Signet Technologies, Inc. v. United States ( 2021 )


Menu:
  • Sn the Anited States Court of Federal Claims
    No. 21-1047C
    Filed: June 30, 2021!
    (** SEALED**)
    SIGNET TECHNOLOGIES, INC.,
    DOING BUSINESS AS CONVERGINT
    FEDERAL SOLUTIONS,
    Plaintiff,
    v.
    THE UNITED STATES,
    Defendant,
    and
    SECURITYHUNTER, INC.,
    Intervenor-Defendant.
    Tra Hoffman, Butzel Long, Washington, D.C., for Plaintiff.
    Mikki Cottet, Senior Trial Counsel, Franklin E. White, Jr., Assistant Director, Martin F. Hockey,
    Jr., Acting Director, Brian M. Boynton, Acting Assistant Attorney General, Commercial
    Litigation Branch, Civil Division, United States Department of Justice, Washington, D.C., for
    Defendant.
    James Y. Boland and Krista Nunez, Venable, LLP, Vienna, VA, for Intervenor-Defendant.
    MEMORANDA OPINION AND ORDER
    TAPP, Judge.
    This bid protest considers whether the Social Security Administration (“SSA”) erred
    when it established a vehicle for the purchase, maintenance, and installation of security system
    ! This Order was originally filed under seal on June 16, 2021, (ECF No. 44). The Court provided
    parties the opportunity to review this Opinion for any proprietary, confidential, or other protected
    information and submit proposed redactions. The proposed redactions were filed June 30, 2021,
    (ECF No. 48) and are accepted by the Court. Thus, the sealed and public versions of this Opinion
    differ only to the extent of those redactions, the publication date, and this footnote.
    equipment in its offices across the United States. On March 10, 2021, Plaintiff, SigNet
    Technologies, Inc., doing business as Convergint Federal Solutions, (“SigNet’)?, filed its
    Complaint against Defendant, United States, acting by and through the SSA. (See Complaint
    (“Compl.”), ECF No. 1). SigNet asserts that the SSA impermissibly established an agreement for
    the purchase and installation of security equipment at SSA offices. (/d.). In turn, SigNet requests
    declaratory injunctive relief providing that the SSA’s award lacks a rational basis and is
    otherwise unreasonable, arbitrary and capricious, and contrary to applicable law and regulation.
    (/d.). The awardee, Securityhunter, Inc. (“Securityhunter’), successfully intervened in this suit
    on March 11, 2021. (ECF No. 10).
    Before the Court are the parties’ Cross-Motions for Judgment on the Administrative
    Record and Securityhunter’s Motion to Dismiss. For reasons articulated below, the Court
    DENIES SigNet’s Motion for Judgment on the Administrative Record, (Pl.’s MJAR, ECF No.
    25), GRANTS the United States’ Motion for Judgment on the Administrative Record, (Def.’s
    MJAR, ECF No. 28), GRANTS Securityhunter’s Motion for Judgment on the Administrative
    Record, (Int.-Def.’s MJAR, ECF No. 29), and DENIES Securityhunter’s Motion to Dismiss and
    Motion to Strike, (id. ).
    I. Background?
    A. The Solicitation
    This post-award bid protest involves a challenge to the SSA’s decision to establish a
    Blanket Purchase Agreement (“BPA”) with Securityhunter for the purchase and installation of
    security equipment. On June 10, 2020, the United States issued a Request for Quotations*
    (“RFQ”) seeking to establish a Physical Security Systems Standardization and Support Services
    (“PS5”) BPA for “equipment, acquisition, installation and maintenance services to support
    project management, site system design, installation, maintenance, inventory management,
    miscellaneous work and repair of security equipment at [SSA] offices” at approximately 1,500
    2 Throughout the United States’ and Intervenor-Defendant’s briefing, Plaintiff is referred to as
    “Convergint.” The initial filing from Plaintiff refers to itself as “SigNet.” For uniformity, this
    Opinion refers to Plaintiff as “SigNet.”
    3 The Administrative Record, (ECF No. 24), is consecutively paginated, thus the Court will cite
    to the record using “(AR __).” On May 24, 2021, the United States moved to amend the record
    after it discovered errors preventing the parties from accessing a portion of the AR. (ECF No.
    37). The Court granted the United States’ motion and accepted corrected attachment, which
    replaced pages 453-678 of the Administrative Record. (ECF Nos. 37-1; 40). Any citations to that
    portion of the record reflect citation to the corrected document.
    4 Solicitation No. 2832 1320Q00000234.
    locations nationwide. (Administrative Record (“AR”) 557).° In an effort to enhance its physical
    security, the SSA sought to establish this BPA to provide “standardized video services including
    video surveillance systems (VSS), intrusion detection systems (IDS), duress alarms, and physical
    access control systems (PACS), and other physical security equipment installation, maintenance,
    and support services” to all SSA offices. (AR 523).
    The RFQ articulated multiple requirements, only some of which are relevant here. The
    Statement of Work (“SOW”) explained that the BPA “intended to serve as a vehicle for the
    purchase of all security system equipment and materials required for maintenance and
    installations.” (AR Tab 23 at 1715 (‘the SOW”)). The SOW outlined various requisite services,
    including design, installation, maintenance, and physical security assessments, and noted Lenel®
    products as just one of many other branded systems currently in place at the SSA. (See AR Tab
    23 at 1715-17).
    The RFQ instructed offerors to submit their quotes in two separate volumes—Volume I
    (Non-Price) and Volume II (Price). (AR 1701). In Volume I, offerors provided proposed
    solutions, information, and specified materials consistent with the Corporate Experience, Past
    Performance, and Technical Approach factors outlined in the RFQ. (See AR 1702-07). As part
    of their Volume II quotes, offerors submitted “[c]omplete pricing tables found in Section
    D/Attachment 3” of the RFQ, which included the mandatory “Pricing Schedule” template that
    detailed the required labor, equipment, and maintenance line items. (AR 1708).
    Importantly, the RFQ authorized the use of Contractor Teaming Arrangements (“CTAs”),
    described and explained as follows:
    A Schedule Contractor Teaming Arrangement (CTA) is an arrangement
    between two or more Schedule Contractors to work together to meet agency
    requirements. The CTA allows the Contractor to meet the government agency
    needs by providing a total solution that combines the supplies and/or services
    from the team members’ separate Schedule contracts. .. .
    A CTA document is required for any proposed CTA under this BPA. A CTA
    document is a written agreement between the team members detailing the
    responsibilities of each team member during the BPA performance period. If
    a CTA is proposed, the Contractor shall specifically identify the CTA as such
    > The SSA amended the RFQ six times, (AR 288-706, 2181-82), and responded to offeror’s
    questions in amendments 3 and 5, (AR 382-391, 511-522, 2182). Unless otherwise indicated,
    references to the solicitation are to amendment 5, (AR 453-678), which incorporates all prior
    amendments to the RFQ. (See also AR 2758-83).
    © Lenel is the producer of some portion of the equipment and software required for performance
    of the BPA; in order to sell, implement, and service Lenel security systems, a contractor must be
    certified by Lenel as a Value Added Reseller (“VAR”). (Compl. at 12—16).
    in its quotation. The Contractor’s CTA document must be complete and fully
    executed between the parties. If a CTA is proposed, the Contractor shall
    identify a Team Lead to be the main point of contact between the Government
    and the CTA Team Members. The CTA Team Lead will be responsible for
    all communication, ordering procedures, delivery requirements, invoicing
