BS Iso Iec Ieee 41062-2019
BS Iso Iec Ieee 41062-2019
National foreword
This British Standard is the UK implementation of ISO/IEC/
IEEE 41062:2019.
The UK participation in its preparation was entrusted to Technical
Committee IST/15, Software and systems engineering.
A list of organizations represented on this committee can be obtained on
request to its secretary.
This publication does not purport to include all the necessary provisions
of a contract. Users are responsible for its correct application.
© The British Standards Institution 2019
Published by BSI Standards Limited 2019
ISBN 978 0 580 99869 0
ICS 35.080
Compliance with a British Standard cannot confer immunity from
legal obligations.
This British Standard was published under the authority of the
Standards Policy and Strategy Committee on 28 February 2019.
2 0 1 9 -0 2
Software engineering —
Recommended practice for software
acquisition
Ingénierie du logiciel — Pratique recommandée pour l'acquisition des
logiciels
Reference number
I SO /I E C/I E EE 41 0 62 : 2 0 1 9 (E )
© IEEE 2 01 6
BS ISO/IEC/IEEE 41062:2019
ISO/IEC/IEEE 41062:2019(E)
Published in Switzerland
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members o f ISO or IEC participate in the development o f International Standards through technical
committees established by the respective organization to deal with particular fields o f technical
activity. ISO and IEC technical committees collaborate in fields o f mutual interest. Other
international organizations, governmental and non‐governmental, in liaison with ISO and IEC, also
take part in the work. In the field o f information technology, ISO and IEC have established a joint
technical committee, ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the di fferent approval criteria needed for
the di fferent types o f ISO documents should be noted (see www.iso.org/directives).
IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating
Committees o f the IEEE Standards Association (IEEE‐SA) Standards Board. The IEEE develops its
standards through a consensus development process, approved by the American National Standards
Institute, which brings together volunteers representing varied viewpoints and interests to achieve
the final product. Volunteers are not necessarily members o f the Institute and serve without
compensation. While the IEEE administers the process and establishes rules to promote fairness in
the consensus development process, the IEEE does not independently evaluate, test, or veri fy the
accuracy o f any o f the information contained in its standards.
Attention is drawn to the possibility that some o f the elements o f this document may be the subject
o f patent rights. ISO and IEC shall not be held responsible for identi fying any or all such patent
rights. Details o f any patent rights identified during the development o f the document will be in the
Introduction and/or on the ISO list o f patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience o f users and does
not constitute an endorsement.
For an explanation o f the voluntary nature o f standards, the meaning o f ISO specific terms and
expressions related to con formity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT),
see www.iso.org/iso/foreword.html .
ISO/IEC/IEEE 41062 was prepared by the So ftware & Systems Engineering Standards Committee o f
the IEEE Computer Society (as IEEE Std 1062‐2015) and drafted in accordance with its editorial
rules. It was adopted, under the “fast‐track procedure” de fined in the Partner Standards
Development Organization cooperation agreement between ISO and IEEE, by Joint Technical
Committee ISO/IEC JTC 1, Information techn ology, Subcommittee SC 7, Software and systems
engineering.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing o f these bodies can be found at www.iso.org/members.html.
I E E E S td 1 0 62 ™ -2 0 1 5
(Revisi on of
I EEE Std 1 062-1 993)
S oftware Acq u i s i ti on
Spon sor
of th e
Keyword s: acq u i rer, cu stom d evel oped , en d u ser, FOS S, I EE E 1 062 ™ , off-th e-sh el f, OTS ,
SaaS , software acq u i si ti on process, software as a servi ce, su ppl i er
I EEE i s a reg i stered trad em ark i n th e U . S. Paten t & Trad em ark Offi ce, own ed by Th e I n sti tu te of El ectri cal an d El ectron i cs
En g i n eers, I n corporated .
iv
Copyri gh t © 201 6 I EEE. Al l ri g h ts reserved.
IEEE documents are made available for use subj ect to important notices and legal disclaimers. These
notices and disclaimers, or a reference to this page, appear in all standards and may be found under the
heading “Important Notice” or “Important Notices and Disclaimers Concerning IEEE Standards
Documents. ”
D ocu m en ts
IEEE Standards documents (standards, recommended practices, and guides), both full-use and trial-use, are
developed within IEEE Societies and the Standards Coordinating Committees of the IEEE Standards
Association (“IEEE-SA”) Standards Board. IEEE (“the Institute”) develops its standards through a
consensus development process, approved by the American National Standards Institute (“ANS I”), which
brings together volunteers representing varied viewpoints and interests to achieve the final product.
Volunteers are not necessarily members of the Institute and participate without compensation from IEEE.
While IEEE administers the process and establishes rules to promote fairness in the consensus development
process, IEEE does not independently evaluate, test, or verify the accuracy of any of the information or the
soundness of any j udgments contained in its standards.
IEEE does not warrant or represent the accuracy or content of the material contained in its standards, and
expressly disclaims all warranties (express, implied and statutory) not included in this or any other
document relating to the standard, including, but not limited to, the warranties of: merchantability; fitness
for a particular purpose; non-infringement; and quality, accuracy, effectiveness, currency, or completeness
of material. In addition, IEEE disclaims any and all conditions relating to: results; and workmanlike effort.
IEEE standards documents are supplied “AS IS” and “WITH ALL FAULTS . ”
Use of an IEEE standard is wholly voluntary. The existence of an IEEE standard does not imply that there
are no other ways to produce, test, measure, purchase, market, or provide other goods and services related
to the scope of the IEEE standard. Furthermore, the viewpoint expressed at the time a standard is approved
and issued is subj ect to change brought about through developments in the state of the art and comments
received from users of the standard.
In publishing and making its standards available, IEEE is not suggesting or rendering professional or other
services for, or on behalf of, any person or entity nor is IEEE undertaking to perform any duty owed by any
other person or entity to another. Any person utilizing any IEEE Standards document, should rely upon his
or her own independent j udgment in the exercise of reasonable care in any given circumstances or, as
appropriate, seek the advice of a competent professional in determining the appropriateness of a given
IEEE standard.
IN NO EVENT SHALL IEEE BE LIAB LE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO:
PROCUREMENT OF SUB STITUTE GOODS OR SERVICES ; LOS S OF USE, DATA, OR PROFITS ;
OR BUS INESS INTERRUPTION) HOWEVER CAUS ED AND ON ANY THEORY OF LIAB ILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWIS E) ARISING IN ANY WAY OUT OF THE PUB LICATION, US E OF, OR RELIANCE
UPON ANY STANDARD, EVEN IF ADVIS ED OF THE POSS IBILITY OF SUCH DAMAGE AND
REGARDLESS OF WHETHER SUCH DAMAGE WAS FORESEEABLE.
Tran s l ati on s
The IEEE consensus development process involves the review of documents in English only. In the event
that an IEEE standard is translated, only the English version published by IEEE should be considered the
approved IEEE standard.
v
Copyright © 201 6 IEEE. All rights reserved.
Offi ci al statements
A statement, written or oral, that is not processed in accordance with the IEEE-SA Standards Board
Operations Manual shall not be considered or inferred to be the official position of IEEE or any of its
committees and shall not be considered to be, or be relied upon as, a formal position of IEEE. At lectures,
symposia, seminars, or educational courses, an individual presenting information on IEEE standards shall
make it clear that his or her views should be considered the personal views of that individual rather than the
formal position of IEEE.
Commen ts on standards
Comments for revision of IEEE Standards documents are welcome from any interested party, regardless of
membership affiliation with IEEE. However, IEEE does not provide consulting information or advice
pertaining to IEEE Standards documents. Suggestions for changes in documents should be in the form of a
proposed change of text, together with appropriate supporting comments. Since IEEE standards represent a
consensus of concerned interests, it is important that any responses to comments and questions also receive
the concurrence of a balance of interests. For this reason, IEEE and the members of its societies and
Standards Coordinating Committees are not able to provide an instant response to comments or questions
except in those cases where the matter has previously been addressed. For the same reason, IEEE does not
respond to interpretation requests. Any person who would like to participate in revisions to an IEEE
standard is welcome to j oin the relevant IEEE working group.
Users of IEEE Standards documents should consult all applicable laws and regulations. Compliance with
the provisions of any IEEE Standards document does not imply compliance to any applicable regulatory
requirements. Implementers of the standard are responsible for observing or referring to the applicable
regulatory requirements. IEEE does not, by the publication of its standards, intend to urge action that is not
in compliance with applicable laws, and these documents may not be construed as doing so.
Copyrig hts
IEEE draft and approved standards are copyrighted by IEEE under U. S. and international copyright laws.
They are made available by IEEE and are adopted for a wide variety of both public and private uses. These
include both use, by reference, in laws and regulations, and use in private self-regulation, standardization,
and the promotion of engineering practices and methods. By making these documents available for use and
adoption by public authorities and private users, IEEE does not waive any rights in copyright to the
documents.
