259
COUNTY OF SANTA CLARA, CALIFORNIA REQUEST FOR PROPOSAL FOR SCVMC SECURE TEXT MESSAGING SYSTEM RFP NUMBER: RFP-PRO-FY17-0098 ISSUE DATE: NOVEMBER 16, 2016 PROPOSALS DUE DATE: JANUARY 23, 2017 BY 3:00 PM PACIFIC TIME SUBMIT TO: PROCUREMENT DEPARTMENT 2310 NORTH FIRST STREET, SUITE 201 SAN JOSE, CA 95131-1040 PROCUREMENT OFFICER: Irene Shen COUNTY OF SANTA CLARA, PROCUREMENT DEPARTMENT (408) 491-7412 [email protected] Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System Page 1 of 259

 · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

  • Upload
    vongoc

  • View
    232

  • Download
    2

Embed Size (px)

Citation preview

Page 1:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

COUNTY OF SANTA CLARA, CALIFORNIA

REQUEST FOR PROPOSAL FOR

SCVMC SECURE TEXT MESSAGING SYSTEM

RFP NUMBER: RFP-PRO-FY17-0098

ISSUE DATE:NOVEMBER 16, 2016

PROPOSALS DUE DATE:JANUARY 23, 2017 BY 3:00 PM PACIFIC TIME

SUBMIT TO:PROCUREMENT DEPARTMENT

2310 NORTH FIRST STREET, SUITE 201SAN JOSE, CA 95131-1040

PROCUREMENT OFFICER: IRENE SHENCOUNTY OF SANTA CLARA, PROCUREMENT DEPARTMENT

(408) [email protected]

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 1 of 182

Page 2:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

TABLE OF CONTENTS

I. INTRODUCTION........................................................................................................................... 3

II. PROJECT SCOPE OF WORK …................................................................................................ 7

III. TIMELINE ................................................................................................................................... 8

IV. EVALUATION CRITERIA ......................................................................................................... 11

V. RESPONSE FORMAT AND ORGANIZATION ......................................................................... 13

VI. REQUIREMENTS AND OFFEROR’S SUBMITTAL ……………………………………………... 15

APPENDICES ................................................................................................................................ 19All applicable appendices must be submitted with the proposal.

A. County Hosted Solution: APPENDIX A1 - TECHNICAL REQUIREMENTS RESPONSE FORM (COUNTY HOSTED) APPENDIX A2 - FEATURES, FUNCTIONALITIES, AND INTEGRATION RESPONSE FORM (COUNTY HOSTED) APPENDIX A3 – IMPLEMENTATION, PROJECT MANAGEMENT, TRAINING AND ONGOING SUPPORT (COUNTY HOSTED) APPENDIX A4 - OFFEROR'S ACKNOWLEDGEMENT OF VENDOR REMOTE ACCESS /SECURELINK AND USER RESPONSIBILITY STATEMENTS APPENDIX A5 - PROPOSAL COST RESPONSE FORM (COUNTY HOSTED)

B. CSP/SAAS (Vendor Hosted) Solution:APPENDIX B1 - TECHNICAL REQUIREMENTS RESPONSE FORM (VENDOR HOSTED)APPENDIX B2 - FEATURES, FUNCTIONALITIES, AND INTEGRATION RESPONSE FORM (VENDOR HOSTED)APPENDIX B3 - IMPLEMENTATION, PROJECT MANAGEMENT, TRAINING AND ONGOING SUPPORT (VENDOR HOSTED)APPENDIX B4 - CSP/SAAS SECURITY ACCESSMENT CHECKLIST (VENDOR HOSTED)APPENDIX B5 - PROPOSAL COST RESPONSE FORM (VENDOR HOSTED)

C. Other Appendices APPENDIX C - NON-COLLUSION DECLARATION APPENDIX D - DECLARATION OF LOCAL BUSINESS APPENDIX E - DECLARATION OF COMPLIANCE WITH WAGE THEFT PREVENTION POLICY. APPENDIX F - OFFEROR'S TERMS AND CONDITIONS APPENDIX G - OFFEROR'S ACKNOWLEDGEMENT OF BUSINESS ASSOCIATE AGREEMENT (BAA) STATEMENTS APPENDIX H - PREVIOUS CUSTOMER REFERENCE FORM APPENDIX I - INTENT TO RESPOND

ATTACHMENTS ................................................................................................................................ 114The Attachments listed below are for reference only and do not have to be submitted with the proposal. ATTACHMENT 1 - CONDITIONS GOVERNING THE PROCUREMENT ATTACHMENT 2- COUNTY OF SANTA CLARA STANDARD TERMS AND CONDITIONS ATTACHMENT 3 - INSURANCE REQUIREMENTS ATTACHMENT 4 - VENDOR REMOTE ACCESS /SECURELINK AND USER RESPONSIBILITY STATEMENTS ATTACHMENT 5- BUSINESS ASSOCIATE AGREEMENT (BAA) STATEMENT ATTACHMENT 6 COUNTY TRAVEL POLICY (INCLUDE IF APPLICABLE)

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 2 of 182

Page 3:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

I. INTRODUCTION

A. INVITATION

The County of Santa Clara (“County”) is seeking proposals from qualified suppliers to provide, install, implement, customize, support and maintain a comprehensive Santa Clara Valley Medical Center (“SCVMC”) Secure Text Messaging System solution that can meet the functional needs of the Physician, Pharmacy, Nursing, and Allied Health (Respiratory Care, Diagnostic Imaging, Laboratory, Dietary, Protective Services, Environment Services, and Therapy Services) by demonstrating capabilities to achieve the goals and objectives reflected in this Request for Proposal (“RFP”). For purposes of this project, devices will only be distributed to practitioners (physicians, nurse practitioners, physician-assistants). For non-practitioners, the intent is to minimize messaging workflow changes.

The County will consider a county-hosted or a Cloud Service Provider (“CSP”) solution. Either way, the proposed solution must be a proven base system. The County is not interested in a beta system or purchasing professional services to design and develop a system. The integrated solution must meet the business, functional, and technical requirements as defined in this RFP. The County also reserves the right to purchase the hardware from third party suppliers.

The mandatory requirements are listed on Appendix A2 and Appendix B2. Mandatory requirements will be evaluated as PASS or FAIL. Proposed software systems that do not meet the mandatory requirement will not be considered.

It is the County’s intent to make a single award. If an award is made, the resulting contract shall be for a term of five years unless terminated earlier or otherwise amended.

The County will hold a pre-proposal conference on the date and time specified in Section III. A of this RFP. All vendors intending to respond to this RFP are encouraged to attend the pre-proposal conference either in person or via the teleconference line provided. While the RFP is comprehensive, there will be further information and details about the project disclosed at the pre-proposal conference which may not be captured in the solicitation documents.

Vendors intending to respond to this solicitation should submit APPENDIX I, INTENT TO RESPOND, via email to the Procurement Officer, on or before the due date and time specified in this RFP.

B. BACKGROUND

1. County of Santa Clara

Santa Clara County (SCC) is the sixth most populous County in California, with a population of nearly 1.8 million people. The County contains fifteen cities, encompassing approximately 1,300 square miles, which have large concentrations of electronics, research, and manufacturing firms. Santa Clara County is the fifth-largest County government in the State and has an estimated workforce of 18,000.

The County organizational structure includes a decentralized mix of approximately 50 semi-autonomous County Agencies and Departments. The County provides services such as public safety and justice, road construction and maintenance, parks and recreation, libraries, and environmental resource management. It also operates "enterprise" programs, which charge fees to users for services. Two examples are the Santa Clara Valley Medical Center and the County airports. The County acts as an agent of the State in administering health, social services, and criminal justice programs that are of statewide concern.

The County is governed by a five member Board of Supervisors which is elected by district to serve four-year terms. The County Executive administers the day-to-day affairs of the County and is appointed by the Board of Supervisors.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 3 of 182

Page 4:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

2. Santa Clara Valley Health and Hospital System (SCVHHS)

Santa Clara Valley Health & Hospital System (SCVHHS) is Santa Clara County’s public healthcare system. Making quality care available to the residents of our community, SCVHHS is made up of: Santa Clara Valley Medical Center (SCVMC), including Valley Specialty Center (VSC) and Valley Health Center community clinics, Public Health Department (PHD), the Department of Alcohol and Drug Services (DADS), the Mental Health Department (MHD), and the Children’s Receiving Center and Custody Health Services (CSCHS).

3. Santa Clara Valley Medical Center (SCVMC)

Santa Clara Valley Medical Center is a 574-bed acute care public teaching hospital affiliated with Stanford University Medical School and provides a full range of inpatient, emergency, rehabilitation, neonatal, intensive care, high-risk maternity care, psychiatry, pediatric intensive care, and burn intensive care services. The Ambulatory outpatient services include both primary and specialty clinics located not only at VMC, but also at satellite facilities located throughout the County.

