10 Best Practices to Consider as Your SBIR Negotations Approach Contract Signature

10 Best Practices to consider as your SBIR negotiations approach contract signature:

1. Draft your confirmation of negotiations, be sure to memorialize that this is an SBIR type contract along with the applicable data rights and SBIR related terms and conditions.

2. Firm up the actual start date. There is not time to waste, everyday counts when your program's duration is only 6 or 9 months long!

3. Get into order system entry mode. A quick entry into the system assures no loss of valuable time in job performance!

4. Get your Julian calendar out. Convert relative days (i.e. 180 days after ?) to actual dates. Don't only use your CDRL's to extract due dates, some deliverables may be embedded in the SOW, schedule or term of your contract!

5. Don't forget to inform your IP dept (or whoever keeps track of your IP) what IP arrangements were negotiated. (If your company does not already co-locate this information in one central place, start organizing it now!) Documenting the evolution of your IP is critical to maintaining data rights.

6. Work out charge numbers with your accounting/finance department.

7. If applicable, close out any pre-contract cost charge numbers so you can effectively segregate the charges. This is an unlikely occurrence in the SBIR world, but still worth noting.

8. Start your subcontracting and consulting activities immediately, especially if they are starting the work at the same time as you or shortly thereafter. The race is on to get those PO's and subcontracts issued! With a short program duration, as in the case of an SBIR, there is not much time to get subs and consultant work going.

9. Communicate any security issues with your security officer/department.

10. Start organizing the volume of paper you have piled up during the life of this proposal and negotiation. If you don't do it now, you may never!

Lisa DeMaio is the president and founder of Virtual Contract Manager, LLC, which is a one-stop "information shop" for and about the Contract Management Community and the SBIR (Small Business Innovative Research) Program. Let Virtual Contract Manager coach you on how to integrate the SBIR program into your existing business. Come visit Virtual Contract Manager and get a wealth of FREE SBIR information on our Free Articles Page and to sign up for our content-rich monthly newsletter which features one article a month on the SBIR program. Let Virtual Contract Manager help you tap the federal market and help fund your research or innovative technology. http://www.virtualcontractmanager.com/

no-contract cleaning service Mundelein ..
In The News:

Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.

Financial Strategies for a Mobile Car Wash Business Plan

Writing a business plan for a mobile car wash is... Read More

Naming Your Business: 3 Tips To Ensure Success

If you are just starting your business, or if you... Read More

You Are Invited

Business card size works well for invitations to special events.What... Read More

When to Say NO!

When is it a good thing to say no to... Read More

Sexual Harassment - Its just not on!

Sexual Harassment is a disturbing part of employment life in... Read More

Collect that Debt - Your Business Depends on it

The efficiency of debt collection is the difference between a... Read More

Cost Effective Franchise Regulations, Come again

The Franchise Group at the Federal Trade Commission in all... Read More

Starting an Aircraft Washing Service

To wash an airplane there are many items you will... Read More

Why Small Businesses Fail (or Fail to Thrive)

Tammy, a skilled and gifted horticulturist, called me to discuss... Read More

How To Build Business Credit

Having their own business is something many millions of people... Read More

What is Business Process Automation?

Business Process Automation or BPA for short. This was a... Read More

Five Simple Software Tips for Small Business Owners

The start of a new year is a time for... Read More

Knowledge is Power

Why does research and education play an important part of... Read More

How to be Annoyed and Make Money

When do annoyances in a relationship become too much to... Read More

Small Business Marketing: Specialize or Generalize?

There have been many great points raised on both sides... Read More

Expanding Franchisee Advice

Franchisor expansion policies are not as simple as one might... Read More

Private Investigator Tactics

A Private Investigator is a professional trained in the art... Read More

Why Small and Medium-Sized Businesses Should

As the owner or an employee of a small-to medium-sized... Read More

Beginning an Internship Program

CONSIDERATIONS FOR YOUR INTERN: Specify the number of hours the... Read More

More Business Card Marketing

If you are worried about how many different business cards... Read More

Keeping Business Alive

Who is responsible for maintaining the business relationship?Nurturing a business... Read More

How to Protect Yourself & Your Business

As a business owner, you already know how important it... Read More

Buying a Franchise

Buying a franchise is not for everyone. This guide will... Read More

Small Business Operators - 7 Reasons You Should Change Your Accountant

A recent survey showed that only 28.7% of small business... Read More

Virtual Assistance for Healthcare Professionals

Administrative and clerical tasks are the bane of every industry.... Read More

maid service near Glenview ..