SOLICITATION NOTICE
70 -- Avicenna MedRec Software Brand Name Only
- Notice Date
- 2/24/2026 8:26:03 AM
- Notice Type
- Presolicitation
- NAICS
- 541511
— Custom Computer Programming Services
- Contracting Office
- 244-NETWORK CONTRACT OFFICE 4 (36C244) PITTSBURGH PA 15215 USA
- ZIP Code
- 15215
- Solicitation Number
- 36C24426Q0336
- Response Due
- 3/6/2026 7:00:00 AM
- Archive Date
- 04/05/2026
- Point of Contact
- Ryan Hatfield, Contract Specialist, Phone: 412-860-7204
- E-Mail Address
-
Ryan.Hatfield@va.gov
(Ryan.Hatfield@va.gov)
- Awardee
- null
- Description
- Brand Name Only: Avicenna MedRec Software Pittsburgh VAMC Contractor shall provide enhanced software maintenance and software support for the Medication Reconciliation Tool for Pittsburgh VA Healthcare System for a base year with four (4) option years, exercisable at the Government s discretion. I. SITE LOCATIONS: Pittsburgh VA Healthcare System University Drive Pittsburgh, PA 15240 II. BACKGROUND: The computerized Patient Record System (CPRS) is a Veterans Health Information Systems and Technology Architecture (VistA) software application. CPRS enables care providers to create, read, and update patient information. The system can be used to order lab tests, medications, diets, radiology tests, procedures, track reactions to medications, request and track consults, enter progress notes, diagnoses, and treatments for each encounter, and enter discharge summaries. CPRS limitations include data filtering, sorting and trending in a format that helps the provider quickly view and evaluate the data. Providers have limited clinic time with increased documentation demands and patient load. An electronic medication reconciliation tool shall provide these functions by collating and trending data from across the VA s care continuums. III. SCOPE OF WORK: Contractor shall perform software maintenance support for the Medication Reconciliation (MedRec) Tool which includes 24/7 help desk support by phone and email; remote and on-site software fixes when issues are detected as well as version releases, patches, and updates on a quarterly basis. Enhanced software support plan coverage shall include: 1. 24/7 Telephone Support 2. 24/7 Accesses to IT product specialists 3. Remote Diagnostics Support 4. Safety Updates 5. Annual Performance Enhancing Updates IV. DESCRIPTIONS Hardware shall refer to monitors and modules manufactured by and supplied to customer by company. Software shall refer to software and/or firmware which is manufactured by and supplied to customer by company. Update shall refer to all modifications, changes, and enhancements which company elects to incorporate into and make part of the software and does not separately price or market. Upgrade shall refer to all modifications, changes, and enhancements that add features or functionality to Avicenna s software that Avicenna separately prices and markets. The Medication Reconciliation Tool (MedRec tool) works by combining all medications from multiple sources into a single easy to manage, master list. The medications are logically ordered so that the user can efficiently and accurately reconcile medications at both admission and discharge. The tool allows the provider to generate patient-friendly lists emphasizing new, changed, or discontinued medications. The tool is also being used in the outpatient setting in primary care and the emergency department to generate a pre-appointment medication list that allows the patient to play a role in providing an accurate medication list prior to their outpatient visit. The MedRec tool fully integrates with VistA/Computerized Patient Record System (CPRS). The tool assists with the VA-specific workflow for all health providers. The ability for the tool to interface with VistA/CPRS and incorporate VA-specific provider workflow is vital as the end product list will need to pull and push information between VistA/CPRS and the software tool in order to promote patient safety. The MedRec tool aggregates medications from multiple VA sites (i.e., other VA medical centers and outpatient clinics, inpatient medications, outpatient medications, suspended/inactive/ expired medications, non-VA medications, as well as remote medications found in the separate program VistA Web). The tool then constructs an intuitive single display of medications which allows for a complete, efficient and rational review of a patient s entire prescription medication history and is the basis for perfect reconciliation of these medications. This tool will allow physicians to have a complete picture of the patient s medical history so they can make more informed decisions on future treatment. The tool is both physician-centric and patient-centric because the generated patient-friendly medication list, that clearly specifies new, changed, or discontinued medications, which can be given to the patient if desired. Prior to possessing this capability, pharmacists and physicians using CPRS had to reconcile medications by frequently relying on incongruent medication lists, which increased the potential of committing a significant medication error and jeopardizing patient safety. Software maintenance support requirements include 24 hours per day, 365 days per year help desk support by phone and email; remote and on-site software fixes when issues are detected as well as version releases, patches and updates on a quarterly basis. V. HOURS OF SUPPORT SERVICES: 1. Hours of telephone support services are defined as 24 hours a day/7 days a week. Coverage shall include support in the operation, planned maintenance, and corrective maintenance of equipment covered by the agreement. This includes remote diagnostic support. 