4. SCVHHS Information Services Department

Information systems and technology for SCVHHS is centralized in the Information Services (IS) Department and is responsible for all systems, planning, development and support within HHS. Business units comprising IS are (note: data presented below is from the preceding annual report and is, therefore, dated):

a. Application Services – provides a comprehensive array of services i. Strategy ii. Solutions iii. Sourcing iv. Support

b. Technical Services i. Data Center Operations ii. Operations iii. Customer Service iv. Field Support v. Network infrastructure

c. Technical Environment – Intel platform / IBM AIX

5. Santa Clara County Information Technology Department

The Office of the Chief Information Officer (CIO) coordinates County information technology planning and management and promotes the collaboration of County Agencies and Departments in the development of enterprise-wide information systems. The CIO manages the Information Services Department (ISD) which performs information and technology systems planning, development, acquisition, implementation, and maintenance for a majority of County Departments. Some Agencies, such as the Santa Clara Valley Health and Hospital System (SCVHHS) and the Social Services Agency (SSA) maintain their own information technology staff and systems, but collaborate with ISD in Countywide technology projects.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 4 of 182

Page 5:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

6. Combined SCVHHS IS and SCC ISD Technical Environment

SERVEROperating system Windows Server 2008/2008R2/2012/2012R2

IBM AIX 5x/7x LDAP Servers Microsoft Active Directory Services Hardware Intel-Based Servers with multiple processors (redundant), SAN

integration via Emulex HBAs, redundant power supplies. Server Virtualization VMware 5.5 and 6.0 Backup IBM TSM Client 6.04.x, CA ARCServe Application Servers .NET Framework 4.0/3.5/3.5SP1

Java Runtime Environment 1.5/1.6 Databases Microsoft SQL Server 2008/2008 R2 (32 & 64 bit) / 2012

Oracle v8, 9, 10, & 11 High Availability and Clustering HA Clustering and FT Supported or Windows Clustering, VMware Disk array Raid 1(Blade),Standalone: RAID 1 (OS) RAID 5 or 6 (Data), Raid 10

(SAN) Antivirus Symantec AV 12.x

PC HARDWARE/SOFTWAREDesktops HP Business Line Desktops Laptops HP and Lenovo Line Notebooks Monitors 17”-30” Monitors Docking station Basic and Advanced docking stations

DESKTOP/LAPTOP SOFTWAREOperating System Windows 2008 sp4/ 2008R2 sp3

Windows 7 SP 1 Office applications Microsoft Office Professional Plus 2013 Email Office 365 Microsoft Cloud Email (Outlook 2013) Terminal emulation Micro Focus Rumba v.8.1 PDF reader Adobe Acrobat Reader XI Desktop database Discourage local databases. (Office 2013) Internet browser Microsoft Internet Explorer 11.0 Antivirus Symantec AntiVirus Corporate Edition Version 12.x Java Various versions installed Encryption – Laptop and Removable Media

Safend

MOBILE DEVICE HARDWARE/SOFTWAREHardware Apple iPhone 4 and above, Samsung Galaxy 3 and above, iPad, and

Google Android based phones Operating System IOS 6 and above, Android Jelly Bean 4.1.x and above, Email Microsoft Outlook 2013 Security AirWatch

PRINTERSLaser HP LaserJet devices

Cannon MFP devices Network interface HP- Internal Jet Direct

Cannon internal network interface

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 5 of 182

Page 6:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

COMMUNICATIONSProtocol TCP/IP Topology Ethernet Routers/ switches Cisco Bandwidth – network 10 Gigabit (sx/lx) Bandwidth – to the desktop 10/100/1000 MB/ second Backbone Fiber optic Cable to the desktop Category 5e / 6e UTP with RJ45 connections

REMOTE ACCESS & AUTHENTICATIONSecureLink Cisco ASA VPN Citrix XenDesktop Citrix Netscaler SDX 10.x RSA Security Tokens SecurAuth Two-Factor Authentication CA Arcot Two-Factor Authentication

Microsoft UAG for ActiveSync Authentication is integrated with Microsoft Active Directory

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 6 of 182

Page 7:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

II. PROJECT SCOPE OF WORK

This solicitation is for a SCVMC Secure Text Messaging System which is to include software and related maintenance, support and services required to install and operate the proposed system as a County-hosted (on premise) solution or as a vendor hosted solution. The proposed solution(s) must be a proven base system. The County is not interested in a beta system or purchasing professional services to design and develop a system. The integrated solution must meet the business, functional, and technical requirements as defined in this RFP. The County also reserves the right to purchase the hardware from third party suppliers.

The complete scope of work is dependent upon the selected solution. The implementation may consist of planning, organizing, installing, configuring, testing for acceptance and training on the Secure Text Messaging System as well as integrating it with the SCVMC environment. In addition, provide training for maintenance, operations, and systems upgrades to end users, technicians, and support staff. Interfaces or data file uploads from several existing systems may also be required.

The proposed SCVMC Secure Text Messaging System must demonstrate capabilities to achieve the following goals and objectives:

1. It supplements and/or replaces existing (non-secure) pagers and paging systems with at least equivalent functionality via secure text messaging.

2. It must support Apple iPhone 6 or newer end-user devices running iOS 9 or greater.3. The secure text messaging solution must be a “high-availability” system, capable of storing, managing,

and protecting a projected message volume of 10’s of thousands of messages per day.4. The replacement solution must satisfy applicable requirements to adequately protect PHI (anticipating

recommendations from The Joint Commission --TJC), specifically:a. Signing on to a device to retrieve messages must be secure as specified by SCVMC.b. Messages must be encrypted whenever transmitted, and whenever stored on a device.c. The status of sent text messages must be visible to the sender; in particular, whether or not the

text message has been (i) received; and/or (ii) read by the receiver.d. Messages must be date- and time-stamped; this must be recorded in and retrievable from the

solution messaging archive.e. Message retention time on devices must be customizable to meet the security requirements of

SCVMC.f. There must be a centrally-maintained contact list of individuals and their devices authorized to

send/receive secure messages.5. The replacement solution should be integrated as much as possible into the SCVMC information

systems environment, specifically:a. Messages can be initiated via links from Treatment Team and Care Team screens of the

HealthLink (Epic) application; in this case, user (sender) and patient contexts are automatically carried over into the message.

b. Messages can be initiated via links from the physician call schedule system (currently Amion, but also any successor systems selected during the life of the project); in this case, user (sender) context is automatically carried over into the message.

c. If the system supports text messaging conversations (threads), all or part of a thread must be made readily available for copying into nursing documentation (equivalent to Provider Notification documentation currently implemented in HealthLink at SCVMC).

d. Data from the solution messaging archive must be available and accessible from within the Enterprise Reporting Environment at SCVMC.

6. VMWare Airwatch mobile device management is currently deployed at SCVMC. Because of the large number of devices that will be used and must be managed for secure text messaging, it is imperative that the VMWare Airwatch mobile device management system be used to deploy and manage the secure text messaging solution.

Section VI—Requirements and Offeror’s Submittal and the related appendices provide all the pertinent functional, technical, and business requirements as required by the County.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 7 of 182

Page 8:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

III. TIMELINE

This section of the RFP contains the anticipated schedule for the procurement and describes the procurement events as well as the conditions governing the procurement.

A. SEQUENCE OF EVENTS AND CONTACT INFORMATION The Procurement Officer will make every effort to adhere to the following anticipated schedule:

Action Date1. Issue of RFP November 16, 2016 2. Pre-Proposal Conference November 29, 2016 at 9:00 A.M. Pacific Time 3. Deadline To Submit Written Questions December 2, 2016 by 5:00 P.M. Pacific Time 4. Response to Written Questions/RFP Addendum December 15, 2016 by 5:00 P.M. Pacific Time 5. Deadline to Submit Intent to Respond December 16, 2016 by 5:00 P.M. Pacific Time6. Deadline for Submission of Proposals January 23, 2017 by 3:00 P.M. Pacific Time 7. Proposal Evaluation February 20178. Selection of Shortlist (if applicable) February 20179.. Demonstrations/Presentations (County Option) March 2017 – April 2017 10. Selection of Finalists March 2017 – April 201711. Negotiations May 2017 – June 2017 12. Issue Notice of Intent to Award June 201713. Contract Approval and Execution June 201714. Commencement of Contract July 201715. Anticipated Go-Live Date To be determined – based Upon Execution of the

Agreement by both parties

B. POINT OF CONTACT: The County has designated a Procurement Officer who is responsible for the conduct of this procurement whose name, address and telephone number is listed below:

Irene Shen, Procurement Officer County of Santa Clara Procurement Department 2310 North First Street, Suite 201 San Jose, CA 95131-1040 Telephone: (408) 491-7412 E-mail: [email protected]

Any inquiries or requests regarding this procurement must be submitted to the Procurement Officer in writing. Offerors may contact ONLY the Procurement Officer regarding this RFP.

C. EXPLANATION OF EVENTS

1. ISSUE OF RFP

This RFP is being issued by the County of Santa Clara Procurement Department. Copies of this RFP including supporting documents may be obtained from Bidsync’s web site at http://www.bidsync.com

2. PREPROPOSAL CONFERENCE

No pre-proposal conference is scheduled for this RFP. Please submit all questions by the due date listed in Paragraph A of Section II.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 8 of 182

Page 9:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Non-mandatory. Attendance at the pre-proposal conference is strongly recommended but is not a prerequisite for submission of a proposal. For those unable to attend in person, a teleconference conference line is available: dial 877-402-9757 and enter access code 7094144. The County does not guarantee error free connection. See date, time, and location of the preproposal conference below.

Mandatory. Attendance at the pre-proposal conference is a prerequisite for submission of a proposal. Offerors must attend in order to be considered. See date, time, and location of the preproposal conference below.

Preproposal Conference date/time/location: Date: November 29, 2016 Time: 9:00 a.m. Pacific Standard Time Location: Procurement Department Cedar Conference Room – 2nd Floor

2310 North First Street, Suite 201 San Jose, Ca 95131-1040

Potential Offerors are strongly encouraged to submit written questions to the RFP Point of Contact in advance of the conference. Additional written questions may be submitted at the conference. Oral responses at the conference are not binding until addressed in the form of a written addendum posted on: www.bidsync.com.

3. DEADLINE TO SUBMIT WRITTEN QUESTIONS

Potential Offerors may submit written questions to this RFP until the deadline as indicated in paragraph A of Section III. Written questions may be submitted through www.bidsync.com or via email to the Procurement Officer listed in Section I, Paragraph D. The Procurement Officer will not respond to questions submitted in any other manner or format.

4. RESPONSE TO WRITTEN QUESTIONS / RFP ADDENDUM

Written responses to written questions regarding the substance of the RFP will be listed on an addendum to the RFP and posted on the bid management site: www.bidsync.com. Additional written questions must be received by the Procurement Officer no later than two (2) days after the addendum is posted. The County will respond in the same manner. Thereafter, the County does not guarantee that it will respond to questions submitted before the RFP closing date and time.

