84
BID RESPONSE STATE INFORMATION TECHNOLOGY AGENCY (PTY) LTD Registration number 1999/001899/07 APPENDIX 2 - BIDDERS RESPONSE TEMPLATE Bidder Name BID NUMBER PUBLISHED DATE: CLOSING DATE: CLOSING TIME: 11:00 AM BID VALIDITY PERIOD: 120 days (commencing from the BID Closing Date) 1 of 84 CONFIDENTIAL

1… · Web vie

  • Upload
    lyhanh

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1… · Web vie

BID RESPONSE

STATE INFORMATION TECHNOLOGY AGENCY (PTY) LTDRegistration number 1999/001899/07

APPENDIX 2 - BIDDERS RESPONSE TEMPLATE

Bidder Name

BID NUMBER

PUBLISHED DATE:

CLOSING DATE:

CLOSING TIME: 11:00 AM

BID VALIDITY PERIOD: 120 days (commencing from the BID Closing Date)

1 of 62CONFIDENTIAL

Page 2: 1… · Web vie

2 of 62CONFIDENTIAL

Page 3: 1… · Web vie

Contents1. EXECUTIVE SUMMARY.................................................................................................................................... 4

2. TECHNICAL OVERVIEW.................................................................................................................................... 5

ANNEX A.1: TECHNICAL MANDATORY, FUNCTIONALITY AND PROOF OF CONCEPT REQUIREMENTS......................6

3. TECHNICAL MANDATORY................................................................................................................................ 6

3.1. INSTRUCTION AND EVALUATION CRITERIA....................................................................................................63.2. TECHNICAL MANDATORY REQUIREMENTS.....................................................................................................63.3. DECLARATION OF COMPLIANCE.....................................................................................................................9

4. TECHNICAL FUNCTIONALITY.......................................................................................................................... 10

4.1. COMMERCIAL REQUIREMENT......................................................................................................................114.2. CORE SYSTEM PRODUCTS.............................................................................................................................124.3. CORE FUNCTIONAL PRODUCTS.....................................................................................................................154.4. CORE BUSINESS PRODUCTS..........................................................................................................................214.5. PRODUCT PERFORMANCE REQUIREMENTS..................................................................................................314.6. PROJECT DELIVERY........................................................................................................................................394.7. PRODUCTION SUPPORT................................................................................................................................50ANNEX A.2: SPECIAL CONDITIONS OF CONTRACT (SCC).........................................................................................55

5. SPECIAL CONDITIONS OF CONTRACT.............................................................................................................. 55

5.1. INSTRUCTION...............................................................................................................................................555.2. SPECIAL CONDITIONS OF CONTRACT............................................................................................................555.3. DECLARATION OF ACCEPTANCE...................................................................................................................62ANNEX A.3: COSTING AND PRICING.......................................................................................................................63

6. COSTING AND PRICING.................................................................................................................................. 64

6.1. COSTING AND PRICING EVALUATION...........................................................................................................646.2. COSTING AND PRICING CONDITIONS............................................................................................................646.3. DECLARATION OF ACCEPTANCE...................................................................................................................656.4. BID PRICING SCHEDULE................................................................................................................................66ANNEX A.4: TECHNICAL SCHEDULES.......................................................................................................................68

7. TECHNICAL SCHEDULES................................................................................................................................. 68

7.1. LOCATION SCHEDULE...................................................................................................................................68ANNEX A.5: TERMS AND DEFINITIONS...........................................................................................................................69

8. ABBREVIATIONS............................................................................................................................................ 69

9. DEFINITIONS................................................................................................................................................. 69

ANNEX A.6: BIDDER SUBSTANTIATING EVIDENCE..................................................................................................70

ANNEX B: LOCAL CONTENT REQUIREMENTS (SBD 6.2)......................................................................................71

3 of 62CONFIDENTIAL

Page 4: 1… · Web vie

1. Executive Summary

4 of 62CONFIDENTIAL

Page 5: 1… · Web vie

2. TECHNICAL OVERVIEW

5 of 62CONFIDENTIAL

Page 6: 1… · Web vie

ANNEX A.1: TECHNICAL MANDATORY, FUNCTIONALITY AND PROOF OF CONCEPT REQUIREMENTS

6. TECHNICAL MANDATORY

6.1. INSTRUCTION AND EVALUATION CRITERIA

(1) The bidder must comply with ALL the requirements by providing substantiating evidence in the form of documentation or information, failing which it will be regarded as “NOT COMPLY”.

(2) The bidder must provide a unique reference number (e.g. binder/folio, chapter, section, page) to locate substantiating evidence in the bid response. During evaluation, DBE reserves the right to treat substantiation evidence that cannot be located in the bid response as “NOT COMPLY”.

(3) The bidder must complete the declaration of compliance as per section 6.3 below by marking with an “X” either “COMPLY”, or “NOT COMPLY” with ALL of the technical mandatory requirements, failing which it will be regarded as “NOT COMPLY”.

(4) The bidder must comply with ALL the TECHNICAL MANDATORY REQUIREMENTS in order for the bid to proceed to the next stage of the evaluation.

6.2. TECHNICAL MANDATORY REQUIREMENTS

TECHNICAL MANDATORY REQUIREMENTS Substantiating evidence of compliance(used to evaluate bid)

Evidence reference (to be completed by bidder)

6.2.1 BIDDER CERTIFICATION / AFFILIATION REQUIREMENTS

The bidder must be an OSM or a registered OSM partner of the proposed COTS software.

Provide a copy of a valid letter from OSM indicating, (a) the bidder’s name, (b) the bidder’s OSM partner level/grade, (c) date the partnership was established, and (d) information stating that the partnership is valid at time of bid.

Note: All letters, certificates or licenses must be in writing, dated, signed and on a letterhead of the entity that issued to letter.

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

6.2.2 BIDDER EXPERIENCE AND CAPABILITY REQUIREMENTS

Provide 2 letters of affirmation (or an affidavit to this effect) from Business or Government customers to whom the project or service

<provide unique reference to locate

6 of 62CONFIDENTIAL

Page 7: 1… · Web vie

TECHNICAL MANDATORY REQUIREMENTS Substantiating evidence of compliance(used to evaluate bid)

Evidence reference (to be completed by bidder)

The bidder must have designed and implemented the following solution components to at least two (2) customers during the past three (3) years:

Master data management;

Workflow engine;

Business rules engine;

User and system administration;

Financial management;

Document management;

Property and Asset management;

Task and schedule management;

Case management; and

Reporting and dash-boarding

NB: All the aforementioned components may not necessarily have been implemented at one customer solution.

was delivered. Each letter must be dated, signed and on a letterhead of the customer that indicating:(a) The customer Company name and physical address;

(b) Customer contact person’s name, telephone number and email address;

(c) For a Business customer, the Company Registration Number as registered with Companies and Intellectual Property Commission (CIPC);

(d) Which of following components that was implemented at each customer must be included:

Master data management;

Workflow engine;

Business rules engine;

User and system administration;

Financial management;

Document management;

Property and Asset management;

Task and schedule management;

Case management; and

Reporting and dash-boarding; and

(e) Project Start and End Date.

substantiating evidence in the bid response – see Annex A.7>

6.2.3 LETTER OF GUARANTEE The bidder must provide an original bank official letter confirming the <provide unique

7 of 62CONFIDENTIAL

Page 8: 1… · Web vie

TECHNICAL MANDATORY REQUIREMENTS Substantiating evidence of compliance(used to evaluate bid)

Evidence reference (to be completed by bidder)

The bidder must provide a Letter of Guarantee from one of the major banks reflecting the bidder’s financial access to capital equating to the value of the project.

bidders’ access to capital equating to the value of the bid.

NB: The letter must NOT include the rand value but must include confirmation to the access to the bid capital

reference to locate substantiating evidence in the bid response – see Annex A.7>

6.3. DECLARATION OF COMPLIANCE

Comply Not ComplyThe bidder declares by indicating with an “X” in either the “COMPLY” or “NOT COMPLY” column that –

(a) The bid complies with each and every TECHNICAL MANDATORY REQUIREMENT as specified in SECTION 6.2 above; AND

(b) Each and every requirement specification is substantiated by evidence as proof of compliance.

8 of 62CONFIDENTIAL

Page 9: 1… · Web vie

7. TECHNICAL FUNCTIONALITY

9 of 62CONFIDENTIAL

Page 10: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

7.1.

7.2.7.3. FUNCTIONALITY DEMONSTRATION REQUIREMENT

10 of 62CONFIDENTIAL

Page 11: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

7.4.

7.5.

The main objective of the SA-SAMS is to replace the current SA-SAMS systems and modernise the current processes. The bidder solution should be built on top of the Enterprise Technology Platform and contains the functionality that is aligned with the SA-SAMS core solution products as mentioned in Figure 2. The SA-SAMS solution also provides core functionalities such as a workflow engine, business rules engine, enterprise content and documents management, master data management as well as a multi-channel collaboration platform to support the entire school administration and management process end to end. The case study below must be read in conjunction with the entire RFB and presented with narration on self-execution file that is saved on an external media that can be viewed on a standard computer.

DO NOT include marketing and sale pitch information on this media.

The scope of the demonstration will be for the SA-SAMS basic functionality, This Use Case below must be developed on the Bidder system and saved on an external media device that will be added to the BID response. This demonstration will cover the:

Login of users on a web-based portal;

School, learner and educator registration;

Curriculum set-up and management;

Learner test results (input test scores, moderation, audit trails);

Reports;

Audit log; and

will be executable on a standard computer.

FUNCTIONALITY DEMONSTRATION USE CASE

11 of 62CONFIDENTIAL

Page 12: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

Thulisa Primary School is a new school and needs to be registered on the SA-SAMS system. The setup of the school must be administered by the School’s Administrator and queued in a workflow to be approved by the school principal and thereafter the Provincial Education Department representative for the school.

Use the data in the table below and setup the school for approval.

EMIS number 341362

School name Thulisa Primary School

Physical address 498 Simelane Street | Skhosana | Katlehong | Germiston

School contact number (011) 909 3507

Principal’s name Mr SE Kumalo

Principal’s contact number 079 794 4812

School information The Persal system is used to manage the school’s salary payment process.

Single shift operation.

Uses the nearby school’s woodwork facilities.

