GSA Begins E-Commerce Portal Implementation Program’s Phase II With 2 RFIs

The General Services Administration has sought information from industry as part of the second phase of a program to establish an e-commerce platform that federal agencies can use to buy commercial products and services.

GSA issued a request for information on Friday asking e-commerce platform providers to share their data standards; spending trends; cybersecurity; user experience and program design; terms and conditions such as order tracking, issue resolution and delivery.

The agency asked information on product categories, program design and terms and conditions from suppliers that use such portals to sell their products under the second RFI posted Friday.

GSA will hold on Thursday, June 21, a town hall-like meeting for the market analysis and consultation phase and accept responses on the RFIs through July 20, according to the notices.

GSA and the Office of Management and Budget will use the feedback from the RFIs to develop the Phase II report that is scheduled for submission to Congress in March 2019 with plans to come up with a proof of concept before fiscal 2019 ends.

The RFIs for the Phase II came three months after GSA released the implementation plan for the e-commerce portal.

Executive Mosaic‘s Potomac Officers Club will host a forum in Falls Church, Va., on July 18. The “GSA Plans and Priorities Forum” will feature public and private sector leaders to discuss how industry can assist the agency to deliver real estate, acquisition and technology services to the government and the public.

Check Also

Cybersecurity Strategy

Updated CISA Federal Cybersecurity Strategy Directs Improved CDM Scores Through FY 2021

The Cybersecurity and Infrastructure Security Agency (CISA) has released an update to its action plan for strengthening federal cybersecurity in fiscal years 2020 through 2021. The initiative was led by Matthew Travis, the deputy director of CISA. CISA also cited evolving threat landscapes and limitations in cloud, network and encryption capabilities as challenges.

Leave a Reply

Your email address will not be published. Required fields are marked *