Global Navigation System
Department of the Air Force, Air Force Materiel Command | Published January 26, 2016 - Deadline February 10, 2016
Global navigation Satellite System SimulatorThe U.S. Air Force requires a contractor to provide an Global navigation satellite system simulator. The anticipated award is firm fixed price - Best Value. Additional details on the requirements can be found in the Minimum Requirements (attachment 1).
This is a combined synopsis/solicitation synopsitation for commercial items prepared in accordance with the format in Federal Acquisition Regulation (FAR) Subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotations are being requested and a written solicitation will not be issued. The solicitation number is FA8601Simulator issued as a Request for Quotations (RFQ) and is conducted as a commercial item procurement using Simplified Acquisition Procedures (FAR Part 13). The government reserves the right to award without discussions or make no award at all depending upon (1) the quality of proposals received and (2) whether proposed prices are determined to be fair and reasonable of proposals received. This solicitation document and incorporated provisions and clauses are those in effect through Federal Acquisition Circular 2005-85, 4 Jan 2016.
This acquisition is unrestricted, full and open competition. Any offeror capable of providing the required services as described in the minimum requirements document is eligible to submit a quotation. The associated North American Industry Classification System (NAICS) code is 334511 and the size standard is 750 employees.
This RFQ has one line item:
CLIN Item Unit Quantity Unit Price Total Price0001 Global Navigation Satellite System simulator Each 1
Proposals must contain the following: - Price quote- All requirements listed in the attached minimum requirements document- Evidence of completed Representations and Certifications
Quotations shall be accompanied by a completed FAR 52.212-3, Representations and Certifications (Apr 2012), and adhere to FAR 52.212-1, Instructions to Offerors - Commercial Items (Feb 2012). The Government's preferred method is electronic Representations and Certifications. This can be accomplished by registering in the System for Award Management (SAM) at https://www.sam.gov and completing the on-line Representations and Certifications.
Quotations MUST contain a complete description of item offered to clearly show item meets or exceeds all requirements listed in the minimum requirements document, attachment 1, hereto. Quotation shall provide a point-by-point comparison to each item listed in the minimum requirements document. A general overview, general comparison, or statement such as "able to provide the requirements" or "meets minimum requirements" is unacceptable and will not be considered for potential acceptance.
Offerors are required to submit DFARs 252.209-7991 with quote. Quotes received without the completed DFARs 252.209-7991 will be considered incomplete.
The Contracting Officer will review quotations based on the factors listed in this solicitation and the information furnished by the offeror. Before price is considered, the proposal must meet the requirements. The lowest priced technically acceptable offer will be awarded the contract. THE CONTRACTING OFFICER IS NOT RESPONSIBLE FOR LOCATING OR OBTAINING ANY INFORMATION NOT IDENTIFIED IN THE QUOTE.
Contract financing is NOT provided for this acquisition. Quotations must identify payment terms as Net 30. The Government intends to award one firm fixed price (FFP) purchase order resulting from this solicitation to the responsible offeror whose quote is conforming to the solicitation and will be most advantageous to the Government. The Government intends to award without discussions and the Government reserves the right not to make an award at all.
IMPORTANT NOTICE TO CONTRACTORS: All prospective awardees are required to register at the System for Award Management (SAM) and to maintain active registration during the life of the contract. SAM can be accessed at https://www.sam.gov. Any award resulting from this solicitation will include DFARS Clause 252.232-7003, Electronic Submission of Payment Requests and Receiving Reports. Section 1008 of the National Defense Authorization Act of Fiscal Year 2001 requires any claims for payment (invoices) under DoD contract to be submitted in electronic form. Wide Area Workflow- Receipt and Acceptance (WAWF-RA) is the DoD system of choice for implementing this statutory requirement. Use of the basic system is at no cost to the contractor. Contractors must complete vendor training, which is also available at no cost at http://www.wawftraining.com. Prior to submitting invoices in the production system, contractors must register for an account at http://wawf.eb.mil/.
The following Federal Acquisition Regulation (FAR) provisions apply to this acquisition:52.212-1, Instructions to Offerors (June 2008) [subparagraph (c) is changed to 60 days and subparagraph (e) is deleted and marked as reserved]; 52.212-2, Evaluation Factors (Jan 1999) [The evaluation factors for the fill-in portion of this provision will be handled in accordance with FAR 13.106-1 and 13.106-2. Evaluation criteria will be - Price- Ability to comply with the requirements of the Minimum Requirements, as evidenced by providing a complete description of the equipment to be provided52.212-3, Contractor Representations and Certifications (Nov 2015) (Full-text copy - attachment 1 to this RFQ)52.252-1, Solicitation Provisions Incorporated by Reference (Feb 1998) (the fill in portion of this clause is: http://farsite.hill.af.mil or http://www.arnet.gov/far);52.252-5 [fill in "Defense Federal Acquisition Regulation Supplement" & "Chapter 2"]
The following Federal Acquisition Regulation clauses, either by reference or full text, apply to this acquisition:52.212-4 Contract Terms and Conditions - Commercial Items (May 2015); 52.212-5 Contract Terms and Conditions Required to Implement Statues or Executive Orders - Commercial Items (Jul 2012) The clauses that are check marked as being applicable to this purchase are: - 52.204-10 Reporting Executive Compensation and First-Tier Subcontract Awards- 52.209-6 Protecting the Government's Interests when Subcontracting with Contractors Debarred, Suspended or Proposed for Debarment- 52.219-4 Notice of Price Evaluation for HUBZone Small Business Concerns- 52.219-28 Post Award Business Program Representation- 52.222-3, Convict Labor (June 2003); - 52.222-19, Child Labor - Cooperation with Authorities and Remedies (Mar 2012);- 52.222-21, Prohibition of Segregated Facilities (Feb 1999); - 52.222-26, Equal Opportunity (Mar 2007);- 52.222-36, Affirmative Action for Workers with Disabilities (Oct 2010); -52.222-50, Combating Trafficking in Persons (Mar 2015)- 52.223-18 Encouraging Contractor Policies to Ban Text Messages While Driving (Aug 2011);- 52.225-13, Restrictions on Certain Foreign Purchases (Jan 2008); - 52.232-33, Payment by Electronic Funds Transfer-System for Award Management (Jul 2013) [end fill in for 52.212-5];[end fill in for 52.212-5];52.247-34 F.o.b. Destination (Nov 1991)52.232-40, Providing Accelerated Payments to Small Business Subcontractors52.252-2 Clauses Incorporated by Reference (Feb 1998) (the fill in portion of this clause is: http://farsite.hill.af.mil or http://www.arnet.gov/far)52.252-4, (fill in) 52.212-4(j) is marked Reserved/52.252-6 Authorized Deviations in Clauses (fill in)("Defense Federal Acquisition Regulations supplement"; "Chapter 2")
The following DFARS Clauses/Provisions, either by reference or full text, apply to this acquisition: 252.203-7000 Requirements Relating to Compensation of Former DoD Officials252.203-7002, Requirement to Inform Employees of Whistleblower Rights252.203-7005, Representation Relating to Compensation of Former DoD Officials (Nov 2011)252.203-7000, Requirements Relating to Compensation of Former DoD Officials (Sep2011); 252.211-7003, Item Identification and Valuation (fill in "None")252.213-7000 NOTICE TO PROSPECTIVE SUPPLIERS ON USE OF PAST PERFORMANCE INFORMATION RETRIEVAL SYSTEM - STATISTICAL REPORTING IN PAST PERFORMANCE EVALUATIONS (JUN 2015)252.223-7008 PROHIBITION OF HEXAVALENT CHROMIUM (JUN 2013)252.225-7035 BUY AMERICAN-FREE TRADE AGREEMENTS-BALANCE OF PAYMENTS PROGRAM CERTIFICATE-ALTERNATE I (NOV 2014)252.225-7036 BUY AMERICAN-FREE TRADE AGREEMENTS-BALANCE OF PAYMENTS PROGRAM-ALTERNATE I (NOV 2014)252.232-7003 Electronic Submission of Payment Requests (Jun 2012); 252.247-7023 Transportation of Supplies by Sea (May 2002) & Alternate III (May2002)[end fill in for 252.212-7001];252.225-7002 Qualifying Country Sources as Subcontractors (Jun 2012)252.232-7006 Wide Area Workflow Payment Instructions (Jun 2012)252.232-7010 Levies on Contract Payments (Dec 2006)252.244-7000 SUBCONTRACTS FOR COMMERCIAL ITEMS AND COMMERCIAL COMPONENTS (DOD CONTRACTS) (JUN 2013)DFARS 252.203-7996 PROHIBITION ON CONTRACTING WITH ENTITIES THAT REQUIRE CERTAIN INTERNAL CONFIDENTIALITY AGREEMENTS-REPRESENTATION (DEVIATION 2016-O0003)(OCT 2015)(a) In accordance with section 101(a) of the Continuing Appropriations Act, 2016 (Pub. L. 114-53) and any subsequent FY 2016 appropriations act that extends to FY 2016 funds the same restrictions as are contained in section 743 of division E, title VII, of the Consolidated and Further Continuing Appropriations Act, 2015 (Pub. L. 113-235), none of the funds appropriated (or otherwise made available) by this or any other Act may be used for a contract with an entity that requires employees or subcontractors of such entity seeking to report fraud, waste, or abuse to sign internal confidentiality agreements or statements prohibiting or otherwise restricting such employees or contactors from lawfully reporting such waste, fraud, or abuse to a designated investigative or law enforcement representative of a Federal department or agency authorized to receive such information.(b) The prohibition in paragraph (a) of this provision does not contravene requirements applicable to Standard Form 312, Form 4414, or any other form issued by a Federal department or agency governing the nondisclosure of classified information.
