From ed3806a619f5a8ab26f96f814db4c7aff38ff456 Mon Sep 17 00:00:00 2001 From: massonpj Date: Wed, 17 Jun 2015 12:55:55 -0400 Subject: [PATCH] Add OSI license requriements MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Open source licenses are only licenses that comply with the Open Source Definition — in brief, they allow software to be freely used, modified, and shared. To be approved by the OSI, a license must go through the Open Source Initiative's license review process and as such is the industry and globally recognized standard for identifying open source software. --- _includes/techfar-online.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/techfar-online.md b/_includes/techfar-online.md index 0fe8875a..a273cedc 100644 --- a/_includes/techfar-online.md +++ b/_includes/techfar-online.md @@ -441,7 +441,7 @@ This text is to help illustrate how the Agile principles in this handbook may be - The contractor shall work with Agency stakeholders and technology professionals to properly understand business requirements and develop an industry best practice approach to technology solutions. - The contractor shall provide subject matter expertise for the [insert title] product suite including [insert applicable] coding languages. - **The contractor shall develop or configure, test, stage, and release business applications by applying iterative processes utilizing the proposed Agile methodology and a frequent release cycle.** -- The contractor shall provide customer-friendly open source solutions that provide ease of use for non-technical Government users. +- The contractor shall provide customer-friendly solutions which carry [OSI Approved Open Source Licenses](http://opensource.org/licenses) and provide ease of use for non-technical Government users. - The contractor shall ensure commercial best practices workflows shall come bundled with the solutions. - The contractor shall design solutions that offer role or attribute based identity management, authorization, and authentication across all business applications. - The contractor shall ensure all content is preserved according to federal record retention requirements and applications shall have the ability to protect personally identifiable information (PII).