Any material changes to the RFP will be issued as an addendum, and posted on www.bidsync.com. The County reserves the right to post additional addenda until the RFP closing date and time.

5. DEADLINE TO SUBMIT INTENT TO RESPOND

Pursuant to the INTRODUCTION section of this RFP, Offerors intending to participate in the solicitation should submit via email, APPENDIX I, INTENT TO RESPOND, to the Procurement Officer at the due date as specified in Section III.A Sequence of Events.

6. SUBMISSION OF PROPOSAL

Proposals must be addressed to and received at the place listed below. All received proposals will be time stamped.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 9 of 182

X

Page 10:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Irene Shen, Procurement OfficerRFP-PRO-FY17-0098 SCVMC Secure Text Messaging System County of Santa Clara Procurement Department 2310 North First St., Suite 201 San Jose, CA 95131-1040

Proposals must be sealed and labeled on the outside of the package to clearly indicate that they are in response to the RFP # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System as referenced on the cover page.

7. PROPOSAL EVALUATION

An Evaluation Committee will review and evaluate the proposals. Offerors that demonstrate their capacity, ability and capability to meet the County’s requirements and cost will be determined to be within the competitive range and selected on the shortlist of Offerors to progress to the next round of evaluation. At the County’s option, those Offerors in the shortlist will be invited to participate in additional interviews, demonstrations, and/or presentations as required. One of more Offerors may be selected as finalist(s) to enter into negotiations with the County with an intent to award a contract.

8. SELECTION OF SHORT LIST {If applicable}

Offerors that demonstrate their capacity, ability, and capability to meet the County’s requirements will be determined to be within the competitive range and selected on the shortlist of Offerors to progress to the next round of evaluation.

9. DEMONSTRATION/PRESENTATIONS {If applicable}

At County’s option, Offerors may be required to perform a demonstration/presentation of their proposed solution. Demonstrations/presentations will be held on-site at a County location. The specific date, time, and location are to be determined.

10. SELECTION OF FINALIST FOR NEGOTIATIONS

At County’s option, one or more Offerors may be selected as finalists and invited to move forward in the process.

11. NEGOTIATIONS

At County’s option, one or more Offerors may be selected to enter into final negotiations with the intent of award.

12. ISSUE NOTICE OF INTENT TO AWARD

Pursuant to the completion of the final negotiations, the Procurement Officer will issue a notice of intent to award a contract and notify all Offerors.

13. CONTRACT APPROVAL AND EXECUTION

Commencement of Agreement is upon execution by both parties. Based on the total value of the agreement, either the Board of Supervisors or the Director of Procurement will execute the Agreement.

14. COMMENCEMENT OF AGREEMENT

Commencement of Agreement is upon execution by both parties.

15. ANTICIPATED GO-LIVE DATE

Anticipated go-live date is based Upon Execution of the Agreement by both parties.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 10 of 182

Page 11:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

IV. EVALUATION CRITERIA

A. FACTORS

The evaluation criteria listed below will be used in the evaluation of written proposals. The expectation is that those proposals in the competitive range may be considered for contract award. The proposal should provide clear, concise information in sufficient detail to allow an evaluation based on the criteria below. An Offeror must be acceptable in all criteria for a contract to be awarded to the Offeror that offers the best value to the County.

1. Corporate strength, qualifications, references and reputation of Offeror;2. Ability to meet technical, functionality and integration requirements;3. Implementation, project managements, training and ongoing support4. Local Business Preference

The overall total cost to the County will be considered and the degree of importance of cost will increase with the degree of equality of the proposals in relation to the other factors on which is to be based.

B. LOCAL BUSINESS PREFERENCE

In accordance with applicable sections of Board Policy, Section 5.6.5.2, in the formal solicitation of goods or services, the County of Santa Clara shall give responsive and responsible Local Businesses the preference described below.

“Local Business” means a lawful business with a physical address and meaningful “production capability” located within the boundary of the County of Santa Clara. The term “production capability” means sales, marketing, manufacturing, servicing, provision of services, or research and development capability that substantially and directly enhances the firm's or bidder's ability to perform the proposed contract. Post Office box numbers, residential addresses, a local sales office without any support and/or a local subcontractor hired by the contractor may not be used as the sole basis for establishing status as a “Local Business.”

In the procurement of goods or services using an Invitation to Bid or another solicitation method in which price is the determining factor for award of the contract, five percent (5%) shall be subtracted from a bid submitted by a responsive and responsible Local Business in determining the lowest responsive responsible bidder. If application of the 5% results in a Local Business bid being lower than the non-local business bid, the contract award shall be made to the Local Business at the Local Business' original bid price. If after applying the 5% discount, two or more competing vendors have bid the same price, local businesses shall be given preference.

In the procurement of goods or services in which best value is the determining basis for award of the contract - for example, a Request for Proposals - five percent (5%) of the total points awardable will be added to the Local Business score.

When a contract for goods or services, as defined in this policy, is presented to the Board for approval, the accompanying transmittal document shall include a statement as to whether the proposed vendor is a Local Business, and whether the application of the local preference policy was a decisive factor in the award of the proposed contract. The local preference policy may only be applied based on the entity submitting a bid or proposal and not a subcontractor or business partner. This Local Business preference shall not apply to the following:

a. Public works contracts; b. Where such a preference is precluded by local, state or federal law or regulation;c. Contracts funded in whole or in part by a donation or gift to the County where the special conditions

attached to the donation or gift prohibits or conflicts with this preference policy. The donation or gift must be approved or accepted by the Board in accordance with County policy; or

d. Contracts exempt from solicitation requirements under an emergency condition in accordance with Board policy, state law and/or the County of Santa Clara Ordinance Code.”

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 11 of 182

Page 12:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

In order to be considered for Local Preference, Offeror must complete and submit Declaration of Local Business with its RFP response.

C. WAGE THEFT PREVENTION POLICY

The County of Santa Clara does not tolerate wage theft. Accordingly, Santa Clara County Board of Supervisors’ Policy Manual, Section 5.5.5.4, includes the following:

Wage Theft Prevention

It is the policy of the County that all parties contracting with the County must comply with all applicable federal, state, and local wage and hour laws, including, but not limited to, the Federal Fair Labor Standards Act, the California Labor Code, and any Minimum Wage Ordinance enacted by the County or any city within the County of Santa Clara. A potential contractor that has submitted a formal or informal bid to provide goods and/or services to the County may be disqualified if the potential contractor has been found, by a court or by final administrative action of an investigatory government agency, to have violated applicable wage and hour laws in the five years prior to the submission of a bid to provide goods and/or services. A current contractor found by a court or by final administrative action of an investigatory government agency to have violated applicable wage and hour laws, in the five years prior to or during the term of the contract with the County, may be in material breach of its contract with the County if the violation is not fully disclosed and/or satisfied per County guidelines and contract requirements. Such breach may serve as a basis for contract termination and/or any other remedies available under law, including a stipulated remediation plan.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 12 of 182

Page 13:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

V. RESPONSE FORMAT AND ORGANIZATION

This section contains relevant information Offerors should use for the preparation of their proposals.

A. NUMBER OF RESPONSES

Offerors must submit only one written proposal, but may include more than one option or alternative offer of service in the proposal. An Offeror may submit an amended proposal before the deadline for receipt of proposals. Such amended proposals must be complete replacements for a previously submitted proposal and must be clearly identified as such in the transmittal letter. The County personnel will not merge, collate, or assemble proposal materials.

Offerors will be allowed to withdraw their proposals at any time prior to the deadline for receipt of proposals. The Offeror must submit a written withdrawal request signed by the Offeror’s duly authorized representative addressed to the Point of Contact.

B. ORIGINAL AND COPIES

a. Hardcopies

Offerors must provide one (1) original and seven (7) identical copies of their proposal to the location specified on or before the closing date and time for receipt of proposals.

The original binder/submittal must be stamped “ORIGINAL” and contain original signatures on the necessary forms. The remaining sets should be copies of the originals.

b. Electronic Copy

Electronic copy of the proposal is for the purpose of developing the contract for award. Offerors shall provide one (1) electronic copy of their proposal in flash drive format, readable by Microsoft Office 2003 (Word, Excel and Project) software. The flash drive shall be included in the ORIGINAL binder.

C. PROPOSAL FORMAT

All proposals shall be typewritten on standard 8 ½ x 11 paper (larger paper is permissible for charts, spreadsheets, etc.). and placed within a binder with tabs delineating each section. Hard copies should utilize both sides of the paper where practical.

The proposal should be organized and indexed in the following format and must contain at a minimum all listed items in the sequence indicated. Failure to meet the proposal format will lead to disqualification.

Table of Contents Tab 1: (Section VI, A) Letter of Transmittal

(Section VI, B) Executive SummaryTab 2: (Section VI, C) Corporate Experience, Stability/Strength, and Reputation (include copies

of Financial Statements here).Tab 3: (Sections VI, D - H)Tab 4: Appendix A1: Technical Requirements Response Form (County Hosted)

Appendix A2: Features, Functionalities, and Integration Response Form (County Hosted) Appendix A3: Implementation, Project Management, Training And Ongoing Support (County Hosted)Appendix A4: Vendor Acknowledgement of Vendor Remote Access and User Responsibility Statement

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 13 of 182

Page 14:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

And/Or

Appendix B1: Technical Requirements Response Form (Vendor Hosted) Appendix B2: Features, Functionalities, and Integration Response Form (Vendor Hosted) Appendix B3: Implementation, Project Management, Training And Ongoing Support (Vendor Hosted)Appendix B4: CSP Security Assessment Checklist

Tab 5: (Section VI, J) Other Submittals Appendix C: Non-collusion Declaration Form Appendix D: Declaration of Local Business Appendix E: Declaration of Compliance with Wage Theft Prevention PolicyAppendix F Offeror’s Terms and Conditions Appendix G: Offeror’s acknowledgement of Business Associate Agreement (BAA) Statements. Appendix H: Previous Customer Reference FormAppendix I: Intent to Respond

Tab 6: Related Reference Material

Separate:

APPENDIX A5 and/or APPENDIX B5: PROPOSAL COST RESPONSE FORM with relevant information shall be submitted in a separate sealed envelope marked “ORIGINAL APPENDIX A5 AND/OR APPENDIX B5 - Cost Proposal Response form”. In addition, submit all copies in a separate sealed envelope marked “Copies of Appendix A5 And/Or Appendix B5 Cost Proposal Response Form”. Both envelopes (ORIGINAL and COPIES) must be submitted with the original proposal.