(c) Representation. By submission of its offer, the Offeror represents that it does not require employees or subcontractors of such entity seeking to report fraud, waste, or abuse to sign or comply with internal confidentiality agreements or statements prohibiting or otherwise restricting such employees or contactors from lawfully reporting such waste, fraud, or abuse to a designated investigative or law enforcement representative of a Federal department or agency authorized to receive such information.(End of provision)
252.203-7997 PROHIBITION ON CONTRACTING WITH ENTITIES THAT REQUIRE CERTAIN INTERNAL CONFIDENTIALITY AGREEMENTS (DEVIATION 2016-O0003)(OCT 2015)(a) The Contractor shall not require employees or subcontractors seeking to report fraud, waste, or abuse to sign or comply with internal confidentiality agreements or statements prohibiting or otherwise restricting such employees or contactors from lawfully reporting such waste, fraud, or abuse to a designated investigative or law enforcement representative of a Federal department or agency authorized to receive such information.(b) The Contractor shall notify employees that the prohibitions and restrictions of any internal confidentiality agreements covered by this clause are no longer in effect. (c) The prohibition in paragraph (a) of this clause does not contravene requirements applicable to Standard Form 312, Form 4414, or any other form issued by a Federal department or agency governing the nondisclosure of classified information.
(d)(1) Use of funds appropriated (or otherwise made available) by the Continuing Appropriations Act, 2016 (Pub. L. 114-53) or any other FY 2016 appropriations act that extends to FY 2016 funds the same prohibitions as contained in sections 743 of division E, title VII, of the Consolidated and Further Continuing Appropriations Act, 2015 (Pub. L. 113-235) may be prohibited, if the Government determines that the Contractor is not in compliance with the provisions of this clause. (2) The Government may seek any available remedies in the event the Contractor fails to perform in accordance with the terms and conditions of the contract as a result of Government action under this clause.
(End of clause)252.204-7008 Compliance with Safeguarding Covered Defense Information Controls.As prescribed in 204.7304(a), use the following provision:
COMPLIANCE WITH SAFEGUARDING COVERED DEFENSE INFORMATION CONTROLS (DEC 2015)
(a) Definitions. As used in this provision-
"Controlled technical information," "covered contractor information system," and "covered defense information" are defined in clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting.
(b) The security requirements required by contract clause 252.204-7012, Covered Defense Information and Cyber Incident Reporting, shall be implemented for all covered defense information on all covered contractor information systems that support the performance of this contract.
(c) For covered contractor information systems that are not part of an information technology (IT) service or system operated on behalf of the Government (see 252.204-7012(b)(1)(ii))-
(1) By submission of this offer, the Offeror represents that it will implement the security requirements specified by National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, "Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations" (see http://dx.doi.org/10.6028/NIST.SP.800-171), not later than December 31, 2017.
(2)(i) If the Offeror proposes to vary from any of the security requirements specified by NIST SP 800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, the Offeror shall submit to the Contracting Officer, for consideration by the DoD Chief Information Officer (CIO), a written explanation of-
(A) Why a particular security requirement is not applicable; or
(B) How an alternative but equally effective, security measure is used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection.
(ii) An authorized representative of the DoD CIO will adjudicate offeror requests to vary from NIST SP 800-171 requirements in writing prior to contract award. Any accepted variance from NIST SP 800-171 shall be incorporated into the resulting contract.
(End of provision)
252.204-7012 SAFEGUARDING COVERED DEFENSE INFORMATION AND CYBER INCIDENT REPORTING (DEC 2015)(a) Definitions. As used in this clause-
"Adequate security" means protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to, or modification of information.
