- About
- Technology Services
- How to Order VITA Services
- VITA Service Portal
- Catalog Services
- Non-Catalog Services
- CAMs and Other VITA Contacts
- VITA Identity Manager (VIM)
- VITA Billing
- Online Customer Forms
- ADABAS Field/File Modification
- ADABAS File Request
- CICS File Definition
- CICS General Purpose Request
- CICS Program/Mapset Change Request
- CICS Transaction Change Request
- Comprehensive Services Credit/Change Request
- DB2 Storage Group Database Request
- Firewall Account Request
- Firewall Exemption Letter
- Firewall Rules Request
- Information Security Access Agreement
- Mainframe Services
- Mainframe Services Billing Account Request
- MVS Automated Scheduling Change Request
- Natural Security Authorization
- Natural Table System Security Authorization
- Request for Mainframe Services User ID Account
- Special Privilege Request
- Tape Handling Request
- Telecommunications Billing Account Request
- Telecommunications Billing Request: Billing Contact/Coordinator Change
- Telecommunications Billing Request: Billing Questions
- FAQs
- COV Grade
- COV Apps
- COV Cloud
- COV Cyber
- COV Ramp (formerly ECOS)
- Information Security
- Policy & Governance
- Policies, Standards & Guidelines
- Enterprise Architecture
- IT Investment Management
- Project Management
- Governance
- Glossary
- Artificial Intelligence
- Procurement
- Announcements
- High-Risk Solicitations and Contracts
- Buy IT Manual
- Introduction
- Chapter 1 - VITA's Purpose and Scope
- Chapter 2 - How Is Procuring Information Technology Different?
- Chapter 3 - VITA's Supply Chain Management (SCM)
- Chapter 4 - Reserved
- Chapter 5 - Ethics in Public Procurement
- Chapter 6 - Fair and Open Competition in IT Procurement
- Chapter 7 - Promoting the Commonwealth's Socio-Economic Initiatives
- Chapter 8 - Describing the Need - Specifications and Requirements
- Chapter 9 - Determining Fair and Reasonable Pricing
- Chapter 10 - General IT Procurement Policies
- Chapter 11 - IT Procurement Planning and Strategic Sourcing
- Chapter 12 - Statements of Work for IT Procurements
- Chapter 13 - The IT Procurement Project Team
- Chapter 14 - Selecting the IT Procurement Method
- Chapter 15 - Small IT Purchase Procedures
- Chapter 16 - Sole Source IT Procurements
- Chapter 17 - Emergency IT Procurements
- Chapter 18 - Requests for Information, Prequalification of Suppliers, Unsolicited Proposals
- Chapter 19 - Public, Online and Reverse Auctions
- Chapter 20 - Joint and Cooperative and GSA Contracts
- Chapter 21 - Performance-Based Contracting and Service Level Agreements
- Chapter 22 - IT Competitive Sealed Bidding / Invitation for Bid
- Chapter 23 - Two-Step Competitive Sealed Bidding
- Chapter 24 - Requests for Proposals and Competitive Negotiations
- Chapter 25 - IT Contract Formation
- Chapter 26 - Negotiating IT Contracts
- Chapter 27 - Software Licensing and Maintenance Contracts
- Chapter 28 - Agency IT Procurement Security and Cloud Requirements for Solicitations and Contracts
- Chapter 29 - Award and Post-Award of IT Contracts
- Chapter 30 - High Risk IT Solicitations and Contracts
- Chapter 31 - Reserved
- Chapter 32 - Protest Procedures
- Chapter 33 - Reserved
- Chapter 34 - IT Contract Administration
- Chapter 35 - Reserved
- Chapter 36 - Reserved
- Chapter 37 - Reserved
- Bibliography
- IT Contingent Labor
- Virtual/Distance Learning Program
- Contact SCM
- Policies & Procedures
- Training Resources
- Contracts
- Supplier Reporting
- Sell to VITA
- Teacher PC Purchase Program
- IT Support
- Website Modernization
- Contact
- Search VITA
- Site Map