Ph otocopi es
Subj ect to payment of the appropriate fee, IEEE will grant users a limited, non-exclusive license to
photocopy portions of any individual standard for company or organizational internal use or individual,
non-commercial use only. To arrange for payment of licensing fees, please contact Copyright Clearance
Center, Customer Service, 222 Rosewood Drive, Danvers, MA 01 923 USA; +1 978 75 0 8400. Permission
to photocopy portions of any individual standard for educational classroom use can also be obtained
through the Copyright Clearance Center.
vi
Copyright © 201 6 IEEE. All rights reserved.
Users of IEEE Standards documents should be aware that these documents may be superseded at any time
by the issuance of new editions or may be amended from time to time through the issuance of amendments,
corrigenda, or errata. An official IEEE document at any point in time consists of the current edition of the
document together with any amendments, corrigenda, or errata then in effect.
Every IEEE standard is subj ected to review at least every ten years. When a document is more than ten
years old and has not undergone a revision process, it is reasonable to conclude that its contents, although
still of some value, do not wholly reflect the present state of the art. Users are cautioned to check to
determine that they have the latest edition of any IEEE standard.
In order to determine whether a given document is the current edition and whether it has been amended
through the issuance of amendments, corrigenda, or errata, visit the IEEE-SA Website at
http: //ieeexplore. ieee. org/xpl/standards. j sp or contact IEEE at the address listed previously. For more
information about the IEEE SA or IEEE’ s standards development process, visit the IEEE-SA Website at
http: //standards. ieee. org.
E rrata
Errata, if any, for all IEEE standards can be accessed on the IEEE-SA Website at the following URL:
http: //standards. ieee. org/findstds/errata/index. html. Users are encouraged to check this URL for errata
periodically.
Paten ts
Attention is called to the possibility that implementation of this standard may require use of subj ect matter
covered by patent rights. By publication of this standard, no position is taken by the IEEE with respect to
the existence or validity of any patent rights in connection therewith. If a patent holder or patent applicant
has filed a statement of assurance via an Accepted Letter of Assurance, then the statement is listed on the
IEEE-SA Website at http: //standards. ieee. org/about/sasb/patcom/patents. html. Letters of Assurance may
indicate whether the Submitter is willing or unwilling to grant licenses under patent rights without
compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of
any unfair discrimination to applicants desiring to obtain such licenses.
Essential Patent Claims may exist for which a Letter of Assurance has not been received. The IEEE is not
responsible for identifying Essential Patent Claims for which a license may be required, for conducting
inquiries into the legal validity or scope of Patents Claims, or determining whether any licensing terms or
conditions provided in connection with submission of a Letter of Assurance, if any, or in any licensing
agreements are reasonable or non-discriminatory. Users of this standard are expressly advised that
determination of the validity of any patent rights, and the risk of infringement of such rights, is entirely
their own responsibility. Further information may be obtained from the IEEE Standards Association .
vii
Copyright © 201 6 IEEE. All rights reserved.
Parti ci pants
At the time this IEEE recommended practice was completed, the RP of the Software Acquisition Working
Group had the following membership:
Philip Bernick,
,
Secretary
The following members of the individual balloting committee voted on this recommended practice.
Balloters may have voted for approval, disapproval, or abstention.
viii
Copyright © 201 6 IEEE. All rights reserved.
When the IEEE-SA Standards Board approved this recommended practice on 5 December 201 5 , it had the
following membership:
* Member Emeritus
ix
Copyright © 201 6 IEEE. All rights reserved.
I n trod u cti on
This introduction is not part of IEEE Std 1 062-201 5 , IEEE Recommended Practice for Software Acquisition.
This introduction provides some background on the rationale used to develop this recommended practice.
This information is meant to aid in the understanding and usage of this recommended practice.
This recommended practice describes the management and execution of software acquisition activities. It is
intended for the following:
Individuals or organizations that acquire software from a developer for resale to other individuals
or organizations
Incorporate quality considerations during the definition, evaluation, selection, and acceptance of
supplier software for operational use
Determine how supplier software should be evaluated, tested, and accepted for delivery to end
users
Promote consistency within organizations in acquiring third-party software from software suppliers
Provide useful practices on including quality considerations during software acquisition planning
Provide useful practices on evaluating and qualifying supplier capabilities to meet user software
requirements
Assist individuals or organizations j udging the quality of supplier software for referral to end users
x
Copyright © 201 6 IEEE. All rights reserved.
Contents
1 . Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1
1 . 1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1
1 . 2 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2
2. Normative references . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2
Annex B (informative) Software safety assurance and software information security assurance . . . . . . . . . . . . . . . . 5 7
B. 1 Software safety assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 7
B. 2 Software information security assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 8
xi
Copyright © 201 6 IEEE. All rights reserved.
xii
Copyright © 201 6 IEEE. All rights reserved.
S oftware Acq u i s i ti on
IMPORTANT NOTICE: IEEE Standards documents are not intended to ensure safety, security, health,
or environmental protection, or ensure against interference with or from other devices or networks.
Implementers of IEEE Standards documents are responsible for determining and complying with all
appropriate safety, security, environmental, health, and interference protection practices and all
applicable laws and regulations.
This IEEE document is made available for use subject to important notices and legal disclaimers.
These notices and disclaimers appear in all publications containing this document and may
be found under the heading “Important Notice” or “Important Notices and Disclaimers
Concerning IEEE Documents. ” They can also be obtained on request from IEEE or viewed at
http://standards. ieee. org/IPR/disclaimers. html.
1 . O vervi ew
This recommended practice is divided into six clauses. Clause 1 provides the scope of this recommended
practice. Clause 2 lists references to other standards that are essential in applying this recommended
practice. Clause 3 provides definitions that are either not found in other standards, or have been modified
for use with this recommended practice. Clause 4 describes the options for acquiring software. Clause 5
describes the eight steps in a software acquisition process and the related quality practices that apply to
acquiring software. Clause 6 describes how quality assurance can be applied to software acquisition.
This recommended practice also contains five annexes. Annex A provides a set of checklists that
individuals or organizations may elect to adapt to their specific needs, Annex B provides software
acquisition guidelines with respect to Software Safety Assurance and Software Information Security
Assurance, Annex C provides guidelines with respect to rights in technical data software usage, Annex D
provides acquisition plan guidelines, and Annex E is the bibliography.
1 .1 S cope
This recommended practice describes a set of useful quality considerations that can be selected and applied
during one or more steps in a software acquisition process. The recommended practices can be applied to
software that runs on any computer system regardless of the size, complexity, or criticality of the software.
The software supply chain may include integration of commercial-off-the-shelf (COTS ), custom, or free
and open source software (FOS S). Each organization or individual using this recommended practice will
need to identify the specific quality and activities that need to be included within the organization’ s
acquisition process. Security will be included as a quality attribute considered during the acquisition.
1
Copyright © 201 6 IEEE. All rights reserved.
1 . 2 Pu rpose
This recommended practice is designed to help organizations and individuals incorporate quality, including
security considerations during the definition, evaluation, selection, and acceptance of supplier software for
operational use. It will also help determine how supplier software should be evaluated, tested, and accepted
for delivery to end users. This recommended practice is intended to satisfy the following obj ectives:
Provide useful practices on including quality, security, safety and data rights considerations during
acquisition planning.
Provide useful practices on evaluating and qualifying supplier capabilities to meet user
requirements.
Assist individuals or organizations j udging the quality of supplier software for referral to end users.
Assist suppliers in understanding how the software will be evaluated, tested, and accepted for
delivery to end users.
Success in acquiring high-quality software products and services from software suppliers can be achieved
by doing the following things:
e) Establishing a software acquisition process using the eight steps stated in 5 . 2 as a starting point
2. N ormati ve references
The following referenced documents are indispensable for the application of this document (i. e. , they must
be understood and used, so each referenced document is cited in text and its relationship to this document is
explained). For dated references, only the edition cited applies. For undated references, the latest edition of
the referenced document (including any amendments or corrigenda) applies.
1, 2
IEEE Std 1 228™, IEEE Standard for Software Safety Plans.
ISO/IEC/IEEE Std 1 2207, Systems and software engineering—S oftware life cycle processes.
IS O/IEC/IEEE Std 1 5 28 8, Systems and software engineering—S ystem life cycle processes.
1
IEEE publications are available from the Institute of Electrical and Electronics Engineers, Inc. , 445 Hoes Lane, Piscataway, NJ
2
Copyright © 201 6 IEEE. All rights reserved.
3. D efi n i ti on s an d term s
For the purposes of this document, the following terms and definitions apply. The International Standard
ISO/IEC/IEEE 24765: Systems and Software Engineering—Vocabulary should be referenced for terms not
3
defined in this clause.