"Compromise" means disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media may have occurred.
"Contractor attributional/proprietary information" means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.
"Contractor information system" means an information system belonging to, or operated by or for, the Contractor.
"Controlled technical information" means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information would meet the criteria, if disseminated, for distribution statements B through F using the criteria set forth in DoD Instruction 5230.24, Distribution Statements on Technical Documents. The term does not include information that is lawfully publicly available without restrictions.
"Covered contractor information system" means an information system that is owned, or operated by or for, a contractor and that processes, stores, or transmits covered defense information.
"Covered defense information" means unclassified information that-
(A) Provided to the contractor by or on behalf of DoD in connection with the performance of the contract; or
(B) Collected, developed, received, transmitted, used, or stored by or on behalf of the contractor in support of the performance of the contract; and
(ii) Falls in any of the following categories:
(A) Controlled technical information.
(B) Critical information (operations security). Specific facts identified through the Operations Security process about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure or unacceptable consequences for friendly mission accomplishment (part of Operations Security process).
(C) Export control. Unclassified information concerning certain items, commodities, technology, software, or other information whose export could reasonably be expected to adversely affect the United States national security and nonproliferation objectives. To include dual use items; items identified in export administration regulations, international traffic in arms regulations and munitions list; license applications; and sensitive nuclear technology information.
(D) Any other information, marked or otherwise identified in the contract, that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and Governmentwide policies (e.g., privacy, proprietary business information).
"Cyber incident" means actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein.
"Forensic analysis" means the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.
"Malicious software" means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code-based entity that infects a host, as well as spyware and some forms of adware.
"Media" means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which information is recorded, stored, or printed within an information system.
‘‘Operationally critical support'' means supplies or services designated by the Government as critical for airlift, sealift, intermodal transportation services, or logistical support that is essential to the mobilization, deployment, or sustainment of the Armed Forces in a contingency operation.
"Rapid(ly) report(ing)" means within 72 hours of discovery of any cyber incident.
"Technical information" means technical data or computer software, as those terms are defined in the clause at DFARS 252.227-7013, Rights in Technical Data-Non Commercial Items, regardless of whether or not the clause is incorporated in this solicitation or contract. Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code.
(b) Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall-
(1) Implement information systems security protections on all covered contractor information systems including, at a minimum-(i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government-
(A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and
(B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or
(ii) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause-
(A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, "Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations," http://dx.doi.org/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at email@example.com, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or
(B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and
(2) Apply other information systems security measures when the Contractor easonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
(c) Cyber incident reporting requirement.
(1) When the Contractor discovers a cyber incident that affects a covered contractor information system or the covered defense information residing therein, or that affects the contractor's ability to perform the requirements of the contract that are designated as operationally critical support, the Contractor shall-
(i) Conduct a review for evidence of compromise of covered defense information, including, but not limited to, identifying compromised computers, servers, specific data, and user accounts. This review shall also include analyzing covered contractor information system(s) that were part of the cyber incident, as well as other information systems on the Contractor's network(s), that may have been accessed as a result of the incident in order to identify compromised covered defense information, or that affect the Contractor's ability to provide operationally critical support; and
(ii) Rapidly report cyber incidents to DoD at http://dibnet.dod.mil.
(2) Cyber incident report. The cyber incident report shall be treated as information created by or for DoD and shall include, at a minimum, the required elements at http://dibnet.dod.mil.
(3) Medium assurance certificate requirement. In order to report cyber incidents in accordance with this clause, the Contractor or subcontractor shall have or acquire a DoD-approved medium assurance certificate to report cyber incidents. For information on obtaining a DoD-approved medium assurance certificate, see http://iase.disa.mil/pki/eca/Pages/index.aspx.
(d) Malicious software. The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
(e) Media preservation and protection. When a Contractor discovers a cyber incident has occurred, the Contractor shall preserve and protect images of all known affected information systems identified in paragraph (c)(1)(i) of this clause and all relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow DoD to request the media or decline interest.
(f) Access to additional information or equipment necessary for forensic analysis. Upon request by DoD, the Contractor shall provide DoD with access to additional information or equipment that is necessary to conduct a forensic analysis.
(g) Cyber incident damage assessment activities. If DoD elects to conduct a damage assessment, the Contracting Officer will request that the Contractor provide all of the damage assessment information gathered in accordance with paragraph (e) of this clause.
