subcontracting Plan (Test Program) (Apr 2018)) (Applicable if Seller participates in the DoD test program described in DFARS 219.702-70.) 252.235-7011, Final Scientific or Technical Report (Jan 2015) (Applicable for all purchase orders/subcontracts for research and development.) 252.243-7002, Requests for Equitable Adjustment (Dec 2012) (Applicable for all purchase orders/subcontracts over $150,000. Government means ϰſֱ.) 252.245-7001, Tagging, Labeling, and Marking of Government-Furnished Property (Apr 2012) (Applicable for purchase orders/subcontracts, including purchase orders/subcontracts for commercial items, where the items furnished by Seller will be subject to serialized tracking.) 252.245-7004, Reporting, Reutilization, and Disposal (Dec 2017) (Applicable to all purchase orders/ subcontracts, including purchase orders/subcontracts for commercial items, containing the clause at FAR 52.245-1, Government Property. "Contracting Officer" means ϰſֱ.) 252.246-7000, Material Inspection and Receiving Report (Mar 2008) (Applicable if direct shipments will be made to the Government.)      08/09/2018 Document No. ATC147, Rev. 0 Flowdowns for Prime Contract N00014-18-C-1026, Robotic Laser Additive Manufacturing System with Comprehensive Quality Assurance Framework Document No. ATC147, Rev. 0  PAGE 12 of 11     " # / 2 ij|qcqZcNBZBZBZhHhc*CJaJhPc5>*CJaJhh4,d5>*CJaJhXzw5>*CJaJ h]Zh 5B*CJaJphhm5B*CJaJphhmB* CJaJphHh]ZhmB* CJaJphHhmCJaJh]ZhmCJaJ 3 4 ./EF  $%efgdc,?,--r.s.//m1n1333^4_466gd6ggd  7$8$H$gd gd(h`hgd8_f`gd8_fgd8_f?,E,Q,R,S,,,,,,,;-<-----r.s.}.///n11334_4z45¶¡{j{^ShFh6gCJaJhFh6g6CJaJ hW!h6g6B*CJaJphhW!h6gB*CJaJphhW!h6gCJaJhW!h6g6CJaJh#Nh CJ\aJhHCJ\aJhHh CJ\aJ h \h 5CJ\aJh h 5CJ\aJ h 5\h#Nh 5CJ\aJh8_f5CJ\aJ55U5V55566l7z77?8P888999 ;;<<Z<a=c=q====@,@EEEEEE塵塕~rj_jrhW!h/CJaJh/CJaJjh/CJUaJhGh6g6CJaJhFh6gCJaJhFh6g6CJaJhXHCJaJhW!h6g6CJaJhXHh6g6CJaJhXHh6gCJaJhXHh CJ\aJhW!h6g0JCJaJhW!h6gCJaJjhW!h6gCJUaJ#666k7l7>8?88899 ; ;;<<<b=c===>>@@ A AAAkB`gd6ggd6gh`hgd6gkBlB C C"D#D]F^F'H(HIIJJNNPP@PAPQQSSST8`8gd6g 8`gd6gh`hgd6g`gd6ggd6gEEEYGZGmGGGGGGrLsLLLLLLLP>9:ʰݰTT34*CJ\aJ h \ h6g\hGh6g56CJaJhGh6g6CJaJhW!h6g0JCJaJjhW!h6gCJUaJhW!h6gCJaJhQy?h6g6CJaJ'eeffYhZhhhjjjjkklllllllrmsmmmgdHgd|gd `gd6gh`hgd6ggd6glmRmSmTmqmrmsmmmnnKnLnnnnnnnnnn,oCoDouovooȽvhZh1ghhP5CJ\aJhhPhhP0JCJ\aJ jhhPCJU\aJjhhPCJU\aJhQhhPCJ\aJhhPCJ\aJhhP5CJ\aJhHCJaJhH5CJ\aJhxhxCJ\aJhxCJaJhxhxCJaJhxhx5CJ\aJhx5CJ\aJmnnppPqQqrrrrssxtytuuuuu]v^v[w\wxgdtgd|gd2gdZLgdH]gdgdgd2gdhPooooooppphpppppqqqqqqNqQqoqrDrrFsgsyssʾʳʾʔʾʉulc[R[hHCJ\aJhHCJaJhH5CJaJhCJ\aJh5CJ\aJh2CJ\aJh25CJ\aJ j*hhPCJU\aJh1ghhP5CJ\aJhhP5CJ\aJhQhhPCJ\aJhhPCJ\aJhhPhhP0JCJ\aJjhhPCJU\aJ jhhPCJU\aJsssssssttttvtwtytttLuuuuuuuҽɮɢ|tk_PEhXzw5CJ\aJhhXzw5>*CJ\aJhFh CJ\aJhfCJ\aJh2CJaJh}Xh2B*CJaJphh}Xh2CJ\aJh}Xh2CJaJh}Xh25CJaJh7@hZLB*CJaJphhJhZLCJ\aJhZLCJ\aJhAWhZLCJ\aJh7@hZLCJ\aJhZL5CJaJh7@hZL5CJaJuuuu[v^vvwXw\wwwwwwwwwwCxDxExOxPxx۲t`Rh5/ht0JCJ\aJ&j?h5/hDCJU\aJh5/hDCJ\aJ jh5/hDCJU\aJh5/htCJ\aJ h5/hth5/hD5CJ\aJh5/ht5CJ\aJh5/hCJ\aJh5/h2B*CJaJphh5/h2CJ\aJh5/h2CJaJh5/h25CJ\aJxxxxx7y9yvywyxyyyyzlzzM{T{~{{{-|F|J|||ĹyymayyyVNhCJaJh5/hA@CJaJh5/hqCJ\aJh5/hq5CJaJh5/hCJ\aJh5/hCJaJh5/h5CJ\aJh5/h5CJaJh5/hDB*CJaJphh5/hDCJaJh5/hD5CJaJh5/ht5CJ\aJh5/htCJ\aJ)h5/htB*CJOJQJ^JaJph`xx8y9yyykzlz}{~{||} }!}#}$}&}'})}*}+},}:}$ !`'a$gd3gd5QgdqgdgdDgdt||}}}!}"}$}%}'}(}*}+},}-}/}0}1}2}4}9}:};}H}K}L}M}N}V}X}e}k}l}t}u}}}}}Ǹ|tojbh?Qh?Q>* hA>* h6>*h6gh6g>* hAM>* hXzw>*h]h6>*hXzwhAM ht ht h!h hFh6ghZ~ ht hF[jTht h!OJQJUhChshx4jhx4Uh7@h5QCJ\aJh5/h5QCJ\aJh5/h5Q5CJaJ&:};}W}X}}}}~~~~~~gd5Q $ !$a$gdt $ !`'a$gdfgd4# gd6 $ !`'a$gdq$ !`'a$gdXzw $ !$a$gdG }}}}}}}}}}}}}~~~~ ~ ~ ~~~~~~~~~~Ƶܟh7@h5QCJ\aJhx4hChs h\Y0J h5/0J hXzw0JhPc0JmHnHu h!0Jjh!0JUh6gh hXzwh! h6>*hAhA>* hA>* h!b>*h6gh6g>*21h:pq/ =!8"8#$% DyK yK https://www.acq.osd.mil/dpap/policy/policyvault/USA000864-18-DPAP.pdfyX;H,]ą'cDyK yK https://www.acq.osd.mil/dpap/policy/policyvault/USA000864-18-DPAP.pdfyX;H,]ą'cDyK yK https://www.acq.osd.mil/dpap/policy/policyvault/USA000864-18-DPAP.pdfyX;H,]ą'cDyK yK https://www.acq.osd.mil/dpap/policy/policyvault/USA003779-17-DPAP.pdfyX;H,]ą'cG Dd GdH  c $A?blSfpŤynlSfpŤPNG  