2. Hours of Accesses to IT Product Specialists are defined as 24 hours a day/7 days a week. Coverage shall include enhanced telephone support for the corrective maintenance of IT Equipment covered by the agreement. 3. Safety Update Services are defined as 7 days a week from 8:30 AM to 5:00 PM EST. Coverage shall include any travel, accommodation, labor, and software required to complete the safety update. VI. SUPPORT SERVICES: Contractor shall provide any travel, accommodation, labor, and software required to complete performance enhancing updates at the customer s site, 7 days a week from 8:30 AM to 5:00 PM EST, to include up to one (1) performance enhancing update per year for currently supported products. Contractor shall provide the Contracting Officer Representative (COR) a monthly progress report by the 5th day of each month throughout the period of performance. Progress Report shall contain maintenance or support that was provided that month, any upcoming software updates, any periodic fixes, and any downtime instances. VII. COMPETENCY OF PERSONNEL SERVICING EQUIPMENT: Contractor shall assure fully qualified staff are available to provide support services described in the statement of work. Upon request by the COR, the contractor shall provide written assurance of the competency of their personnel on the specific systems covered in this agreement. VIII. SAFETY REQUIREMENTS: In the performance of this contract, the Contractor shall take such safety precautions as the COR may determine to be reasonably necessary to protect the lives and health of occupants of the building. The COR shall notify the Contractor of any safety issues and the action necessary to correct these issues. Such notice, when served on the contractor or their representative at the work site shall be deemed sufficient for the corrective actions to be taken. If the contractor fails or refuses to comply promptly, the Contracting Officer (CO) may issue an order stopping all or part of the work, and hold the contractor in default. IX. INVOICING Contractor shall invoice monthly in arrears through the approved VA invoicing system. X. PERFORMANCE MONITORING Contractor performance shall be monitored through the progress report identified in section VI, through timely/accurate invoices, and through monitoring system operational uptime. The system shall be operational 96% of the time and downtime shall be measured through the work order process and service reports. XI. SECURITY CLAUSE During installation, training and maintenance, the vendor may have access to patient information such as full name, social security number and date of birth. As this is the case, the vendor must agree to the following regulations: APPENDIX C VA INFORMATION AND INFORMATION SYSTEM SECURITY AND PRIVACY LANGUAGE FOR INCLUSION IN CONTRACTS, AS APPROPRIATE GENERAL. This entire section applies to all acquisitions requiring any Information Security and Privacy language. Contractors, contractor personnel, subcontractors and subcontractor personnel will be subject to the same federal laws, regulations, standards, VA directives and handbooks, as VA personnel regarding information and information system security and privacy. VA INFORMATION CUSTODIAL LANGUAGE. This entire section applies to all acquisitions requiring any Information Security and Privacy language. The Government shall receive unlimited rights to data/intellectual property first produced and delivered in the performance of this contract or order (hereinafter contract ) unless expressly stated otherwise in this contract. This includes all rights to source code and all documentation created in support thereof. The primary clause used to define Government and Contractor data rights is FAR 52.227-14 Rights in Data General. The primary clause used to define computer software license (not data/intellectual property first produced under this contractor or order) is FAR 52.227-19, Commercial Computer Software License. Information made available to the contractor by VA for the performance or administration of this contract will be used only for the purposes specified in the service agreement, SOW, PWS, PD, and/or contract. The contractor shall not use VA information in any other manner without prior written approval from a VA Contracting Officer (CO). The primary clause used to define Government and Contractor data rights is FAR 52.227-14 Rights in Data General. VA information will not be co-mingled with any other data on the contractor s information systems or media storage systems. The contractor shall ensure compliance with Federal and VA requirements related to data protection, data encryption, physical data segregation, logical data segregation, classification requirements and media sanitization. VA reserves the right to conduct scheduled or unscheduled audits, assessments, or investigations of contractor Information Technology (IT) resources to ensure information security is compliant with Federal and VA requirements. The contractor shall provide all necessary access to records (including electronic and documentary materials related to the contracts and subcontracts) and support (including access to contractor and subcontractor staff associated with the contract) to VA, VA's