3. 1 D efi n i ti on s
commercial-off-the-shelf (COTS): A product available for purchase and use without the need to conduct
development activities [ISO/IEC/IEEE 1 5 289: 201 1 ] .
modified-off-the-shelf (MOTS): Software product that is already developed and available, usable either
“as is” or with modification, and provided by the supplier, acquirer, or a third party.
off-the-shelf (OTS) : Product or system already developed and available [ISO/IEC/IEEE 1 5 289: 201 1 ] .
software-intensive system : A system for which software is a maj or technical challenge and is perhaps the
maj or factor that affects system schedule, cost, and risk [IEEE Std 1 3 62-1 998 (Reaff 2007)] and
[ISO/IEC/IEEE 24765 : 201 0] .
NOTE —In the most general case, a software-intensive system is comprised of hardware, software, people, and manual
4
procedures.
3 . 2 U s e of s h ou l d , m ay, an d can
In this document, the word should is used to indicate a recommendation. The word may is used to indicate a
permissible action. The word can is used for statements of possibility and capability.
4. 1 I n trod u cti on
Software can be acquired in three different ways or a combination of the three. It is acknowledged that any
combination of these three alternatives will make the overall software proj ect more complex and likely to
be different from each other. This document does not attempt to address the combinations of these three
basics software acquisition options. The software acquisition alternatives include contracting custom-
developed software, obtaining the right to use off-the-shelf (OTS) software and renting software as a
service (SaaS). The advantages and disadvantages of each option are summarized in Table 1 .
3
The International Standard ISO/IEC/IEEE 24765: Systems and Software Engineering—Vocabulary is available at
www.computer.org/sevocab.
4
Notes in text, tables, and figures are given for information only and do not contain requirements needed to implement the standard.
3
Copyright © 201 6 IEEE. All rights reserved.
The acquirer can require that flexibility and maintainability be supported by the solution and by the
supplier of the solution.
The acquirer can monitor and influence the course of development/test in case changes are deemed
appropriate.
The acquirer can control and influence the related topics to the executable software solution (e. g. ,
size, performance, information protection, authorization security, capacity) and the software
development environment (language, tools, etc. ).
If a problem is reported, the acquirer can determine if the problem legitimately violates the
specifications and if it does, the supplier should be responsible for fixing that problem, typically at
no additional cost to the acquirer.
Changes after acceptance are typically still under control of the acquirer via an ops/maintenance
agreement with a possibly different ops/maintenance supplier.
Typically costs more than the other options.
Typically takes more time (sometimes much more) than the other options.
4
Copyright © 201 6 IEEE. All rights reserved.
Cost is less than the custom-developed option but similar to the SaaS option.
Time to initial operations is less than the custom-developed option and can be greater than the SaaS
option.
Since the acquirer takes possession of the solution, the control over data and access is greater than
the SaaS option and about the same as the custom-developed option.
The terms of the generally non-negotiable license agreement constrain how the solution may be
used by the acquirer, possibly to the acquirer’ s detriment. The solution typically includes features
that attempt to enforce specific agreement terms, adding cost and complexity to the solution.
The solution may not satisfy all of the acquirer’ s needs (sometimes called gaps) and it may also
provide features/capabilities that are not required, not desired or even tolerable to the acquirer. The
acquirer may need additional solutions, or modifications to the acquired solution, to fill these gaps.
In addition, the acquirer may also need to identify and deactivate or prevent the extraneous code
from activating itself.
Sometimes, the User Interface to the solution is different from the way an acquirer is currently
offering a User Interface to their current users. This can sometimes/often be solved via product
tailoring.
Typically, there will be a need to obtain support from the supplier for installation, activation, and
maintenance.
Problem reporting can be an issue, depending on the supplier’ s capability to accept and react to
problem reports. In addition, the supplier may not even agree that because an acquirer alleges a
problem exists that a legitimate problem actually does exist.
Product changes, both fixes and upgrades, are controlled mostly by the supplier and determined by
marketplace needs. Such changes may not be consistent with the acquirer’ s ongoing needs or
timeframe.
It is possible for the vendor to go out of business resulting in a possible loss of data.
5
Copyright © 201 6 IEEE. All rights reserved.
Rapid access to products and services via Service Level Agreement (SLA) and ready to use
solutions, more so than custom-developed or OTS .
No need to provide internal computing assets to support “building or buying” the equivalent
products or services, thus reducing costs and time in prep for using solution, as compared to both
custom-developed and OTS .
Typically is cheaper than custom-developed option and can be cheaper than the OTS option.
No need to take permanent ownership of the software solution, thus reducing impacts associated
with such ownership (e. g. , sustainment, hardware to host solution), as in the custom-developed and
OTS options.
The terms of the generally non-negotiable license agreement constrain how the solution may be
used by the acquirer, possibly to the acquirer’ s detriment. The solution typically includes features
that attempt to enforce specific agreement terms, adding cost and complexity to the solution.
The solution may not satisfy all of the acquirer’ s needs (sometimes called gaps) and it may also
provide features/capabilities that are not required, not desired or even tolerable to the acquirer. The
acquirer may need additional solutions, or modifications to the acquired solution, to fill these gaps.
In addition, the acquirer may also need to identify and deactivate or prevent the extraneous code
from activating itself.
The location of where the data is stored is not controlled by the acquirer; therefore the data
(personal data, sensitive data, etc. ) could be subj ect to the rules and regulations of the locality of
the supplier.
In the event the supplier is no longer a case of e. g. , bankruptcy of supplier, potentially the
acquirer’ s data could be lost.
The user interface to the solution may be different from the way an acquirer is currently offering a
user interface to their current users. This can sometimes/often be solved via product tailoring.
Problem reporting and problem correction of a solution, if it does not work as desired: Supplier
may not agree with nature of the problem or may not be able to fix in a timely manner. Similar to
OTS and more problematic than custom-developed.
Assured access to solution due to dependency on external assets. Again, backup/alternative paths
to supplier’ s assets may be required or legal recourse in case of loss of access. This is typically a
bigger risk than for custom-developed or OTS options.
Recovery from loss of access to or other failures of the solution may be dependent on the supplier’ s
abilities and sometimes out of the control of the acquirer.
Product changes, both fixes and upgrades, are controlled mostly by the supplier and determined by
marketplace needs. Such changes may not be consistent with the acquirer’ s ongoing needs or
timeframe.
It is possible for the vendor to go out of business resulting in a possible loss of data.
6
Copyright © 201 6 IEEE. All rights reserved.
7
Copyright © 201 6 IEEE. All rights reserved.
Advantages Disadvantages
Software 1. Rapid access to products and services via 1. The terms of the generally non-negotiable license
as a Service Level Agreement (SLA) and ready-to- agreement constrain how the solution may be used
service use solutions, more so than custom-developed or by the acquirer, possibly to the acquirer’ s
(SaaS) OTS. detriment. The solution typically includes
2. No need to provide internal computing assets to features that attempt to enforce specific agreement
support ‘ building or buying’ the equivalent terms, adding cost and complexity to the solution.
products or services, thus reducing costs and 2. The solution may not satisfy all of the acquirer’ s
time in preparation for using solution, as needs (sometimes called gaps) and it may also
compared to both custom-developed and OTS. provide features/capabilities that are not required,
3. Typically is cheaper than custom-developed not desired or even tolerable to the acquirer. The
option and can be cheaper than the OTS option. acquirer may also need to identify and deactivate
4. No need to take permanent ownership of the or prevent the extraneous code from activating
software solution, thus reducing impacts itself.
associated with such ownership (e. g., 3. Sometimes the user interface to the solution is
sustainment, hardware to host solution), as in the different from the way an acquirer is currently
custom-developed and OTS options. offering a user interface to their current users.
This can sometime/often be solved via product
tailoring.
4. Typically, there will be a need to obtain support
from the supplier for installation, activation, and
maintenance.
5. Problem reporting and problem correction of a
solution, if it does not work as desired.
6. Recovery from loss of access to or other failures
of the solution may be dependent on the supplier’ s
abilities and sometimes out of the control of the
acquirer.
7. Product changes, both fixes and upgrades, are
controlled mostly by the supplier and determined
by marketplace needs. Such changes may not be
consistent with the acquirer’ s ongoing needs or
timeframe.
8. It is possible for the vendor to go out of business
resulting in a possible loss of data.
5.1 Purpose
The purpose of the acquisition process is to obtain a product or service in accordance with the acquirer’ s
requirements.
5.1 .1 Outcomes
As a result of the successful implementation of the acquisition process:
8
Copyright © 201 6 IEEE. All rights reserved.
The software acquisition process should be tailored or streamlined to the maximum extent possible taking
risk into consideration. The process should be consistent with technical maturity, validated requirements,
and expected level of effort and funding. The tailoring process is presented in Annex A of ISO/IEC/IEEE
1 2207.
