Experts: Value beats price to avoid fake IT

As government regulators consider tougher ways to block counterfeit information technology products from entering the federal marketplace, they’re restarting an old debate about whether to award contracts based on the lowest bid or the best value.

At a meeting Dec. 11 regarding newly proposed rules on counterfeit IT, Laura Auletta, a procurement policy analyst at the Office of Federal Procurement Policy, said she was surprised to hear that contracting officers believe they should award a contract to the lowest bidder to save money instead of finding the best value.

Contracting officers and acquisition officials often interpret the Federal Acquisition Regulation to mean that the lowest bid should get the award, said James Bockman, a former NASA official who worked closely with the agency’s procurement employees.

“They see that as saving the government money,” said Bockman, who is now a special projects engineer at Aerospace Corp.

The FAR gives civilian agencies broad discretion in making decisions based on price or other best-value parameters, such as the company’s experience and management capabilities. But government and industry experts say acquisition workers are concerned about making a mistake and paying for it with a career-ending embarrassment. With today’s emphasis on curbing waste and abuse, they say contracting officers often choose the vendor with the lowest price.

However, federal officials agree that the government should strive for quality and ensure that agencies don’t buy products that are tainted with malware or poorly made.

The prevalence of counterfeit IT and electronic parts has exploded in the past five years after roughly 20 years of level numbers, officials say.

“The whole supply chain is infected with counterfeit parts,” said Brian Hughitt, manager of quality assurance at NASA’s Safety and Assurance Requirements Division.

The sudden increase has led regulators to add tougher checks to the FAR. Counterfeit IT products lead to financial losses for government agencies and companies, and they pose a threat to national security, the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council wrote in a Nov. 18 Federal Register notice.

The new rules’ draft language would require agencies to buy all IT products from original equipment manufacturers, software developers, or authorized distributors or resellers. In addition, agencies would have to require companies to offer proof in contract proposals that their products are authentic.

Edward Chambers, a procurement analyst at the General Services Administration who is leading the regulatory proposal, tried to allay initial concerns from industry and government officials by saying the language is preliminary.

At the meeting, government officials disagreed about who’s to blame if an agency buys fake IT or electronic parts. Hughitt said a federal employee should take no blame if an agency buys a phony product because the contractor should know what it’s selling to the government.

However, the government does not use rigorous scrutiny when evaluating products, said Brad Botwin, director of industrial studies at the Commerce Department.

“The sloppiest processes are on this side of the house,” he said, referring to the government, particularly the Defense Logistics Agency. The liability for counterfeit parts rests on contractors and the government.

As the debate continues, officials say they need to find a way to increase scrutiny without putting companies out of business. But the checks are necessary because counterfeit products will continue to be a problem, Botwin said.

About the Author

Matthew Weigelt is a freelance journalist who writes about acquisition and procurement.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group