This computer system, including all related equipment, networks, and network devices (specifically including internet access) are provided only for authorized U.S. Government use. U.S. Government computer systems may be monitored for all lawful purposes, including insuring that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. Monitoring includes active attacks by authorized U.S. Government entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied and used for authorized purposes.
All information, including personal information, placed or sent over this system may be monitored.
Use of this U.S. Government computer system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collecting during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for these purposes.
The Broad Agency Announcement (BAA) Information Delivery Systems (BIDS) is provided as a tool for dissemination and receipt of data related to the solicitations for the Irregular Warfare Technical Support Directorate (IWTSD).
BAA packages may be downloaded and released to the public. The information is presented to encourage responses from industry, government laboratories, educational institutions and other sources to provide technology solutions to the requirements identified in the BAA packages.
This computer system uses software programs to create summary statistics, which are for such purposes as assessing what information is of most or least interest, determining technical design specifications, and identifying system performance or problem areas. Data maintained for registered users is considered to be the minimum needed for the proper contact and execution of the BAA process. Except for authorized law enforcement investigations, no other attempts are made to identify individual visitors to the BIDS site or to track usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction.
NOTICE: Unauthorized attempts to upload information or to change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1987 and the National Information Infrastructure Protection Act.