D. PROPOSAL PREPARATION INSTRUCTIONS

Within each section of their proposal, Offerors should address the items in the order in which they appear in this RFP. All forms provided in the RFP shall be thoroughly completed and included in the appropriate section of the proposal.

E. NON-CONFORMING SUBMISSIONS

A submission may be construed as a non-confirming proposal, ineligible for consideration or incomplete if it does not comply with the requirement of this RFP.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 14 of 182

Page 15:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

VI. OFFEROR SUBMITTAL AND REQUIREMENTS

This section contains requirements and relevant information Offerors should use for the preparation of their proposals. Offerors should thoroughly respond to each requirement.

A. LETTER OF TRANSMITTAL

The letter of transmittal should include:

a. Identify the submitting organization, include company name, business address, and headquarter location, all offices relevant to the proposed solution and services.

b. Identify all subcontractors that will be used in the performance of the contract. Include company name, business address; headquarter location, and all office relevant to the proposed solution and services. Explain what goods and/or services the subcontractor will provide in relation to the proposed solution. If no subcontractor will be used, state “No subcontractor will be utilized in the performance of the agreement.”

c. Identify the name, title, telephone and fax numbers, and e-mail address of the person authorized by the organization to contractually obligate the organization;

d. Identify the name, title, telephone and fax numbers, and e-mail address of the person authorized to negotiate the contract on behalf of the organization;

e. Identify the names, titles, telephone and fax numbers, and e-mail addresses of persons to be contacted for clarification;

f. Be signed by the person authorized to contractually obligate the organization; and g. Acknowledge receipt of any and all addenda to this RFP h. Identify all sections of the proposal that the Offeror claims contain “proprietary” or “confidential”

information.

B. EXECUTIVE SUMMARY

Include a one- or two-page executive summary which provides the Evaluation Committee with an overview of the significant business and service features of the proposal.

C. OFFEROR’S EXPERIENCE / CORPORATE INFORMATION

The Offeror shall include in their proposal a statement of relevant experience. The Offeror should thoroughly describe, in the form of a narrative, its experience and success as well as the experience and success of its subcontractors (if applicable) in providing services. Please do not refer to a link(s) but provide the actual written material in the proposal.

1. Corporate information:

a. The name of the jurisdiction in which the Offeror is organized and the date of such organization.

b. Length of time your company has been providing the offered solution.

c. A discussion of the type and duration of the business relationship with the manufacturer(s) whose products are included in the proposed systems.

d. A description of the Offeror’s organization, including names of principals, number of employees, client base, areas of specialization and expertise, and any other information that will assist the Evaluation Committee in formulating an opinion about the stability and strength of the organization.

2. Specifics on the number of certified technicians and the depth of their experience with installing and supporting the proposed system. Identify the location and availability of the technicians.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 15 of 182

Page 16:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

3. Provide a complete disclosure if Offeror, its subsidiaries, parent, other corporate affiliates, or subcontractors have defaulted in its performance on a contract during the past five years which has led the other party to terminate the contract. If so, identify the parties involved and the circumstances of the default or termination.

4. A list of any lawsuits filed against the Offeror, its subsidiaries, parent, other corporate affiliates, or subcontractors in the past five years and the outcome of those lawsuits. Identify the parties involved and circumstances. Also, describe any civil or criminal litigation or investigation pending.

5. Provide copies of the most recent years independently audited financial statements, as well as those for the preceding three years. The submission shall include the audit opinion, balance sheet, income statement, retained earnings, cash flows, and notes to the financial statements.

If independently audited financial statements do not exist for the Offeror, the Offeror shall state the reason and, instead, submit sufficient detail information (such as a Dun and Bradstreet report) to enable the Evaluation Committee to determine the financial stability of the Offeror.

Offerors must provide information with their proposal and not defer submission at a later date. The Procurement Officer may request and the Offeror shall supply any additional financial information requested in a timely manner.

6. Provide three (3) different external references from clients who have completed their projects in the last three years and who are willing to validate the Offeror’s past performance on projects of same size and scope. Include public organization references, if any. The minimum information that shall be provided for each client reference follows:

a. Name and title of the contact person; b. Name of the company or governmental entity; c. Address of the contact person; d. Telephone number and email address of contact person; and e. Brief description of the system and services provided (name and version) and go-live date.

7. Offerors shall provide a certificate(s) of insurance or a copy insurance declaration page(s) with their proposals as written evidence of their ability to meet the insurance certificate and other applicable County insurance requirements in accordance with the provisions listed in Attachment 2 of the RFP. In addition,

Offerors should provide a letter from an insurance agent or other appropriate insuring authority documenting their willingness and ability to endorse their insurance policies making the County an additional insured.

Offerors must provide this information with their proposal and not defer a submission at a later date.

D. TECHNICAL REQUIREMENTS

The County is seeking Offeror(s) to provide a complete solution to satisfy the technical, functionality, and integration requirements and Offeror(s) who is/are capable of providing the stated capacity and service levels as well as the training and technical support required to maintain the system in an operational status.

The technical requirements are to be defined referencing the technical requirements in Appendix A1 and Appendix B1.

Offerors must submit a thorough narrative supported by references to the technical documentation in response to questions asked in Appendix A1 and/or Appendix B1. If offering a County hosted solution, please include Appendix A1 in your proposal. If offering a vendor hosted solution, please include Appendix B1 in your proposal. If offering both types of solutions, include both Appendix A1 and Appendix B1 in your proposal.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 16 of 182

Page 17:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

E. FEATURES, FUNCTIONALITIES, AND INTEGRATION REQUIREMENTS

The features and functionality requirements are defined in Appendix A2 and Appendix B2

Offerors must complete and submit with their proposals the features and functional requirements referenced in Appendix A2 and/or Appendix B2. If offering a County hosted solution, please include Appendix A2 in your proposal. If offering a vendor hosted solution, please include Appendix B2 in your proposal. If offering both types of solutions, include both Appendix A2 and Appendix B2 in your proposal.

F. SUPPORT AND SERVICES

The support and services (implementation, project management, training, etc.) are defined in Appendix A3 and Appendix B3.

Offerors must submit a thorough narrative supported by references to the support and service questions asked in Appendix A3 or/or Appendix B3. If offering a County hosted solution, please include Appendix A3 in your proposal. If offering a vendor hosted solution, please include Appendix B3 in your proposal. If offering both types of solutions, include both Appendix A3 and Appendix B3 in your proposal.

G. VENDOR REMOTE ACCESS AND USER RESPONSIBILITY

Attachment 4 lists the Vendor Remote Access and User Responsibility Statements. If offering a county-hosted solution, Offerors shall acknowledge agreement to abide by the terms and conditions of Attachment 4 on Appendix A4.

Should Offerors object to any of the terms and conditions, Offerors must propose specific alternative language and indicate the reason for their objection. The County may or may not accept the alternative language.

H. CSP/SaaS SECURITY ASSESSMENT CHECKLIST

If offering a vendor hosted solution, Offerors must complete and include Appendix B4 – CSP/SaaS Security Assessment Checklist form with proposal.

I. COST PROPOSAL

Offerors shall complete all pages of the Proposal Cost Response Form and submit it in a sealed envelope with their proposal. The proposed costs shall directly relate to the Project Work Plan.

If offering a County hosted solution, please include Appendix A5 in your proposal. If offering a vendor hosted solution, please include Appendix B5 in your proposal. If offering both types of solutions, include both Appendix A5 and Appendix B5 in your proposal.

J. OTHER SUBMITTALS

1. NON-COLLUSION DECLARATION

Offerors shall complete and include Appendix C - Non-collusion Declaration form with their proposal.

2. DECLARATION OF LOCAL BUSINESS

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 17 of 182

Page 18:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Offerors shall complete and include Appendix D - Declaration of Local Business form with their proposal, if applicable.

3. DECLARATION OF COMPLIANCE WITH WAGE THEFT PREVENTION POLICY

Offerors shall complete and include Appendix E - Wage Theft Prevention Declaration form with their proposal.

4. OFFEROR’S TERMS AND CONDITIONS

Offerors shall initial and/or provide information based upon the appropriate statement on Appendix F. Failure to initial shall default to the first response, acceptance of the County’s terms and conditions as is.

5. BUSINESS ASSOCIATE AGREEMENT (BAA)

Attachment 5 lists the Business Associated Agreement Statement. Offerors shall acknowledge agreement to abide by the terms and conditions of Attachment 5 on Appendix G.

Should Offerors object to any of the terms and conditions, Offerors must propose specific alternative language and indicate the reason for their objection. The County may or may not accept the alternative language.

6. PREVIOUS CUSTOMER REFERENCE FORM

Offerors shall complete and include Appendix H – Previous Customer Reference form with their proposal.

7. INTENT TO RESPOND

Pursuant to the Introduction section of this RFP, Vendors intending to participate in the solicitation should submit via email, Appendix I - Intent to Respond, to the Procurement Officer at the due date as specified in Section III.A, Sequence of Events.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 18 of 182

Page 19:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX A1TECHNICAL REQUIREMENTS RESPONSE FORM

(COUNTY HOSTED)

If proposing a county-hosted (client/server) solution, please complete and submit Appendix A1 with your proposal.

A. TECHNICAL REQUIREMENTS

1. Description of System

a. Describe and attach a diagram of your application architecture.

b. Do you require operation from a central repository and application, or can these be distributed to remote satellite operations? If the latter, what aspects of the operation will be more difficult/easier to manage?

c. Provide a description of the proposed product, database, software, and services, including how the proposed system will meet or exceed the requirements stated in the entire RFP. Include sufficient technical information about the application, operating environment and performance data to enable the County to determine whether or not the proposed system meets the technical environment prerequisites.

d. Identify/list all software required for the solution that is not supplied directly by the Offeror (any/all third party software) including license types and counts.

e. Provide a case study for a successful Public Health Open Data Portal system implementation used by a health care provider of comparable size and a government entity like the County of Santa Clara. Technical data such as bandwidth usage, request response time, storage projections and use etc. will be helpful.

f. Provide an overview and/or benchmarks relating to the system’s ability to process information in real time. Include the number of concurrent users as well as named users the proposed system will accommodate and state the maximum number of recommended users.

g. Does the solution’s Integration product support highly available Virtual Servers? If so, please describe the capabilities.

2. Integration

a. Identify any requirement to purchase interfaces from other vendors to work with the proposed solution.

b. Describe any built-in capabilities for integrating with external systems.

c. Describe if the system supports and is optimized for mobile devices (tablets, smart phones).

d. Describe if the system supports a web-based front end or if a client install is required.

e. Define the system’s capability to support multiple browser types (i.e. Internet Explorer, Mozilla Firefox, Chrome, Safari, and Opera) on different platforms, and the minimum version of each browser supported if the system supports web-based access.

f. Specify all browser plug-ins necessary to utilize web-based features.

g. Specify the web service standards used and the functionality exposed through the web services, if the system supports the use of web service protocols such as SOAP.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 19 of 182

Page 20:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

h. The County may not be able or willing to conform to the process orientation or operating constraints put forth by the programs. As such, do you offer the ability to configure operating parameters of the programs? Please describe the level of capability associated with configuration options, and what conditional situation can be modified, through control panels, parametric configuration files, or other alternatives?

i. Are business rule modifications supported? How is this accomplished? If rules are changed, how might this impact future product upgrades?

3. Data Management

a. Describe the system’s overall data management approach.

b. Provide a copy of the Service Level Agreement.

c. Describe the capabilities for periodically exporting data stored in the database, and if it can be exported to MS Excel, MS Access or other software. Specify supported export formats (i.e. Excel, CVS, SAS, STATA, SPSS etc.)

d. Describe if dynamic connections may be made to the system.

e. Describe the system’s data archiving capabilities.

f. Explain how the information can be retrieved from the archive. Explain how the data is stored within the database, including if it can be stored in a separate database.

g. Explain how the entire dataset could be retrieved in an industry standard format in case of disengagement or discontinuity of service.

h. The types of projects that the system supports.

i. The types of project information and metadata supported by the system out of the box.

j. Describe the system’s ability to provide statistical analysis of historical data.

k. Indicate if the proposed system requires a customer-provided DBA (Database Administrator) for support.

l. Describe the maximum number of database records that can be stored.

m. Describe your data conversion strategy and tools, given the need to convert/import historical data from legacy systems.

n. Please provide a scalability scenario for the addition of users and the location of the recommended break points. This should be based on the "best practices" for server sizing given an assumed user base.

4. Application Security

a. Describe the system’s compliance with LDAP (Lightweight Directory Access Protocol), and how the system can be configured to authenticate users against it.

b. Describe how the proposed solution can be configured to authenticate users against an Active Directory 2012 tree, if possible.

c. Describe how the solution audits user access and privilege use and the information that is logged. Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System

Page 20 of 182

Page 21:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

d. Describe how access privileges are configured in the system, and whether or not privileges can be based on group designations including anonymous logon.

e. Describe how different levels of security and privileges are established.

f. Describe the granularity of access to system’s security approach related to portfolios, projects, items, reports, etc.

g. Describe the password management features of the proposed system.

h. Describe how the solution allows the County to configure minimum password difficulty requirements, and password lockout policies.

i. Describe how the solution allows system administrators to set a password expiration policy, thereby requiring end-users to change their passwords at a specified interval.

j. Describe how the solution encrypts sensitive information transmitted across the network and internet, and specify the algorithms used.

k. Specify whether the system establishes user identity via:

(1) A user ID and password; or

(2) Two-factor authentication, such as a smart-card and a PIN. If two-factor authentication is available or used, Offeror must describe the hardware requirements, the authentication process, and any supplies needed for ongoing implementation.

l. Specify if a “user inactivity timeout” feature is available that forces a user to re-authenticate if idle for a preconfigured amount of time.

m. Describe how the system utilizes electronic signatures and electronic confirmation (if applicable).

n. Explain how the security and confidentiality of the system data collected and entered into the system will be maintained.

o. Describe the security capabilities of the solution.

p. How does the solution store keys and certificates?

q. If so, does the solution store them as files on the file system?

r. Describe the solution’s capabilities for authorization and authentication.

s. What SSL encryption frameworks are supported? (Cert, Token, passcode)

t. How does the solution interrogate secured messages?

u. Can the secured messages activate events and triggers without being decrypted?

v. Which security protocols does the solution support?

w. How is security configured and/or customized for service consumers and providers?

x. Can security be configured differently for consumer vs. providers?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 21 of 182

Page 22:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

y. Describe how the solution can be configured to support management of Threats and Vulnerabilities.

5. Reporting

a. Describe the system’s standard reporting and report generation capabilities including dashboards and drill down.

b. Describe the system’s data export capabilities.

c. Define which third party reporting tools are compatible with the proposed system.

d. Describe the reporting software compatible with the proposed system (Crystal, MS Excel, MS Access, MS Word, etc.).

e. Describe capabilities and process for creating, editing, and maintaining displays and reports

f. Describe capabilities for customizing views, graphs, and reports by individual user.

g. Describe the reporting software compatible with the proposed system. (Crystal, MS Excel, MS Access, MS Word, SAS, STATA, SPSS, etc.)

6. Communications

a. Describe the system’s capabilities for supporting mass communication (i.e. all users).

b. Describe the system’s capabilities for providing targeted communication (i.e. by group, role, etc.).

c. Describe the system’s capabilities related to real-time communication by group or one-to-one.

d. Describe the system’s built-in help system.

7. Scalability

a. Define the scalability of the proposed system.

b. Can the system be purchased in modules and expanded?

c. Describe the maximum number of projects and project records that can be stored.

d. Does the system scale in parallel, i.e. can additional application servers be configured in a load-balanced cluster?

e. Can the database, application and data analysis components be configured to reside on separate independent servers, so that one impacted subsystem does not affect the overall solution?

8. General

a. Describe licenses required for the software (concurrent / per seat and the number associated). Identify access types for license or any constraints imposed by different license types.

b. Identify if the proposed software is COM (Component Object Model) compliant.

c. Identify if the proposed software is ODBC, OLE-DB or OLAP compliant. Identify any drivers provided.

d. Describe how the system protects database records while it is being accessed by one user, so that multiple users will not attempt to change the record at the same time.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 22 of 182

Page 23:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

e. Identify if the solution’s database is ACID (Atomicity, Consistency, Isolation and Durability) compliant, and how it provides transaction rollback capability in the event of a failed transaction.

f. Define the requirements for a test system. Include all related components (hardware, software, etc.) Include test system costs.

g. Provide the data dictionary and schema used by the system.

h. Describe the minimum monitor and screen resolution limit.

i. Describe the process for change management or customer notification.

j. Describe the current generally available (GA) version number and release date, including how often new GA releases are made available.

k. Describe how continuous application and system support is provided 24 hours a day, 365 days per year. Describe the process for requesting support during standard business hours and after hours.

l. Provide the company escalation and response plan, and describe how issues are triaged and escalated.

m. Provide the average response time of the proposed system.

n. Describe the level of customization available without a programmer or vendor support.

o. Provide the location of the closest service representative.

p. Define the system uptime. Include planned downtime windows.

9. Equipment and Software

a. Provide detailed server hardware specifications, including but not limited to:

(1) operating system

(2) processors type and speed

(3) redundancy

(4) system configuration

(5) hard drive size

b. Include a list of all hardware and software components the County must purchase.

c. Describe the proposed system architecture.

d. Describe the proposed systems transaction processing capabilities.e. Describe how the client software and agent components are able to coexist with other software and

application on end-user devices.

f. Describe hardware support and escalation process.

g. Describe any maintenance and support the client is expected to do.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 23 of 182

Page 24:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

h. Describe, in detail, any test facilities available to test our assets/inventory of tagged items.

10. Backup/Recovery

a. Describe the backup capabilities for the proposed system.

b. Describe the process for automatic reprogramming and/or recovery after a failure due to hardware, software, or absence of power.

c. Describe the capabilities for periodically exporting data stored in the database, and if it can be exported to MS Excel, MS Access or other software.

d. How does your system support Disaster Recovery (DR)?

e. Please provide a system architecture diagram of the solution.

f. Does the solution’s Integration product support highly available Virtual Servers? If so, please describe the capabilities.

g. Is the streaming Server Java or Windows Based?

h. If so, list the JVMs that have been certified with the solution

i. Describe the architecture of the solution to support load balancing, high availability and clustering.

j. Does the solution provide capabilities for change control/management?

k. Does the solution support active/active clustering?

l. If the solution supports clustering, describe the process for adding additional servers the cluster.

m. If the solution supports clustering, can a cluster node be scheduled to be removed from a cluster without impacting any in-flight transactions or processes?

n. Describe the capabilities for Business Continuity Planning (BCP) and/or and Disaster Recovery (DR) capabilities of the solution and the recommended configuration(s) to implement it, balance cost versus BC/DR over-design.

o. Does the solution support multiple network interfaces with different transports active simultaneously?

p. Does the solution support installing the product in any directory on any drive?

q. Does the solution provide the ability to save configuration metadata data for reuse in silent installations?

r. Does the solution provide the capability to support a silent script install.

s. If so, please describe the process to support a silent install and particularly one without the necessity of human intervention.

t. If so, does the silent installations provide warning and error messages detailing installation failures and/or warnings to indicate configuration issues.

u. Does the solution generate an Installation log detailing all installation events (services, executables, setting privileges, movement of files, etc.)?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 24 of 182

Page 25:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

v. Does the solution provide or execute a pre-Installation check of the environment and identify any configuration errors (operating system software levels and requisite patches, disk space, available memory, etc.)?

w. Does the solution provide to execute a post-Installation check of the environment and identify any configuration errors (operating system software levels and requisite patches, disk space, available memory, etc.)?

x. Does the solution provide any samples to test and verify the installation?

y. If so, please describe the capability provided

z. Does the solution provide an automated uninstall tool to remove the solution

aa. If so, does this support the ability to save Meta data or databases configured by the solution (Event Triggers, Message Structure Type Definitions, Routing Rules, or Transformation Rules?

bb. If so, does the uninstall tool provide the ability to optionally preserve the existing installation settings to facilitate a product reinstallation.

cc. Does the solution support the capability for multiple versions of the solution to be installed on the same host?

dd. If so, can these multiple instances operate concurrently on the same host providing support for multi-instance environments (for upgrade and release support)?

ee. If so, can an instance can be removed from the environment without affecting other instances on the same host?

ff. How can the solution be configured to avoid points of failure?