    and payment, warranties and all other activities within the CTA “model”
    document (See [AR 2980-82]). The Contractor’s CTA document must be
    submitted to the government as part of its quotation in response to this RFQ.
    Failure to provide a complete and fully executed CTA document in
    accordance with this solicitation will result in no further consideration of the
    Contractor’s quotation .. ..
    (AR 2801-02). The RFQ pointed offerors to GSA’s website for further information regarding
    this explanation. (See AR Tab 23 at 1700).
    The RFQ then set forth the terms of the “quote format,” stating: “Quotes must set forth
    full, accurate, and complete information as required by this RFQ. The government will rely on
    such information in the award of the BPA.” (AR 2803 (emphasis added)).
    The RFQ set forth the “evaluation factors” as follows:
    The Government intends to establish a single-award BPA to the responsible
    contractor whose quote, conforming to the RFQ, represents the best value to
    the Government, considering both price and non-price factors. This may be
    determined by using a trade-off process that allows us to consider award to
    other than the lowest price Contractor or other than the highest technically
    rated Contractor. For this solicitation, all non-price evaluation factors, when
    combined, are significantly more important than price. The non-price factors
    ({1] Corporate Experience, [2] Past Performance, and [3] Technical
    Approach) have equal weight/importance. SSAS intends to make an award
    based on initial quotations.
    (AR 2812 (italics in original; numbers in brackets added)).
    The SSA was to evaluate the first non-price factor by assessing the relevance of an
    offeror’s Corporate Experience, considering the extent to which the offeror’s maximum of three
    “identified projects/contracts adequately demonstrate its experience in providing
    supplies/services similar in size, scope, and complexity” to the requirements under the RFQ.
    (/d.). The RFQ instructed offerors to include descriptions of at least one, but no more than three,
    contracts/projects that “clearly and conclusively demonstrate the Contractor’s relevant
    experience (similar in size, scope, and complexity)” to the RFQ’s requirements. (AR 2804). The
    information that offerors were to provide for each contract/project for the evaluation of
    Corporate Experience included the following:
    A complete and full description of the services provided (in your role as either
    the Prime Contractor, CTA member, or subcontractor) for each
    contract/project. Specifically, describe the extent to which the work
    performed under the cited/referenced contract/project is similar in size,
    scope, and complexity to the requirements set forthin the Statement of Work
    (SOW) and elsewhere in this solicitation....
    (AR 2805).
    The RFQ notified offerors that submitted quotations be madeas a CTA and include a
    “complete” “CTA document,” addressing “each element in the CTA ‘model’. . ..”» (AR 2810).
    Providing guidance for evaluating CTAs for Corporate Experience, the RFQ stated:
    Contractor Team Arrangements (CTA): SSA will evaluate Corporate
    Experience and Past Performance of each party to the CTA only to the extent
    that it relates to the work that each party will be responsible for under the
    BPA. Previous experience and past performance of the CTA, operating as a
    CTA (comprised of the same CTA members), is considered more relevant
    than experience and past performance of the individual parties to the CTA,
    as it represents experience and past performance of the team rather than that
    of the individual players.
    (AR 2813 (bold emphasis in original)).
    For Past Performance, the RFQ explained that the evaluation would bea “subjective
    assessment based on performance history on the contracts/projects cited in the ‘Corporate
    Experience’ section of the Contractor’s quotation.” (AR 2806). The SSA was to evaluate the past
    performance of the contractor’s identified projects/contracts based on information in the
    quotation, responses to the Past Performance Questionnaires received from references, and
    additional pertinent information relative to the offeror’s Contractor Performance Assessment
    Reporting System. (AR 2813-14). This evaluation would be based on the quality of service,
    timeliness of performance, and management of personnel/business relations. (AR 28 14).
    As to Technical Approach—the final non-Price factor—the RFQ stated in part as follows:
    The Technical Approach section must thoroughly describe in narrative form
    the solution proposed by the Contractor, and must be sufficiently specific,
    detailed and complete to clearly and fully demonstrate the techniques and
    procedures the Contractor will employ to meet all of the requirements of the
    SOW....
    (AR 2808). As part of its Technical Approach, the RFQ required each offeror to submit a
    “staffing plan” proposing a “project team for the BPA, as well as the ability to deliver personnel
    with the appropriate knowledge, experience and skills throughout the entire period of
    performance, including options.” (/d.). The SSA should consider “specifics” of the technical
    approach, and quotations must “clearly demonstrate an understanding of the government’s
    requirements and providea high likelihood for success to be eligible for award.” (AR 2814).
    Turning to pricing, the RFQ indicated that the Agency “will perform a price analysis...
    to evaluate the contractor’s submission for completeness, accuracy, and reasonableness.” (AR
    2815). The SSA was to evaluate quotations for award purposes by adding the total price for the
    base period to the total price for all options to arrive at a total evaluated fixed-price for the full
    performance of the BPA. (/d.). The SSA could “reject any quote that contains ‘unbalanced
    pricing.’” (/d.).
    B. Quotations, Evaluations, and Award
    The SSA received quotes ion SigNet, and Securityhunter,
    determining those quotes to be timely and compliant with the solicitation requirements. (AR
    2065-67, 2182). Among those quotes, Securityhunter submitted a CTA to address SSA’s current
    use of Lenel PACS. (AR 524). Because it is not a Lenel authorized retailer, Securityhunter does
    not offer Lenel-certified technicians on its Federal Supply Schedule (“FSS”) contract. (Int.-
    Def.’s MJAR at 7; see also AR 2591). To meet the RFQ’s limited requirement to procure Lenel
    equipment and to provide several Lenel-certified technicians concerning the BPA,
    Securityhunter has established a CTA with Executive Technologies Corporation (“ETC”), a
    Lenel VAR. (See AR Tab 21 at 780, 822—28).
    The technical evaluation team (“TET”) and price evaluation team (“PET”) received and
    evaluated quotes. (Def.’s MJAR at 11). The TET’s evaluation included a review of the non-price
    factors (corporate experience, past performance, and technical approach) of each bid to identify
    any strengths, weaknesses, significant weaknesses, and deficiencies. (AR 2068). After review,
    the TET assigned a rating as: exceptional, very good, satisfactory, marginal, or poor. (AR 2070—
    74). To determine which quote offered the best value, the Contracting Officer (“CO”) completed
    a trade-off analysis, where “all non-price evaluation factors, when combined, are significantly
    more important than price,” and non-price factors “have equal weight/importance.” (/d. at 1710).
    Per the RFQ, the CO assigned offerors the following ratings:
    Corporate | Past Performance | Technical Total Price
    Experience Approach
    Quoter’s Name
    Securtyhunter® | | | a
    SigNet? Eo eee
    (See AR Tab 34 at 2220). The CO went on to rank offerors as follows:
    7 (AR 2074-79).
    8 (AR 2083-88).