IHDRNk^gAMAPLTEƜkkkcccΔ{ssbjYYbQƵέscƜΤrjֽƽs{skskckcYbY֔΄ֽcscYjYzzQbQBRBrr{{{{rzέ֥s{{JRRΜƓbkƋrBsƃAYbsR{Jsb9c{1Zs9Zsz{kBc9Z{!Jsr9Rs8j1Js)Z0jJZ!9s0rRc!Z b{jrbj(0Y9B{!ZJR19s jZbRRZYYbJJRQQbޔ{{))s!!sjrZbjzrkcQIJBIA800(( zbjr֔Ό΃zZ0 )zjscYI8 (rƽjYYAJ1A(8 R9rjRjIZ9Z9I(rQ{RY8{RrIc9zΔrƌkbεzޜrεﵔ޽ZYQbޜjsk{RJZέz޽ֵέ凜sƭ΃jrYzƥrオƽsksbYbRJRֵ֋rZJZj{c{zj֭޽{csﵥߩIDATx\p}=Yo\coۢ&)V$ҴR䏛Jg\ 'iAkg:o/-NLx&P;T= *1$ H}۽ɒl?to߾}}}])B'ӗZhBş)C8fb%֑k`8<F?4cGa-;|KE+4+2Y%0SX$&|%ْ*ґ~2"DH6ݒT7 FMǟW|7k@ .tW$$e+MCTN$JDDaT"阑/oOpڔmk{| raB*H"S|]1S@^/ר@2!dT ՖШ ^}cH 30C5Nh7e.;%UŠ>:?`Y p@I&*0dC*i(A5#l(ؠR8e74&b!JpXAG S1梄fI8! wa\9Y4)ZVx0bd.,CVa֬fg1/r1`uf!')/= p*?$V'$a.4=7r.Z\jͨ_qÈ]1=ЪEC*X5m&*IKfPqOΑdqf-܋C' "̳ qwDʋhn8Gf^LZI>P&AuO*C՞5m+9R!*vhǑ޲$T2%+1]cމ/ ˉOE7BE9q-4[°ܛ`nKDŽH.]]5D#rXu !*;# jsm펼8ܔPԢ^\Ҹ7k Jz@?CepdD \32HTi#o}$ݐ+s9nihi>y51v7!PX֮74vg vsFy;Ucjrh7\as5<|#\G䩤]\*ZUVvXCoVasp\?F"Rn*,fl\f Izd*_5+#A#?'3, -ߵ\0p%"4TOCɚn_`] r=i8b z 3]_W6gYVF$#"O SQqTC;Cnqy`L|ĸKNӨ2MElFRz[,R!.vrµ׌Opo1C![{S Ɋl'hpA3niG_aa ۩xzWӌZIimRwh |9"}a=ZϼvtvvttttwtwAG&ݎG=[3;ӝl6tꞞ[};6膪L&7h7d2# 8QvUK{?f5 :<*rm Z@,Aܢ&bOիmDczŗsP|≧~xχv,S*BdeVV6[mvvQf;vdwW6׷Kvها/'V}S(XX߶}۶m߃-[m-۾[2 Gq ozX{zT LzZ*Л-Ǡαcoӯʛ/KGy<#CCCb bw;-§XpOE^]"JVs_94n6z5v=i6"ю"U3}wJc[iyI%*aܻ(3Rzˇ>{/˯ڋO>g8/>o=KPȨ GHSkPP;Vc0JD0kذ$Ab*;enLXkHl40Ԫ&T0jL[ S 2>>62{cE^yW_y ʑgZJ⌙~T]F,lKlxi[J/_z٘ Dz1cGшC x}aʳZ'cm:9ij {$[ׅR0w9!̻@/sԶey s8NtTB2C d.]_=otث%1ZV7b 9l<b6t];H rA>Q`M$H$T&tz0ЀK fk#y.*3J *ϕ'(ixBn h^ $UI((/C IcܒAhiE[oZ @4&}"5`C3hSOw&8*D` cY*F&PV:jIyDPwØ\ c<aWG_1/70][u"vcΓM$o ^{l6(Ղs J\usj;PE*sNpEpe;<` ֿ'#[IxL-?#q3$ҺpP]Ȅ'A }ob%a'.ɹ^~EݕgN QZ&FV%/  sD^EBݸp{F#<+e O(s}fP` Mq".}qq -H Yл q'~+Ri _tR} C .QSUσ%3@l#6h8H7-MKf<}+_ י`ͥz'KZņoJsZ= ʡ ˲Z7snvR)@Py9 5'<Mx%ZXAѓ*6!1˅"ʷ^Ӵ>`i_eڷ.0-O>wP&UN>\S n8$ !(m@NMw 5/I7`L'&^@]Iu2EqS1"]s~3XA)J|=ݴep{}LfCKM[ɚP ~e>hD^'}=Etoz_P@"k#m57 @IC֯;87R66Έf i.z_U疯ҹInGk|i hiǾ_0Mh wbJWMNYƵ"4loΙpO(> aˡ5tm R?xj̋.|CıPŶj "JpwG{ytAr [)Y(wLe11\h@?F]ꚶ$qU/C5Y(c7 w?0,BslӥkFSzk];JPBɵ]7ilkSxf T/`:5k*{; ]if|{0hV&m 9K%"ajVd&\y%l`A2=6VYE8`3jc=X+E8AD*M0tMO5S #3' LW٧Ϝ9sG~cz4^=y";.L(# ;^ ;M*n9ޘC4*K2}L@dt|-;z!AC$Cꘘ̾('dp]Hnc YSٌ 0Q;p2+r7 0xCvRnr6Ϳw&1L8x-W}vr*alEf栯ITiGu;6*?&!