IG: Clearly define Alliant's scope

The General Services Administration needs more recognizable border lines to keep orders on the Alliant information technology contract in scope and avoid repeating past problems, according to a new report.

The GSA inspector general’s auditors found potential risks in the Alliant governmentwide acquisition contract’s ordering guide and suggested including more information about the scope review process and high-risk areas. Essentially, the guide needs to lay out clearly for contracting officers what’s allowed, the report issued May 1 states.

To counteract problems, the auditors suggest giving examples of appropriate IT services and solutions allowed under the contract, such as acceptable construction, alterations and repair work that mesh closely with the IT work, the report states.

“By providing additional scope-related information to the ordering guide, [the Federal Acquisition Service] can mitigate the risk of [contracting officers] awarding task orders outside of the scope of the contract,” wrote Michelle Westrup, GSA’s audit manager in the acquisition programs audit office.

Several years ago, GSA acquisition staff members had problems where they didn’t keep the task orders in the scope of the IT schedules. Several orders made on IT Schedule 70 contracts stretched well beyond IT and into prison interrogation in Iraq.

In other recommendations, the auditors suggested FAS officials list the roles and responsibilities of the contracting officers and contractors. For officers, GSA should add details on areas such as the delegation of buying authority and requirements on reporting procurement data to the Federal Procurement Data System. For contractors, the details should include how to best market themselves to agencies and pay GSA the contract access fee, which pays the agency's costs of running its GWAC program, the report states.

The auditors also recommended:

  • Guidance on writing a clear statement of work.
  • Information on the use of a streamlined acquisition process.
  • An emphasis on the importance of considering all costs involved in an order when searching for the best value.

In response, GSA officials said they are incorporating the recommendations into the ordering guide.

About the Author

Matthew Weigelt is a freelance journalist who writes about acquisition and procurement.

Featured

  • Cybersecurity
    malware detection (Alexander Yakimov/Shutterstock.com)

    Microsoft targets copycat influence websites

    Microsoft went to court to take down websites it believes to be part of a foreign intelligence operation targeting conservative think tanks and the U.S. Senate.

  • Cybersecurity
    secure network

    FAA explores shifting its network to FISMA high

    The Federal Aviation Administration is exploring an upgrade to the information security categorization of IT systems as part of air traffic control modernization.

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.