    9 (AR 2079-83).
    Overall Technical Quoter Overall Price Quoter
    Ranking Ranking
    1 Securityhunter 1 Securityhunter
    2 | 2 a
    3 Le 3 |
    (See id.).
    After conducting the best value assessment, the CO summarized a comparison
    of SigNet and Securityhunter’s quotes:
    (AR 2228) (emphasis added).
    After consideration of the CO’s analysis, the SSA awarded the BPA to Securityhunter on
    September 29, 2020. (AR 2229-420). The following day, the SSA notified SigNet that it had not
    received the award. (AR 2581-82). Subsequently, on October 1, 2020, following FAR 8.405-
    3(b)(3), the Agency provided SigNet the following explanation for its award decision:
    Again, the best value decision to award to Securityhunter, Inc. was based on
    their technical merit
    ] price after
    performing a trade-off, consistent with how SSA identified that the
    quotations would be evaluated in Solicitation Section E-6 Evaluation Criteria.
    (AR 2595).
    C. SigNet’s GAO Protest and Protective Order
    On October 13, 2020, SigNet filed a protest!° with the United States Government
    Accountability Office (“GAO”) challenging the SSA’s award of the BPA to Securityhunter. (See
    AR Tab 47 at 2610-20). The GAO entered an automatic stay under the Competition in
    Contracting Act (CICA) and Securityhunter was instructed to suspend contract performance on
    October 14, 2020. (Def.’s MJAR, Ex. 1 (“Brennan Decl.”)). On November 25, 2020, rather than
    filing comments or supplemental protest grounds, SigNet filed a notice withdrawing its protest.
    (See AR Tab 60 at 3231). The GAO closed the protest file that same day. (See AR Tab 61 at
    3232). More than three months after voluntarily withdrawing its protest with the GAO, on March
    10, 2021, SigNet filed its Complaint pursuant to 
    28 U.S.C. § 1491
    (b). (See Comp1.).
    II. Analysis
    A. Motion to Strike Complaint and Dismiss
    The Court will first address Securityhunter’s Motion to Strike SigNet’s Complaint and
    motion for outright dismissal. Securityhunter asserts two grounds for dismissing SigNet’s
    Complaint—failure to state a claim for which relief can be granted and for lack of subject matter
    jurisdiction. (See generally Int.-Def.’s MJAR).
    The burden of establishing subject matter jurisdiction rests with the plaintiff, who must
    do so by a preponderance of the evidence. Lujan v. Defenders of Wildlife, 
    504 U.S. 555
    , 561
    (1992); Reynolds v. Army & Air Force Exch. Serv., 
    846 F.2d 746
    , 748 (Fed. Cir. 1988). When
    faced with a motion to dismiss for lack of subject matter jurisdiction according to the RCFC
    12(b)(1), the Court must assume that all undisputed facts alleged in the complaint are true and
    draw all reasonable inferences in the plaintiff’s favor. Scheuer v. Rhodes, 
    416 U.S. 232
    , 236
    (1974), overruled on other grounds by Davis v. Scherer, 
    468 U.S. 183
     (1984); see also Henke v.
    United States, 
    60 F.3d 795
    , 797 (Fed. Cir. 1995). In determining whether a plaintiff has met this
    burden, courts may look “beyond the pleadings and ‘inquire into jurisdictional facts’ in order to
    determine whether jurisdiction exists.” Lechliter v. United States, 
    70 Fed. Cl. 536
    , 543 (2006)
    (quoting Rocovich vy. United States, 
    933 F.2d 991
    , 993 (Fed. Cir. 1991)).
    A protective order was issued during SigNet’s sojourn at the GAO. (ECF No. 18, Ex. A
    (“GAO Protective Order”)). Securityhunter alleges that SigNet used protected materials obtained
    during GAO proceedings in its Complaint before this Court—specifically Securityhunter’s
    sealed bid proposal. (ECF No. 18; see also Int.-Def.’s MJAR at 10). Due to that alleged
    violation, Securityhunter urges the Court to strike relevant portions of SigNet’s Complaint
    10 GAO Docket No. B-419328.1.
    pursuant to RCFC 12(f) and dismiss the Complaint for failure to state a claim. (Int.-Def.’s MJAR
    at 11-16). The Court declines to do so.
    Paragraphs 7 and 8 of the GAO-issued Protective Order state:
    7. Within 60 days after the conclusion of the protest (including any requests
    for reconsideration or entitlement, or claims for costs), each party admitted
    to this protective order must destroy all protected material received pursuant
    to this protest, including all electronically transmitted material and copies of
    such material, with the exception of a single copy of a protected decision or
    letter issued by our Office, and certify in writing to each other party that such
    destruction has occurred or must return the protected information to the
    parties from which the information was received .... Any individual retaining
    material received under this protective order (except for the single copy of a
    protected decision or letter issued by our Office) beyond the 60-day period
    without the authorization of GAO or the prior written agreement of the party
    that produced the material is in violation of this order... The terms of this
    protective order (except those terms regarding the return or destruction of
    protected material) shall apply indefinitely to the single copy of the protected
    decision or letter issued by our Office that is retained by a party admitted
    under this order.
    8. Material to which parties gain access under this protective order is to be
    used only for the subject protest proceedings, absent express prior
    authorization from the GAO. Protected material obtained under this
    protective order may be used, however, in a bid protest filed with the United
    States Court of Federal Claims, without GAO’s prior authorization, provided
    that the information is filed under seal with the Court, that the Court is
    informed of GAO’s protective order, and that the Court is requested to issue
    its own protective order to cover the protected material. In addition, GAO
    must be notified no later than one business day after suit is filed with the
    Court, regardless of whether protected informationis used in the Court filing
    After the Court issues its own protective order, use of material protected
    under the GAO protective order will be governed by the protective order
    issued by the Court.
    (GAO Protective Order PP 7-8).
    A significant portion of SigNet’s Complaint is indeed related to Securityhunter’s
    quotation and proposal. (See Compl. at 20-29). SigNet does not controvert that it retained
    information garnered from the GAO protest; instead, SigNet contends that it was exempt from
    the GAO’s 60-day retention cap because the protected documents were retained concerning this
    bid protest. (ECF No. 20; see also Pl.’s Resp. 14-15).
    On April 6, 2021, Securityhunter filed a notice with the GAO describing the alleged
    violations of that protective order and requested a determination as to those violations. (Int.-
    Def.’s MJAR at 10-11). In that request, “Securityhunter explained to the GAO that the
    Complaint filed in this case relied extensively on portions of Securityhunter’s proposal that
    counsel for SigNet was required to destroy no later than January 25, 2021, per Paragraph 7 of the
    GAO’s protective order.” (/d. at 11). On May 6, 2021, the GAO apparently informed the parties
    that it was “still reviewing the filings submitted by the parties” and that it would inform the
    parties of its decision at a later date. (/d.). As far as the Court is aware, the GAO has not issued a
    determination as to SigNet’s apparent violations.
    The crux of Securityhunter’s argument for striking the Complaint, and ultimately
    dismissal, is that SigNet’s use of information which it improperly retained from the earlier GAO
    proceeding effectively rendered the protected material “fruit of the poisonoustree.” !! RCFC
    12(f) empowers the Court to “strike from a pleading... any redundant, immaterial, impertinent,