Office Inspector General (OIG), and/or Government Accountability Office (GAO) staff during periodic control assessments, audits, or investigations. The contractor may only use VA information within the terms of the contract and applicable Federal law, regulations, and VA policies. If new Federal information security laws, regulations or VA policies become applicable after execution of the contract, the parties agree to negotiate contract modification and adjustment necessary to implement the new laws, regulations, and/or policies. The contractor shall not make copies of VA information except as specifically authorized and necessary to perform the terms of the contract. If copies are made for restoration purposes, after the restoration is complete, the copies shall be destroyed in accordance with VA Directive 6500, VA Cybersecurity Program and VA Information Security Knowledge Service. If a Veterans Health Administration (VHA) contract is terminated for default or cause with a business associate, the related local Business Associate Agreement (BAA) shall also be terminated and actions taken in accordance with VHA Directive 1605.05, Business Associate Agreements. If there is an executed national BAA associated with the contract, VA will determine what actions are appropriate and notify the contactor. The contractor shall store and transmit VA sensitive information in an encrypted form, using VA-approved encryption tools which are, at a minimum, Federal Information Processing Standards (FIPS) 140-2, Security Requirements for Cryptographic Modules (or its successor) validated and in conformance with VA Information Security Knowledge Service requirements. The contractor shall transmit VA sensitive information using VA approved Transport Layer Security (TLS) configured with FIPS based cipher suites in conformance with National Institute of Standards and Technology (NIST) 800-52, Guidelines for the Selection, Configuration and Use of Transport Layer Security (TLS) Implementations. The contractor s firewall and web services security controls, as applicable, shall meet or exceed VA s minimum requirements. Except for uses and disclosures of VA information authorized by this contract for performance of the contract, the contractor may use and disclose VA information only in two situations: (i) in response to a qualifying order of a court of competent jurisdiction after notification to VA CO (ii) with written approval from the VA CO. The contractor shall refer all requests for, demands for production of or inquiries about, VA information and information systems to the VA CO for response. Notwithstanding the provision above, the contractor shall not release VA records protected by Title 38 U.S.C. § 5705, Confidentiality of medical quality- assurance records and/or Title 38 U.S.C. § 7332, Confidentiality of certain medical records pertaining to drug addiction, sickle cell anemia, alcoholism or alcohol abuse or infection with Human Immunodeficiency Virus (HIV). If the contractor is in receipt of a court order or other requests for the above- mentioned information, the contractor shall immediately refer such court order or other requests to the VA CO for response. Information made available to the contractor by VA for the performance or administration of this contract or information developed by the contractor in performance or administration of the contract will be protected and secured in accordance with VA Directive 6500 and Identity and Access Management (IAM) Security processes specified in the VA Information Security Knowledge Service. Any data destruction done on behalf of VA by a contractor shall be done in accordance with National Archives and Records Administration (NARA) requirements as outlined in VA Directive 6300, Records and Information Management, VA Handbook 6300.1, Records Management Procedures, and applicable VA Records Control Schedules. The contractor shall provide its plan for destruction of all VA data in its possession according to VA Directive 6500 and NIST 800-88, Guidelines for Media Sanitization prior to termination or completion of this contract. If directed by the COR/CO, the contractor shall return all Federal Records to VA for disposition. Any media, such as paper, magnetic tape, magnetic disks, solid state devices or optical discs that is used to store, process, or access VA information that cannot be destroyed shall be returned to VA.The contractor shall hold the appropriate material until otherwise directed by the Contracting Officer s Representative (COR) or CO. Items shall be returned securely via VA-approved methods. VA sensitive information must be transmitted utilizing VA-approved encryption tools which are validated under FIPS 140-2 (or its successor) and NIST 800-52. If mailed, the contractor shall send via a trackable method (USPS, UPS, FedEx, etc.) and immediately provide the COR/CO with the tracking information. Self-certification by the contractor that the data destruction requirements above have been met shall be sent to the COR/CO within 30 business days of termination of the contract. All electronic storage media (hard drives, optical disks, CDs, back-up tapes, etc.) used to store, process or access VA information will not be returned to the contractor at the end of lease, loan, or trade-in. Exceptions to this paragraph will only be granted with the written approval of the VA CO. ACCESS TO VA INFORMATION AND VA INFORMATION SYSTEMS. This section applies when any