Home / Acquisition & Procurement / Mary Davie: GSA Forms Single Telecom Services Program to Prepare for EIS Contract Award

Mary Davie: GSA Forms Single Telecom Services Program to Prepare for EIS Contract Award

Mary Davie
Mary Davie

The General Services Administration has combined one program office and 11 regional programs for network services to form a single national program that will work to facilitate the procurement of regional and wide-area network telecommunications services by federal agencies.

Mary Davie, assistant commissioner of the integrated technology service office at GSA’s Federal Acquisition Service, wrote in a blog post published Tuesday that the agency made such a move in July in preparation for the award of the Enterprise Infrastructure Solutions contract vehicle.

EIS is a 15-year procurement vehicle that aims to meet federal agencies’ requirements for information technology telecom services as well as implement GSA’s Network Services 2020 strategy.

GSA expects the contract vehicle to be available for use by agencies in fiscal year 2017.

Davie said GSA will implement a single fee for local telecom services and introduce separate mailboxes for service requests and telecom problem reports through the consolidated national network services program.

The agency has also introduced a website and handbook that seek to guide agencies on how to adopt the EIS contract vehicle in order to meet the May 2020 deadline for the transition, she noted.

Davie also advised agencies to complete and submit their EIS transition plans to GSA by October.

Check Also

USCIS Launching System Modernization, Supply Chain Security Initiatives

The U.S. Citizenship and Immigration Services is working on modernizing its systems and fortifying software security at the supply chain level, Federal Times reported Friday. Adrian Monza, chief of the Department of Homeland Security component's cyber defense branch, told the publication that USCIS is launching “very significant” modernization efforts and that other agencies must be able to defend their networks against threats to financial databases.

Leave a Reply

Your email address will not be published. Required fields are marked *