    or scandalous matter” and states that the Court “may act... on its own.” Securityhunter alleges
    that, should SigNet’s Complaint be stricken under this rule, the Complaint would fail to state a
    claim for which relief could be granted pursuant to RCFC 12(b)(6).
    The Court is apprehensive regarding its role, if any, in interpreting protective orders
    issued by a different forum, particularly when that forum has the issue squarely before it and has
    yet to rule. To do so could present significant and consequential procedural issues, running
    counter to notions of judicial efficiency and restraint. Hypothetically, if the Court were to find
    that a violation exists, thereby rulingin Securityhunter’s favor, but the GAO later found to the
    contrary, what remedy could reconcile those inconsistent rulings? Short of reopening this protest
    and starting anew, there are no other channels for relief. Without a ruling from the GAO, this
    Court is unable to definitively rule that the information SigNet used in its Complaint was
    improper and therefore should be stricken pursuant to RCFC 12(f). Since there has been no
    ruling, and because this protest is denied on other grounds set forth below, the Court will not act
    absent the GAO’s application of its own protective order. As such, Securityhunter’s Motion to
    Strike is denied and SigNet’s Complaint will not be dismissed on these grounds.
    Security hunter next insists the Court dismiss SigNet’s Complaint pursuant to RCFC
    12(b)(1) based on what it perceives as SigNet’s failure to comply with material requirements of
    the RFQ. (Int.-Def.’s MJAR at 16—23). Securityhunter claims that, because SigNet apparently
    failed to comply with the material requirements of the RFQ, it thus lacks standing to pursue
    relief in this Court. (/d.).
    Standing is a threshold issue that implicates the Court’s subject-matter jurisdiction.
    Lujan, 
    504 U.S. at 560-61
    . And so, if a plaintiff cannot establish standing, the Court is without
    jurisdiction to render a decision on the merits of a claim. Myers Investigative & Sec. Servs. v.
    United States, 
    275 F.3d 1366
    , 1369-70 (Fed. Cir. 2002). The Court assumes well-pled
    allegations of error to be true for purposes of the standing inquiry. Sguare One Armoring Serv.,
    'l In context of criminal law, the exclusionary rule encompasses both the “primary evidence
    obtained as a direct result of an illegal search or seizure” and, relevant here, “evidence later
    discovered and found to be derivative of an illegality,” the so-called “‘fruit of the poisonous
    tree.’” Utah v. Strieff, 
    136 S. Ct. 2056
    , 2061, (2016) (citing Segura v. United States, 
    104 S.Ct. 3380
    , (1984)). The Court draws parallels to this suit in that the protected materials used in
    SigNet’s Complaint are allegedly derivative of the improper retention of materials.
    10
    Inc. v. United States, 
    123 Fed. Cl. 309
    , 323 (2015) (citing Digitalis Educ. Sols., Inc. v. United
    States, 
    97 Fed. Cl. 89
    , 94 (2011), aff'd, 
    664 F.3d 1380
     (Fed. Cir. 2012)). Under the Tucker Act,
    the Court has jurisdiction over “an action by an interested party objecting. . . to an alleged
    violation of a statute or regulation with a procurement or a proposed procurement.” 
    28 U.S.C. § 1491
    (b)(1). In evaluating who qualifies as an interested party with standing to bring a bid protest
    claim, the Court looks to the definition of “interested party” provided in CICA. Myers, 
    275 F.3d at 1370
     (quoting Am. Fed ’n of Gov’t Employees v. United States, 
    258 F.3d 1294
    , 1302 (Fed. Cir.
    2001)); see 
    31 U.S.C. § 3551
    (2). And so, to have standing, a plaintiff must show that: “‘it [(1)] is
    ... an actual or prospective bidder and [(2)]... has a direct economic interest’ in the
    procurement or proposed procurement.” Diaz v. United States, 
    853 F.3d 1355
    , 1358 (Fed. Cir.
    2017) (alterations in original) (quoting Digitalis Educ. Sols., Inc. v. United States, 
    664 F.3d 1380
    , 1384 (Fed. Cir. 2012)); see also 
    31 U.S.C. §3551
    (2).
    While Securityhunter’s arguments to this point are well-reasoned, the Court cannot
    ignore the United States’ determination (and concession) that SigNet’s quotation was compliant
    with solicitation requirements. (Def.’s MJAR at 11 (“[t]he SSA received and evaluated three
    quotes, including quotes from Convergint and Securityhunter, which were all determined to be
    timely and compliant with the solicitation requirements) (citing AR 2065-66, 2067, 2182)). The
    Court cannot reasonably defer to the agency’s discretion in its ultimate decision while ignoring
    its ground-level determination that an offeror complied with the RFQ requirements. Because the
    United States effectively concedes that SigNet’s quotation largely complied with the RFQ, the
    Court will not dismiss SigNet’s Complaint for failure to establish standing.
    Based on these findings, the Court denies Securityhunter’s Motion to Strike and Dismiss.
    SigNet’s claims will be addressed on the merits.
    B. Motions for Judgment on the Administrative Record
    In bid protest cases, this Court reviews agency actions under the Administrative
    Procedure Act’s “arbitrary and capricious” standard. See 
    28 U.S.C. § 1491
    (b)(4); 
    5 U.S.C. § 706
    (2)(A), (D). Under this standard, an “award may be set aside if either (1) the procurement
    official’s decision lacked a rational basis; or (2) the procurement procedure involved a violation
    of regulation or procedure.” /mpresa Construzioni Geom. Domenico Garufi v. United States, 
    238 F.3d 1324
    , 1332 (Fed. Cir. 2001).
    When a challenge is brought on the first ground like the instant case, the test is whether
    “the contracting agency provided a coherent and reasonable explanation of its exercise of
    discretion, and the disappointed bidder bears a ‘heavy burden’ of showing that the award
    decision ‘had no rational basis.’” /d. at 1332-33 (internal citations omitted). In this regard,
    “courts have recognized that contracting officers are ‘entitled to exercise discretion upon a broad
    range of issues confronting them’ in the procurement process.” /d. at 1332. In addition, when
    reviewing an agency’s procurement decision, the Court should recognize that the agency’s
    decision is entitled to a “presumption of regularity.” Citizens to Preserve Overton Park, Inc. y.
    Volpe, 
    401 U.S. 402
    , 415 (1971), overruled on other grounds by Califano v. Sanders, 
    430 U.S. 99
     (1977). “The [C]ourt should not substitute its judgment for that of a procuring agency.”
    Cincom Sys., Inc. v. United States, 
    37 Fed. Cl. 663
    , 672 (1997). And so, “[t]he protestor must
    show, by a preponderance of the evidence, that the agency’s actions were either without a
    11
    reasonable basis or in violation of applicable procurement law.” /nfo. Tech. & Applics. Corp. v.
    United States, 
    51 Fed. Cl. 340
    , 346 (2001), aff'd, 
    316 F.3d 1312
     (Fed. Cir. 2003) (citation
    omitted).
    The Court’s standard of review “is highly deferential.” Advanced Data Concepts, Inc. v.
    United States, 
    216 F.3d 1054
    , 1058 (Fed. Cir. 2000). If there is “a reasonable basis for the
    agency’s action, the court should stay its hand even though it might, as an original proposition,
    have reached a different conclusion.” Honeywell, Inc. v. United States, 
    870 F.2d 644
    , 648 (Fed.
    Cir. 1989) (quoting M. Steinthal & Co. v. Seamans, 
    455 F.2d 1289
    , 1301 (D.C. Cir. 1971)).
    Stated differently, “[the Court] will uphold a decision of less than ideal clarity if the agency’s
    path may be reasonably discerned.” Bowman Transp., Inc. v. Arkansas-Best Freight Sys., Inc.,
    
