Contracting Officer's Representative(COR)
A government employee designated by the contracting officer to monitor contractor performance and serve as the technical point of contact.
Overview
The Contracting Officer's Representative (COR) is a government employee assigned to be the day-to-day technical liaison between the agency and the contractor. The COR monitors performance, reviews deliverables, and reports issues to the Contracting Officer — but critically, the COR cannot modify the contract or direct changes to scope.
Why It Matters in GovCon
The COR is usually your most frequent point of contact during contract execution. Building a strong working relationship with the COR leads to smoother performance, quicker issue resolution, and better past performance evaluations. However, always remember that only the CO has binding authority.
Key Details
- Appointment: CORs are formally designated in writing by the CO, with specific duties and limitations outlined.
- Responsibilities: Inspecting deliverables, monitoring schedules, reviewing invoices for accuracy, documenting performance, and reporting to the CO.
- Limitations: Cannot authorize work beyond the contract scope, approve additional funding, or make binding commitments.
- Training: CORs must complete required training and maintain their certification (FAC-COR levels I, II, or III depending on contract complexity).
Related Terms
- Contracting Officer (CO)
- Quality Assurance Surveillance Plan (QASP)
- Past Performance
- Performance Work Statement (PWS)
More Security Terms
The government official with the authority to enter into, administer, and terminate contracts on behalf of the U.S. government.
Federal law establishing a framework for securing federal information systems and protecting government data.
A government-wide program that provides a standardized approach to security assessment and authorization for cloud services.
A sensitivity designation for unclassified information that requires protection from unauthorized disclosure.
Policies and technologies that control who can access systems and data and what they can do.
Practices and controls that protect information and information systems from unauthorized access or harm.
Ready to Win More Contracts?
Use GovCon Data to find opportunities matched to your business and generate winning proposals with AI.