IIE’s Work with Small Businesses, Veteran-Owned, Minority-Owned, and Women-Owned Businesses
Current Opportunity: Seeking Interest and Capabilities
IIE is looking for small businesses that have the expertise and capabilities to support our overall scope of work to administer the Reserve Officer Training Corps (ROTC) Project Global Officer (GO) and Language Training Center (LTC) programs sponsored by the Department of Defense. Key areas of opportunity for small businesses to partner with IIE in support of the administration of these programs include, but are not limited to:
- Website development
- Web hosting services
- Application systems
- Graphic design
- Printing services
- Promotional videos
- Language Assessment (critical languages)
- Consultant Services
- DEIA Outreach Focus
- Marketing Services – Digital and Print Media
- Educational Technology for Language Teaching
- Alumni Engagement
- Events Management
- Social Media and Communications
- Cultural Assessment, Preparation, and Training
- Catering Services for Events
Share Your Capabilities
If you are interested in expressing interest in this opportunity and sharing your capabilities with IIE, please complete the form at the link below.
Creating, Handling and Sharing of Sensitive Data
The work that IIE does may involve creating, handling and sharing of sensitive data. This data can take the form of Personally Identifiable Data (PII) and/or Controlled Unclassified Information (CUI). It is important that IIE’s contractors, subcontractors, etc. as trusted partners, safeguard all forms of sensitive data as recommended by the National Institute of Standards and Technology (NIST) and relevant U.S. Government regulations such as DOD’s DFARS 252.204-7012 “Safeguarding Covered Defense Information and Cyber Incident Reporting”.
IT Security Evaluation
IIE’s IT security assessment is based on The NIST (National Institute of Standards and Technology) Cybersecurity Framework v1.1 (CSF) and is carried out through an assessment conducted by OneTrust. NIST is a guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. The NIST CSF consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover. When considered together, these Functions provide a high-level, strategic view of the lifecycle of an organization’s cybersecurity risk management.
·If the vendor will send, store or receive Personal Data (any information that can identify a specific individual person, including name, address or email address) on behalf of IIE an IT Security Evaluation is required prior to signing a contract. Please note that this includes vendors that will provide a technology solution that sends, stores or receives Personal Data.
·The evaluation may include vendor completion of a security compliance assessment and delivery of security evidence to IIE.
In addition, if the vendor will perform as a subcontractor on a Department of Defense-funded contract, they will have to comply with the requirements of DFARS 252.204-7012; 7019 and 7020.