    419 U.S. 281
    , 286 (1974). However, if “the agency ‘entirely fail[s] to consider an important
    aspect of the problem [or] offer[s] an explanation for its decision that runs counter to the
    evidence before the agency,’” then the resulting action lacks a rational basis and, therefore, is
    defined as “arbitrary and capricious.” Ala. Aircraft Indus., Inc.-Birmingham vy. United States, 
    586 F.3d 1372
    , 1375 (Fed. Cir. 2009) (quoting Motor Vehicle Mjrs. Ass’n v. State Farm Mut. Auto.
    Ins. Co., 
    463 U.S. 29
    , 43 (1983)).
    Unlike RCFC 56 summary judgment motions, “the existence of genuine issues of
    material fact does not preclude judgment on the administrative record” under RCFC 52.1. Tech.
    Sys., Inc. v. United States, 
    98 Fed. Cl. 228
    , 242 (2011); see also RCFC 56. Rather, the Court’s
    inquiry is whether, “given all the disputed and undisputed facts, a party has met its burden of
    proof based on the evidence in the record.” A&D Fire Prot, Inc. v. United States, 
    72 Fed. Cl. 126
    , 131 (2006) (citing Bannum, Inc. v. United States, 
    404 F.3d 1346
    , 1356 (Fed. Cir. 2005)).
    In its Complaint and Motion for Judgment on the Administrative Record, SigNet
    propounds two primary explanations why it believes the United States acted improperly: first,
    Securityhunter’s quotation did not include a complete CTA document in violation of the RFQ;
    and second, the SSA failed to conduct the evaluations fairly and consistently with the RFQ’s
    evaluation scheme. Not unexpectedly, the United States and Securityhunter argue to the contrary
    and separately move for judgment. The arguments will be addressed in turn.
    1. Completeness of Securityhunter’s CTA
    SigNet contends that the SSA should have disqualified Securityhunter from award
    because its CTA was incomplete and thus “defective.” (Pl. MJAR at 33-34). Specifically, SigNet
    indicates that Securityhunter’s CTA document did not adequately address the following elements
    in the model CTA: Specific Team Activities, Terms of Arrangement, Team Ordering Procedures,
    Responsibilities of Team Lead, Responsibilities of Team Members, Pricing, Delivery
    Responsibility, Liabilities, and Legal Relationship. (/d.). As such, SigNet postulates that the SSA
    violated the express terms of the RFQ when it continued to consider Securityhunter’s quotation.
    (/d.). The United States argues that SigNet misapprehends the RFQ and that the RFQ did not
    require a proposed CTA document to mirror the format of the model document. (Def.’s MJAR at
    20). Securityhunter counters that its proposal did in fact satisfy each element of the CTA
    requirements. (Int.-Def.’s MJAR at 23-32). The Court finds that Securityhunter’s quote
    addressed all elements as required by the RFQ.
    12
    As the Federal Circuit has explained, “a proposal that fails to conform to the material
    terms and conditions of the solicitation should be considered unacceptable and a contract award
    based on such an unacceptable proposal violates the procurement statutes and regulations.” E. W.
    Bliss Co. v. United States, 
    77 F.3d 445
    , 448 (Fed. Cir. 1996) (citation omitted); see also Centech
    Grp., Inc. v. United States, 
    554 F.3d 1029
    , 1037 (Fed. Cir. 2009) (“To be acceptable, a proposal
    must represent an offer to provide the exact thing called for in the request for proposals, so that
    acceptance of the proposal will bind the contractor in accordance with the material terms and
    conditions of the request for proposals.”).
    As recited above, the RFQ set forth the requirements when an offeror’s quotation
    proposed a CTA and provided a referential “model” CTA, (AR 496-97; 284-86). The model
    required that the relevant document (1) “state the various types of activities that will be
    incorporated into the team arrangement and who is the primary party responsible forthe
    particular activity,” (AR 284), (2) “define the whole course of the project,” (3) “specify the
    duration, the players, the responsibilities, and the limitations of the various players,” (id.), (4)
    outline and specify the duties of the designated team lead at each phase of the project specify and
    describe the individual duties of the team member, (id.), (5) “state whether the team lead or each
    team member is responsible for a particular part of the project, so that delivery responsibility is
    clearly established,” (AR 285), and (6) “address each team member’s responsibilities and
    performance requirements so that liability is clearly established[.]” (/d.).
    Securityhunter’s CTA document explained that ETC’s sole responsibility as a team
    member was‘
    a. (AR 824). The Court reiterates this to highlight that ETC’s role is quite narrow. In
    its Response and Motion for Judgment on the Administrative Record, Security hunter detailed
    how its quote adequately addressed each element called into question by SigNet. (Int.-Def.’s
    MJAR at 24-32). The Court addresses those elements below.
    First, SigNet asserts that Securityhunter’s CTA document did not provide a “‘complete’
    answer’ to either the “Specific Team Activities” or the “Delivery Responsibility” elements in the
    model CTA. (See Pl.’s MJAR at 16-17). Paragraph 9 of Securityhunter’s CTA document
    identifies ETC’s “primary delivery responsibilities” as being limited to ‘
    .” (AR Tab 21 at 824). Thus,
    Security hunter notes, (Int.-Def.’s MJAR at 24-25), ETC’s role in the CTA was accordingly
    restricted to this very limited scope. Since the RFQ is only fora BPA, not any particular call
    order, the SSA did not solicit proposals for any specific projects, thus there were no specific
    tasks to describe at this early stage of the procurement. The level of detail describing the team
    activities and delivery responsibilities for the BPA was consistent with both the nature of a BPA
    and the proposed CTA relationship, where ETC’s responsibilities were limited to a specific
    narrow scope of work (Arr
    Thus, SigNet has not proved there are specific team activities or delivery responsibilities omitted
    from Securityhunter’s CTA. Therefore, it has also failed to demonstrate that it was arbitrary or
    an abuse of discretion for the SSA to accept Securityhunter’s CTA document.
    Second, SigNet argues that Securityhunter’s CTA failed to provide “a ‘list [of] the
    supplies/services and pricing” per the “Team Ordering Procedures” element. (Pl.’s MJAR at 17—
    19 (quoting AR Tab 9 at 284) (alteration in MJAR); see also Pl.’s MJAR at 19-20). This is
    aragraph preceding Securityhunter’s CTA explained
    .” (AR Tab 21 at 822). Further, contrary to SigNet’s position,
    “Services Required” under the SOW did not require Securityhunter to detail each SOW
    requirement on a line-by-line basis, particularly where ETC’s role as a CTA team member was
    limited to the provision of as (See AR Tab 21 at 825).
    Securityhunter did not need to identify other SOW services because none of them are relevant or
    applicable to the CTA. Based on ETC’s limited role, SigNet’s argument here also fails.
    Next, SigNet claims Securityhunter’s CTA meets only two of the requirements of the
    “Terms of Arrangement” element, (1) the duration and the identification of “players,” and (2)
    part of the “responsibilities” requirement, thereby disregarding other responsibilities and