Figure 1 illustrates the eight-step process described in this clause and Table 2 summarizes the process steps,
along with their inputs and outputs.
9
Copyright © 201 6 IEEE. All rights reserved.
I d en ti fi ed N eed
Step 1 . Pl an n i n g th e software
acq u i si ti on strateg y (5. 3)
N o con tract
RFP pu bl ish ed
10
Copyrig h t © 201 6 I EEE. Al l ri g h ts reserved.
software acquisition 2. Develop an acquisition strategy. functional requirements to confirm need for a
3. Develop an acquisition plan. system and guide acquisition planning is produced.
strategy (5. 3 )
4. Include contracting practices. 2. Acquisition plan is specified and deliberated on.
5. Obtain acquisition services from 3. Acquisition plan is approved.
other organizations.
6. Tailor the process.
Step 2. Defining the 1. Define the software being acquired. 1. The software to be acquired is defined in detail.
acquisition and software 2. Establish supplier evaluation criteria. 2. The Statement of Work (SOW) is defined and
3. Establish acquirer and supplier approved.
requirements (5. 4)
obligations. 3. Software requirements are specified and approved.
4. Develop plans to evaluate and accept 4. A detailed RFP which includes acquirer and
software and services. supplier obligations is produced and approved.
5. Develop contingency plans. 5. Evaluation and acceptance criteria for the software
to be acquired are produced.
6. Contingency plan is drawn up and approved.
Step 3 . Identifying 1. Gather software supplier’ s 1. Potential supplier information is gathered and a
potential suppliers (5. 5 ) information. detailed RFI report produced for each supplier
2. Review software supplier’ s visited.
information. 2. Review report based on potential supplier’ s
3. Survey uses of the supplier’ s information is produced.
software. 3. A limited number of supplier candidates are
shortlisted based on the acquisition organization’s
policy.
Step 4. Preparing contract 1. Determine the required quality of the 1. The desired level of quality of work is determined.
Step 6. Managing for 1. Manage the contract during 1. Performance measures or assessment results are
Step 7. Accepting the 1. Review and update the acceptance 1. An acceptance testing report on delivered software
Step 8. Evaluating the 1. Evaluate contracting practices. 1. Contracting practices evaluated and reviewed.
process and identifying 2. Evaluate software product quality. 2. Acquired software product is evaluated.
3. Evaluate supplier performance. 3. Supplier performance is evaluated.
improvement opportunities
4. A detailed evaluation report is produced.
(5 . 1 0)
11
Copyright © 201 6 IEEE. All rights reserved.
5. 3. 1 Pu rpos e
a) The purpose of planning the software acquisition is to define the acquisition strategy. Planning for
software acquisition begins when an organization has established a need for a software system and
has made the decision to acquire the software rather than to develop it in-house. This includes the
activities performed to define an acquisition strategy for the software to be acquired. The
acquisition strategy includes a description of what is to be acquired, the length of time estimated for
implementation, and an estimate of the cost of the implementation. The acquisition strategy also
includes a concept for how the software will be operated and maintained; whether by the acquirer,
the supplier, or by a third party.
b) Planning includes the definition of the acquisition plan to be used by the acquirer. The acquisition
plan describes the activities that the acquisition organization should perform to acquire the
software.
5. 3. 2 Ou tcom es
High level specification of functional and non-functional requirements to confirm need for a system
and guide acquisition planning is produced.
5. 3. 3 Acti vi ti es an d tas ks
5. 3. 3. 1 I n i ti ate a pl an n i n g proces s
Before initiating planning, the acquirer should ascertain if any established acquisition processes policies
exist (preferred supplier lists, etc. ) for the planning organization.
c) Identifying the qualities a software product should possess to achieve the organization’ s obj ectives
The qualities and basic characteristics software should possess to achieve the organization’ s obj ectives
should be determined in order to detail a strategy for acquiring the software. These characteristics can
include high-level descriptions of functionality, as well as other characteristics such as the required time
frame, estimated cost, etc. Constraints in the planned software environment can limit choices to software
that is compatible with the environment and available infrastructure.
12
Copyright © 201 6 IEEE. All rights reserved.
a) Developing lists of capabilities (those of the acquiring organization and those of potential
suppliers) that would be helpful in identifying who could provide the needed software.
b) Identifying responsibilities that are associated with either the supplier or the acquirer.
d) Identify the potential options for acquisition and the risk, cost, and benefits for each. ISO/IEC/IEEE
Std 1 2207 lists potential options.
e) Custom-developed versus OTS versus SaaS : It is important that the acquirer become aware of
which of these three options are viable at this point in the planning process. If experienced vendors
exist, the OTS or SaaS options become important as the acquirer starts to identify such acquisition
options and the necessary trade space to compare one of those options against the other.
f) The strategy should be flexible enough to leave room for negotiations between acquirer and
supplier. Suppliers may propose unanticipated solutions to the proj ect or may wish to negotiate
agreement types, responsibilities, terms and conditions, etc. The strategy should not favor any
particular supplier in order to provide a fair level of competition to all potential suppliers.
5. 3. 3. 3 D evel op an acq u i s i ti on pl an
An acquisition plan should document the acquisition of software for a particular proj ect and should contain
the following:
When establishing an acquisition process, the following should be documented as appropriate in the
proj ect’ s acquisition plan:
b) Preparation of contracting exhibits describing the work required, deliverables, support, training,
and acceptance requirements
c) Consideration of what support, training, and other activities will be provided by the supplier and
what will be provided by acquirer’ s organizations
e) Milestones that will be used to monitor the proj ect’ s progress and acceptance
g) The primary responsibilities of the supplier, including the processes that will be imposed on the
supplier
h) The method to be used to address contract changes, including but not limited to triggers for
renegotiation
13
Copyright © 201 6 IEEE. All rights reserved.
The processes that both the acquirer and supplier are required to implement may be tailored as appropriate.
The amount of tailoring permissible for the supplier should be included in contract documents.
Reference to internal policies and practices may be used for additional guidance on implementing a process
for acquiring high-quality software. A reference list of information currently available within the
organization should be maintained.
After completing the acquisition process, lessons learned should be collected and reviewed to identify
potential process improvements to meet the changing needs and obj ectives of the organization.
5.4.1 Purpose
The purpose of defining the software requirement is to specify detailed functional and non-functional
requirements for the software to be procured and use these to produce the request for proposal (RFP) and
statement of work (SOW).
5.4.2 Outcomes
The outcomes of Step 2 are as follows:
The software to be acquired is defined in detail.
The SOW is defined and approved.
Software requirements are specified and approved.
A detailed RFP that includes acquirer and supplier obligations is produced and approved.
Evaluation and acceptance criteria for the software to be acquired are produced.
Contingency plan is drawn up and approved.
14
Copyright © 201 6 IEEE. All rights reserved.
Functional requirements specify what the software should do. Performance requirements specify the
performance attributes for the software, such as computational load, algorithm timing, precision, or
accuracy. Non-functional requirements specify the quality attributes required for the software, such as
dependability, reliability, availability, or maintainability.
The needed software, deliverables, and software support should be described as completely as possible in
the RFP so that the supplier can understand and address the scope of work in the proposal. The example
questions in Annex A, Checklist 2 may be used as a starting point.
Depending upon the type of software being acquired, a request for quote or other acquisition document may
be used in place of the RFP.
Evaluation criteria should be developed to use in reviewing supplier proposals, identifying nonresponsive
suppliers, and selecting a qualified supplier. The supplier’ s management qualifications, technical approach,
quality assurance program, and proposed cost should be considered. The questions in Annex A, Checklist
3 , may be used.
A provision should be included in the RFP requiring inspections of supplier facilities to investigate and
evaluate various factors, including financial position, technical capability, experience, and quality practices.
15
Copyright © 201 6 IEEE. All rights reserved.
5. 5. 1 Pu rpos e
The purpose is to identify potential suppliers of the required software through a request for information
(RFI) followed by site visits to those potential suppliers.
Contact potential suppliers and schedule the itinerary for facilities visiting. Facilities visiting participants
should be selected and meeting agenda should be prepared in advance. A comparison chart to record
observations made during the supplier facility visit should be created. Annex A, Checklist 3 , may be used.
The purpose of the visiting is to verify the RFI responses matched with suppliers’ operation practices, to
validate products demonstration, and to review document and quality system. A presentation of the RFI
response should be conducted by suppliers for critical points clarification and a management or executive
level meeting will be helpful for mutual understanding of further cooperation possibility.
Identify a group of suppliers whose offers are likely to be acceptable to receive an RFP for further
evaluation. Also, evaluate if a non-disclosure agreement (NDA) is required for the RFP to secure both
acquirer’ s and supplier’ s confidential information.
