10 Best Practices to Consider as Your SBIR Negotations Approach Contract Signature

10 Best Practices to consider as your SBIR negotiations approach contract signature:

1. Draft your confirmation of negotiations, be sure to memorialize that this is an SBIR type contract along with the applicable data rights and SBIR related terms and conditions.

2. Firm up the actual start date. There is not time to waste, everyday counts when your program's duration is only 6 or 9 months long!

3. Get into order system entry mode. A quick entry into the system assures no loss of valuable time in job performance!

4. Get your Julian calendar out. Convert relative days (i.e. 180 days after ?) to actual dates. Don't only use your CDRL's to extract due dates, some deliverables may be embedded in the SOW, schedule or term of your contract!

5. Don't forget to inform your IP dept (or whoever keeps track of your IP) what IP arrangements were negotiated. (If your company does not already co-locate this information in one central place, start organizing it now!) Documenting the evolution of your IP is critical to maintaining data rights.

6. Work out charge numbers with your accounting/finance department.

7. If applicable, close out any pre-contract cost charge numbers so you can effectively segregate the charges. This is an unlikely occurrence in the SBIR world, but still worth noting.

8. Start your subcontracting and consulting activities immediately, especially if they are starting the work at the same time as you or shortly thereafter. The race is on to get those PO's and subcontracts issued! With a short program duration, as in the case of an SBIR, there is not much time to get subs and consultant work going.

9. Communicate any security issues with your security officer/department.

10. Start organizing the volume of paper you have piled up during the life of this proposal and negotiation. If you don't do it now, you may never!

Lisa DeMaio is the president and founder of Virtual Contract Manager, LLC, which is a one-stop "information shop" for and about the Contract Management Community and the SBIR (Small Business Innovative Research) Program. Let Virtual Contract Manager coach you on how to integrate the SBIR program into your existing business. Come visit Virtual Contract Manager and get a wealth of FREE SBIR information on our Free Articles Page and to sign up for our content-rich monthly newsletter which features one article a month on the SBIR program. Let Virtual Contract Manager help you tap the federal market and help fund your research or innovative technology. http://www.virtualcontractmanager.com/

recurring cleaning service Mundelein ..
In The News:

The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.

Attributes Of Companies You Don?t Want To Buy!

There are no "rules of thumb" in the pursuit of... Read More

Detailing Business Options

So you want to get into the auto detailing business... Read More

A Look at Small Business Incorporating in Florida

The choice to incorporate a small business in Florida has... Read More

Get Approved for a Franchise

Deciding to start your own franchise is just one of... Read More

Write An Effective Job Proposal

I am simply amazed at the problems some of my... Read More

Is Your Business Profitable?

What's your job profitability? Do you know?Many business owners are... Read More

Pressure Washing Companies; Pricing Dock and Deck Cleaning

If you own a Pressure Washing Company and wish to... Read More

One Of The Best New Business Opportunities May Be Right In Your Home - A New Daycare Business

The day care industry is expanding. There are now more... Read More

How to Give Informative Talks

Why should you do informative talks to smaller groups?Informative talks... Read More

How the Humble Ice Cube Made Business History

Gather round while I tell you the story of Kennebec... Read More

Computer Related Habits From Small Business Owner - Be Prepared, Avoid Despair

Aside from the fear of losing a spreadsheet or research... Read More

Going Public: Now that You Have Successfully Made the Transition, What Do You Do?

Ok, you have successfully accomplished your dream of being the... Read More

Earn More Money in Your Small Business by Creating a PIG

If you really want to earn more money with your... Read More

Debit and ATM Card Advice for Small Businesses

Your business account comes with an ATM, Debit card. Pick... Read More

The Franchisors Heavy Load

Why are we over regulation the franchising industry, what purpose... Read More

Lawyers Everywhere Telling Regulators What Laws to Make

The Federal Trade Commission decided to sit down and revamp... Read More

Why Small Businesses Need Both A Logo And An Identity System

Experts urge small business owners to "brand" their business ?... Read More

Using Technology to Manage Customer Loyalty

Don't let your customer satisfaction research initiative collect dust on... Read More

The Most Important Decision of Your Massage Business Career

Don't you find that there are so many decisions you... Read More

How To Accept Credit Cards

If you plan to do business online, then your website... Read More

SBIR vs STTR

SBIR vs. STTR: If you are participating in the SBIR... Read More

Small Business No How - Dont Give Away the Farm

You're pretty proud of yourself! After all, only four months... Read More

Small Business Strategies - Four Critical Success Factors

Scenario OneDuring a recent presentation, a business owner was given... Read More

Finding the Right People for your Business

Where do you find the right people for a business... Read More

7 Essentinal Resources for Small Business

So you want to start a business but you don't... Read More

tidy up service Buffalo Grove ..