11. Network/Hardware

a. Offeror must meet the SCVHHS technical requirements listed in section I.B.10, “Technical Environment.”

b. Provide a system/network design diagram, which provides a visual summary of the system’s servers, network and ancillary components and their relationships.

c. Provide specifications for a virtual server environment (i.e. VM ware).

d. Describe any proprietary equipment utilized.

e. Describe any special networking requirements, i.e. dedicated/segregated network segments, VLANs, etc.

f. Describe the response time expected with the proposed system.

g. Please describe the per-user network bandwidth requirements for usage of your product. Estimates should be based on a typical end user. Please be sure to detail the expected requirements throughout the entire active session.

12. Storage

a. Explain how data is archived (e.g., on demand, automatically, via optical disk, etc.).

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 25 of 182

Page 26:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

b. Describe how the system will store the data on non-proprietary media and in an industry-standard format. Offeror should also specify the type of media used for long-term storage and the format in which it is stored.

c. Describe the archival scheme for the system, including the recommended length of time data is retained on the production system and the availability of data for reporting after archiving.

d. Describe the maximum size of the database and the largest currently operating production and archive directories.

e. Describe the long-term storage options available for the system.

f. Describe how the system will print information on demand. Offeror must specify any special hardware or required printers necessary for printing.

g. Explain how long batches (batch processing data) remain in the system.

13. Software Releases

a. Does the solutions support software releases with backward compatibility of interfaces, metadata, and configurations?

b. Does the solutions support the ability to have software releases applied to specific product instances independently?

c. Is the solutions software release upgrade process fully automated?

d. Does the solutions software release upgrade process perform an automated upgrade of configuration metadata and databases?

e. Does the solutions software release upgrade process perform an automated backup of the pre-upgrade product state?

f. Does the solutions software release upgrade process perform an automated rollback and restore reverting to the pre-upgrade product state in the event of an upgrade error or operator intervention during the upgrade?

g. Does the solutions software release upgrade process execute within 1 hour?

h. Does the solutions software release upgrade process installation perform validations for all pre-requisite and co-requisite software availability?

i. Does the solutions support software releases with backward compatibility of interfaces, metadata, and configurations?

j. Does the solutions software release upgrade provide documentation identifying and describing the functional changes included in the release?

k. What is the format of the documentation?

l. Does the solutions software release upgrade provide documentation that identifying all files changed by the release?

m. What have been the typical frequency of software releases for the solution over the past two years?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 26 of 182

Page 27:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

n. Describe the expected frequency of software releases in the Vendor Explanations section for the upcoming two years.

o. What is the current duration of support for prior software releases?

14. Describe the support policy for older software releases in the Vendor Explanations section. Critical Updates, Patches and Antivirus

a. Describe the process for approving and installing operating system Critical Updates. Attach the Offeror policy regarding Microsoft Critical Updates.

b. Describe or attach the company Service Pack policy for the proposed solution.

c. Describe the Antivirus software used to protect data in real-time on the vendor’s servers.

d. Describe any issues that may occur when running Antivirus software in real-time on the workstations.

e. Describe or attach the company policy regarding the use of anti-virus software with the proposed system.

f. Describe the disclosure policies related to security vulnerabilities found in the system, including procedures in place to notify customers of potential flaws, and the average time between a flaw being discovered and corrective action taken.

g. Does the vendor provide Hotfixes which address specific problems and do not require product reinstallation or data conversions?

h. If so, have any prior Hotfixes impacted altered or added new functionality.

i. Does the vendor provide detailed documentation for Hotfixes which identify the functionality targeted by the hotfix and describes the problem(s) resolved by the Hotfix?

j. Does the application of Hotfixes preclude being able to obtain vendor support?

15. Vendor Remote Support

a. Provide any software application and hardware requirements if Vendor supplies remote support.

b. Provide network diagram for vendor remote support.

16. Escrow

a. Explain your company’s ability to make available a software escrow account and include the source code and all products released during the maintenance term, including third party software. List the products that your company will hold in an escrow account and a list of those products that cannot be held and explain why. NOTE – As Microsoft does not allow for escrow of its software, this requirement is waived for all Microsoft software packages.

b. Explain in detail the process to retrieve the software source code.

c. Provide written evidence of ability to provide and maintain a Software Escrow account in the form of a letter from an escrow agent or other acceptable third party.

d. Explain in detail the build environment needed to support and/or compile the source code in the Software Escrow Account.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 27 of 182

Page 28:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX A2FEATURES, FUNCTIONALITIES, AND INTEGRATION RESPONSE FORM

(COUNTY HOSTED)

The features, functionalities, and integration requirements for physician group for a county hosted solution are listed in this section. Offerors offering a county hosted solution must complete Appendix A2 and include in their proposal.

1. Each item is rated based upon level of importance: “M” means Mandatory, “HD” means Highly Desirable, “D” means Desirable, and “U” means Useful.

M001 – M005 are mandatory requirements. Mandatory requirements must be in the offered current production version by the RFP closing date and time. Solutions that do not meet the mandatory requirements will be deemed non-responsive and the proposal(s) will not be considered. Requirements M004a-M004f anticipate recommendations from the Joint Commission (TJC). Place “Yes” or “No” in the “Availability” column for mandatory requirements and provide proof if answering “Yes.”

REQUIREMENTS:

ID Description Importance Meet Mandatory Requirement? (Yes/No)

Proof if Answering YesReference related material by title and include in Tab 6

M001 Supplement and/or replace existing (non-secure) pagers and paging systems with at least equivalent functionality via secure text messaging.

M

M002 The secure text messaging solution must be compatible with Apple iPhone 6 or newer end-user devices running iOS 9.3.5 or newer

M

M003 The secure text messaging solution must be capable of storing, managing and protecting a projected message volume of 10’s of thousands of messages per day.

M

M004a Signing on to a device to retrieve messages must be secure as specified by SCVMC. SCVMC must be able to manage the balance between security and access so that users are not tempted to abandon secure text messaging in favor of other mechanisms.

M

M004b Messages must be encrypted whenever transmitted, and whenever stored on a device. That encryption algorithm must be industry-standard AES128 or greater.

M

M004c The status of sent text messages must be visible to the sender; in particular whether or not the text message has been (i) received; and/or (ii) read by the receiver.

M

M004d Messages must be date- and time-stamped; this must be recorded in and retrievable from the solution messaging archive.

M

M004e Message retention time on devices must be customizable to meet the security requirements of SCVMC.

M

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 28 of 182

Page 29:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance Meet Mandatory Requirement? (Yes/No)

Proof if Answering YesReference related material by title and include in Tab 6

M004f There must be a centrally-maintained contact list of individuals and their devices authorized to send/receive secure messages.

M

M005 The VMWare Airwatch mobile device management system must be used to deploy and manage the secure text messaging solution to all mobile devices which use it.

M

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 29 of 182

Page 30:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

2. Offeror shall place the appropriate letter response code in the “Availability” column for non-mandatory requirements. If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column.

“A” means specification is one that currently exists in the proposed software, in the current production version and included in the County’s price.

‘B” means specification is not in the proposed software but it is a planned enhancement. The enhancement will be included in the system at no additional cost.

“C” means specification is not part of the proposed software but can be added at an additional cost. Disclose all costs on the Cost Response Form.

“D” means specification is not available in the proposed solution.

6. Offeror may use the “Comments” column to reference, by title, any related technical material and include the material in Tab 6 of the proposal.

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

Messaging

MSG1 Support message priority flags (at least “high”, “normal”)

HD

MSG2 Support request for acknowledgment. HD

MSG3 Support message recall. HD

MSG4 Support group and broadcast messages. HD

MSG5 Send secure messages to non-users of the SVCMC secure text messaging system.

HD

MSG6 Support user-customizable “quick list” of pre-configured response messages to secure text messaging users.

D

MSG7 Send secure messages to patients in at least two circumstances: post-discharge, and pre-visit.

D

MSG8 Support user-customizable “quick list” of pre-configured response messages to patients.

D

System Integration

INT1 Support message initiation from the treatment and care team displays in HealthLink (Epic).

HD

INT2 For messages initiated from the treatment team or care teams in HealthLink (Epic), seamlessly pass the user (sender) and patient contexts along with the message.

HD

INT3 Support group messaging to selected members of treatment and or care team as maintained in HealthLink (Epic).

HD

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 30 of 182

Page 31:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

INT4 Support message initiation from the on-call system (Amion and successor systems TBD)

HD

INT5 For messages initiated from the on-call system, seamlessly pass whatever context information is available (user/sender +/- patient contexts).