It is important that the acquirer establishes “valid supplier” criteria and that these are shared with the
supplier community. This can reduce the possibility of protests against any final supplier selection.
a) Custom-developed: If custom built software is an option, then determining the past performance of
a potential supplier in the domain (e. g. , communications, spacecraft, IT) is important.
b) OTS /S aaS: If OTS or SaaS is an option, determining the satisfaction of the user community of the
product/service is important. This can sometimes be accomplished by interacting with
product/service user groups for a given product/service.
5. 5. 2 Ou tcom es
Potential supplier information is gathered and a detailed RFI report produced for each supplier
visited.
A limited number of supplier candidates (e. g. , 3) are shortlisted based on the acquisition
organization’ s policy.
5. 5. 3 Acti vi ti es an d tas ks
Prepare an RFI/market survey and/or user survey form to collect software suppliers’ information. Collect
any information to assist further evaluation and mitigate the acquisition risk.
The RFI should consist of general company and domain specific information.
16
Copyright © 201 6 IEEE. All rights reserved.
The RFI and user survey needs to be managed to determine who should receive it. The supplier list may be
obtained from technical alliance membership lists, exhibition and/or trade publications, consultants,
supplier-chain management (refer to ISO/IEC/IEEE 1 2207). The user list can be obtained from suppliers’
website, consultant, or other stakeholders’ recommendation.
A task owner should be assigned to distribute the RFI and/or user survey form to appropriate suppliers or
users. She/he should also be responsible for collecting the RFI and user survey response. The RFI and user
survey form should define the deadline for response submission.
Review domain specific information and user survey responses. The acquirer’ s proj ect team should define
criteria for the technical related thresholds such as quality process maturity level, person-years of expertise
team experience, domain knowledge scope, patent(s) protection coverage, etc.
If a supplier has been contracted with before, review the suppliers’ performance and commitment
fulfillment.
The suppliers identified with capability insufficiency and/or bad user experience should be eliminated from
the potential suppliers list. Suppliers without the capability to handle a large effort on their own may be
awarded a portion of a proj ect, as an encouragement to small businesses or to apply specific expertise.
b) Evaluating software product against the functional and performance requirements of item a).
c) Evaluating the adequacy of the development process including the activities of quality assurance,
configuration management, verification and validation, reliability measurement, documentation,
and maintenance.
When preparing to contact users about a product, the questions suggested in Annex A, Checklist 6, may be
used. This checklist can be easily modified to fit the acquirer’ s needs.
17
Copyright © 201 6 IEEE. All rights reserved.
5.6.1 Purpose
The purpose is to prepare a detailed contract for the engagement of the chosen supplier.
5.6.2 Outcomes
The outcomes of Step 4 are as follows:
a) Describe in the contract’ s statement of work the relationship between the supplier and acquirer, and
who has responsibility for each task. The list of supplier and acquirer obligations developed from
Annex A, Checklist 4, may be used (see 5 . 5 . 3 ).
b) Describe in the contract what will be delivered, and what constitutes satisfactory and timely
performance by the supplier (see Annex A, Checklist 7. ).
c) Specify who is authorized to make changes in the contract and to answer supplier questions.
d) Consider providing in the contract means to monitor the supplier’ s progress. To do this, divide the
development effort into logical work steps. The more undefined the software is, the closer the steps
should be at the outset. The acquirer’ s approval should be required for each step before the
development is allowed to continue to the next step. Identify performance as well as functional
specifications.
e) Specify what measures will be used to determine the acceptability of the product or service. Service
contracts often include service level agreements (SLA) that define an acceptable level of service.
Agreements for developed software can require acceptance testing in the acquirer’ s environment.
f) Specify the measures of reliability and quality by which the supplier’ s work will be evaluated. The
list of quality obj ectives developed from Annex A, Checklist 5 , may be used.
g) Specify the criteria for software evaluation. The list of criteria developed from Annex A, Checklist
1 0, may be used.
18
Copyright © 201 6 IEEE. All rights reserved.
An obj ective of this step is to prepare a contract that provides the acquirer the right to terminate the contract
if the supplier cannot perform according to the contract’ s terms. The satisfactory performance and
acceptance testing criteria developed from Annex A, Checklist 7, can be used to identify work that does not
meet contract requirements.
Include a provision requiring the supplier to deliver, at contract termination, all agreed deliverables.
Complex proj ects where there is significant risk in achieving the contract requirements should include a
provision that requires the supplier to deposit with an escrow agent source code, documentation and other
material deemed appropriate by the acquirer.
Contract provisions should be developed according to the acquirer’ s needs. Consideration should be given
to the following when preparing the contract:
Review the obj ectives previously described in 5 . 5 . 1 . Select those provisions that represent the
acquirer’ s business practices that influence or contribute to obtaining a high-quality product.
Identify the contracting method most appropriate for acquiring software products or services from
suppliers.
Incorporate in the agreement the acquirer selected provisions. Review existing agreements and
consider including favorable contract provisions used successfully in the past.
Incorporate in the agreement appropriate contract exhibits describing the work required,
deliverables, support, and training (see Annex A, Checklist 2) and the acceptance requirements (see
Annex A, Checklist 7, Checklist 1 0, and Checklist 1 2).
During the review of the contract provisions, modify existing provisions in the agreement as required.
When these modifications affect any of the intellectual property or other legal provisions, then these
modified provisions should be reviewed with the organization’ s legal counsel.
SaaS : When renting access to a software product, typically a Service Level Agreement is involved
as part of the contracting effort.
OTS : When buying an OTS product, not only are contracts involved, but purchase agreements and
license agreements typically are also required. It is important that the consequences of these
various contractual devices are well understood.
19
Copyright © 201 6 IEEE. All rights reserved.
5.7.1 Purpose
The purpose is to confirm that a skilled and responsible supplier is selected. The supplier qualification and
selection process is established as a part of the software acquisition process.
5.7.2 Outcomes
The outcomes of Step 5 are as follows:
If the supplier proposes the use of existing software products, the list of questions in Annex A, Checklist
1 0, may be helpful.
Consider any results observed during supplier demonstrations at the supplier’ s site or the acquirer’ s site,
and supplier facility visits.
Determine for whom the supplier has produced work. Solicit comments from the supplier’ s prior
customers. The questions in Annex A, Checklist 6, may be used as a guide.
Costs should be compared to other supplier’ s prices and schedules. Caution should be exercised when the
supplier’ s proposed costs are much higher or lower than the average of all costs received.
Suppliers that are not completely responsive to the requirements in the RFP should be eliminated from
further consideration.
20
Copyright © 201 6 IEEE. All rights reserved.
Determine whether supplier’ s staff has experience with the problem domain for the software to be acquired,
the required languages, and with the software and hardware to be used during development. Review
resumes of personnel who would be assigned to the project and conduct interviews, if needed.
Determine whether any changes are under consideration that might impact the progress of the development
project, i.e., changes in organization, moving of supplier offices, or change in ownership.
During the negotiating process, identify any problems and misunderstandings, examine potential
uncertainties, allocate the risks, and protect both parties. Consideration should be given to the following
when negotiating the contract:
a) Provide a means of avoiding disputes and of resolving disputes that may arise
b) Provide for investing only a minimum amount of funds before the quality of the supplier’ s work or
product is demonstrated
c) Provide for a maximum total price, payment amounts, or total value of the contract
Confirm the right of using intellectual property of acquired software and the remedy process if intellectual
property infringement occurs on the acquired software to protect acquirer’ s product delivery.
The acquirer should negotiate necessary maintenance supplements with the supplier to extend the
acquisition software lifecycle though the sustainability is not included in the acquisition process.
Define the process of invoking and escalating urgent/critical events (delivery schedule slipped,
critical/quality issue, payment delay, response time, etc.) to the supplier management for prioritization and
resolution.
The review comments from business, finance, legal, procurement, and technical stakeholders should be
consolidated for negotiation reference.
Compare contract against related or previous contracts for organization acquisition policy/strategy
consistency.
21
Copyright © 201 6 IEEE. All rights reserved.
The acquirer should adj ust the contract consideration in accordance with custom-developed/OTS /SaaS
acquisition model.
If negotiations with the selected supplier fail to produce a contract that will assure delivery of a quality
product on time and properly supported, consider opening negotiations with an alternate supplier.
5.8.1 Purpose
The purpose of managing for supplier performance is to determine the status of the work and process
execution to help assure that performance is consistent with the agreement and milestones are met.
5.8.2 Outcomes
The outcomes of Step 6 are as follows:
a) The acquirer should provide any required work product (e. g. , equipment, software, machine time,
and reference materials) to the supplier within the specified time frames so that the supplier is not
delayed. When provided, the work products should be complete and accurate to provide a basis for
the supplier’ s work. Any discrepancies should be dealt with immediately.
b) Management should create an environment within the organization that supports the supplier’ s
efforts. Internal disagreements should be resolved in-house by management and not left for the
supplier to encounter.
c) An individual should be appointed to deal with the supplier on all aspects of the contract. If
possible, the same person who previously worked with the supplier should be kept on the proj ect
throughout the contract. All discovered problems should be resolved. The individual appointed to
deal with the supplier will be responsible for confirming that all discovered problems (e. g. , during
the reviews) “are identified, analyzed, managed, and controlled to resolution” (ISO/IEC/IEEE
1 2207).
d) An open line of communication should be maintained with the supplier. A representative of the
acquirer should be closely involved in the development and provide continuous feedback to the
acquirer. Undocumented informal communication can lead to additional costs; therefore any
changes in the scope of work should be handled by amending the contract.