School details:

a) EMIS number: 162305

b) Windmill Park Primary School

c) 3253 East Central Road

12 of 62CONFIDENTIAL

Page 13: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

d) Windmill Park Ext 9

The Woodwork subject is taught at Windmill Park Primary School by the Windmill Park Primary School educators.

Examination authority is Provincial with the examination centre being Skhosana. The examination centre number assigned is 5459595.

Public school resides on the land of a church and is offered a wide range of subject fields.

The predominant language of learning, teaching and correspondence is IsiXhosa.

There are no multi-grade or remedial classes.

Thulisa Primary School is an ordinary school with grades from R to 7, with 3 classes per grade.

5-day cycle, with a maximum of 8 periods per day and a maximum of 60 mins.

The school term is as per the public-school terms for School year 2017.

The SGB has the authority to look after the property, building, grounds and hostels occupied by the school. In addition, the extra-mural activities and the subject choices according to the provincial policy are also defined and managed by the SGB.

Subjects offered:

o IsiXhosa First Language

o English Second Language

o Mathematics

o Life Orientation

o Technology

13 of 62CONFIDENTIAL

Page 14: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

Additional disciplinary codes for minor violations of general classroom discipline are:

o Copying of fellow learner’s homework.

o Disrupting learning environment.

The following nursery and primary schools feed into the school:

a) Bright Light Nursery school

b) Principal: Mrs A Knowledge

c) Contact number: 082 123 4567

d) Windmill Park Primary School

e) Principal: Mr RR Mashala

f) Contact number: 082 556 9540

Educators

Mrs HR Tshabalala

a) Specialised subjects: Mathematics and IsiXhosa

b) Instruction Language: IsiXhosa

c) ID: 8204190066084

d) Persal number: 123456

e) Race: Black

f) Teaching level: Primary

g) Years of experience: 5

h) Qualification: Professional degree

14 of 62CONFIDENTIAL

Page 15: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

Learners

Tebogo Khumalo

a) ID number: 0711140099084 | Male

b) Grade: 4 | Class: 4B

c) Educator: Mrs HR Tshabalala

d) Physical Address: 123 Mandela Road | Skhosana | Germiston

e) Parent: Mr SM Khumalo | Home number: 011 – 432 8765 | Contact number: 084 345 6789

Curriculum

Mathematics: Grade R to 7:

Numbers, calculations and relationships; Patterns, functions and algebra; Space and shapes; Measurement and Data handling

Life Orientation: Grade R to 7:

Health promotion

IsiXhosa: Grade R to 7:

Listening; Speaking; Reading and viewing; Writing; Thinking and reasoning and language structure and uses

UPDATE LEARNER RECORDS

A current learner, Tebogo Khumalo has moved into a new area closer to the school and Mrs Tshabalala has informed the principal of the learner’s new residential address and home contact number. The Principal has instructed the School Administrator to update the details accordingly on the system and process it for his approval, by queueing it in the workflow for the principal’s approval.

15 of 62CONFIDENTIAL

Page 16: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

New residential address 283 Simelane Street | Skhosana | Katlehong | Germiston

Home number 011 – 909 7753

UPDATE MONTHLY CURRICULUM COVERAGE

On a monthly basis, the educators are required to provide feedback on the coverage of the curriculum. The educators capture that progress and submit it for review. The school’s HODs review and approve the progress report in the workflow queue to ensure that information is accurate and complete before submitting the progress report to the principal for consumption. If the HOD declines the feedback, the feedback is queued back to the educator in the workflow and the educator is required to update the feedback accordingly and resubmit the progress report.

GENERATE AND PRINT LEARNER’S REPORT

The educators are required to submit the final results and learner progress reports must be generated automatically once approved in the workflow by the school’s HODs. Using the report template below, configure a report in the bidder’s system:

16 of 62CONFIDENTIAL

Page 17: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

17 of 62CONFIDENTIAL

Page 18: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

GENERATE AUDIT LOGS

A parent is disputing the learner’s final results and the school principal requires an audit log of the submitted final results of the learner for a specific period.

7.6. EVALUATION OF THE DEMONSTRATION

The bidder’s demonstration of the above use case will be evaluated by the following requirements:

7.6.1. WEB BASED PORTAL WITH ROLE-BASED REGISTRATION AND LOGIN FOR EASY USABILITY SYSTEM AIDED LOST CREDENTIAL MANAGEMENT

Demonstrate that the proposed product meets the following requirements:(a) Runs on the Android and iOS mobile platforms;

(b) Accessible via popular web browsers, namely Windows Edge, Internet Explorer, Google Chrome, Safari and FireFox.

(c) Transition seamlessly between mobile and desktop devices without losing any functionality;

(d) User must be able to recover/manage lost credential (user name or password);

(e) Access different functionality based on role;

Evaluation0 = None of the above requirements met, or no evidence/response provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.6.2. INTUITIVE, PROCESS DRIVEN Demonstrate that the proposed product meets the following requirements:

18 of 62CONFIDENTIAL

Page 19: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

SCHOOL, LEARNER AND EDUCATOR REGISTRATION

(c) Intuitive, flexible, user input driven data capturing for setting up and capturing the school information;

(d) Data pre-population from master data records;(e) Field validation rules (e.g. telephone number must be 10 numbers);(f) On-screen help guides;(g) Tooltips to guide the user.

Evaluation0 = None of the above requirements met, or no evidence/response provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.6.3. CURRICULUM SET-UP AND MANAGEMENT

Demonstrate that the proposed product meets the following requirements:(h) Setup school curriculum from master data;(i) Maintain the prescribed school curriculum from master data;(j) Allocate subjects to a learner;(k) Update the curriculum coverage;(l) Automated approval of the school curriculum.

Evaluation0 = None of the above requirements met, or no evidence/response provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.6.4. LEARNER TEST RESULTS (INPUT TEST SCORES, MODERATION, AUDIT TRAILS)

Demonstrate that the proposed product meets the following requirements:(m) Select report generation when viewing a learner record;(n) Viewing final report before saving;(o) Workflow learner results between educator and school HOD for moderation changes;

19 of 62CONFIDENTIAL

Page 20: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

(p) Return workflow learner results with moderation changes and re-route between educator and school HOD for approval;

(q) Email report as PDF to Parent (use own email address to show receipt of email).

Evaluation0 = None of the above requirements met, or no evidence/response provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.6.5. REPORTS AND DASHBOARDS Demonstrate that the proposed product meets the following requirements:(r) Dashboards available on landing page;(s) Display a trend analysis report on the dashboard.(t) Using a wizard driven process to customise a dashboard on the landing page;(u) Drill down capability for details on summarised dashboards;(v) Display a predicative analysis report on the dashboard.

Evaluation0 = None of the above requirements met, or no evidence/response provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.6.6. VIEWING OF AUDIT LOG AND HISTORY TRACKING

Demonstrate that the proposed product meets the following requirements:

(a) Login as an auditor and view all system activity logs;(b) Search using the learner name and date range as parameters;(c) View an audit trail for changes made to a learner record;(d) Save an audit trail report in a PDF format;(e) Log an automated incident to query the learner record discrepancy found.

20 of 62CONFIDENTIAL

Page 21: 1… · Web vie

TECHNICAL FUNCTIONALITY REQUIREMENTS

Substantiating evidence and evaluation criteria (used to evaluate bid)

Evaluation0 = None of the above requirements met, or no evidence/response provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

21 of 62CONFIDENTIAL

Page 22: 1… · Web vie

7.7. COMMERCIAL REQUIREMENTTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

7.7.1. BIDDER’S CUSTOMER BASEThe bidder must provide a description of their profile customer Base. Include data on local representation and localisation of planned solution if required.

Provide a sworn affidavit showing the total number of customers that the bidder has in the public sector.

Evaluation0 = Bidder has a customer base of 0 in the South African public sector;1 = Bidder has a customer base of ≥1 and <3 in the South African public

sector;3 = Bidder has a customer base of 3 in the South African public sector;5 = Bidder has a customer base of >3 in the South African public sector.

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

7.7.2. BIDDER’S ICT INDUSTRY EXPERIENCEThe bidder must provide a description of the Bidder’s experience in the ICT industry in South Africa.

Provide a sworn affidavit showing the number of years’ experience in the ICT Industry in South Africa.

Evaluation0 = Bidder has <1year experience in ICT;1 = Bidder has ≥1 and <5 years’ experience in ICT;3 = Bidder has 5 years’ experience in ICT5 = Bidder has >5 years’ experience in ICT

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

22 of 62CONFIDENTIAL

Page 23: 1… · Web vie

7.8. CORE SYSTEM PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

7.8.1. USER ADMINISTRATION

The system must be able to set different levels of access including read-only, read-write access. It must provide simplified interfaces to improve ease of access for all users.

The system must also provide configurable workflows which can simplify complex processes.

The following functionalities must be provided:

Permissions Granularity Field-Level Permissions Role-Based Interfaces Audit Logging User Task Lists Task Assignment Board/Management View

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:

a) Define user or group permissions to user role on a field-by-field basis.

b) Record all data updates, along with the data and the user who made the update, in an audit log and history log.

c) Provide “dashboard” views which summarise the user task currently relevant to each individual user.

d) Provides users with a “task list” when they sign onto the system.e) Users can assign tasks, such as reviews and approvals to other users.f) Provide a focused, role-based view for management and user group

members.g) Assign tasks to users based on rules and roles.h) Assign users to predefined but customisable user roles and profiles.i) Provide two different internal interfaces. One shows all system

functionality. The other shows only the tasks specifically assigned to the user.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b), (c) and (d) of the above requirements are met;3 = (a), (b), (c), (d), (e), (f) and (g) of the above requirements are met;5 = (a), (b), (c), (d), (e), (f), (g) and (h) or (i) are met.