person requires access to information made available to the contractor by VA for the performance or administration of this contract or information developed by the contractor in performance or administration of the contract. A contractor/subcontractor shall request logical (technical) or physical access to VA information and VA information systems for their employees and subcontractors only to the extent necessary to perform the services specified in the solicitation or contract. This includes indirect entities, both affiliate of contractor/subcontractor and agent of contractor/subcontractor. Contractors and subcontractors shall sign the VA Information Security Rule of Behavior (ROB) before access is provided to VA information and information systems (see Section 4, Training, below). The ROB contains the minimum user compliance requirements and does not supersede any policies of VA facilities or other agency components which provide higher levels of protection to VA s information or information systems. Users who require privileged access shall complete the VA elevated privilege access request processes before privileged access is granted. All contractors and subcontractors working with VA information are subject to the same security investigative and clearance requirements as those of VA appointees or employees who have access to the same types of information. The level and process of background security investigations for contractors shall be in accordance with VA Directive and Handbook 0710, Personnel Suitability and Security Program. The Office of Human Resources and Administration/Operations, Security and Preparedness (HRA/OSP) is responsible for these policies and procedures. Contract personnel who require access to classified information or information systems shall have an appropriate security clearance. Verification of a Security Clearance shall be processed through the Special Security Officer located in HRA/OSP. Contractors shall conform to all requirements stated in the National Industrial Security Program Operating Manual (NISPOM). All contractors and subcontractors shall comply with conditions specified in VAAR 852.204-71(d); Contractor operations required to be in United States. All contractors and subcontractors working with VA information must be permanently located within a jurisdiction subject to the law of the United States or its Territories to the maximum extent feasible. If services are proposed to be performed abroad the contractor must state where all non-U.S. services are provided. The contractor shall deliver to VA a detailed plan specifically addressing communications, personnel control, data protection and potential legal issues. The plan shall be approved by the COR/CO in writing prior to access being granted. The contractor shall notify the COR/CO in writing immediately (no later than 24 hours) after personnel separation or occurrence of other causes. Causes may include the following: Contractor/subcontractor personnel no longer has a need for access to VA information or VA information systems. Contractor/subcontractor personnel are terminated, suspended, or otherwise has their work on a VA project discontinued for any reason. Contractor believes their own personnel or subcontractor personnel may pose a threat to their company s working environment or to any company- owned property. This includes contractor-owned assets, buildings, confidential data, customers, employees, networks, systems, trade secrets and/or VA data. Any previously undisclosed changes to contractor/subcontractor background history are brought to light, including but not limited to changes to background investigation or employee record. Contractor/subcontractor personnel have their authorization to work in the United States revoked. Agreement by which contractor provides products and services to VA has either been fulfilled or terminated, such that VA can cut off electronic and/or physical access for contractor personnel. In such cases of contract fulfillment, termination, or other causes; the contractor shall take the necessary measures to immediately revoke access to VA network, property, information, and information systems (logical and physical) by contractor/subcontractor personnel. These measures include (but are not limited to): removing and then securing Personal Identity Verification (PIV) badges and PIV Interoperable (PIV-I) access badges, VA-issued photo badges, credentials for VA facilities and devices, VA-issued laptops, and authentication tokens. Contractors shall notify the appropriate VA COR/CO immediately to initiate access removal. Contractors/subcontractors who no longer require VA accesses will return VA- issued property to VA. This property includes (but is not limited to): documents, electronic equipment, keys, and parking passes. PIV and PIV-I access badges shall be returned to the nearest VA PIV Badge Issuance Office. Once they have had access to VA information, information systems, networks and VA property in their possessions removed, contractors shall notify the appropriate VA COR/CO. TRAINING. This entire section applies to all acquisitions which include section 3. All contractors and subcontractors requiring access to VA information and VA information systems shall successfully complete the following before being granted access to VA information and its systems: VA Privacy and Information Security Awareness and Rules of Behavior course (Talent Management System (TMS) #10176) initially and annually thereafter. Sign and acknowledge (electronically through TMS #10176) understanding of and responsibilities for compliance with the Organizational Rules of Behavior, relating to access to VA information and information systems initially and annually thereafter; and Successfully complete any additional cyber security or privacy training, as required for VA personnel with equivalent information system or information access [to be defined by the VA program official and provided to the VA CO for inclusion in the solicitation document i.e., any role- based information security training]. The contractor shall provide to the COR/CO a copy of the training certificates and certification of signing the Organizational Rules of Behavior for each applicable employee within five days of the initiation of the contract and annually thereafter, as required. Failure to complete the mandatory annual training is grounds for suspension or termination of all physical or electronic access privileges and removal from work on the contract until such time as the required training is complete. SECURITY INCIDENT INVESTIGATION. This entire section applies to all acquisitions requiring any Information Security and Privacy language. The contractor, subcontractor, their employees, or business associates shall immediately (within one hour) report suspected security / privacy incidents to the VA OIT s Enterprise Service Desk (ESD) by calling (855) 673-4357 (TTY: 711). The ESD is OIT s 24/7/365 single point of contact for IT-related issues. After reporting to the ESD, the contractor, subcontractor, their employees, or business associates shall, within one hour, provide the COR/CO the incident number received from the ESD. To the extent known by the contractor/subcontractor, the contractor/ subcontractor's notice to VA shall identify the information involved and the circumstances surrounding the incident, including the following: The date and time (or approximation of) the Security Incident occurred. The names of individuals involved (when applicable). The physical and logical (if applicable) location of the incident. Why the Security Incident took place (i.e., catalyst for the failure). The amount of data belonging to VA believed to have been compromised. The remediation measures the contractor is taking to ensure no future incidents of a similar nature. After the contractor has provided the initial detailed incident summary to VA, they will continue to provide written updates on any new and relevant circumstances or facts they discover. The contractor, subcontractor, and their employes shall fully cooperate with VA or third-party entity performing an independent risk analysis on behalf of VA. Failure to cooperate may be deemed a material breach and grounds for contract termination. VA IT contractors shall follow VA Handbook 6500, Risk Management Framework for VA Information Systems VA Information Security Program, and VA Information Security Knowledge Service guidance for implementing an Incident Response Plan or integrating with an existing VA implementation. In instances of theft or break-in or other criminal activity, the contractor/subcontractor must concurrently report the incident to the appropriate law enforcement entity (or entities) of jurisdiction, including the VA OIG, and the VA Office of Security and Law Enforcement. The contractor, its employees, and its subcontractors and their employees shall cooperate with VA and any law enforcement authority responsible for the investigation and prosecution of any possible criminal law violation(s) associated with any incident. The contractor/subcontractor shall cooperate with VA in any civil litigation to recover VA information, obtain monetary or other compensation from a third party for damages arising from any incident, or obtain injunctive relief against any third party arising from, or related to, the incident. The contractor shall comply with VA Handbook 6500.2, Management of Breaches Involving Sensitive Personal Information, which establishes the breach management policies and assigns responsibilities for the oversight, management and reporting procedures associated with managing of breaches. With respect to unsecured Protected Health Information (PHI), the contractor is deemed to have discovered a data breach when the contractor knew or should have known of breach of such information. When a business associate is part of VHA contract, notification to the covered entity (VHA) shall be made in accordance with the executed BAA. If the contractor or any of its agents fails to protect VA sensitive personal information or otherwise engages in conduct which results in a data breach involving any VA sensitive personal information the contractor/subcontractor processes or maintains under the contract; the contractor shall pay liquidated damages to the VA as set forth in clause 852.211-76, Liquidated Damages Reimbursement for Data Breach Costs. INFORMATION SYSTEM DESIGN AND DEVELOPMENT. This entire section applies to information systems, systems, major applications, minor applications, enclaves, and platform information technologies (to include the subcomponents of each) designed or developed for or on behalf of VA by any non-VA entity. Information systems designed or developed on behalf of VA at non-VA facilities shall comply with all applicable Federal law, regulations, and VA policies. This includes standards for the protection of electronic