HD

INT6 Support group messaging to selected individuals from the on-call system

HD

INT7 Once the user has authenticated via the SCVMC active directory, use those credentials to support secure messaging (no additional sign-on requirement).

HD

INT8 All or part of a thread must be made readily available for copying into nursing documentation (equivalent to Provider Notification documentation currently implemented in HealthLink).

HD

INT9 Data from the solution messaging archive must be available from within the Enterprise Reporting Environment at SCVMC

HD

INT10 If standard one-way text paging is still supported, make sure this is indicated on contact lists as “non-secure”, and support numeric paging ONLY on such devices.

D

INT11 Supports web-based portal to view, edit and send text messages

D

Technical

TEC1 Messages must arrive with minimal latency; messaging platform on devices must work however the device is connected – either wifi or cellular.

HD

TEC2 Solution shall be a fully supported vendor product, 24/7 (i.e. to maintain and fix in the event of downtime).

HD

TEC3 Solution shall be able to support Interface engine message File Types (HL7, sFTP, XML, X12 or SOAP Web Services) whichever is appropriate. Also, support real time and batched interfaces.

HD

TEC4 Integrate seamlessly with Microsoft Office applications, including Office, Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web browsers, included, but not limited to, Internet Explorer, Google Chrome, Safari and Mozilla Firefox.

HD

TEC5 Enlist the help of data integration software to sync master data stores with open data repositories for automated or scheduled configurations.

D

TEC6 Ability to use SecureLink as the remote access solution.

D

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 31 of 182

Page 32:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

TEC7 The secure text messaging solution is compatible with other end-user devices running Google Android

D

Contacts

CON1 Support centralized management of contact groups within the secure contact list

HD

CON2 Integrate display of secure contacts with each users list of personal contacts

HD

CON3 Uniform integration of secure contacts across organizations

D

CON4 Support user management of personal groups in the contact list, which may include a mix of secure and non-secure contacts

D

Attachments

ATT1 Support secure capture and share images, audio and video, without storing on the device.

D

ATT2 Support secure exchange of .pdf, .xls and .doc files.

D

Notifications

NOT1 Support user-controlled message notification status (at least “Online”, “Do Not Disturb”, “Away”).

HD

NOT2 Support user-controlled forwarding notification path to be used when notification status is “Away”.

HD

NOT3 Support message escalation up through phone calls; support central escalation management by people with specialized access.

HD

NOT4 Support central customization of notification alerts and behaviors (at least for test results critical values).

D

NOT5 Support redundant notification paths (at least for test result critical values).

D

Security

SEC1 Support remote “wiping” of message archive on specific user devices.

HD

SEC2 Support remote “wiping” of messaging application on specific user devices.

HD

SEC3 Support central management of message archive according to local policy.

HD

SEC4 Call back requests enable recipient to call back with a single tap, embedding phone number directly into message

HD

SEC5 Message notifications displayed do not include any ePHI

HD

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 32 of 182

Page 33:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

SEC6 Vendor solution has been audited and certified by 3rd party. Vendor has training and procedures in place to properly handle PHI

HD

SEC7 The secure texting application can be password protected for use at the discretion of SCVMC; if used this feature can never be disabled

D

SEC8 Passwords generated/used for application are of sufficient complexity (application)

D

SEC9 All login attempts, both successful and failures, are logged and monitored

D

SEC10 Application accounts are locked after a defined number of failed login attempts

D

SEC11 Resetting the application password destroys all saved messages

D

Reporting

REP1 Data from the solution messaging archive must be available from within the Enterprise Reporting Environment at SCVMC

HD

REP2 At least the following times must be recorded for later access via reporting: message initiation, message receipt, message read, message acknowledged

HD

REP3 Links between messages in a conversation (thread) must be recorded for later access via reporting

HD

REP4 Escalations for all messages must be recorded and included as part of links in a conversation

HD

REP5 All data available for reporting from the archive must be retrievable according to at least an ODBC standard interface via SQL

HD

REP6 Support messages to all devices in the message archive, including non-secure devices

HD

Change Management

CM1 Solution shall have built in process to inform all applicable governing bodies (e.g. Medical Executive Committee) of changes prior to implementation

HD

CM2 Capture enhancement and bug fix requests D

CM3 Capture application change and maintenance requests D

CM4 Manage status and disposition of all service and change requests

D

CM5 Manage application down time schedule D

CM6 Capture versioning and patch levels related to applications

D

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 33 of 182

Page 34:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

CM8 Provide automated notification for required upgrades and patching

D

System Administration

SA1 System automatically performs incremental and/or full data backups at least nightly.

HD

SA2 Specify access to and control of, and ownership of backup data.

HD

SA1 System automatically performs incremental and/or full data backups at least nightly.

HD

User Interface

UI1 Solution shall have ADA compliant capabilities (e.g. voice recognition, languages, fonts, viewing).

HD

UI2 GUI screens should use reasonable colorful differentiation.

D

UI3 Fully scalable fonts (resizing of workspace for visibility or real estate).

D

UI4 Easy forward and backward navigation between workflow/entry.

D

UI5 Page splitting (side by side viewing) for easy workflow compare on or workflow training.

D

UI6 Intuitive layout for easy navigation. D

UI7 Navigation by workflow. D

UI8 Logical grouping by functionality. D

UI9 Change alerts (email) and logging. D

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 34 of 182

Page 35:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX A3IMPLEMENTATION, PROJECT MANAGEMENT, TRAINING AND ONGOING SUPPORT

(COUNTY HOSTED)

1. Project Implementation Plan and Project Management Team

a. Include the implementation plan and approach the Offeror intends to employ for the project and an explanation of how it will support the project requirements and logically lead to the required deliverables. The description shall include the organization of the project team, including accountability and lines of authority.

b. Describe services to be provided to ensure success of the project e.g. publicize the system to employees, organizing support infrastructure and processes, consulting on content set up and management etc.

c. Describe how the relationship between the County and Offeror will be managed from an account and technical support perspective.

d. Describe what is required of the County to ensure the successful implementation of the system.

e. Include the steps that will be undertaken to identify and resolve any issues or problems before, during, and after the implementation.

f. Include a list of proposed project staff and key personnel.

g. Provide resumes, experience narratives, and at least one reference for key personnel who will be assigned to the project, if awarded the contract.

h. Explain the relationship of the project management team with the Offeror, including job title and years of employment with the Offeror; role to be played in connection with the proposal; relevant certifications and experience.

2. Statement of Work (SOW) - Training Plan

a. Include a description for training of both real time and batch responses for three different audiences: i. Power users/administrators, general users, Content creators and Instructors. ii. Technical administrators of the proposed system. iii. Technical operations staff and support staff for the proposed system.

b. Describe the type and quantity of training that will be provided for each audience. The description must include:

i. The methods by which training will be provided e.g. online, on-site, webcast, self-paced online courses etc.; ii. A recommended training curriculum; iii. Explain how the Offeror will work with the County to determine training needs and tailor the curriculum; iv. Explain the type of training that will be provided at what stage/phase of the project as well as follow-up training after implementation; v. Explain the ability to provide training at a County location.

c. Describe the training facility requirements for physical layout, communication needs (internet connectivity, etc.), projectors, # of computers, etc. that are needed to fulfill the proposed training plan. Identify which elements of the training facility will be supplied by the Offeror.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 35 of 182

Page 36:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

3. SOW - Project Work Plan

Include a detailed work plan for the implementation and operation of the proposed system.

a. Task Level -The plan shall include all activities necessary for a successful project down to the task level. No task can exceed more than eighty hours in the work plan.

b. Identify All Resources - The plan shall clearly identify all Offeror (including subcontractors) and using agency resources required to successfully complete the project. Provide job descriptions and the number of personnel to be assigned to tasks supporting implementation of the project. Identify County resources needed for each task.

c. Deliverables – describe the deliverables of each task.

d. Time lines – describe the timeline of each task.

e. Acceptance criteria – describe the criteria used to determine completion of each task.

f. Plan Progress Charts - The plan shall include appropriate progress/Gantt charts that reflect the proposed schedule and all major milestones. A sample project plan shall be submitted using Microsoft Project.

4. System Documentation

a. Describe the documentation provided to facilitate system implementation.

b. Describe the System Administrator documentation provided.

c. Describe if user groups exist to collaborate on issues pertaining to the Offeror’s software, including how often and where they meet. Explain if the user group is a separate independent organization or funded and organized by the Offeror.

d. Attach a listing summarizing available stock (“canned”) reports provided by the solution and a sample of each.

e. Describe how system documentation is provided (online, hard copy etc.) for the initial implementation as well as future updates and releases.

f. Describe any user help system that is included as part of the solution.

5. Acceptance Test Plan

Include an acceptance test plan. The plan shall individually address each system component that comprises of the proposed system, approach for load testing, and number of people to be involved in testing. The plan should document the acceptance testing approach, resources and/or tools that may be used to validate the functions and features of the proposed system. Include an example test plan that is representative of the structure, content, and level of detail planned for this project.

6. Risk Management

Submit a risk assessment using the methodology published by the Project Management Institute or other comparable methodology. Include risk mitigation strategies as well as the resources the using agency may utilize to reduce risk.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 36 of 182

Page 37:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

7. On-Going Service and Support

a. Describe the post implementation follow-up activities that will be provided by the Offeror, specifically addressing the following tasks:

i. Post-live system debugging to bring application into full conformance with documentation, proposal, and modification specifications ii. Six-month and 12-month post live operational (non-technical) audits to review SCVMC utilization of the software and to provide recommendations for optimizing benefits. iii. Describe how application and support documentation is updated and distributed.

b. Provide the normal hours and describe the channels (phone, email, web, etc.) for support. Describe how after hours support is provided. Describe the support and escalation process, including response times.

c. Indicate the current version of the package. Indicate when the next major version of the package will be available. For major software upgrades, describe how often upgrades are released, how upgrades are defined, developed, tested and released, how customers are notified and educated about the upgrade. Describe the decision process on how new features and functions get included in the product.

d. Explain if the cost of upgrades (including “patches”, corrections to defects, feature enhancements, and minor and major version updates) is included with the proposed solution.

e. Explain if software upgrades, or other maintenance window, will impose a service disruption on the system. If yes, discuss frequency and duration of the service disruptions.

f. Describe the method used for change management and advance notification timeframe for application changes.

g. Explain if there is a user group. If yes, explain how often they meet and where the meetings are held. Include if the user group is a separate independent organization or funded and organized by the Offeror.