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

7.8.2. MASTER DATA MANAGEMENT The bidder must provide proof of evidence (affidavit, screen dumps, letters <provide unique

23 of 62CONFIDENTIAL

Page 24: 1… · Web vie

7.8. CORE SYSTEM PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

Master Data represents the business objects, such as a school, Learning and Training Material, curriculum, results, etc., that are shared across more than one transactional application or module. This data represents the business objects around which the transactions are executed. This data also represents the key dimensions around which analytics are done. Master data creates a single version of the truth about these objects across the operational landscape. Business rules verification on fields

from clients, manuals and functional brochures/marketing material) to show that the proposed solution meets the following requirements that define the role-based access functionality:a) Profile the master data according to all possible sources (external and

internal) and the current state of data quality in each source;b) Consolidate the master data into a central repository and link it to all

participating applications and functional modules;c) Enabling synchronization of the central master data with enterprise

(DBE, PED and school) business processes and the connected applications and functional modules;

d) Govern the master data by enabling clean up, deduplication, and enrich data with information from 3rd party systems, all done to business rules;

e) Leverage the fact that a single version of the truth exists for all master data objects by supporting business intelligence systems and reporting.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

reference to locate substantiating evidence in the bid response – see Annex A.7>

7.8.3. BUSINESS RULES ENGINE

Business rules are defined separately and added to a new or existing function within the process flow of the workflow engine. These business rules are applied to fields

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:

a) Business rules must be defined separately and added to a new or existing function within the process flow of the workflow engine.

<provide unique reference to locate substantiating evidence in the bid response – see Annex

24 of 62CONFIDENTIAL

Page 25: 1… · Web vie

7.8. CORE SYSTEM PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

on the screens.

The Business Rules engine must have a configurable, modular “drag and drop” type graphical user interface.

b) Business rules must be applied to fields, processes and condition-based sub-processes.

c) The user must be able to copy and re-use existing processes.d) There must be versioning of business rules and applying multiple

versions of rules within the solution for processing.’e) The Business Rules engine must have a configurable, modular “drag

and drop” type graphical user interface.f) A wizard tool that converts policy documents into business rules.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) or (f) are met.

A.7>

7.8.4. WORKFLOW ENGINEThe Workflow Engine is required to empower users to thoroughly define and enforce the business process workflow within the SA-SAMS Solution. It maps the business process linkages of the functions and data elements. The Workflow Engine enables total control in designing system processes and business workflow.

The following features must be provided with this functionality:

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following:

a) The workflow engine features an integrated email and/or sms-based alert system, or any notification and communication module that defines the triggers, to facilitate the communication of different workflow events and notify workflow participants.

b) Reusable workflow processes.c) Create and immediately deploy business process workflows.d) A wide-variety of workflow templates have been setup to cater for

typical school management workflows.e) Workflows are designed with a web-based graphical flowchart tool

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

25 of 62CONFIDENTIAL

Page 26: 1… · Web vie

7.8. CORE SYSTEM PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

integrated email-based alert system notification and communication automatic status report generation summarise defined sets of actions dashboard depicting the progress of

the business workflows.

directly. Designing a workflow can be as easy as drag and-dropping data and control elements.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.9. CORE FUNCTIONAL PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

7

7.5

7.6

7.7

7.9.1. REPORTING AND DASHBOARDThe proposed bidder’s solution must feature Dashboard and Analytics Report capability that empowers users to cut across clusters of plain data to gain insight into the strategic and operational landscape on a real-time basis. The following minimum features must be included:

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:a) Allows the user search or filter to find a set of records;b) Allows the user quickly to view favourite reports on reporting

home page;c) Supports ad-hoc reports within the system, which can include and

filter by nearly any field displayed to users. These reports can include custom data columns, data sets, sorting, grouping, logos and headers;

d) Allows the user to expand and collapse levels of information from summary reports;

e) Allows the user to set up distribution list to email customised

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

26 of 62CONFIDENTIAL

Page 27: 1… · Web vie

7.9. CORE FUNCTIONAL PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

Searching and Filtering

Report Modification

Favourite Reports

Saving Modified Reports

Ad Hoc Reporting

Hierarchical Summaries

Data Reporting

Report Drill-Down

Attachment Searching

Emailing and sharing customised reports

reports with the option of the receiver to manage subscription to the email list;

f) Make updates to standard reports—for example, to change the columns displayed, or the grouping;

g) Allows the user to save reports that he/she creates or modify and email to a specific distribution list;

h) Allows the user to search the content of file attachments through integration with document management;

i) The solution must provide a tool to publish certain surveys with various information. This should be only on an exception basis where the data is not already on SA-SAMS and would eliminate the time-consuming process of submitting manual surveys.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b), (c) and (d) of the above requirements are met;3 = (a), (b), (c), (d), (e), (f) and (g) of the above requirements are met;5 = (a), (b), (c), (d), (e), (f), (g) and (h) or (i) are met.

7.9.2. DOCUMENT MANAGEMENTThis requirement is for all types of digital assets to be managed within the system. In conjunction with the workflow engine, complex processes and procedures must be defined to handle digital assets and automate document review and approval processes.

The following aspects of the document

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:a) All types of digital assets are managed within the system;b) Provide version control and document history tracking;c) Provide content searching capability for stored documents;d) Provide document review and approval capability;

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

27 of 62CONFIDENTIAL

Page 28: 1… · Web vie

7.9. CORE FUNCTIONAL PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

management functionality define the minimum requirements: version control history tracking searching capabilities document review and approval

e) Provide auto archiving of digital assets.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.9.3. TASK AND SCHEDULE MANAGEMENTThe system must enable the user to build the best schedule and school timetable with no conflict of time while satisfying learner requirements, curriculum coverage and educator availability.The following features must be provided with this functionality:

Integrated Timetable System generated timetable Timetable options and scenarios View schedules Timetable wizard set-up Schedule Management External timetable solutions Predefined Timetable templates

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:

a) The timetable must be fully integrated into the solution, this means that it must be able to utilise all the relevant data that has been captured into the system. This can include information on learners, educators, classes etc. to set up and manage the timetable.

b) The timetable functionality must guide the user through the process of completing the timetable, where there are issues in producing the timetable, the system must guide the user in the resolving of those issues.

c) The solution must provide users with a robust timetable that is able to cater for complex scenarios. This includes scenarios where schools do not have subject sets but allows learners to choose whichever subjects they would like to do in addition to the languages.

d) Provide predefined templates.

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

28 of 62CONFIDENTIAL

Page 29: 1… · Web vie

7.9. CORE FUNCTIONAL PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

e) Enable easy schedule manipulation, analysis and comparison, resource allocation, time allocation, on-going progress tracking, and multiple baseline analysis.

f) Generate timetables for individual learners and educators.g) Export individual timetables in PDF format;h) Supports integration with external timetable solutions.i) The user can view his/her timetable on a mobile device or

convert the entire timetable into a calendar of appointments.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b), (c) and (d) of the above requirements are met;3 = (a), (b), (c), (d), (e), (f) and (g) of the above requirements are met;5 = (a), (b), (c), (d), (e), (f), (g) and (h) or (i) are met.

7.9.4. FINANCIAL MANAGEMENTThe system must provide functionality for the school to manage its financial resources. Users must be able to upload approved budgets, track expenditure against the budget and process payments to service providers and suppliers. The system must also be able to generate financial reports in line with the GRAP accounting standards.The following features must be provided with this functionality:

Budgeting Method

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:

a) Allows the user to enter a budget amount for each school or sections of the school rolled up in the school budget and report on that information;

b) Able to generate financial statements as per GAAP accounting standard;

c) Allows the user to easily set-up multi-year budgeting;d) Allows the user to see what scheduled payments are due or

upcoming;

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

29 of 62CONFIDENTIAL

Page 30: 1… · Web vie

7.9. CORE FUNCTIONAL PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

Budget Reporting Hierarchical Budget Tracking Copying Budgets Budget splitting Multiyear Budgeting What-Ifs Ring-fenced budgeting Default Payment Scheduling Viewing Payment Schedules Paper Check Requests View Annual Scheduled Payments Schedule-Based Payment Viewing Third-Party Payee Support Electronic Payments Viewing Payments Made Accounting Integration Automated Payment Approval Process Payment Controls

e) Can split school budgets across more than one funding source for budgeting and payment-tracking purposes;

f) Allows the user to configure audit/security controls to ensure that only certain staff can change payment information with full audit history;

g) Supports an automated payment approval process with configurable workflow steps;

h) Integration with external accounting packages.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b), (c) and (d) of the above requirements are met;3 = (a), (b), (c), (d), (e) and (f) of the above requirements are met;5 = (a), (b), (c), (d), (e), (f) and (g) or (h) are met.

7.9.5. PROPERTY AND ASSET MANAGEMENTThe solution must provide functionality for the school to manage the asset management lifecycle from acquisition to disposal as well as to manage the school infrastructure maintenance. PEDs and DBE must be able to manage a portfolio of schools in relation to the needs of the education community.

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:

a) Create a portfolio of properties made up of the list of public schools in the country;

b) Provide analytic capability for decision-making and policy making regarding schools;

c) Provide ability to plan, deliver and manage the maintenance

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

30 of 62CONFIDENTIAL

Page 31: 1… · Web vie

7.9. CORE FUNCTIONAL PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

cycle for a portfolio of schools;d) Provide for schools to create and maintain an asset register;e) Provide for reporting capability and utilise the schools master

data to analyse trends and provide predictive analysis.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b) and (c) of the above requirements are met;3 = (a), (b), (c) and (d) of the above requirements are met;5 = (a), (b), (c), (d) and (e) are met.

7.9.6. CASE MANAGEMENTThe case management product is required to support a complex process that requires a combination of human tasks and electronic workflow, such as incoming applications to the school, a submitted claim by a service provider, a complaint by a parent or any stakeholder, school incidents, request for information/service, task assignment, etc. The solution uses the workflow, collaboration tools, storage of images and content, decisioning, and processing of electronic files or cases.

The bidder must provide proof of evidence (affidavit, screen dumps, letters from clients, manuals and functional brochures/marketing material) to show that the bidder’s solution meets the following requirements:a) The solution can record decisions on a matter and link these to the

status of a case;b) Users can register and assign cases to relevant role-players, group

or individuals for resolution;c) Assignees can update the status of the case through the resolution

process;d) Users can easily retrieve information on a case based selected

filters and produce reports.e) Users can define workflows for each case as well as triggers for

escalations and alerts;f) Enables the user to define custom categorisation for tracking and

reporting.

<provide unique reference to locate substantiating evidence in the bid response – see Annex A.7>

31 of 62CONFIDENTIAL

Page 32: 1… · Web vie

7.9. CORE FUNCTIONAL PRODUCTSTECHNICAL FUNCTIONAL REQUIREMENTS Substantiating evidence of compliance

(used to evaluate bid)Evidence reference (to be completed by bidder)

g) Enables the user to easily attach files to cases, including Word documents, Excel spread sheets or PDFs, voice notes, videos and stores attached documents in the database as objects rather than links.

h) A document size and type can be controlled including compression tools for attachments.