ξO?;{~ǫGǕBT'|n>KlcU_x|/F$sel_q_pᢢ05uBY8DpaJG_dWǒ!V+)r 䣩3=I!E1 ig^k3'2A} 7aQB?I2wQla!]B(H -RUxN$(!P+1ACB9avgw|۹ݻ$ٛyo}̛o4B֚\z=ΩQ -EΈ (`kAdʈG_{Q.5g+aKR= uIph4INsnlh)­`Z9h[ *}Y  BtnҔd(L->lm+na ~}h{^) 0Aeq>fy73TXGI0ihL6J#bz/  QLNu#+$ 6ɘ79}ɛߕϏ67[.JltJ2_I2BfL 7U]_y׉`D =! {&V =^bEhݞy© Z#G8r^ʌJ*x]Vm8QD(pjk]_!1Q)sN}d'}ơa0{w+-S>!kKl tЊQL Kcq:;{)Q@ "y6n_RiX32zACZٹv*' ڦWe!qB+/q"͕BP/Q y5L(Wy(I% 0ԞYIҳ8/)MiN !/U!L91*nq).nE;01M4*^h~ӉjՊ(!-|ۖX~$I+-M|i_)%Cb@όZ#5~Upu "N}=<;$tDwrt]dpW酸ț;ܛ (+p+l@>  Heading 1$@& 5>*\@@  Heading 2$$@&a$5\::  Heading 3$@&5\NN co6 Heading 5 <@&56CJ\]aJDA`D Default Paragraph FontViV  Table Normal :V 44 la (k (No List 4@4 Header  !4 @4 Footer  !4B4 Body Text5\*W !* Strong5\NQ2N co6 Paragraph 5 56CJ\]aJHCBH 7OBody Text Indenthx^h<PR<  Body Text 2 dxR^bR Y Normal (Web)dd[$\$CJOJQJaJ.)@q. { Page NumberXX N{DFARS h*xS @@@@@@d@KHOJQJaJHH N{ Balloon TextCJOJQJ^JaJf/f KQ Clause Text 91$7$8$H$$CJOJQJ^J_HaJmH sH tH 4U`4 L0 Hyperlink >*ph6a 6 L0 HTML Cite 6]ph3FV F LFollowedHyperlink >*B*phjj W- Table Grid7:V0b/b XwDefault 7$8$H$-B*CJOJQJ^J_HaJmH phsH tH Rv!R t0Unresolved MentionB*phq PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VGRU1a$N% ʣꂣKЛjVkUDRKQj/dR*SxMPsʧJ5$4vq^WCʽ D{>̳`3REB=꽻Ut Qy@֐\.X7<:+& 0h @>nƭBVqu ѡ{5kP?O&Cנ Aw0kPo۵(h[5($=CVs]mY2zw`nKDC]j%KXK 'P@$I=Y%C%gx'$!V(ekڤք'Qt!x7xbJ7 o߼W_y|nʒ;Fido/_1z/L?>o_;9:33`=—S,FĔ觑@)R8elmEv|!ո/,Ә%qh|'1:`ij.̳u'k CZ^WcK0'E8S߱sˮdΙ`K}A"NșM1I/AeހQתGF@A~eh-QR9C 5 ~d"9 0exp<^!͸~J7䒜t L䈝c\)Ic8E&]Sf~@Aw?'r3Ȱ&2@7k}̬naWJ}N1XGVh`L%Z`=`VKb*X=z%"sI<&n| .qc:?7/N<Z*`]u-]e|aѸ¾|mH{m3CԚ .ÕnAr)[;-ݑ$$`:Ʊ>NVl%kv:Ns _OuCX=mO4m's߸d|0n;pt2e}:zOrgI( 'B='8\L`"Ǚ 4F+8JI$rՑVLvVxNN";fVYx-,JfV<+k>hP!aLfh:HHX WQXt,:JU{,Z BpB)sֻڙӇiE4(=U\.O. +x"aMB[F7x"ytѫиK-zz>F>75eo5C9Z%c7ܼ%6M2ˊ 9B" N "1(IzZ~>Yr]H+9pd\4n(Kg\V$=]B,lוDA=eX)Ly5ot e㈮bW3gp : j$/g*QjZTa!e9#i5*j5ö fE`514g{7vnO(^ ,j~V9;kvv"adV݊oTAn7jah+y^@ARhW.GMuO "/e5[s󿬅`Z'WfPt~f}kA'0z|>ܙ|Uw{@՘tAm'`4T֠2j ۣhvWwA9 ZNU+Awvhv36V`^PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!g theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] v9 2 i ?,5EDUy{Ǩk- VH"xD6݋[SO71nN\<5iy<N<7=+A=]= >k>#>-?3?I?l?u?Qy?