(h) DoD safeguarding and use of contractor attributional/proprietary information. The Government shall protect against the unauthorized use or release of information obtained from the contractor (or derived from information obtained from the contractor) under this clause that includes contractor attributional/proprietary information, including such information submitted in accordance with paragraph (c). To the maximum extent practicable, the Contractor shall identify and mark attributional/proprietary information. In making an authorized release of such information, the Government will implement appropriate procedures to minimize the contractor attributional/proprietary information that is included in such authorized release, seeking to include only that information that is necessary for the authorized purpose(s) for which the information is being released.
(i) Use and release of contractor attributional/proprietary information not created by or for DoD. Information that is obtained from the contractor (or derived from information obtained from the contractor) under this clause that is not created by or for DoD is authorized to be released outside of DoD-
(1) To entities with missions that may be affected by such information;
(2) To entities that may be called upon to assist in the diagnosis, detection, or mitigation of cyber incidents;
(3) To Government entities that conduct counterintelligence or law enforcement investigations;
(4) For national security purposes, including cyber situational awareness and defense purposes (including with Defense Industrial Base (DIB) participants in the program at 32 CFR part 236); or
(5) To a support services contractor ("recipient") that is directly supporting Government activities under a contract that includes the clause at 252.204-7009, Limitations on the Use or Disclosure of Third-Party Contractor Reported Cyber Incident Information.
(j) Use and release of contractor attributional/proprietary information created by or for DoD. Information that is obtained from the contractor (or derived from information obtained from the contractor) under this clause that is created by or for DoD (including the information submitted pursuant to paragraph (c) of this clause) is authorized to be used and released outside of DoD for purposes and activities authorized by paragraph (i) of this clause, and for any other lawful Government purpose or activity, subject to all applicable statutory, regulatory, and policy based restrictions on the Government's use and release of such information.
(k) The Contractor shall conduct activities under this clause in accordance with applicable laws and regulations on the interception, monitoring, access, use, and disclosure of electronic communications and data.
(l) Other safeguarding or reporting requirements. The safeguarding and cyber incident reporting required by this clause in no way abrogates the Contractor's responsibility for other safeguarding or cyber incident reporting pertaining to its unclassified information systems as required by other applicable clauses of this contract, or as a result of other applicable U.S. Government statutory or regulatory requirements.
(m) Subcontracts. The Contractor shall-
(1) Include this clause, including this paragraph (m), in subcontracts, or similar contractual instruments, for operationally critical support, or for which subcontract performance will involve a covered contractor information system, including subcontracts for commercial items, without alteration, except to identify the parties; and
(2) When this clause is included in a subcontract, require subcontractors to rapidly report cyber incidents directly to DoD at http://dibnet.dod.mil and the prime Contractor. This includes providing the incident report number, automatically assigned by DoD, to the prime Contractor (or next higher-tier subcontractor) as soon as practicable.
(End of clause)The following local information will be included in subsequent award. A full text version is available upon request:STMNT NBR 03 Inspection and Acceptance; STMNT NBR 04 Invoice and Payment; STMNT NBR 08 For Base Supply Stock Fund Items Only.
Copies of all provisions and clauses, including Representations and Certifications, are available at http://farsite.hill.af.mil/.
Attachments to the announcement:1. Minimum requirements document2. FAR 52.212-3 Full-Text Copy3. DFARS 252.209-7991 Tax Deviation Memo
Quotations, references AND completed representations and certifications, if not available in SAM, are due by 11:00 am (Eastern Time) on Feb 10, 2016 to:
Stephanie V. Foster AFLCMC/PZIOB E-mail: firstname.lastname@example.org (preferred method of contact)
Mailing Address:ATTN: Stephanie Foster AFLCMC/PZIOB1940 Allbrook Drive, Suite 3Wright-Patterson AFB OH 45433
Quotations may be sent via email or postal service using the above contact information.
Questions should be directed to Stephanie Foster at email@example.com or 937-522-4604.
Be advised that all correspondence sent via e-mail shall contain a subject line that reads "FA8601Simulator". Note that e-mail filters at Wright-Patterson AFB are designed to filter e-mails without subject lines or with suspicious subject lines or contents (i.e., .exe, or .zip files). Therefore, if this subject line is not included, the e-mail may not get through the e-mail filters. Also be advised that .zip or .exe files are not allowable attachments and may be deleted by the e-mail filters at Wright-Patterson AFB. If sending attachments with e-mail, ensure only .PDF, .doc, or .xls documents are sent. The e-mail filter may delete any other form of attachm