    limitations. (See Pl.’s MJAR at 19). For the reasons discussed above, Securityhunter’s CTA
    adequately addressed the CTA members’ responsibilities. The “Terms of Arrangement” element
    provided that “[t]he terms of the CTA must define the whole course of the project. The CTA
    must specify the duration, the players, the responsibilities, and the limitations of the various
    players.” (AR Tab 9 at 284). However, the model CTA does not define any of these
    specifications. (See id.). Evenso, Securityhunter’s CTA contained various limitations applicable
    to each team member, such as: paragraphs 3 and 17 (defining parameters of liability), paragraph
    9 (outlining responsibilities), paragraph 12 (administrative functions and fee), and paragraph 13
    (independent contractor relationship and obligations). (See AR Tab 21 at 822-27). Given that the
    subject CTA document defined limitations and each other “Terms of Arrangement” element as
    required, there is no basis for the Court to conclude that it was arbitrary for the SSA to determine
    the CTA addressed the “whole course of the project.” (See AR Tab 9 at 284-87).
    SigNet’s next arguments allege that Securityhunter’s CTA document failed to meet the
    Responsibilities of Team Lead and Team Member elements. (Pl.’s MJAR at 20). The former
    element states that “[t]he CTA document must outline and specify the duties of the designated
    team lead at each phase of the project” and the latter states that “[t]he CTA document must
    specify and describe the individual duties of the team members.” (AR Tab 9 at 284). Again, the
    Court is satisfied with Securityhunter’s explanation of those elements and in accord with the
    SSA’s assessment of this portion of the CTA. Paragraph 9 of the CTA described
    Securityhunter’s and ETC’s respective duties as the designated team lead and the team member.
    (See AR Tab 21 at 824). Subparagraphs (a) and (b) outline Securityhunter’s role and
    responsibilities, subparagraph (c) details ETC’s role and responsibilities, and subparagraph (d)
    breaks down the procedures pursuant to which Securityhunter will manage the team’s
    erformance of call orders. (See AR 824-25). Paragraph 12 solidified that Securityhunter =
    .” (AR 825). Paragraph 14 additionally
    identified Securityhunter’s oversight and management of the invoicing and payment processes
    for the duration of the contract. (See id.). Paragraph 15 stated that Securityhunter and ETC are
    individually responsible for reporting sales and paying the Industrial Funding Fee (“IFF’”) to
    GSA. (See id.). Paragraph 16 specified that each CTA member is responsible for warranties and
    repairs related to work that they perform under Paragraph 9. (See id.). Paragraph 17 identified
    each party’s respective liability. (AR 826). It is unclear what information SigNet believes to be
    excluded. Based on the foregoing, SigNet has not provided any basis for the Court to conclude
    that the SSA’s evaluation was arbitrary or an abuse of discretion.
    14
    SigNet next contends that Securityhunter’s CTA document failed to satisfy the
    specificities of the “Pricing” element. (Pl.’s MJAR at 21, citing AR Tab 9 at 285).
    Securityhunter’s quote, which was incorporated into the CTA by reference in paragraph 17,
    included a “CTA ITEM LISTING” table that detailed the specified labor, license, and items that
    ETC would provide. (AR 828). As such, the Court finds the SSA reasonably was within its
    discretion to accept Securityhunter’s quotation because it adequately addressed the pricing
    element and was therefore properly considered.
    SigNet also claims that Securityhunter’s CTA failed to comply with the requirements of
    the “Liabilities” element. (Pl.’s MJAR at 21—22). That element states as follows: “The CTA
    document must address each team member’s responsibilities and performance requirements so
    that liability is clearly established.” (AR Tab 9 at 284). The CTA specifically addressed each
    team member’s liability in paragraphs 4 and 17. (See AR Tab 21 at 822, 826). Based on the text
    of those paragraphs and the rationale regarding the responsibilities and performance
    requirements provided above, SigNet’s challenge on this point is without merit.
    In its final argument, SigNet contests Securityhunter’s compliance with the “Legal
    Relationship” element in the model CTA, (Pl.’s MJAR at 22—23), and argues that
    Securityhunter’s CTA document “says nothing about each team member ‘operating as a “prime”
    for the portion of the work they are performing.’” (Pl.’s MJAR at 22 (quoting AR Tab 9 at 286)).
    Paragraph 21 of Securityhunter’s CTA, titled “Legal Relationship,” declared that
    .” (AR Tab 21 at 826). The same paragraph goes on to state that
    (/d.). The model CTA did not include a requirement that the CTA include a provision stating that
    “all team members must be operating as a ‘prime.’” (See AR Tab 9 at 286). However, that is
    apparent based on the content of Securityhunter’s CTA document, which identified the FSS
    contract numbers for both Securityhunter and ETC. Any service or equipment provided by ETC
    would be ordered through its own FSS contract (i.e., ETC serving as a “prime contractor” for its
    limited scope of work). Again, SigNet misses the mark in attempting to prove that
    Securityhunter’s compliance with the RFQ was deficient or that the SSA’s reliance was arbitrary
    and capricious.
    Reviewing of Securityhunter’s total offer, the SSA determined that Securityhunter
    provided the information required by the RFQ with respect to its CTA document. (AR 2065
    (Quotation Checklist, Notes: § 8 — documenting agency determination that CTA document was
    “complete (addresse[d] each element in the CTA ‘model’ document)” and fully executed)).The
    Court agrees that Securityhunter’s CTA was complete, and the SSA evaluated the
    Securityhunter/ETC CTA document as the RFQ imstructed. (See AR 2065 (Quotation Checklist),
    AR 2184 (finding that Securityhunter’s proposal was complete); AR 2079 (where the TET noted
    the roles and responsibilities of the CTA team members and stated ‘
    ”
    SigNet’s claims that Securityhunter’s CTA document was incomplete or that the SSA improperly
    evaluated that document are contradicted by the administrative record.
    Because Securityhunter’s CTA document complied with the RFQ’s requirements,
    including providing the mandatory information stated in the model CTA document, though
    SigNet disagrees, the Court finds that the SSA properly considered Securityhunter’s proposal.
    “[Mlere disagreements are not enough” to overcome an agency’s evaluation determinations or
    award decision. GEO Grp., Inc. v. United States, 
    100 Fed. Cl. 223
    , 228 (2011). Thus, the Court
    rejects SigNet’s claims regarding the deficiencies of Securityhunter’s CTA.
    2. Fairness in Evaluations
    As its ensuing argument, SigNet contends that the SSA failed to uniformly evaluate
    Securityhunter’s and SigNet’s proposals in that Securityhunter was awarded the BPA
    notwithstanding Securityhunter’s termination as an authorized Lenel VAR. (Pl.’s MJAR at 34—
    35). In this connection, SigNet also argues that Securityhunter/ETC lacked a “substantial number
    of Lenel-authorized technicians.” (/d.). SigNet suggests that, based on its lack of Lenel
    authorization, “it is umplausible that Securityhunter could have been evaluated as having earned a