Evaluation:0 = None of the above requirements met, or no evidence/response

provided;1 = (a), (b), (c) and (d) of the above requirements are met;3 = (a), (b), (c), (d), (e) and (f) of the above requirements are met;5 = (a), (b), (c), (d), (e), (f) and (g) or (h) are met.

32 of 62CONFIDENTIAL

Page 33: 1… · Web vie

ANNEX A.3: SPECIAL CONDITIONS OF CONTRACT (SCC)

9 SPECIAL CONDITIONS OF CONTRACT

8.

9.

9.1. INSTRUCTION

(1) The successful supplier will be bound by Government Procurement: General Conditions of Contract (GCC) as well as this Special Conditions of Contract (SCC), which will form part of the signed contract with the successful Supplier. However, DBE reserves the right to include or waive the condition in the signed contract.

(2) The DBE reserves the right to –

a) to disqualify any Bidder who has been involved in the process or leading up to the process of the BID documents (URS development, ConOps development, technical documentation development).

b) Negotiate the conditions, or

c) Automatically disqualify a bidder for not accepting these conditions.

(3) In the event that the bidder qualifies the proposal with own conditions and does not specifically withdraw such own conditions when called upon to do so, DBE will invoke the rights reserved in accordance with subsection 8(2) above.

(4) The bidder must complete the declaration of acceptance as per section 9.3 below by marking with an “X” either “ACCEPT ALL” or “DO NOT ACCEPT ALL”, failing which the declaration will be regarded as “DO NOT ACCEPT ALL” and the bid will be disqualified.

9.2. SPECIAL CONDITIONS OF CONTRACT

(1) CONTRACTING CONDITIONS

(a) Formal Contract. The Supplier must enter into a formal written Contract (Agreement) with the National Education Collaboration Trust.

(b) Right of Award. DBE reserves the right to award the contract via the National Education Collaboration Trust for required goods or services to multiple Suppliers.

(c) Right to Audit. DBE reserves the right, before entering into a contract, to conduct or commission an external service provider to conduct a financial audit or probity to ascertain whether a qualifying bidder has the financial wherewithal or technical capability to provide the goods and services as required by this tender.

(2) BIDDER PRESENCE

33 of 62CONFIDENTIAL

Page 34: 1… · Web vie

The bidder must have presence in Gauteng, North West and Free State provinces to meet the Service Level conditions.

(3) INTEGRATION

The bidder solution must integrate with the DBE existing systems and external systems as prescribed in Table 1 - Key system integrations above.

(4) NON-DELIVERY AND LIQUIDATED DAMAGES

The bidder is required to pay liquidated damages of 8% (eight percent) of the contract value each month in the event that the Project phases are not delivered according to the agreed timeline and acceptance criteria for reasons within the bidders control unless otherwise agreed.

(5) DELIVERY ADDRESS. The bidder must deliver the required products or services at

Physical AddressNECT , c/o ELRC Offices, Ground Floor, 261 West Avenue, Centurion, Gauteng, 0046The DBE Sol Plaatje House, 222 Struben St, Pretoria Central, Pretoria, 0001SITA Centre, 459 John Vorster Dr, Centurion, Pretoria, 0048Free State – Various public schools and the PED office as stipulated in Section 11.1North West – Various public schools and the PED office as stipulated in Section 11.1

(a) Phase 1 NECT offices in Centurion full time and may be required to travel to the DBE offices in Pretoria and the SITA offices in Centurion. The Bidder needs to be aware of the potential risk of connectivity to the DBE environment that is hosted by SITA.

(b) Phase 2 The Bidder may be required to travel for deployment and support to the schools in the Free State and North West PEDs. The physical locations as specified in section 10.1.

(c) Phase 3 NECT offices in Centurion full time and may be required to travel to the DBE offices in Pretoria and the SITA offices in Centurion

(d) Phase 4 The bidder will be required to be located at the SITA Centre in Centurion.

(6) SCOPE OF WORK AND DELIVERY SCHEDULE

The DBE is seeking the supply, implementation, maintenance and support a Commercial off-the-shelf (COTS) innovative solution to replace the current South African School Administration and Management System (SA-SAMS) to the Department of Basic Education (DBE), North West Provincial Education, and Free State Provincial Education. This must be completed within a period of 28 months. For the North West and Free State implementations (including districts and schools) – please reference Appendix 1 - School’s List.xls.

34 of 62CONFIDENTIAL

Page 35: 1… · Web vie

Figure 8 – Delivery timelines

The bidder is responsible to perform the work as outlined in the following Work Breakdown Structure (WBS):

WBS Statement of Work Delivery Timeframe1. Phase 1

Supply and install the COTS software and use an Agile methodology to design, develop/configure, integrate and test the modernised SA-SAMS solution, as detailed in Section 7: Technical Functionality to replace the current SA-SAMS solution

Implement an instance of the modernised SA-SAMS system in a sandpit environment onto a new technology platform.

Provide the data migration requirements for the modernised SA-SAMS.

Develop the modernised SA-SAMS training material.

Ends 12 Months after contract is awarded

2. Phase 2

Train the users that will be conducting User Acceptance Testing (UAT).

Provide support and resolve all defects identified during UAT.

Develop rollout tool kits for each of the 3 types of schools (Type A: full internet connectivity, Type B: partial internet connectivity and Type C: no internet connectivity).

Test the rollout tool kits and resolve all identified defects and issues.

Implement the modernised SA-SAMS

Ends 4 months after the completion of Phase 1

35 of 62CONFIDENTIAL

Page 36: 1… · Web vie

WBS Statement of Work Delivery Timeframesolution into production and then rollout to the North West and Free State PEDs.

Provide training and support to the system users in the DBE, North West and Free State PEDs including schools and district offices in these two provinces.

Identify all data sources, test migration data and sign off data migration readiness.

Identify all infrastructure requirements, test infrastructure and sign off infrastructure Technical readiness.

3. Phase 3

Rollout the modernised SA-SAMS system using the tested toolkits in all type A, B and C schools in the North West and Free State Provincial Education Departments.

Rollout the modernised SA-SAMS system using the tested toolkits at the North West and Free State PED offices.

Rollout the modernised SA-SAMS system at DBE office.

Ends 2 months after completing Phase 2

4. Phase 4

Maintenance and support for 12 months;

Handover the system to SITA for ongoing support and maintenance.

Define the approach, processes, procedures, people and tools that will be used to support the solution for the national rollout.

Starts when phase 2 ends and is completed after 12 months

(7) SERVICES AND PERFORMANCE METRICS

The bidder is responsible to provide the following minimum services as specified in the Service Breakdown Structure (SBS). This will be defined as a part of the Service Level Agreement to be entered into with the successful bidder.

SBS Service Element Service Grade Service Level1. Call Centre Normal 8h x 5d, 07:30 – 16:30

2. Incident Response Normal Maximum 4 hours

3. Incident Restore Normal Maximum 8 hours

36 of 62CONFIDENTIAL

Page 37: 1… · Web vie

(7.1) SUPPORT METHODOLOGY

The strategy, detailed plans and procedures for the Maintenance and Support functions that are required for the successful operation of the SA-SAMS solution. To this end, the bidder must provide and deliver the following functions:

(a) Planning and Implementation;(b) Service Control (Helpdesk);(c) Service Level Agreements;(d) Change Control;(e) Version and Migration Control;(f) Release Control and Management; (g) User Administration;(h) Monitoring;(i) Performance Management;(j) Backup and Recovery Management; and(k) Licensing

(7.2) USER SUPPORT AND TRAINING

The user support and training strategy, approach and plan documents and delivery must address the following:

(l) Unlimited phone support as part of the yearly maintenance fee. (m) Online manuals and documentation with context sensitive and searchable help

content.(n) Classroom based as well as online user training.(o) Establishment and running of user support forums.

(7.3) IT OPERATIONAL MANAGEMENT AND SUPPORT

During the planning and implementation of the modernised solution, the operational maintenance and support must be taken into consideration.

(p) The bidder must ensure an international IT management and/or governance standard(s) will be followed in delivering IT operational management and support;

(q) The process and/or procedure that will be followed in delivering IT operational management and support; and

(r) The IT operational management and support task in the various phases of the project delivery.

(7.4) SERVICE CONTROL

The service control strategy, detailed plan and approach documents must address the following:

(s) the traditional “Help Desk” or “Service Desk” functions with the addition of handling service requests and User Administration and the integration of this function into DBE helpdesk within the initial 12-month period.

(t) The three levels of support providing Service Request Management, Problem Management, and User Administration aligned with DBE helpdesk.

(u) The levels of support provided for the entire period after delivery of the products/tools and the support options available.

37 of 62CONFIDENTIAL

Page 38: 1… · Web vie

(v) The categories and measures for various types of service requests and the process for improving “problem trends”.

(w) Illustrate how many users can be supported.(x) Illustrate how users with varying levels of sophistication can be supported.(y) Do you provide 24-hr service and support?(z) Do you provide a toll-free support number?(aa) Do you have a global support program?(bb) What is the charge for support after installation?(cc) Frequency of upgrades and new releases, and cost implications thereof.

(7.5) SERVICE LEVEL MANAGEMENT

The service level management strategy, detailed plan, approach, processes and procedures include a dashboard service level agreement must be provided by the bidder.

(7.6) CHANGE MANAGEMENT

The change management strategy, detailed plan and approach documents must address the following:

(dd) planning, communicating, coordinating, scheduling, monitoring, and controlling changes for the development, test and production environments.

(ee) Define the process that will protect the various environments from changes that are potentially disruptive or have unacceptable risk associated with them.

NB. For the sake of simplicity, the change control, migration control, version control and release control and management are grouped under this heading.

(7.7) SYSTEM ADMINISTRATION AND MANAGEMENT

The system administration and management strategy, detailed plan and approach documents must address the following:

(ff) the process and/or approach to system administration and management responsibilities for the solution after implementation.

(gg) the roles, responsibilities and tools for system administration and management of the solution after implementation. This must include data management, system administration and any other necessary roles.

(hh) the minimum daily tasks for each role involved in post-implementation system administration and management.