22
Copyright © 201 6 IEEE. All rights reserved.
e) Depending on the type of contract, performance information can be used for award fees
determination. Consideration should be given to the following when monitoring supplier progress:
1) The representative of the acquirer closely involved in all the development should participate
in the planning of each iteration, at development reviews at the end of each iteration (or other
segment of work), and manage the delivery of contract products yet to be delivered.
2) Use measures (e. g. , of reliability) specified in the contract to evaluate the supplier’ s work.
f) Regular and continuous feedback to the supplier on supplier performance (see Annex A, Checklist
7) in terms of overall progress and on handling problems, should be provided.
g) The acquirer should maintain a process for risk management in order to manage the risk of contract
default.
5.9.1 Purpose
The purpose of software acceptance is to manage the acceptance of the software product by the acquirer by
following an acceptance testing process that has been agreed to by both the acquirer and supplier.
Acceptance begins when the acquirer receives the completed product. The acquirer determines whether the
product meets all functional, performance, and non-functional requirements. This process may include
tests conducted in the supplier’ s development environment and tests conducted in the acquirer’ s operational
environment. When the acquirer has determined that the software product meets the requirements of the
contract, the software product is accepted, including any documentation or other support provided from the
supplier. Before accepting the software, the processes in 5 . 9. 2 through 5 . 9. 4 should be completed.
5.9.2 Outcomes
The outcomes of Step 7 are as follows:
Decision to accept, rej ect or make changes to the delivered software solution is made.
23
Copyright © 201 6 IEEE. All rights reserved.
a) Acceptance criteria provided as a part of supplier performance standards should be kept meaningful
and current.
b) Evaluations and tests should be conducted to detect the differences between existing and required
conditions and to evaluate the features of the software (e. g. , conformance to specifications,
standards, performance, portability, or functionality).
c) Consideration should be given to conducting a system-level test, particularly when the software is
to be used in another system. Once it has been determined the test is needed, then it should be
included in the acceptance criteria.
d) Final acceptance criteria should include testing results to verify conformance to standards,
performance, and quality of the software in a user environment.
e) The quality, conformance to standards and maintenance plans developed for the proj ect should be
used in evaluating and accepting the software and services provided by the supplier.
a) When evaluating a software product, the list of questions in Annex A, Checklist 1 0, may be helpful
in considering significant factors that would have some impact on the quality of the product. This
list is also useful when preparing requirements for a fully developed software effort (see 5 . 5 . 1 ).
This list may be tailored by adding other factors and questions that are important to the acquirer’ s
organization.
b) When testing a software product, the acquirer should have a role in the testing process. Annex A,
Checklist 1 1 , may be used in defining that role.
To assess how well the software solution meets the identified need and software requirements
To assess how well the software acquisition process was handled and suggest improvements
otherwise.
24
Copyright © 201 6 IEEE. All rights reserved.
An analysis should be conducted on the software acquisition contract to evaluate contracting practices,
evaluate product quality, notably quality in use, as for example, user satisfaction with the product, and
evaluate supplier performance. The evaluation should result in usable information for future acquisitions.
b) Record the actual amount of software maintenance work that is needed after the software is put into
use.
c) Record data about other software product qualities that in the minimum should be the specified in
the contract agreement. A product quality model and measures are defined in the ISO/IEC 25 000
families of standards, particularly the quality in use model. A product evaluation process for
acquires is described in ISO/IEC 1 45 98 -4 that can be used with the IS O/IEC 25 000 families.
25
Copyright © 201 6 IEEE. All rights reserved.
The acquisition of software should aim to achieve the desired or intended acquirer goals and obj ectives.
Quality assurance (QA) in the acquisition of software facilitates the achievement of the goal(s) through of
the following (specific obj ectives):
Ensuring the acquired software solution conforms to requirements and are acceptable to the
acquirer and end user.
Enabling acquirer selection teams to identify contractors whose methodologies and processes in
architecting and delivering software solutions are compliant with known standards and are most
likely to produce the desired results.
It is recommended that QA activities be performed in every step of the software acquisition process. The
quality assurance approach will depend on the software acquisition option that is chosen or implemented.
A detailed quality assurance plan reflective of the software acquisition option is necessary to detail specific
quality assurance activities during the software acquisition process. These activities help ensure the
acquisition processes and methods are monitored and evaluated to avoid mistakes or defects. Such activities
may simply involve checking activities/processes/results of a given stage /process against known ISO/IEC
and IEEE standards.
Table 3 includes recommended quality assurance activities for each step in the software acquisition
process.
26
Copyright © 201 6 IEEE. All rights reserved.
Step 2. Defining the acquisition and 1. Check that requirements ISO/IEC 291 48
Step 3 . Identifying potential suppliers 1. Check compliance of potential ISO/IEC 291 1 0 [B1 7]
Step 7. Accepting the software (5. 9) 1. Assemble user acceptance test ISO/IEC 25051 [B1 5 ]
cases to support verification of ISO/IEC/IEEE 291 1 9 [B1 0]
requirements. IEEE Std 1 01 2 [B6]
2. Evaluate results of acceptance tests IEEE Std 73 0 [B4]
conducted using the acceptance test
cases.
3. Check completeness of user
manuals.
Step 8. Evaluating the process and 1. Monitor performance against ISO/IEC/IEEE 1 2207
27
Copyright © 201 6 IEEE. All rights reserved.
Annex A
(i n formati ve)
Checklists in this annex are provided to assist organizations in establishing an organization’ s own software
acquisition process. These checklists are intended to help organizations think about relevant issues to
specific organization and software acquisition efforts. The checklists are not applicable to every acquisition
and should be tailored to a specific software acquisition effort.
Step 2. Defining the acquisition and software requirements. (5. 4) A. 2 Define the software
A. 3 Supplier selection evaluation
A. 4 Supplier and acquirer obligations
A. 5 Quality and maintenance plans
Step 3 . Identifying potential suppliers (5. 5 ) A. 1 Organizational strategy
A. 3 Supplier selection evaluation
A. 6 User survey
Step 5 . Evaluating proposals and selecting the supplier (5 . 7) A. 7 Supplier performance standards
A. 9 Monitor supplier progress
28
Copyrig h t © 201 6 I EEE. Al l ri g h ts reserved.
I E E E S td 1 0 6 2 -2 0 1 5
29
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
30
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
j) Rate the importance of the software support to be provided with the software being defined
1 0) Free and open source software (FOSS) products used Important ❐ Not Important ❐
31
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
Technical assistance
a) What assistance is provided at the installation time?