    higher rating than [SigNet] for Corporate Experience and Technical Approach evaluation
    factors.” (/d. at 35). Again, SigNet’s claims are unavailing.
    In a best value procurement, the Court will not substitute its judgment for that of the
    agency. See RISC Memt. Joint Venture v. United States, 
    69 Fed. Cl. 624
    , 638 (2006). A
    contracting officer has “even greater discretion” in making an award on a best value basis as
    opposed to based on cost alone. Sys. Plus, Inc. v. United States,
    69 Fed. Cl. 757
    , 774 (2006). The
    plaintiff has the burden of showing “that its position in the procurement was prejudiced.” Jd.
    When addressing an argument that there was a flawed best value determination, “[t]he Court’s
    main task is to ensure that the CO articulated a rational connection between the facts found and
    the choice made.” Allied Tech. Grp., 94 Fed. Cl. at 49. Here, the CO met that burden.
    Securityhunter’s quotation set forth a technical approach that the agency determined was
    consistent with the RFQ’s evaluation criteria. SigNet has not alleged that the SSA reached its
    own evaluation in error, but relies solely on the SSA’s evaluation of Securityhunter’s quote in
    connection with Lenel. (Pl.’s MJAR at 34—35). As noted, because Securityhunter is not a Lenel
    By accepting the CTA as part of Securityhunter’s quotation, the SSA
    therefore established privity of contract with both Securityhunter and ETC. (See AR Tab 37 at
    2468-67).
    The RFQ required offerors to provide Lenel PACS products and services. (AR 524-25).
    of the CTA document in its quotation. (AR 822-28). Therein,
    16
    .” Ud.) In addition to its
    intended use of a CTA with ETC, Securityhunter also stated that it would ‘
    .” (AR 780).
    As part of its
    Based on its CTA and quotation, the TET determined that ‘
    (AR 2082-83). The TET further determined:
    AR 2083). As part of this evaluation, the TET further recognized that ‘
    ” with ETC, and that ETC would ‘
    .” (AR 2079). Additionally, the
    TET determined that Securityhunter’s detailed technical approach had‘ ” and
    the TET could not identify any concerns or weaknesses. (AR 2083). Self-evident by its ultimate
    award, the CO agreed with the TET’s evaluation. The recommendation acknowledges and
    evaluates the CTA specifically. Thus, the SSA’s detailed evaluation of Securityhunter’s technical
    approach quote was reasonable and consistent with the RFQ.
    SigNet disregards the fact that the RFQ did not refer to the phrase “value added reseller”
    or “VAR,” or establish a requirement that a contractor be certified as a Lenel VAR to be
    awarded the BPA. In response to one question proffered by an offeror, the SSA specifically
    stated that the prime was not required to be a Lenel VAR. (See AR 520 (Question #55: “Given
    the complexity of the systems involved, must the Prime be a Lenel VAR?” Answer: “It is
    preferable that the Prime be a [Lenel] VAR but a team member is acceptable as well.”’)). Even
    so, SigNet emphasizes that it would be “impossible” for a contractor to perform under the BPA
    without a substantial number of Lenel-authorized technicians. (Pl.’s MJAR at 8-11). As the
    United States points out this RFQ is not a contract for continual, full-time, constant maintenance
    of all SSA locations, but instead, a BPA pursuant to which work be performed by the contractor
    when call orders are issued for services at specific locations. (AR 458—59). Securityhunter may
    hire or subcontract individuals with Lenel VAR certifications after award. Therefore, it is
    17
    irrelevant that Security hunter is not certified as a Lenel VAR because the RFQ did not require
    the prime contractor to be certified as Lenel VAR.
    Finally in its Lenel-related sally, SigNet argues that “[s]ince the access control systems
    with Lenel as the main component represent approximately 30% of the overall SOW
    requirements, and since ETC had , It strains credulity to
    believe that the Securityhunter CTA could service 1,500 facilities nationwide, plus U.S. overseas
    territories, in accordance with the requirements of the SOW.” (Pl.’s MJAR at 34-35). Simply
    put, this is not supported in the record. Even assuming that it were, SigNet fails to consider that
    ETC (as the CTA team member) is not barred from hiring more Lenel-certified employees as
    needed based on call orders issued under the BPA, and neither Securityhunter nor ETC are
    prohibited from subcontracting work relating to the access control systems to subcontractors who
    are certified Lenel technicians. Thus, the number of Lenel-certified employees is irrelevant, and
    consideration of these facts would be speculative.
    Within this argument, SigNet summarily states in a single-sentence paragraph that, “[the
    SSA’s] evaluation of Securityhunter’s price leads ineluctably to the inference that the price
    analysis was skewed in Securityhunter’s favor, to [SigNet’s] prejudice. (Pl.’s MJAR at 35)
    Without offering some scintilla of support, it is unclear what SigNet wants the Court to do with
    that argument. “Such naked claims, no matter how vigorous, fall far short of meeting the heavy
    burden of demonstrating that the findings in question were the product of an irrational process
    and hence were arbitrary and capricious.” Banknote Corp. of America, Inc. v. United States, 
    56 Fed. Cl. 377
    , 384 (2003), aff'd, 
    365 F.3d 1345
     (Fed. Cir. 2004). Nonetheless, the Court reiterates
    that the record demonstrates the SSA conducted the appropriate price analysis and reasonably
    concluded that Securityhunter’s price was reasonable. (AR 2184-219).
    While Lenel authorization is not required by the RFQ, Securityhunter has an effective
    CTA with a Lenel authorized retailer, thereby negating SigNet’s apparent concerns. SigNet has
    failed to persuade the Court that prejudice existed in the analysis of SigNet and Securityhunter’s
    proposals. Based on the analysis above, the record demonstrates that the SSA conducted the
    appropriate price analysis and rationally concluded that Securityhunter’s proposal was complete.
    (AR 2184-219). As such, SigNet cannot prove that the SSA’s award was irrational, arbitrary and
    capricious, or contrary to applicable law and regulation. Thus, the Court must enter judgment for
    the United States and Security hunter.
    “Because proving success on the merits is a necessary element for a permanent
    injunction.” Dell Fed. Sys., L.P. v. United States, 
    906 F.3d 982
    , 999 (Fed. Cir. 2018). Since
    SigNet failed to establish success on the merits for the reasons set forth above, injunctive relief
    would be likewise be inappropriate.
    II. Conclusion
    For the reasons set forth above, the Court hereby DENIES SigNet’s Motion for Judgment
    on the Administrative Record, (Pl.’s MJAR, ECF No. 25), GRANTS the United States’ Motion
    for Judgment on the Administrative Record, (Def.’s MJAR, ECF No. 28), GRANTS
    Securityhunter’s Motion for Judgment on the Administrative Record, (Int.-Def.’s MJAR, ECF
    No. 29), and DENIES Security hunter’ s Motion to Dismiss and Motion to Strike, (id.).
    18
    The Clerk is directed to enter judgment in accord with this Opinion. Each side shall bear
    its own costs. The parties shall file proposed redactions to this Opinion on or before July 1, 2021.
    IT IS SO ORDERED.
    3/ David A. Tapp
    DAVID A. TAPP, Judge
    19
    