@ol@A_ B3B9B3CwCDD8DE^EtE,F4FRFxFG+G3G49GmGyG( H7MHXHJvH/IzLIdJJ-J?JOdJKKfKiK|'LILZLMHMN9ZN1\N[O<OOX\O?^OBPP^WPhP\pP1Q[2Q?Qs^QyQ {QPmRR'S*)S{RS&9T,UVmU rUuUkV mWXCX?KX^XMnX*Y\YpYZZoZ+4Zm6Zk[D\/\P\e\ ]xY]z] ^$^w_(`]L`t`caaS]agb!b*b{:bPcWccec4,d4dqd)eEe0f8_fdf'*g6gYgOug:hFhoiEjsj`lBlNJmWmlmnBHnw_n.oBoNooT(pcs-Osu}AuSu9WuIau?v!vD*vw(w()w*wDwSwkwXzw~w?xx xyeyzRlz!wz|{}<{X{F|e} ~Z~ $ot$3;uYw!57eniW-FFFpTj ]I[`ta'tsICyfksr8gJuY'A@XQScfw@k]7Ohi2_/#MVZq t0m7.S0iyb56"ATqc(CGk7RW)2f (Pp@SM\<"R8hqKRhC:as%ufv:9Zfa 4)j%q xh{ _^OyJ\al[$RTo}[Z]hvr(|t g%=[Efgu5=0MWCFHJXs. !`fvn75QsQC&U.f8#FHZ6/4T:(+0f+M#EF23HbozLvy'$VuMwQ`Xb]cv Xqy|lOtSN4+Y+_VAPoU| )WcnPY gkHQABFo !-=Yqf IlErT{ g%KQ!}XZ#5/3IDs+`6\(}-AM]] 9mt'G d2XwN{L)}CHRh;@2ZdLe +:"ENQ_ #,GET`A"TFa 7=7DVF"^,N>W{/~?[YA_g-FY`C7?lpCt{ P'J,n,GI O%)>mailto:osd.dibcsia@mail.mil  *http://dx.doi.org/10.6028/NIST.SP.800-1718' 8http://www.archives.gov/cui/registry/category-list.html H'mailto:dod.ecmra.support.desk@mail.milChttp://www.ecmra.mil/YH)http://www.niso.org/standards/index.htmlUnrestricted04ϰſֱ Proprietary Information (LMPI); ;#LOCKHEED MARTIN PROPRIETARY INFORMATION Flowdowns for Cooperatinve Agreement NNH14CK56C, United Kingdom Infrared Telescope (UKIRT);#0;#Unrestricted;#False;#00000000-0000-0000-0000-000000000000;#Information that is not sensitive.;#0;#ϰſֱ Proprietary Information (LMPI);#True;#00000000-0000-0000-0000-000000000000;#Proprietary information owned by ϰſֱ, such as bu  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcdefghijklmnpqrstuvwxyz{|}~Root Entry F 0Data \$1Tableo0GWordDocument4SummaryInformation(DocumentSummaryInformation8MsoDataStore @6 0@ 02TD2EZXTTWE==2@6 0@6 0Item  PropertiesOGCKPGQBQC==2 @6 0@6 0Item  PropertiesElOCTHOITMQ==2@6 0@ 0Item +PropertiesKMCHBGZ3ALYLYZQ==2@6 0@ 0Item ^PropertiescUCompObjir  !"#$%&'()*+,-./0123456789:;<=>?DocumentLibraryFormDocumentLibraryFormDocumentLibraryForm This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision. i="http://schemas.microsoft.com/office/2006/metadata/properties/metaAttributes"/>   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q