b) Can staff training be conducted on site? Yes No ❐ ❐
c) To what extent can the software and documentation be modified
to meet user requirements? ________________________________________________________
d) Who will make changes to the software and documentation? _____________________________
e) Will modification invalidate the warranty? Yes No ❐ ❐
f) Are any enhancements (software and documentation) planned or in process? Yes No ❐ ❐
g) Will future enhancements be made available? Yes No ❐ ❐
Quality practices
a) Are the development and control processes followed? Yes ❐ No ❐
b) Are requirements, design, and code reviews used? Yes ❐ No ❐
c) If requirements, design, and code reviews are used, are they effective? Yes ❐ No ❐
d) Is a total quality program in place? Yes ❐ No ❐
e) If a total quality program is in place, is it documented? Yes ❐ No ❐
f) Does the quality program assure the product meets specifications? Yes ❐ No ❐
g) Is a corrective action process established to handle error corrections
and technical questions? Yes ❐ No ❐
h) Is a configuration management process established? Yes ❐ No ❐
32
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
Maintenance service
a) Is there a guarantee in writing about the level and quality of maintenance
services provided? Yes No ❐ ❐
b) Will ongoing updates and error conditions with appropriate
documentation be supplied? Yes No ❐ ❐
c) Who will implement the updates and error corrections? _________________________________
d) How and where will the updates and error corrections be implemented? ____________________
e) What turnaround time can be expected for error corrections? _____________________________
Product usage
Product warran ty
Costs
a) What pricing arrangements are available? ____________________________________________
b) What are the license terms and renewal provisions? ____________________________________
c) What is included in the acquisition price or license fee? _________________________________
d) What costs, if any, are associated with a warranty period? _______________________________
e) What is the cost of maintenance after the warranty period? ______________________________
f) What is the cost of modifications? __________________________________________________
g) What is the cost of enhancements? _________________________________________________
h) Are updates and error corrections provided at no cost? Yes No ❐ ❐
Contracts
33
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
1) Were the relationships between the supplier and acquirer identified? Yes❐ No ❐
2) Were responsibilities for each task identified? Yes ❐ No ❐
34
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
35
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
Reliability
Performan ce
36
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
Flexibility
a) What software product modifications have been done? _____________________________
b) Who did the modifications? __________________________________________________
c) Are changes done on site? Yes ❐ No ❐
d) If the changes are not done on site, where are they done? ___________________________
e) How long did changes in each area take? ________________________________________
f) What fully developed software has been added? ___________________________________
g) Who added the software? _____________________________________________________
h) How long did it take? _______________________________________________________
i) Were there any interface problems? Yes ❐ No ❐
j ) How has the system been expanded or upgraded? ________________________________
k) How successful was the conversion? __________________________________________
l) How much time was involved? _______________________________________________
m) How much cost was involved? _______________________________________________
n) How many personnel were involved? __________________________________________
Installation
a) Was the system installed as planned? Yes ❐ No ❐
b) How long did installation take? ________________________________________________
c) How much did installation cost? _______________________________________________
d) Was supplier installation training adequate? Yes ❐ No ❐
e) Was supplier installation support competent and complete? Yes ❐ No ❐
f) Was the system cut over smoothly? Yes ❐ No ❐
g) What anomalies, if any, marred the installation? __________________________________
h) What environmental changes were required to install the system? ____________________
Costs
a) What unanticipated charges were incurred during installation
and training? _______________________________________________________________
b) What unanticipated charges were incurred after installation
and training? _______________________________________________________________
c) Is the acquirer’ s service agreement cost-effective? Yes ❐ No ❐
d) What have new product enhancements from the supplier cost? _______________________
e) What charges, if any, have been incurred to update or correct software? ________________
f) How much does customized software work cost? __________________________________
g) Does customized software work also include updated documentation? Yes ❐ No ❐
h) In what areas is the system to be
most cost-effective? _________________________________________________________
i) In what areas is the system to be
least cost-effective? __________________________________________________________
37
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
Security
Docum entation
Miscellan eous
38
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
Performan ce criteria
⎯ Demonstration Yes ❐ No ❐
⎯ Test Yes ❐ No ❐
39
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
k) Reduce payment if certain requirements are not met. Important ❐ Not Important ❐
40
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
41
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
c) Can the software be run under the acquirer’ s operating system? Yes ❐ No ❐
Performance
a) Is the performance adequate for the acquirer’ s needs? Yes ❐ No ❐
b) Are believable performance figures available? Yes ❐ No ❐
c) How many users can be on the system before it begins to slow down? _________________________
d) What verifiable evidence is available showing that the supplier has tested
performance issues in a suitable environment? ______________________________________________
Reliability
a) Does the product have a clean, modular design? Yes ❐ No ❐
b) Has it been in actual use long enough to make sure that most of its bugs
have been cleaned up? Yes ❐ No ❐
c) Are there errors that a user can make that will bring the system down? Yes ❐ No ❐
Availability
a) Was the software available for actual use when it was needed? Yes ❐ No ❐
b) Can another user prevent you from using the system? Yes ❐ No ❐
c) How much time is needed to correct errors that bring the system down? ________________________
f) How effectively did the supplier test the product in the acquirer’ s
operational environment? _______________________________________________________________
42
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
Serviceability
c) What level and quality of maintenance will the supplier provide? _____________________________
Ease of installation
a) How difficult will it be to install the software? ____________________________________________
e) How much assistance will the supplier furnish during the process? ____________________________
Ease of use
c) Are the reports and screen displays it produces reliable, informative, and
easy to interpret? Yes ❐ No ❐
d) Are help screens provided? Yes ❐ No ❐
b) Are direct costs included for the price of the software? Yes ❐ No ❐
c) Are direct costs included for the price of the documentation? Yes ❐ No ❐
43
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
⎯ Training personnel ❐
⎯ Converting tables ❐
⎯ Installing the software ❐
⎯ Checking out the software ❐
⎯ Operating the software ❐
⎯ Maintaining the software after installation ❐
⎯ Travel expenses ❐
44
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
45
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
I E E E S td 1 0 6 2 -2 0 1 5
46
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
Annex B
(i n formati ve)
The acquisition of software for systems with safety or information security requirements deserves special
consideration. Failure of software that is acquired for safety systems may have the potential to result in a
risk of inj ury or death, whereas failure of software acquired for information security systems may have the
potential to result in risks to individual privacy, business or organizational confidential information, or
operational stability.
Software for these systems should focus on reducing the exposure to software safety or software
information security risks and requirements typically focus on minimizing unacceptable system behavior
rather than identifying software system functionality.
Safety considerations in the acquisition of software include the identification and management of hazards
and their associated risks during system development and system sustainment.
A Software Safety Plan, as specified in IEEE Std 1 228, should be used by the acquirer and supplier to
document the software safety approach for managing hazards throughout the acquisition lifecycle.
Safety requirements to be met by the software should be specified to help avoid or control system hazards.
Software safety requirements are derived from the system and subsystem safety requirements and should be
clearly specified in the Software Requirements Document (SRD).
Hazards should be identified through a systematic analysis process to include the software, system
interfaces and the intended use in the operational environment. A Hazard Tracking System is also
recommended, where both the acquirer and supplier have access, with appropriate controls on data
management. The plan should specify the tracking system used to help ensure that hazards, hazard owners,
and their status can be tracked throughout the software life cycle, through retirement.
47
Copyrig h t © 201 6 I EEE. Al l ri g h ts reserved.
I E E E S td 1 0 6 2 -2 0 1 5
Software information security assurance is the practice of assuring information and managing risks related
to the use, processing, storage, and transmission of information or data and the systems and processes used
for those purposes. While focused dominantly on information in digital form, the full range of information
assurance encompasses not only digital but also analog or physical form. Information assurance as a field
has grown from the practice of information security, which in turn grew out of practices and procedures of
computer security.
The terms privacy, information security, computer security, and information assurance are frequently used
interchangeably. These fields are interrelated often and share the common goals of protecting the
confidentiality, integrity, and availability of information; however, there are some subtle differences
between them.
These differences lie primarily in the approach to the subject, the methodologies used, and the areas of
concentration. Information security is concerned with the confidentiality, integrity, and availability of data
regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on
ensuring the availability and correct operation of a computer system without concern for the information
48
C o p yri g h t © 2 0 1 6 I E E E . Al l ri g h ts re s e rve d .
stored or processed by the computer. Information assurance focuses on the reasons for assurance that
information is protected, and is thus reasoning about information security.
Software information security risks are vulnerabilities that can lead to software security incidents including
network intrusion or data loss. The goal of successful implementation of software information security is
to help minimize such hazards for the reduction of mishaps.
Procurement of information security-critical software should consider potential failures that could result in
a risk of loss of life, serious harm, or that could have widespread negative social impact.
Information security considerations in the acquisition of software include ensuring the identification and
management of hazards and their associated risks during system development and system sustainment.
Security requirements should cover both overt functional security and emergent systems characteristics and
properties. Abuse cases describe the system under attack.
Processes to produce secure software include at least two testing strategies for testing security functionality
with standard functional testing techniques, and risk-based security testing based on attack patterns and
threat models.
Vulnerabilities that can be exploited by malicious code should be reduced. Any international activities and
any plans for, or known, foreign cooperative development or sales of the system should be summarized.
An evaluation plan should be developed, describing how to evaluate software products and services
(including software-intensive systems) against the software information security criteria.
Privacy is the ability of an individual or group to seclude themselves or information about themselves and
thereby reveal themselves selectively. The boundaries and content of what is considered private differ
among cultures and individuals but share basic common themes. Privacy is sometimes related to
anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to
a person, it usually means there is something within them that is considered inherently special or personally
sensitive. Therefore, the degree to which private information is exposed depends on how the public will
receive this information, which differs between places and over time. Privacy partially intersects security,
including for instance the concepts of appropriate use, as well as protection, of information. Privacy may
also take the form of bodily integrity.
Information security means protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording, or destruction.
A threat is something that is a source of danger; it can be a cause of pain or inj ury or loss; e. g. ,
“earthquakes are a constant threat in Japan. ”
Threat protection is the process of keeping (something or someone) safe; the state of being safe.
49
Copyright © 201 6 IEEE. All rights reserved.
Tabl e B. 2—Recom men ded software i n form ati on secu ri ty assu ran ce acti vi ti es
Step 2. Defining the acquisition and 1. Develop software information security requirements to be included in the
Step 4. Preparing contract 1. Perform analysis to determine software information security evaluation
Step 5 . Evaluating proposals and 1. Confirm RFP responses include obj ective evidence of a supplier’ s ability to
selecting the supplier (5. 7) perform and manage for software information security.