Document Info

Docket Number: 21-1047

Judges: David A. Tapp

Filed Date: 6/30/2021

Precedential Status: Precedential

Modified Date: 6/30/2021

Authorities (20)

Califano v. Sanders , 97 S. Ct. 980 ( 1977 )

Segura v. United States , 104 S. Ct. 3380 ( 1984 )

E.W. Bliss Company v. United States , 77 F.3d 445 ( 1996 )

Impresa Construzioni Geom. Domenico Garufi v. United States , 238 F.3d 1324 ( 2001 )

Honeywell, Inc. v. The United States v. Haz-Tad, Inc. , 870 F.2d 644 ( 1989 )

Centech Group, Inc. v. United States , 554 F.3d 1029 ( 2009 )

Scheuer v. Rhodes , 94 S. Ct. 1683 ( 1974 )

Motor Vehicle Mfrs. Assn. of United States, Inc. v. State ... , 103 S. Ct. 2856 ( 1983 )

Citizens to Preserve Overton Park, Inc. v. Volpe , 91 S. Ct. 814 ( 1971 )

Lujan v. Defenders of Wildlife , 112 S. Ct. 2130 ( 1992 )

M. Steinthal & Co., Inc. v. Robert J. Seamans, Jr., ... , 455 F.2d 1289 ( 1971 )

Alabama Aircraft Industries, Inc.—Birmingham v. United ... , 586 F.3d 1372 ( 2009 )

banknote-corporation-of-america-inc-and-guilford-gravure-inc-v-united , 365 F.3d 1345 ( 2004 )

John G. Rocovich, Jr. v. The United States , 933 F.2d 991 ( 1991 )

american-federation-of-government-employees-afl-cio-american-federation , 258 F.3d 1294 ( 2001 )

Donald A. Henke v. United States , 60 F.3d 795 ( 1995 )

Advanced Data Concepts, Incorporated v. United States , 216 F.3d 1054 ( 2000 )

Karen S. Reynolds v. Army and Air Force Exchange Service , 846 F.2d 746 ( 1988 )

Myers Investigative and Security Services, Inc. v. United ... , 275 F.3d 1366 ( 2002 )

Bannum, Inc. v. United States , 404 F.3d 1346 ( 2005 )

View All Authorities »