Services
The following are services and products that can be provided under their respective Special Item Numbers (SINs). There is no contract ceiling or maximum order limitation. Awards are made on a "Best Value" basis.
If the agency Contracting Officer chooses to purchase from the SINs on a labor hour basis, the Task/Delivery Order will specify a not to exceed price, the labor category(ies) proposed (with the hourly rates for each), including other direct costs. See Price List Catalogue (1M PDF*) for rates and category descriptions.
Scope of Work
Under the FABS Schedule and in accordance with Special Item Numbers 520-11, 520-13 and 520-15, SAIC provides federal agencies with a wide variety of financial business solutions which include but are not limited to the following:
520-11 Accounting Services
Transaction analysis, transaction processing, data analysis and summarization, technical assistance in devising new or revised accounting policies and procedures, classifying accounting transactions, special studies to improve accounting operations.
520-13 Complementary Financial Management Services
Assess and improve financial management systems, financial reporting and analysis, strategic financial planning, financial policy formulation and development. Devise and implement performance measures, conduct special cost studies, perform actuarial services, perform economic and regulatory analysis, assist with financial quality assurance efforts, perform benchmarking.
520-15 Outsourcing for Recurring Commercial Activities for Financial Management Services
Services that an agency identifies as recurring commercial activities which may include billing, payroll processing, application processing, claim processing, grant application management, loan application management, inventory management, brokerage services and other financial management activities.
520-17 Risk Assessment and Mitigation Services
Risk Assessment and Mitigation Services include but are not limited to the following:
- Documentation of disclosure responsibilities for PII and PHI type information
- Deployment of risk assessment and mitigation strategies and techniques
- Improvement of capabilities through the reduction, identification, and mitigation of risks
- Detailed risk statements, risk explanations and mitigation recommendations
- Design and development of new business applications, processes, and procedures in response to risk assessments
- Ensuring compliance with governance and regulatory requirements
- Evaluation of threats and vulnerabilities to the protection PII and PHI type of information
- Training of government personnel on how to prevent data breaches and identity theft
- Information assurance of PII and PHI type information
- Vulnerability assessments
- Privacy impact and policy assessments
- Review and creation of privacy and safeguarding policies
- Prioritization of threats
- Maintenance and demonstration of compliance
- Evaluation and analysis of internal controls critical to the detection and elimination of weaknesses to the protection of PII and PHI type of information
520-18 Independent Risk Analysis
Independent Risk Analysis includes a review of all information compromised by a data breach for trends and unusual patterns. The circumstances surrounding the breach are investigated to determine whether it appears to be incidental, accidental or targeted. The breached data itself is analyzed to determine if there is any current evidence of organized misuse. The analysis ultimately provides a determination as to the probability that breached data may be used to harm the individuals whose data has been compromised. The tasks involved in independent risk analysis include but are not limited to the following:
- Monitoring of multiple data elements and sources
- Metadata analysis
- Pattern analysis
- Risk analysis
- Privacy impact analysis
- Statistical analysis
- Data structure development
- Notification services
- Probability analysis that breached data has been used to cause harm
- Determination of the level of risk for potential misuse of sensitive PII and PHI type of information
- Certification of findings regarding misuse of compromised data
- Investigation of circumstances surrounding breach, including digital forensic analysis
- Collection of evidence regarding data breaches
- Development of a risk mitigation plan
520-19 Data Breach Analysis
Data Breach Analysis includes the monitoring and detection of breached identities and PII and PHI type of information across multiple industries in order to detect patterns of misuse related to a specific data loss. The breached files are continuously monitored over a period of weeks, months, or years. It can provide the locations of potential misuse for further law enforcement action, as well as a listing of consumers likely to be fraud victims. The tasks involved include but are not limited to the following:
- Monitoring of multiple non-credit data elements and sources
- Fraud detection and protection solutions
- Fraud resolution and assistance for affected individuals
- Fraud alerts
- Corrective actions
- Notification services
- Identity theft insurance (as allowed by applicable State statutes)
- Social Security Number monitoring
- Credit card monitoring
520-20 Comprehensive Protection Solutions
Comprehensive Protection Solutions allows for customized solutions that integrate the services found under SINs 520 16 Business Information Services (Credit Monitoring Services), 520 17 Risk Assessment and Mitigation Services, 520 18 Independent Risk Analysis and 520 19 Data Breach Analysis. This SIN CANNOT be used to fulfill requirements that only fall within the scope of one of the other four SINs. It may only be used to fulfill agency requirements that span across multiple SINs.
520-21 Program Management Services
Program Management Services encompasses the management of financial and business solutions programs and projects and includes but is not limited to program management, program oversight, project management and program integration of a limited duration. A variety of functions may be utilized to support program integration or project management tasks.
Note: Services that are not authorized for purchase under this SIN are services where the primary purpose or the preponderance of work performed is specifically covered by another GSA Schedule, such as: mission-oriented business services covered by GSA Schedule 874; engineering services covered by GSA Schedule 871; IT services covered by GSA Schedule 70; advertising and marketing services covered by GSA Schedule 541; human resources services covered by GSA Schedule 738 X; logistics services covered by GSA Schedule 874 V; security services covered by GSA Schedule 84; transportation services covered by GSA Schedule 48; travel services covered by GSA Schedule 599, environmental services covered by GSA Schedule 899; language services covered by GSA Schedule 738 II; and training services covered by GSA Schedule 69. For more information on these or other GSA Schedules, visit the GSA Schedules E-Library website: www.gsaelibrary.gsa.gov.
