Five Ways to Protect Bidding Opportunities and Bid Formulations

Cohen Seglias Pallas Greenhall & Furman PC
Contact
The bidding process for a construction project includes a vast array of folks: estimators, owners, project managers, design professionals and many others. Security, especially cybersecurity, can prove a challenge, and those receiving, drafting or issuing bids would be wise to consider potential problems before they become a reality. This can be accomplished by establishing and maintaining standards and protocols to protect your work product. These protocols can cover elements including accessibility, document protections, review processes and fundamental security protections such as passwords. Here are five essential steps parties should enact to guard their proprietary bidding information:
  1. Limit accessibility to services that provide portals where new projects are presented for bid and require log-on criteria to access the portal. These limitations are the building blocks for good security. Safeguarding access to the portals—and minimizing the number of people who have access—is a simple and practical approach that can and should be used from the initiation of the services.
  2. Require any employee with access to bid requests to sign an NDA. NDAs are imperative to protecting data and can be valuable tools for doing so, assuming they are well-written and address the particulars of what employees and former employees cannot disclose.
  3. Require any and all employees to work full-time and prohibit “moonlighting” for other contractors. One potential area for leaks comes from employees working for competitors. Policies prohibiting such overlap head off such issues before they occur.
  4. Review incoming and sent emails/items from those employees that issue bids. Regular examinations of such communications can help the reviewers proactively spot and address possible issues.
  5. Keep access to bidding pro-forma documents limited and password protected. Similar to the first point, limiting access, especially to important documents, and using strong passwords, are sensible methods for strengthening security.

While there may not be any one way to protect bid formulations and processes fully, taking the above steps will significantly mitigate risk. Consistent, well-implemented and written requirements may also be useful if controversy arises, so parties should consult with their counsel to ensure their procedures are up-to-date and clearly documented.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Cohen Seglias Pallas Greenhall & Furman PC

Written by:

Cohen Seglias Pallas Greenhall & Furman PC
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Cohen Seglias Pallas Greenhall & Furman PC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide