The contractor performance evaluations contained in the PPIMS
are considered "Source Selection Information" as defined
in the FAR, 3.104-3, Definitions, and may be used to support future award decisions. Source
selection information must be protected from disclosure to unauthorized
persons and protected to ensure data availability, integrity,
and confidentiality.
a. The PPIMS database itself and performance evaluations are marked with the legend "SOURCE SELECTION INFORMATION--SEE FAR 42.1503(b)" and safeguarded appropriately to prevent unauthorized disclosure. The PPIMS uses a user identification (ID) and password system, administered by SAAL-PM, Contracting Career Program Office, to authenticate users and control access.
b. The PPIMS resides on an Automated Information System (AIS) accredited to process Unclassified-Sensitive 2 (US2) information as defined in AR 380-19, paragraph 1-5c(2). Authorized users of the PPIMS should operate from a workstation/system/network that is accredited at the US2 level and ensure that appropriate safeguards are in place upon receipt of source selection information from the PPIMS.
c. The PPIMS shall maintain a domain for its own execution that protects it from external interference or tampering and should include technical controls to ensure only authorized users have access to source selection information contained in the database. Disclosure of such information to unauthorized persons could cause harm both to the commercial interest of the Government and to the competitive position of the contractor under evaluation, as well as, impede the efficiency of Government operations.
This is a Department of Defense (DoD) interest computer system. All DoD computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems, including security devices, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. If monitoring of this or any other DoD computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user may be provided to law enforcement officials.