2. Confirm software information security contract requirements cascade down
to subcontracted suppliers.
3. Confirm software information security subj ect matter experts support the
source selection to evaluate proposals.
4. Confirm negotiated software information security agreements are
incorporated into the final contract.
Step 6. Managing for supplier 1. Confirm software information security deliverables are identified in the work
50
Copyright © 201 6 IEEE. All rights reserved.
Annex C
(i n formati ve)
A topic that is of increasing interest in the acquisition of software is that of intellectual property rights.
Innovation in the development of software and software-intensive systems is time-consuming and
expensive. To recoup the expense of conceiving, designing, developing, and maintaining software, industry
relies on the ownership of intellectual property rights. The price of software acquired or developed under
contract should consider the appropriate or necessary division of the intellectual property rights between
the acquirer and the supplier.
The acquirer does not automatically “own” all of the rights to software it has paid a supplier to develop;
instead, the acquirer obtains the limited right to use the software and/or to provide or disclose the software
to a third party for use in accordance with the terms and conditions of a software license. Unauthorized
use, distribution, or disclosure of the software or unauthorized use of protected rights in the software may
lead to possible claims and damages, if they fall outside the rights defined in the license.
As part of the software acquisition process the licensing agreement should be carefully reviewed to help
ensure the acquirer obtains sufficient intellectual property rights to use and maintain the software for its
entire life cycle, including distribution, use and maintenance rights for third parties. Careful review of the
software license is necessary whether the acquirer plans to rely on the supplier to perform maintenance,
perform maintenance by the acquirer, or contract the maintenance to a third party.
Intellectual property rights can be a complicated topic, and software acquisition requires close co-
ordination among the technical, contracts, and legal staff to help ensure a successful acquisition of all the
rights necessary to use and maintain the software, not only by the acquirer but also for third parties.
51
Copyrig h t © 201 6 I EEE. Al l ri g h ts reserved.
An n ex D
(i n formati ve)
Acq u i s i ti on pl an g u i d el i n es
The purpose of this annex is to provide a template to guide the preparation of an acquisition plan (AP)
based on this recommended practice. (See 5 . 3 . )
The AP should contain the content as described in D. 1 through D. 8. The user of this annex may adopt any
format and numbering system for the AP. The AP section numbers listed in this annex are provided to
assist in the readability of this annex and are not mandatory for the user.
1. I n trodu ction
2. References
3. Defin i ti ons
4. Software acq u i si ti on overview
4. 1 . Defin i ti on of Acq u i ri n g Organi zation
4. 2. Sched u l e
4. 3. Resource su m m ary
4. 4. Responsi bi l i ti es
4. 5. Tools, techn i q u es, an d meth od s
5. Software acq u i si ti on process
5. 1 . Pl an n i n g th e software acq u i si ti on strategy
5. 2. Defin i n g th e software req u i remen ts
5. 3. I d enti fyin g potenti al su ppl i ers
5. 4. Preparin g contract req u i rem en ts
5. 5. Eval u ati n g proposals an d sel ectin g th e su ppl i er
5. 6. M anagi n g for su ppl i er performan ce
5. 7. Acceptin g th e software
5. 8. Eval u ati n g th e software
6. Software acq u i si ti on reportin g req u i rements
7. Software acq u i si ti on manag ement requ i rem ents
7. 1 . Anomal y resol u ti on an d reportin g
7. 2. Deviati on pol i cy
7. 3. Control proced u res
7. 4. Stan d ards, practices, an d con venti ons
7. 5. Performan ce trackin g
7. 6. Qu al i ty con trol of pl an
8. Software acq u i si ti on d ocu men tati on req u i rem en ts
F i g u re D . 1 —E xam pl e acq u i s i ti on pl an ou tl i n e
The AP should describe the acquirer’ s needs that are to be fulfilled via the acquisition of software.
c) Information regarding priority concerns (need-by dates, should not exceed costs, required industry
certifications, etc. )
52
Copyrig h t © 201 6 I EEE. Al l ri g h ts reserved.
53
Copyright © 201 6 IEEE. All rights reserved.
The AP should address the following topics for each software acquisition step:
54
Copyright © 201 6 IEEE. All rights reserved.
55
Copyright © 201 6 IEEE. All rights reserved.
Annex E
(i n formati ve)
Bibliography
Bibliographical references are resources that provide additional or helpful material but do not need to be
understood or used to implement this standard. Reference to these resources is made for informational use
only.
[B1 ] ANS I/PMI 99/001 /2008 , A Guide to the Proj ect Management Body of Knowledge (PMB OK
Guide)—Fourth Edition.
[B2] DACS Acquisition Process Improvement, Software Acquisition Gold Practice—Acquisition Process
Improvement.
[B3 ] GAO-04-3 93 , Stronger Management Practices Are Needed to Improve DOD’ s Software-Intensive
Weapon Acquisitions, March 2004.
[B4] IEEE Std 73 0, IEEE Standard for Software Quality Assurance Processes.
[B5 ] IEEE Std 83 0, IEEE Recommended Practice for Software Requirements Specifications.
[B6] IEEE Std 1 01 2, IEEE Standard for Software Verification and Validation.
[B7] IS O/IEC/IEEE 265 1 2, Systems and software engineering—Requirements for acquirers and suppliers
of user documentation.
[B9] ISO/IEC/IEEE 265 1 4, Systems and Software Engineering—Requirements for designers and
developers of user documentation.
[B1 0] ISO/IEC/IEEE 291 1 9, Systems and software engineering—S oftware testing (multiple parts).
[B1 3 ] ISO/IEC 1 63 26, Systems and software engineering—Life cycle processes—Proj ect management.
[B1 5 ] ISO/IEC 25 05 1 , Software engineering—S ystems and software Quality Requirements and Evaluation
(S QuaRE)—Requirements for Quality of Ready to Use Software Product (RUS P) and Instructions for
Testing.
[B1 7] ISO/IEC 291 1 0, Systems and Software Engineering—Lifecycle Profiles for Very Small Entities
(VSEs).
[B1 9] Pelgrin, Will, and Jim Routh, Application Security Procurement Language, SANS , February 201 0.
56
Copyrig h t © 201 6 I EEE. Al l ri g h ts reserved.
Buying standards PLUS is an updating service exclusive to BSI Subscribing Members. You will
automatically receive the latest hard copy of your standards when they’re
You can buy and download PDF versions of BSI publications, including British revised or replaced.
and adopted European and international standards, through our website at
bsigroup.com/shop, where hard copies can also be purchased. To f nd out more about becoming a BSI Subscribing Member and the bene f ts
of membership, please visit bsigroup.com/shop.
If you need international and foreign standards from other Standards Development
Organizations, hard copies can be ordered from our Customer Services team. With a Multi-User Network Licence (MUNL) you are able to host standards
publications on your intranet. Licences can cover as few or as many users as you
Copyright in BSI publications wish. With updates supplied as soon as they’re available, you can be sure your
documentation is current. For further information, email [email protected].
All the content in BSI publications, including British Standards, is the property
of and copyrighted by BSI or some person or entity that owns copyright in the
information used (such as the international standardization bodies) and has
Revisions
formally licensed such information to BSI for commercial publication and use. Our British Standards and other publications are updated by amendment or revision.
Save for the provisions below, you may not transfer, share or disseminate any We continually improve the quality of our products and services to benef t your
portion of the standard to any other person. You may not adapt, distribute, business. If you f nd an inaccuracy or ambiguity within a British Standard or other
commercially exploit, or publicly display the standard or any portion thereof in any BSI publication please inform the Knowledge Centre.
manner whatsoever without BSI’s prior written consent.
Useful Contacts
Storing and using standards Customer Services
Standards purchased in soft copy format: Tel: +44 345 086 9001
• A British Standard purchased in soft copy format is licensed to a sole named Email (orders): orders@bsigroup. com
user for personal or internal company use only. Email (enquiries): cservices@bsigroup. com
• The standard may be stored on more than 1 device provided that it is accessible Subscriptions
by the sole named user only and that only 1 copy is accessed at any one time. Tel: +44 345 086 9001
• A single paper copy may be printed for personal or internal company use only. Email: subscriptions@bsigroup. com
• Standards purchased in hard copy format:
Knowledge Centre
• A British Standard purchased in hard copy format is for personal or internal Tel: +44 20 8996 7004
company use only.
Email: knowledgecentre@bsigroup. com
• It may not be further reproduced – in any format – to create an additional copy.
This includes scanning of the document. Copyright & Licensing
If you need more than 1 copy of the document, or if you wish to share the Tel: +44 20 8996 7070
document on an internal network, you can save money by choosing a subscription Email: copyright@bsigroup. com
product (see ‘Subscriptions’).
BSI Group Headquarters
389 Chiswick High Road London W4 4AL UK