Protected Health Information (PHI), outlined in 45 C.F.R. Part 164, Subpart C and information and system security categorization level designations in accordance with FIPS 199, Standards for Security Categorization of Federal Information and Information Systems and FIPS 200, Minimum Security Requirements for Federal Information Systems. Baseline security controls shall be implemented commensurate with the FIPS 199 system security categorization (reference VA Handbook 6500 and VA Trusted Internet Connections (TIC) Architecture). Contracted new developments require creation, testing, evaluation, and authorization in compliance with VA Assessment and Authorization (A&A) processes in VA Handbook 6500 and VA Information Security Knowledge Service to obtain an Authority to Operate (ATO). VA Directive 6517, Risk Management Framework for Cloud Computing Services, provides the security and privacy requirements for cloud environments. VA IT contractors, subcontractors and third-party service providers shall address and/or integrate applicable VA Handbook 6500, VA Handbook 6517, Risk Management Framework for Cloud Computing Services and Information Security Knowledge Service specifications in delivered IT systems/solutions, products and/or services. If systems/solutions, products and/or services do not directly match VA security requirements, the contractor shall work though the COR/CO to identify the VA organization responsible for governance or resolution. Contractors shall comply with FAR 39.1, specifically the prohibitions referenced. The contractor (including producers and resellers) shall comply with Office of Management and Budget (OMB) M-22-18 and M-23-16 when using third-party software on VA information systems or otherwise affecting the VA information. This includes new software purchases and software renewals for software developed or modified by major version change after the issuance date of M- 22-18 (September 14, 2022). The term software includes firmware, operating systems, applications and application services (e.g., cloud-based software), as well as products containing software. The contractor shall provide a self- attestation that secure software development practices are utilized as outlined by Executive Order (EO)14028 and NIST Guidance. A third-party assessment provided by either a certified Federal Risk and Authorization Management Program (FedRAMP) Third Party Assessor Organization (3PAO) or one approved by the agency will be acceptable in lieu of a software producer's self- attestation. The contractor shall ensure all delivered applications, systems and information systems are compliant with Homeland Security Presidential Directive (HSPD) 12 and VA Identity and Access management (IAM) enterprise identity management requirements as set forth in OMB M-19-17, M-05-24, FIPS 201-3, Personal Identity Verification (PIV) of Federal Employees and Contractors (or its successor), M-21-31 and supporting NIST guidance. This applies to Commercial Off-The-Shelf (COTS) product(s) that the contractor did not develop, all software configurations and all customizations. The contractor shall ensure all contractor delivered applications and systems provide user authentication services compliant with VA Handbook 6500, VA Information Security Knowledge Service, IAM enterprise requirements and NIST 800-63, Digital Identity Guidelines, for direct, assertion-based authentication and/or trust-based authentication, as determined by the design and integration patterns. Direct authentication at a minimum must include Public Key Infrastructure (PKI) based authentication supportive of PIV and/or Common Access Card (CAC), as determined by the business need and compliance with VA Information Security Knowledge Service specifications. The contractor shall use VA authorized technical security baseline configurations and certify to the COR that applications are fully functional and operate correctly as intended on systems in compliance with VA baselines prior to acceptance or connection into an authorized VA computing environment. If the Defense Information Systems Agency (DISA) has created a Security Technical Implementation Guide (STIG) for the technology, the contractor may configure to comply with that STIG. If VA determines a new or updated VA configuration baseline needs to be created, the contractor shall provide required technical support to develop the configuration settings. FAR 39.1 requires the population of operating systems and applications includes all listed on the NIST National Checklist Program Checklist Repository. The standard installation, operation, maintenance, updating and patching of software shall not alter the configuration settings from VA approved baseline configuration. Software developed for VA must be compatible with VA enterprise installer services and install to the default program files directory with silently install and uninstall. The contractor shall perform testing of all updates and patching prior to implementation on VA systems. Applications designed for normal end users will r...
- Web Link
-
SAM.gov Permalink
(https://sam.gov/workspace/contract/opp/77c8ca72cc2342f5a23f02c1e8634f84/view)
- Place of Performance
- Address: Pittsburgh VAMC - University Drive University Drive, Pittsburgh 15240
- Zip Code: 15240
- Zip Code: 15240
- Record
- SN07725821-F 20260226/260224230043 (samdaily.us)
- Source
-
SAM.gov Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's SAM Daily Index Page |