Government Contracts & Investigations

Category: Contract Administration

In Case You Missed It: New Website Provides Acquisition-Related Coronavirus Information

By

If you’re looking for a single place to find information concerning the federal government’s response to the coronavirus that impacts contractors, the General Services Administration (GSA) recently uploaded a webpage on the acquisition.gov website that aims to deliver: https://www.acquisition.gov/coronavirus. While it is not a comprehensive source, the site includes selected links to guidance and memorandaRead More

Topics: Acquisition Reform and Emerging Issues, Contract Administration

First COVID-19 Fraud Action Filed by the DOJ, and What It Means for Government Contractors

By

The U.S. Department of Justice (DOJ) announced it has taken its first action in federal court to combat fraud related to the coronavirus (COVID-19) pandemic. The heightened fraud enforcement establishes a new precedent for government contractors, in particular, to take extra steps to ensure robust compliance measures are in place, to review supply chain agreements,Read More

Topics: Contract Administration, Fraud, False Claims, and False Statements

EAJA Provides Relief to Construction Contractor for Government’s Bad Actions

By

In Vet4U, LLC v. Department of Veterans Affairs, the Civilian Board of Contract Appeals awarded costs and attorney fees to the small business contractor that won its appeal pursuant to the Equal Access to Justice Act (EAJA), 5 U.S.C. § 504, after finding the government’s position was not substantially justified. The EAJA is a usefulRead More

Topics: Claims and Disputes, Contract Administration

U.S. Government Issues Alert Regarding Critical Windows 10 Update – Are You Entitled To Compensation?

By

Earlier this month, the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust certifications used to authenticate sources in communications and files vulnerable to spoofing or attack. As the NSA Cybersecurity Advisory notes, “[e]xploitation of the vulnerability allows attackers to defeat trusted networkRead More

Topics: Claims and Disputes, Contract Administration, Cyber, Data Security, and Privacy