(8) SCOPE OF TECHNICAL SOLUTION

(8.1) CORE BUSINESS PRODUCTS

Refer to section Table 7 - SA-SAMS Manuals, for an understanding of the current SA-SAMS functionality.

(i) SCHOOL SETUP AND ADMINISTRATION

The product or solution must be used to register a school and manage the school’s profile, internal structure, general school management data on the system using an EMIS number

38 of 62CONFIDENTIAL

Page 39: 1… · Web vie

as a reference. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Register a new school.(b) Close an existing school.(c) Merge/split a school(s).(d) Setup school cycle information.(e) Update the school profile.(f) Manage the school class structure.(g) Setup a new school year.(h) Setup and maintain the school terms.(i) Maintain the feeder schools’ database.(j) Setup and maintain the school extra mural activities and sports.(k) Access data from the Early Childhood Development (ECD) system.

(ii) MANAGE CURRICULUM

The product or solution must be used to define and manage the school curriculum. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Manage the prescribed school curriculum.(b) Manage the curriculum aspects for each subject.(c) Define the curriculum content.(d) Lock the prescribed curriculum.(e) Manage learner assessment.(f) Capture learner test or examination marks.

(iii) MANAGE LEARNER

The product or solution must be used to manage learners within the school, transfer learner from one school to another and identify if a learner has been allocated a social grant with SASSA. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Admit a first-time learner to the school.(b) Transfer the learner from one school to another.(c) Archive learner and parent information.(d) Update learner and parent information.(e) Create, update and view learner attendance.(f) Manage the learner merit and demerit points.(g) Manage learner extra mural activities.(h) Manage learner nutrition.(i) Manage learner transportation.(j) Record and manage learner assessment.(k) Manage learner yearly promotions.(l) Allow learners to view the learning sets assigned to them.

(iv) MANAGE EDUCATOR/STAFF

39 of 62CONFIDENTIAL

Page 40: 1… · Web vie

The product or solution must be used to manage all staff’s personal information, the educator’s teaching experience and expertise, class allocation. The educator’s information must be verified with SACE and PERSAL. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Identify a teaching and non-teaching staff member.(b) Manage educator/staff information.(c) Manage the educator’s teaching experience.(d) Manage the educator/staff attendance.(e) Manage educator’s allocated classes.(f) Manage all teaching and non-teaching staff appraisals and performance management

processes including peers to complete an evaluation of the staff member.(g) View leave, apply, approve/decline leave in accordance with the leave policy.(h) Delegate tasks and inbox items to another user if out of office.

(v) MANAGE ACCOMMODATION

The product or solution must be used to effectively manage the school’s hostel accommodation for learners. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Hostel information -The system must manage various rooms types, occupancy, facilities in the rooms and assign multiple wardens for hostels

(b) Learner Admission - The system must manage the hostel admission process and provide accommodation to students based on academic performance. Students can apply online for hostel dormitory & other facilities.

(c) Room Reservation - The system must allow the configure room allocation rules and automatically allot rooms to learners based on room type and capacity. Manage room transfers and update room vacancy status in real-time.

(d) Fee Management - The system must calculate hostel fees, facility charges and fine. Allow the payment of fees at the time of admission before the due date, and issue receipts.

(e) Guests and Visitors - The system must record of authorised guests who are allowed to stay in hostels.

(f) Mess Management - The system must maintain the student data using mess services includes details of their meals and accounts. Automatically calculate mess charges, track mess expenditure and all other transactions.

(g) Attendance records - The system must be able to capture daily attendance records of students with in and out timings with the ability to track the missing learners in the hostel and notify parents by email and messaging.

(h) Inventory Management - The system must manage and control hostel assets efficiently and track hostel consumables and durables by location, value, date and lot codes using RFID, barcode scanners and mobile devices.

(vi) SCHOOL GOVERNING BODY (SGB) MANAGEMENT

40 of 62CONFIDENTIAL

Page 41: 1… · Web vie

The product or solution must be used to manage the School Governing Body activities in alignment to the South African Schools Act, this includes the management of the membership, policies, functions and training. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Manage SGB membership(b) Manage school safety committee rules and regulations.(c) Manage school finances (e.g. school maintenance).(d) Manage SGB training.(e) Manage SGB elections.

(vii) MANAGE TRANSPORTATION

The product or solution must be used to manage the transportation needs of the learners. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Manage school bus routes and ad-hoc bus trips.(b) Manage school bus ticketing and indemnity consent.(c) Manage school bus schedule.

(viii) INCIDENT MANAGEMENT

The product or solution must be used to manage the logging and resolution of incidents raised across the solution delivery. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Create new incidents.(b) Update an existing incident.(c) Process the incident, allowing the relevant users to provide input, investigations and

approvals or rejection feedback.(d) Close resolved incidents.

(ix) MANAGE SCHOOL INFRASTRUCTURE

The product or solution must be used to manage the school infrastructure. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Manage the school security.(b) Manage the school property.(c) Manage School Infrastructure Maintenance Schedule

(x) MANAGE LEARNING AND TEACHING SUPPORT MATERIAL

The product or solution must be used to manage the procurement, distribution and collection of learning and teaching support material. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Manage the procurement of LTSM.(b) Manage the distribution of LTSM.(c) Manage the cataloguing of LTSM.

41 of 62CONFIDENTIAL

Page 42: 1… · Web vie

(d) Manage the collection of LTSM.

(xi) MANAGE LIBRARY

The product or solution must be used to manage the procurement, rental and collection of library resources. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Manage the procurement of library resources.(b) Manage the rental of library resources.(c) Manage the cataloguing of library resources.(d) Manage the collection of library resources.(e) Manage the penalties of defaulters.(f) Manage library user records.

(xii) MANAGE COMMUNICATION

The product or solution must be used to manage the school communications and notifications to parents, school governing body and other stakeholders. This includes the pre-defined notifications that are sent throughout an activated school process. The system must have functionality to create letter and document templates, which include personalised text, mail-merged communications e.g. Emails and SMS to parents for parent teacher meetings, and custom formats, fonts and logos. It must integrate with Microsoft Word or an equivalent web-based word processor mail merge application. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Create a new communication.(b) Provide an update on an existing communication.(c) Manage the contact and recipient list.(d) Manage communication responses from recipients.(e) Manage the pre-defined notifications.(f) Allows the user to define a default format for printing application summaries, choosing

which fields to include as well as customising fonts, colours and logos.(g) Search capability for all forms of communication.(h) Allows the user to create letter templates in Microsoft Word or an equivalent web-

based word processor that include mail-merged information about learners, and allows customized fonts, colours and logos.

(i) Allows the user to print letters or summary reports, or bulk learner reports in a single step.

(j) Allows the user to view and customise individual letters before printing them.(k) Allows the user to attach documents to School Governing Body documents(l) Allows the user to send emails with attached reports via the system to a single

individual or group that meets criteria through a complex query.(m) Allows the user to create emails to individuals and groups based on templates that

include both standard text and “mail-merge” type inserted data.(n) Allows the user to attach files to emails.(o) Allows the user see email delivery statistics.

42 of 62CONFIDENTIAL

Page 43: 1… · Web vie

(p) Allows the user set up and send automatic emails based on certain events, such as online application submission.

(q) Allows the user to set up and send scheduled reminder emails to learners, parents and administrators.

(r) Emails are sent through the Bidder email service to protect you from blacklisting, and the Bidder takes a series of steps to ensure email is not flagged as spam, unless the client hosts the system themselves. In this case, emails are sent through clients’ email servers, potentially exposing them to blacklisting.

(s) The solution should offer a chat room and forum functionality that allows users to share experiences and assistance with communities of practice.

(t) This allows the user, based on their profile to automatically be part of a specific e-community or search and enter another chat room based on predefined rules.

(u) Allows online users to engage in online real-time discussion forums.(v) Allows users to engage in discussion via an online chat.(w) Allows users to view announcements in the ticker bar at the base of the system’s UI.

(xiii) MANAGE SCHOOL ASSETS

The product or solution must be used to manage the procurement, use, maintenance and disposal of the school assets. The bidder must configure and/or customise the proposed solution to meet the following requirements:

(a) Log the school assets.(b) Manage the school asset register.(c) Manage the school asset maintenance.(d) Manage the decommissioning/disposal of school assets.

(8.2) PRODUCT PERFORMANCE REQUIREMENTS

(i) SYSTEM PERFORMANCE

The product or solution must be designed to achieve low latency, flexibility, platform portability, scalability, high availability, data integrity and manageability. The Bidder will be required to design, test, implement and sign-off the following system performance requirement and functionalities:

(a) The proposed solution must be designed for low latency requirements from a database design approach, data and processing co-location and system resources (memory, storage, processors, etc.) usage approaches.

(b) The bidder’s solution must be designed for flexibility to support various physical designs and continue to perform well.

(c) The bidder’s must be designed for platform flexibility to enable solution deployment across different operating systems and mobile platforms.

(d) The bidder’s solution must be designed for scalable to accommodate changes in the number of users, data volumes and multiple storage media.

(e) Provides utilities for user administration, backup/archiving, performance monitoring and tuning, usage monitoring, diagnostic tools, server utilisation, system version control and specific automation features.

43 of 62CONFIDENTIAL

Page 44: 1… · Web vie

(f) A Patch Management process must be provided for the solution to ensure all aspects of the solution perform normally.

(g) Provide integrated high availability architecture with the required redundancy that will ensure 24*7*365 availability.

(h) Supports load balancing using a Network Load Balancer.(i) Supports implementation on a High Availability cluster to ensure maximum solution

availability.(j) Must run on a virtual machine as well as on a standalone machine simultaneously.(k) Must support Standard Industry means of Monitoring (SNMP, WMI, etc.).(l) The Code must be able to be monitored for Memory usage and possible speed issues.

(ii) SOLUTION ARCHITECTURE

The Bidder will be required to present a detailed description of the proposed Solution Architecture aligned to DBE and PED’s Architecture. It must show clearly the different packages suggested and the integration methods employed across the various architecture layers and per architecture component. The Bidder will be required to design, implement and sign-off the following solution architecture requirement and functionalities:

(a) Presentation through Functional, Technical and Data viewpoints. (b) Multiple communication channels which include SMS, Web and Telephone.(c) Reporting and presentation of static and dynamic reporting, custom and generic

dashboards with “real time” or “just in time” information from decentralised and centralised data sources.

