Challenge.gov is a federal government hosted platform on which agencies launch, manage and track performance of open innovation competitions, also known as challenge competitions, crowdsourcing, and ideation. The site and platform allow for broad promotion and access to all listed federally-sponsored competitions.
Government challenge managers must use an OMB MAX authorized login to access the system.
Public users of Challenge.gov do so in order to submit entries to the competitions and to manage their profiles. Only a username and valid email are required to register.
The use of Challenge.gov is subject to the federal government and the General Services Administration’s guidelines for website access. Users should treat this site as they would any government-owned and -operated website.
Challenge.gov requires that an agency manager use a verifiable dot-gov or dot-mil email address. These administrators are responsible for obtaining proper agency approval for acquiring and provisioning legal authority under which the competition will be administered.
Remember that official on-line activities are subject to the ethics regulations of each agency as well as other federal and agency laws, policies, and regulations.
All agency administrators/managers must go through OMB MAX for a valid login that will be used to access the challenge.gov site. All members have a valid government email address and never share passwords, not even with the Site Administrators. Challenge.gov will never ask a member for his or her password.
Site administrators will remove access to the back-end and any system information when employees are terminated or no longer need to have access to the site.
The site is intended for use by federal government agencies to manage competitions and the public to participate in the competitions. Site visitors who are not registered/authorized users can access site pages that do not require authorized access. Authorized access and credentials to the site should be protected as they would for any secured site. Attempts to access the site are reviewed, recorded and logged, including all activity once access has been granted.