eOffer/eMod is a tool to submit contract offers and contract modification requests to GSA Federal Acquisition Service online.
You are required to have a digital certificate for access into the eOffer/eMod applications, to authenticate you against the authorized negotiators list for your offer/modification, and to sign the final contract/modification documents electronically. To obtain a digital certificate, please click on the link under the "About eOffer" section below titled (Digital Certificates). You will see links for the two providers authorized to sell the ACES Business Representative Identity Certificates.
Please be aware, that it will take between 7 and 14 days for a digital certificate to be issued after you have notarized you paperwork and submitted it to the company and that digital certificates must be updated every two (2) years. It is imperative that you as contractors keep your digital certificates current. An expired digital certificate will delay the ability to submit an electronic offer or modification.
Furthermore, please ensure that you back up your certificate. Check the eOffer user guide under the "Customer Assistance and Training" section to find the procedures for backing up your certificate. By backing up your certificate, if something happens to your computer, you will have a copy to import on your new computer.
Also remember you must add your name to the "Authorized Negotiators" list EXACTLY as it appears on your digital certificate. If the names DO NOT match EXACTLY you WILL NOT be able to access the eOffer/eMod applications.
Effective on January 1, 2013, you may now use your DOD ECA certificates to access the eOffer homepage. Select the Digital Certificate section below for additional details.
This is a U.S. General Services Administration Federal Government
computer system that is "FOR OFFICIAL USE ONLY". By using this system
you acknowledge: this system is subject to monitoring. Unauthorized
attempts to upload information, view information, or change information
of other vendor's data and attempts to bypass authentication or
authorization mechanisms to gain access into unauthorized areas of the
website and any other actions that would compromise the
confidentiality, integrity, and availability of this system are
strictly prohibited and may be punishable under the Computer Fraud and
Abuse Act of 1986 and the National Information Infrastructure
Protection Act