(d) A separate business rule engine that can be used consistently across all modules.(e) Process models expressed as a set of discrete components that can be orchestrated to

deliver all the desired business services and can modified and enhanced as business evolve.

(f) User interfaces module completely separated from the back office and connected through the enterprise service bus.

(g) Business components and services are developed once, published in the enterprise service bus and re–used seamlessly across the channels and devices.

(h) Business logic is expressed as a self–contained set of granular components that have limited or no data dependency.

(i) Workflow Engine with role driven profiles linked to security access with escalations for non-conformance to KPI’s as specified in the functions and design specifications.

(j) Separation of operational, analytical and master data, and further separation of master data into applicable entities.

(k) Use an Enterprise Service Bus to manage defined, enterprise–standard interface between all architectural components and services.

(l) The solution must be multi-tiered i.e. separate the web service, business logic and database.

(iii) SECURITY

The solution must provide adequate security to protect the system and the data from threats including to data theft, data corruption, data loss. The Bidder will be required to design, test, implement and sign-off the following security requirement and functionalities:

44 of 62CONFIDENTIAL

Page 45: 1… · Web vie

(a) The solution must provide an authorisation / security management facility / module that prevents unauthorised access.

(b) Security must be integrated into and compatible with DBE security framework. (c) Uses unique passwords with centralised password management, which includes

encryption of passwords and the definition and use of authentication standards. (d) Provides segregation of duties and non-repudiation and crafted which to address

unique roles for users at DBE offices (national and provincial, districts and schools.(e) A security audit trail must be created by the solution for all activities, including

recording of various steps within a security related activity. Audit trails must be available to track data changes as well as configuration changes, incorporating such features as: logon time, logoff time, number of retries and user involved.

(f) Provide for the confidentiality, integrity, privacy of records (as described in 2.7.1 of POPI act) and data will be maintained from ETL to end user reporting.

(g) Provide for full external security attack monitoring and handling, including potential cyber and virus threats, denial of service attacks, spam registration and other. Include all preventative and monitoring capabilities required including the use of, for example, special firewalls, etc.

(h) Provide for encrypted data transfer over secure file transfer protocol. The encryption must allow for security whilst the information is in transit and encryption at the database level.

(i) Must meet industry leading practice security standards (such as ISF Standard of Good Practice and ISO17799 as well as the standards documented in GWEA 2009 and the CGICTPF regulated by DPSA)

(j) All Communication between Users (any client Interface) must be encrypted (k) The solution must support being situated behind a Reverse Proxy (Incoming

connections to the Solution) for incoming access and must support a Forwarding Proxy if Access to the internet is required (From the Solution) while remaining Proxy Friendly to facilitate the caching of static information.

(l) The solution should not require administrative rights to run but should be able to run with minimal privileges on the server.

(m) Supports an external Audit Log Server where the audit information can be sent to.(n) Must be clearly documented and should be security vetted. (If not vetted, this must be

arranged within 3 months of contract award).

(iv) DATA INPUT

The solution must provide for user-friendly, intuitive and flexible data input mechanism. The Bidder will be required to design, test, implement and sign-off the following system’s data input requirements and functionalities:

(a) Enables the user to customise the front-end to match the look and feel of the school, including colours, fonts and navigation.

(b) Carries over contact information and other appropriate data for an entity with the ability to prepopulate other screens

(c) Entities can view their status online.(d) The ability for the system to go offline and be downloaded, once the initial integration

functions are completed(e) Spell-check all free input data fields

45 of 62CONFIDENTIAL

Page 46: 1… · Web vie

(f) Users can save partially completed functions and return to them later.(g) The system should automatically save in progress, but the user can be prompted to

save their work at regular intervals.(h) User registration follows standard best practices—enter Name, ID number email

address, password and favourite questions and then are sent a confirmation email.(i) All users can reset lost credentials following an automated verification process.(j) Users can easily view or print reports/datasets, etc. at any stage in the process.(k) The user can create a preview packet of their information which includes either copies

of all uploaded documents, or links to them.(l) The system must have the ability to have field validations or derive data from input

fields e.g. validation of ID number and then derive date of birth gender etc.(m) Input fields should be linked and verified to applicable business rules (n) The solution must have the ability to copy and paste from external sources e.g. Users

may copy a table from Excel into a table format on an input screen or the system must have the ability to upload and convert an Excel spreadsheet into an input field.

(v) DATA REVIEW

Once the user has captured the data, the system should help manage the process of reviewing inputs and recommending/approving the data input. The Bidder will be required to design, test, implement and sign-off the following system’s data review requirements and functionalities:

(a) Allows the user to see historical relationship — for example, if a parent has multiple children in the same school, or a learner with siblings that were in the school.

(b) Supports checklist functionality to define what information or documents you require from user as they complete a specific function.

(c) Allows the initiating user to reopen data once they’ve submitted it. If further information is required from the user and be saved as a second version and an audit trail of changes is generated on the back end.

(d) Users can easily print summaries or full data sets.(e) Search all data records per field(f) Provides a “portal” interface to allow supervisory/managers/etc. to see and review

data more easily.(g) Allows the super-user/administrator to define automatic steps and rules, or

“workflow,” for the review process.(h) Multiple users can comment on, approve or request additional information(i) Supports on and off-line viewing and reviewing of data.(j) Provides extensive functionality to track external user interests and potential conflicts

of interest and use those criteria to assign data for review.(k) Allows a user to grant via an approved process, temporary access to another whilst out

of office.(l) Allows the user to choose whether to allow other users to see each other’s comments.(m) Automatically notified when status change on workflow process (email and home

landing page notification).

46 of 62CONFIDENTIAL

Page 47: 1… · Web vie

(vi) DATA ACCESS

The availability of data for easy but controlled access is a critical requirement for the system. There is a requirement for the system to be able to extract and export the data for use in Microsoft Office applications. Data and the system must be accessible via mobile devices. The Bidder will be required to design, test, implement and sign-off the following system’s data access requirements and functionalities:

(a) Allows the user to export all data visible to users into another file format, such as .pdf .xls or .csv.

(b) Provides a SOAP API to allow a programmer to create custom automated data flows to an external system.

(c) Provide support for data processing via mobile devices. (d) Provide functionality to let the user do an encrypted data extraction onto an external

device with the encryption key to be automatically stored on another external device (auto detect not to store on same device).

(e) Provide functionality to let the user do an encrypted data upload from an external device with the encryption key to be automatically uploaded from another external device. (auto detect not to store on same device).

(8.3) PROJECT DELIVERY

(i) PROJECT METHODOLOGY

The bidder is required to use a hybrid methodology (PRINCE™ 2 and Agile) with specific focus on the agile development/configuration that must include the following requirements:

(a) phase, procedures and processes; (b) tools and techniques that the bidder will use for the various stages of the project.(c) key dependencies, risks, critical decisions required, assumptions to ensure a successful

delivery of the project. (d) Bidder’s organisational and resource certification achieved. (e) The bidder must identify the DBE required skills and knowledge to ensure a successful

the project delivery. (f) The Bidder must also detail relevant lessons learnt from previous implementations as

well as critical success factors for the nature of the project delivery and rollout.

(ii) PROCESS IMPROVEMENT

The bidder must ensure that a continuous process improvement program that is based on best practice development approaches / methodologies is in place for the SA-SAMS Solution with the following requirements catered for:

(a) continuous assessment elements, (b) continuous improvement planning process, (c) continuous process improvement tools and techniques to be used, (d) matrices and monitoring for the continuous process improvement.

47 of 62CONFIDENTIAL

Page 48: 1… · Web vie

(e) The Bidder should plan to accept an independent, established and industry recognised organisation that may be appointed by NECT to assess the maturity of the processes being used to develop and manage the solution applications. The appointed organisation will not be a competitor of the Bidder.

(f) The Bidder must also deliver a clear strategy that will allow for a clear correlation between the SA-SAMS model and the ability by way of process improvement to achieve long-term integration and alignment with the incremental and iterative development of the SA-SAMS solution.

(iii) STATEMENT OF DELIVERABLES

The bidder is required during the initial phase to deliver an agreed statement of deliverables which details the deliverables or documents per stage and the purpose for each deliverable or document:

(a) Phases;(b) Stages;(c) Deliverables; and(d) Purpose of deliverable.As the example below of the Statement of deliverables

Phase and Stage

Deliverable Purpose

Initiation Phase Test Plans

The test plan documents the strategy that will be used to verify and ensure that the SA-SAMS system meets its design specifications and other requirements.

Initiation Phase

Training Plans

The test plan documents the strategy that will be used to verify and ensure that the SA-SAMS system meets its design specifications and other requirements.

(iv) DESIGN MANAGEMENT

Using an agile methodology approach and design principles in Section 3.1. Solution Design Principles, the bidder will be required to document the design that meets the DBE business needs and modernisation requirements. The bidders SA-SAMS solution design document must incorporate the following:

(a) clearly explain how they will utilise the agile methodology processes to ensure the design of the system is appropriate for the needs of DBE as it and its technology and business environment evolves.

(b) clearly articulate how the DBE modernisation and design principles, as mentioned in Section 3.1. Solution Design Principles, will be incorporated in the solution design of the system

(c) clearly explain how they will manage revisions to existing design and developed components;

48 of 62CONFIDENTIAL

Page 49: 1… · Web vie

(d) clearly explain how they will manage the identification and implementation of an end-to-end integrated requirement from identification to design and through to end of life per component.

(v) SOLUTION BUILD

In documenting the approach to the SA-SAMS solution build the bidder is required to ensure the following requirements within the agile approach:

(a) describe their approach on how they will use the planning (backlog and sprint) to deliver the solution build.

(b) clearly articulate the agile configuration and or development from product backlog to component testing.

(c) explain their approach on how they will use the sprint planning and deliver to ensure that the core base configuration is completed in the shortest timeframe.

(d) clearly explain how they will approach splitting of the development team into smaller teams to parallel streams the remaining development.

(vi) IMPLEMENTATION STRATEGY

Document an approved implementation strategy, in particular the planned iterations and incremental approach and method. The bidders SA-SAMS implement strategy document must address the following:

(a) ensure site readiness(b) testing the toolkit in 3 phases as well as incorporating into the toolkit the lessons

learnt in each testing phase;(c) the incremental approach and deploying of the SA-SAMS solution; and(d) supporting the SA-SAMS solution after rollout.

(vii) DATA MIGRATON

The migration strategy and approach will document the methodology and processed of cleaning ad migrating of existing data in the current databases and hard copy documents to the proposed solution. The following must be addressed:

(a) identify the data requirements from the current data; (b) plan for capturing and validation of hard copy data(c) plan and methodology that will be used to test the data compliancy of each school and

PED; and(d) use ETL tools that will be used to migrate the data.

(viii) SYSTEM TESTING

The strategy, plan and approach for functional and non-functional, technical testing and system acceptance testing must address the following:

(a) Functional Testing including Component Testing, Integration Testing, System Testing, Regression Testing and Solution Acceptance Testing,

49 of 62CONFIDENTIAL

Page 50: 1… · Web vie

(b) Non-Functional Testing including Performance Testing, Usability Testing, Security Testing and Portability Testing;

(c) Usability Testing including Graphical User Interface Testing, Non-Graphical User Interface Testing, Portability Testing, Security, Authentication and Authorisation testing;

(d) Technical Testing including Performance Testing, Load Testing and Performance Benchmarking, Stress Testing, Data and Database Integrity Testing, Fault Tolerance and Failover Testing, Configuration and Deployment Testing and Regression Testing; and

(e) The Bidder must describe the defect logging, defect monitoring and defect resolution process.

(ix) USER ACCEPTANCE TESTING

The User Acceptance Testing strategy, plan and approach documents must address the following

(a) Usability Testing including User Acceptance Testing, Graphical User Interface Testing, Non-Graphical User Interface Testing, Portability Testing, Security, Authentication and Authorisation testing

(b) User Acceptance Test Plans, (c) Entry and exit criteria results including verification of the test results. (d) The Bidder must describe the defect logging, defect monitoring and defect resolution

process pertaining to user acceptance testing. (e) The bidder must provide details of support that will be provided to the users during

the UAT.

(x) ROLLOUT TOOLKIT

A comprehensive end to end rollout toolkit strategy, approach and plan that will be used for the development and setting up of the rollout for Type A, B and C schools as well as SA-SAMS at national and provincial departments must be documented and developed, tested and implemented. The rollout toolkit that will be developed by the bidder, tested and used for the rollouts of the provincial department (including districts) and a school rollout for the new SA-SAMS solution. This toolkit must incorporate as a minimum the following:

(a) the end to end implementation at a school level;(b) a comprehensive “dummy guide” for the solution implementation;(c) the toolkit checklist must include the tasks the technical implementation; (d) Testing guides;(e) change management; (f) training of technical support staff and users;(g) communication;(h) solution support;(i) rollout readiness; and (j) data cleansing and migration.

(xi) TRANSITION MANAGEMENT

50 of 62CONFIDENTIAL

Page 51: 1… · Web vie

The transition management strategy, detailed plan and approach documents must address the following:

(a) a plan for the evolution from the existing system to a new web-based/enabled system including strategy, plan, approach and method for managing the transition.

(b) detail description of the evolution from the existing system to a new mobile application including strategy, plan, approach and method for managing the transition.

(c) all change management initiatives that will be used on the Project.

(xii) QUALITY ASSURANCE / CONTROL

The Quality Assurance / Control methodology and process(es) that will be used in the Project delivery. Compliance with International Quality Standards is to be detailed and any Internationally Recognised Quality Certifications held should be stated. The following must also be addressed:

(a) detail the phases in which various quality assurances and control methodology and process(es) used in the Project delivery that will be implemented as well as the process followed the remedial actions to be resolved;

(b) include the internal or/and external party used by the bidder for conduction quality assurance as may be required by the standards followed by the bidder;

(c) The bidder must state the international quality standard(s) they follow in delivering projects;

(d) The bidder must describe the process and/or procedure they follow in delivering projects; and

(e) The bidder must describe how they will use their quality control methodology/process to deliver this project.

(xiii) REQUIREMENT MANAGEMENT

The requirements management strategy, detailed plan and approach documents in an Agile delivery environment must address the following:

(a) an approach for ensuring that they will manage the product backlog (capture and manage existing, new, evolving and changing business and technical environments) within the Agile solution development process;

(b) how deliverables will be measured and reported on; and(c) an approach for managing diverse stakeholders’ requirements.

(xiv) RISKS MANAGEMENT

The Risk management process that it will follow on the project and must address the following:

(a) Risk management strategy and approach; (b) Plans and processes for identify, classify and manage risk on the project; (c) Risk management tools; and(d) Risk mitigations strategies.

51 of 62CONFIDENTIAL

Page 52: 1… · Web vie

(xv) ISSUE MANAGEMENT

The issue management process that it will follow on the project and must address the following:

(a) strategy and approach; (b) Process for identify, classify and manage issues on the project; (c) Issue management tools; and(d) Issue resolution strategies.

(xvi) CHANGE CONTROL

The change control strategy, approach and plan documents must how each proposed change during a project is adequately:

(a) defined, (b) assessed, (c) reviewed and (d) approved or declined before implementation. (e) The bidder must address how the change control process will be used to avoid

unnecessary changes that might disrupt services and ensures the efficient use of resources.

(xvii) PROJECT RESOURCE MANAGEMENT

The project resource management strategy, detailed plan and approach documents must address the following:

(a) A detailed Resource Plan must present the resource categories and levels of that the Bidder will be supplying (including subcontractors). The bidder must also indicate what resources they require from NECT’s and DBE’s during Project implementation.

(b) CV’s / resumes for all the bidder’s delivery personnel that will be used for the project delivery including relevant experience and certification

(c) Details of any 3rd parties’ resources involved in the Bid(d) The Bidder must also provide details on how they will manage continuity during staff

turnover.

(xviii) PROJECT DOCUMENTATION AND LIBRARY

The project documentation and library used for all artefacts of the project hard copy and soft copy covering:

(a) all application software;(b) user manuals and configuration document(c) platform system software; and(d) The bidder must provide a list of the documents per phase that will be produced to

keep a record of project and for good governance.

(xix) PROJECT APPROACH

52 of 62CONFIDENTIAL

Page 53: 1… · Web vie

The project approach addresses the hybrid (PRINCE® 2 for the Project management and Agile for system delivery) methodology for deployment approach and plan that could be used to deliver the SA-SAMS into production in a shorter time period as indicted by in figure 8 without compromising the scope or quality. Alterative deliver approaches may be proposed.

(a) provide strategy, approach and detail plan of how they will reduce the Phase 1 (12 month) phase 2 (4 months) and phase 3 (2 months) times without compromising the scope, quality and without increasing risk and complexity of the project

(b) Describe the shortest, average and longest length of time, in calendar days, required to get your solution into initial production and the dependencies required to achieve this timeline.

(c) Describe specific steps that your consultants or the customers need to take to minimise installation time.

(d) Describe specific issues in previous installations that have extended the installation time.

(e) Which organisations will provide application integration consultants? Describe their organisation, specific implementation experience and scale of available expertise

(f) Describe how your proposal will assist DBE employees at all levels to embrace the radical changes in the organisation that will be part of this initiative. Include information on how this will be resourced.

(g) Describe how your proposal will assist to develop the necessary management processes to implement and operate the solution. Include information on how this will be resourced.

(9) CERTIFICATION, EXPERTISE AND QUALIFICATION

(a) The bidder represents that,

(i) it has the necessary expertise, skill, qualifications and ability to undertake the work required in terms of the Statement of Work or Service Definition and;

(ii) it is committed to provide the Products or Services; and

(iii) perform all obligations detailed herein without any interruption to the Customer.

(b) The bidder must provide the service in a good and workmanlike manner and in accordance with the practices and high professional standards used in well-managed operations performing services similar to the Services;

(c) The bidder must perform the Services in the most cost-effective manner consistent with the level of quality and performance as defined in Statement of Work or Service Definition;

(d) Original Software Manufacturer (OSM) work. The bidder must ensure that work or service is performed by a person who is certified by Original Software Manufacturer.

(10) LOGISTICAL CONDITIONS

(a) Hours of work. The NECT office hours of work are from 8am to 5pm.

53 of 62CONFIDENTIAL

Page 54: 1… · Web vie

(b) In the event that the DBE grants the bidder permission to access DBE's Environment including hardware, software, internet facilities, data, telecommunication facilities and/or network facilities remotely, the bidder must adhere to DBE's relevant policies and procedures (which policy and procedures are available to the bidder on request) or in the absence of such policy and procedures, in terms of, best industry practice.

(c) Tools of Trade. The bidder must supply all tools of trade for the project.

(11) SKILLS TRANSFER AND TRAINING

(11.1) The Supplier must provide the strategy, approach and plan for knowledge and skills transferred from the Bidder will be to DBE. This will be a measurable target in the contract.

(11.2) TECHNICAL STAFF TRAINING

The technical staff training strategy, approach and detailed plans that will allow for current SA-SAMS technical staff to be re-skilled in the bidder’s technologies and solution processes must address the following:

(a) The bidder must include knowledge transfer on the project with DBE staff fulfilling key roles on the Project. This will be a measurable target in the contract.

(b) The various training options (e.g: classroom, train-the-trainer, e-Learning, video-based training, etc) that the bidder will use to train the various user groups also using the sandpit environment.

(c) The Bidder must include the requirements needed from the DBE, dependencies and risks for each training option to enable success of training.

(11.3) USER TRAINING

The user training strategy, approach and detailed plan that will allow for current SA-SAMS users to be re-skilled and trained on the modernised SA-SAMS solution must address the following:

(d) A detailed strategy and approach for the various anticipated training modules for the different user roles.

(e) The various training options (e.g.: classroom, train-the-trainer, e-Learning, video-based training, etc) that the bidder will use to train the various user groups also using the sandpit environment for post training experience.

(f) The Bidder must include the requirements needed from the DBE, dependencies and risks for each training option to enable success of training.

(11.4) SYSTEM TRAINING CONTENT

The system training content document must include for each defined user group (educators, school administration, HOD’s, principals, SGB members, district administration, district managers, PED administration, PED managers, DBE administration, DBE managers (incl. help desk and end-user support) the content for the and address the following:

(g) Pre-requisite courses

54 of 62CONFIDENTIAL

Page 55: 1… · Web vie

(h) Mandatory courses(i) Optional courses(j) On the job training / floor walking(k) The training offerings and the curriculum that will be covered, measured and tested

using the sandpit option.

(11.5) TRAINING MATERIAL

Details the development and provision of user training materials for both technical staff and user training material for all courses that is available for:

(l) User Training; (m) Technical Staff Training; (n) The training material must be available both online as well as in hard copy.

(12) REGULATORY, QUALITY AND STANDARDS

(a) The bidder must for the duration of the contract ensure that the proposed product or solution conform with the Government Minimum Interoperability Standards (MIOS).

(13) PERSONNEL SECURITY CLEARANCE

(a) The bidder’s personnel who are required to work with information related to NATIONAL SECURITY must have a valid South African security clearance or must apply within 30 days of the signed contract for a security clearance to the level of CONFIDENTIAL at the expense of the bidder from the South African State Security Agency or duly authorised Personnel Security Vetting entity of SA Government.

(b) The bidder’s personnel who are required to work with GOVERNMENT CLASSIFIED information or access government RESTRICTED areas must be a South African Citizen and at the expense of the bidder be security vetted (pre-employment screening, criminal record screening and credit screening).

(c) The bidder must ensure that the security clearances of all personnel involved in the Contract remains valid for the period of the contract.

(14) CONFIDENTIALITY AND NON-DISCLOSURE CONDITIONS

(a) The bidder, including its management and staff, must before commencement of the Contract, sign a non-disclosure agreement regarding Confidential Information.

(b) Confidential Information means any information or data, irrespective of the form or medium in which it may be stored, which is not in the public domain and which becomes available or accessible to a Party as a consequence of this Contract, including information or data which is prohibited from disclosure by virtue of:

(i) the Promotion of Access to Information Act, 2000 (Act no. 2 of 2000);

(ii) being clearly marked "Confidential" and which is provided by one Party to another Party in terms of this Contract;

55 of 62CONFIDENTIAL

Page 56: 1… · Web vie

(iii) being information or data, which one Party provides to another Party or to which a Party has access because of Services provided in terms of this Contract and in which a Party would have a reasonable expectation of confidentiality;

(iv) being information provided by one Party to another Party in the course of contractual or other negotiations, which could reasonably be expected to prejudice the right of the non-disclosing Party;

(v) being information, the disclosure of which could reasonably be expected to endanger a life or physical security of a person;

(vi) being technical, scientific, commercial, financial and market-related information, know-how and trade secrets of a Party;

(vii) being financial, commercial, scientific or technical information, other than trade secrets, of a Party, the disclosure of which would be likely to cause harm to the commercial or financial interests of a non-disclosing Party; and

(viii) being information supplied by a Party in confidence, the disclosure of which could reasonably be expected either to put the Party at a disadvantage in contractual or other negotiations or to prejudice the Party in commercial competition; or

(ix) information the disclosure of which would be likely to prejudice or impair the safety and security of a building, structure or system, including, but not limited to, a computer or communication system; a means of transport; or any other property; or a person; methods, systems, plans or procedures for the protection of an individual in accordance with a witness protection scheme; the safety of the public or any part of the public; or the security of property; information the disclosure of which could reasonably be expected to cause prejudice to the defence of the Republic; security of the Republic; or international relations of the Republic; or plans, designs, drawings, functional and technical requirements and specifications of a Party, but must not include information which has been made automatically available, in terms of the Promotion of Access to Information Act, 2000; and information which a Party has a statutory or common law duty to disclose or in respect of which there is no reasonable expectation of privacy or confidentiality;

(c) Notwithstanding the provisions of this Contract, no Party is entitled to disclose Confidential Information, except where required to do so in terms of a law, without the prior written consent of any other Party having an interest in the disclosure;

(d) Where a Party discloses Confidential Information which materially damages or could materially damage another Party, the disclosing Party must submit all facts related to the disclosure in writing to the other Party, who must submit information related to such actual or potential material damage to be resolved as a dispute;

(e) Parties may not, except to the extent that a Party is legally required to make a public statement, make any public statement or issue a press release which could affect another Party, without first submitting a written copy of the proposed public statement or press release to the other Party and obtaining the other Party's prior

56 of 62CONFIDENTIAL

Page 57: 1… · Web vie

written approval for such public statement or press release, which consent must not unreasonably be withheld.

(15) GUARANTEE AND WARRANTIES.

The bidder warrants that:

(a) The warranty of goods supplied under this contract remains valid for twelve (12) months after the goods, or any portion thereof as the case may be, have been delivered to and accepted at the final destination indicated in the contract;

(b) as at Commencement Date, it has the rights, title and interest in and to the Product or Services to deliver such Product or Services in terms of the Contract and that such rights are free from any encumbrances whatsoever;

(c) the Product is in good working order, free from Defects in material and workmanship, and substantially conforms to the Specifications, for the duration of the Warranty period;

(d) during the Warranty period any defective item or part component of the Product be repaired or replaced within 3 (three) days after receiving a written notice from the DBE;

(e) the Products is maintained during its Warranty Period at no expense to DBE;

(f) the Product possesses all material functions and features required for DBE Operational Requirements;

(g) the Product remains connected or Service is continued during the term of the Contract;

(h) all third-party warranties that the bidder receives in connection with the Products including the corresponding software and the benefits of all such warranties are ceded to DBE without reducing or limiting the bidder’s obligations under the Contract;

(i) no actions, suits, or proceedings, pending or threatened against it or any of its third-party suppliers or sub-contractors that have a material adverse effect on the bidder’s ability to fulfil its obligations under the Contract exist;

(j) The DBE is notified immediately if it becomes aware of any action, suit, or proceeding, pending or threatened to have a material adverse effect on the bidder’s ability to fulfil the obligations under the Contract;

(k) any Product sold to the DBE after the Commencement Date of the Contract remains free from any lien, pledge, encumbrance or security interest;

(l) the DBE’s use of the Product and Manuals supplied in connection with the Contract does not infringe any Intellectual Property Rights of any third party;

57 of 62CONFIDENTIAL

Page 58: 1… · Web vie

(m) the information disclosed to the DBE does not contain any trade secrets of any third party, unless disclosure is permitted by such third party;

(n) it is financially capable of fulfilling all requirements of the Contract and that the bidder is a validly organized entity that has the authority to enter into the Contract;

(o) it is not prohibited by any loan, contract, financing arrangement, trade covenant, or similar restriction from entering into the Contract;

(p) the prices, charges and fees to the DBE as contained in the Contract are at least as favourable as those offered by the bidder to any of its other customers that are of the same or similar standing and situation as the DBE; and

(q) any misrepresentation by the bidder amounts to a breach of Contract.

(16) INTELLECTUAL PROPERTY RIGHTS

(a) The DBE retains all Intellectual Property Rights in and to the DBE's Intellectual Property. As of the Effective Date, the bidder is granted a non-exclusive license, for the continued duration of this Contract, to perform any lawful act including the right to use, copy, maintain, modify, enhance and create derivative works of DBE's Intellectual Property for the sole purpose of providing the Products or Services to DBE pursuant to this Contract; provided that the bidder must not be permitted to use DBE's Intellectual Property for the benefit of any entities other than DBE without the written consent of DBE, which consent may be withheld in DBE's sole and absolute discretion. Except as otherwise requested or approved by DBE, which approval is in DBE's sole and absolute discretion, the Supplier must cease all use of DBE's Intellectual Property, at of the earliest of:

(i) termination or expiration date of this Contract;

(ii) the date of completion of the Services; and

(iii) the date of rendering of the last of the Deliverables.

(b) If so required by DBE, the bidder must certify in writing to DBE that it has either returned all DBE Intellectual Property to the DBE or destroyed or deleted all other DBE Intellectual Property in its possession or under its control.

(c) DBE, at all times, owns all Intellectual Property Rights in and to all Intellectual Property.

(d) Save for the license granted in terms of this Contract, the bidder retains all Intellectual Property Rights in and to the bidder’s pre-existing Intellectual Property that is used or supplied in connection with the Products or Services.

(17) TARGETED PROCUREMENT/TRANSFORMATION

SITA, in terms of the PPPFA Regulation 2017 section 9(1), has an obligation to advance designated groups which includes black SMMEs (i.e. Exempted Micro Enterprises (EME) and Qualifying Small Enterprises (QSE)) for the supply of certain ICT goods or

58 of 62CONFIDENTIAL

Page 59: 1… · Web vie

services where feasible to subcontract for a contract above R30 million, an organ of state must apply subcontracting to advance designated groups.

The bidder is required to subcontract a minimum of 30% of the value of the contract to an EME or QSE which is at least 51% owned by black people, or to EMEs and/ or QSEs which are at least 51% owned by black people”.

9.3. DECLARATION OF ACCEPTANCE

ACCEPT ALL DO NOT ACCEPT ALL

(1) The bidder declares to ACCEPT ALL the Special Condition of Contract as specified in section Error: Reference source not found above by indicating with an “X” in the “ACCEPT ALL” column, OR

(2) The bidder declares to NOT ACCEPT ALL the Special Conditions of Contract as specified in section Error: Reference source not found above by -

(a) Indicating with an “X” in the “DO NOT ACCEPT ALL” column, and;

(b) Provide reason and proposal for each of the conditions that is not accepted.

Comments by bidder:Provide reason and proposal for each of the conditions not accepted as per the format:Condition Reference:Reason:Proposal:

59 of 62CONFIDENTIAL

Page 60: 1… · Web vie

ANNEX A.5: TECHNICAL SCHEDULES

10. Technical Schedules

10.1.LOCATION SCHEDULE

Refer to Appendix 1 - School’s List.xls.

60 of 62CONFIDENTIAL

Page 61: 1… · Web vie

ANNEX A.6: Terms and definitions

11. ABBREVIATIONS

Abbreviations /

AcronymsDescription

12. DEFINITIONS

61 of 62CONFIDENTIAL

Page 62: 1… · Web vie

ANNEX A.7: BIDDER SUBSTANTIATING EVIDENCE

This section is reserved for the bidder to provide information related to the substantiating evidence or comments in the format as required by the bid specification (e.g. text, graphical representation, diagrams, statistical reports, lists, reference letters, copies of product of solution documentation, certificates, licences, memberships, etc.).

Note: The evidence provided in this section will be used by the bid evaluation committee to evaluate the bid. Therefore, each piece of substantiating evidence must be cross referenced to requirements specification section.

62 of 62CONFIDENTIAL