8. Value Added Services (Optional)

Offerors are encouraged but not required to propose any optional value added services they believe would help the using agency to effectively implement, operate, or use the proposed system. Information provided in this section must be directly relevant to and not exceed two (2) pages in length.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 37 of 182

Page 38:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX A4OFFEROR’S ACKNOWLEDGEMENT

VENDOR REMOTE ACCESS /SECURELINK AND USER RESPONSIBILITY STATEMENTS

If offering a county-hosted solution, Offerors shall acknowledge agreement to abide by the terms and conditions of Attachment 3 here. Should Offerors object to any of the terms and conditions, Offerors must propose specific alternative language here and indicate the reason for their objection on this form. The County may or may not accept the alternative language.

Offerors must provide this information with their proposal and not defer a submission at a later date.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 38 of 182

Page 39:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX A5PROPOSAL COST RESPONSE FORM

(COUNTY HOSTED)

Page 1 of 2

Offeror: Please complete the applicable sections based upon your proposed solution. The proposed cost shall include all fees, including one-time and recurring, sales tax, and value added options.

All pricing proposals must be submitted using this form. Offerors may submit their own pricing structure/format for further clarity in same tab, if necessary.

Name of Proposed Solution: ___________________ Version: _________________

Section I – One Time Costs

DESCRIPTION PROPOSED PRICE

1. Proposed Software

2. Integration

3. Implementation Services

4. Project Management

5. Training, including all materials

6. Travel Expenses (County reimbursement of travel expense shall not exceed rates as specified in Attachment 6 – County Travel Policy)

7. Other One-time Costs (Total from Section II below)

8. Applicable Sales Tax

Total One Time Cost

Offeror Name: ________________________________________

Section II – Other One-time Costs

*Please itemize all other costs and enter total in Row 7 in the above table.

Description Cost 1. ______________________________________________ $_________________

2. ______________________________________________ $_________________

3. ______________________________________________ $_________________

Total $ _________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 39 of 182

Page 40:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Page 2 of 2

Section III – Recurring Annual Costs

List any recurring costs below:

MAINTENANCE AND SUPPORT

LIST PRICE/COST PROPOSED COST DISCOUNT % OFF LIST PRICE/COST

1. Year One

2. Year Two

3. Year Three

4. Year Four

5. Year Five

TOTAL

Section IV – Other Value Added Services:

Please itemize other value added services cost below.

Description Cost

1. ______________________________________________ $_______________

2. ______________________________________________ $_______________

3. ______________________________________________ $_______________

Offeror Name: ________________________________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 40 of 182

Page 41:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX B1TECHNICAL REQUIREMENTS RESPONSE FORM

(VENDOR HOSTED)

A. TECHNICAL REQUIREMENTS

1. Description of System

a. Explain if the solution you are offering is a CSP or SaaS system.

b. Describe and attach a diagram of your application architecture.

c. Provide a description of the proposed product, database, software and services, including how the proposed system will meet or exceed the requirements stated in the entire RFP. Include sufficient technical information about the application, operating environment and performance data to enable the County to determine whether or not the proposed system meets the technical environment prerequisites.

d. Identify/list all software required for the solution that is not supplied directly by the Offeror (any/all third party software) including license types and counts.

e. Provide a case study for a successful Public Health Open Data Portal system implementation used by a health care provider of comparable size and a government entity like the County of Santa Clara. Technical data such as bandwidth usage, request response time, storage projections and use etc. will be helpful.

f. Provide an overview and/or benchmarks relating to the system’s ability to process information in real time. Include the number of concurrent users as well as named users the proposed system will accommodate and state the maximum number of recommended users.

2. Integration

a. Identify any requirement to purchase interfaces from other vendors to work with the proposed solution.

b. Describe any built-in capabilities for integrating with external systems

c. Describe if the system supports and is optimized for mobile devices (tablets, smart phones).

d. Describe if the system supports a web-based front end or if a client install is required.

e. Define the system’s capability to support multiple browser types (i.e. Internet Explorer, Mozilla Firefox, Chrome, Safari, and Opera) on different platforms, and the minimum version of each browser supported if the system supports web-based access.

f. Specify all browser plug-ins necessary to utilize web-based features.

g. Specify the web service standards used and the functionality exposed through the web services, if the system supports the use of web service protocols such as SOAP.

h. The County may not be able or willing to conform to the process orientation or operating constraints put forth by the programs. As such, do you offer the ability to configure operating parameters of the programs? Please describe the level of capability associated with configuration options, and what conditional situation can be modified, through control panels, parametric configuration files, or other alternatives?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 41 of 182

Page 42:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

i. Are business rule modifications supported? How is this accomplished? If rules are changed, how might this impact future product upgrades?

j. Complete and submit the CSP Security Assessment Checklist. (Appendix B4)

3. Data Management

a. Describe the system’s overall data management approach.

b. Provide a copy of the Service Level Agreement.

c. Describe the capabilities for periodically exporting data stored in the database, and if it can be exported to MS Excel, MS Access or other software. Specify supported export formats (i.e. Excel, CVS, SAS, STATA, SPSS etc.)

d. Describe if dynamic connections may be made to the system.

e. Describe the system’s data archiving capabilities.

f. Explain how the information can be retrieved from the archive. Explain how the data is stored within the database, including if it can be stored in a separate database.

g. Explain how the entire dataset could be retrieved in an industry standard format in case of disengagement or discontinuity of service.

h. The types of data that the system supports.

i. The types of metadata supported by the system out of the box.

j. Describe the system’s ability to provide statistical analysis of historical data.

k. Indicate if the proposed system requires a customer-provided DBA (Database Administrator) for support.

l. Describe the maximum number of database records that can be stored.

m. Describe your data conversion strategy and tools, given the need to convert/import historical data from legacy systems.

Please provide a scalability scenario for the addition of users and the location of the recommended break points.

4. Application Security

a. Describe the system’s compliance with LDAP (Lightweight Directory Access Protocol), and how the system can be configured to authenticate users against it.

b. Describe how the proposed solution can be configured to authenticate users against an Active Directory tree, if possible.

c. Describe how the solution audits user access and privilege use and the information that is logged.

d. Describe how access privileges are configured in the system, and whether or not privileges can be based on group designations including anonymous logon.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 42 of 182

Page 43:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

e. Describe how different levels of security and privileges are established. f. Describe the granularity of access to system’s security approach related to portfolios, projects, items,

reports, etc.

g. Describe the password management features of the proposed system.

h. Describe how the solution allows the County to configure minimum password difficulty requirements, and password lockout policies.

i. Describe how the solution allows system administrators to set a password expiration policy, thereby requiring end-users to change their passwords at a specified interval.

j. Describe how the solution encrypts sensitive information transmitted across the network and internet, and specify the algorithms used.

k. Specify whether the system establishes user identity via:

(1) A user ID and password; or

(2) Two-factor authentication, such as a smart-card and a PIN. If two-factor authentication is available or used, Offeror must describe the hardware requirements, the authentication process, and any supplies needed for ongoing implementation.

l. Specify if a “user inactivity timeout” feature is available that forces a user to re-authenticate if idle for a preconfigured amount of time.

m. Describe how the system utilizes electronic signatures and electronic confirmation (if applicable).

n. Explain how the security and confidentiality of the system data collected and entered into the system will be maintained.

o. Describe the security capabilities of the solution.

p. How does the solution store keys and certificates?

q. If so, does the solution store them as files on the file system?

r. Describe the solution’s capabilities for authorization and authentication.

s. What SSL encryption frameworks are supported? (Cert, Token, passcode)

t. How does the solution interrogate secured messages?

u. Can the secured messages activate events and triggers without being decrypted?

v. Which security protocols does the solution support?

w. How is security configured and/or customized for service consumers and providers?

x. Can security be configured differently for consumer vs. providers?

y. Describe how the solution can be configured to support management of Threats and Vulnerabilities.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 43 of 182

Page 44:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

5. Security

a. Describe network security features used to protect customer data/information (i.e. firewalls, network segmentation, etc.).

b. Explain the type of physical security used to protect customer information in vendor data centers and co-location facilities.

c. Explain the type of electronic security used (i.e. biometrics, authentication, and surveillance) at vendor and co-location facilities.

d. Explain how the security and confidentiality of the system data collected and entered into the system will be maintained.

e. Describe, in detail, how County data will be partitioned from other customer’s information. Include information on whether separate database containers are used.

6. Reporting

a. Describe the system’s standard reporting and report generation capabilities including dashboards and drill down.

b. Describe the system’s data export capabilities.

c. Define which third party reporting tools are compatible with the proposed system.

d. Describe the reporting software compatible with the proposed system (Crystal, MS Excel, MS Access, MS Word, etc.).

e. Describe capabilities and process for creating, editing, and maintaining displays and reports.

f. Describe capabilities for customizing views, graphs, and reports by individual user.

g. Describe the reporting software compatible with the proposed system. (Crystal, MS Excel, MS Access, MS Word, SAS, STATA, SPSS, etc.)

7. Communications

a. Describe the system’s capabilities for supporting mass communication (i.e. all users).

b. Describe the system’s capabilities for providing targeted communication (i.e. by group, role, etc.).

c. Describe the system’s capabilities related to real-time communication by group or one-to-one.

d. Describe the system’s built-in help system.

8. Scalability

a. Define the scalability of the proposed system.

b. Can the system be purchased in modules and expanded?

c. Describe the maximum number of projects and project records that can be stored. Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System

Page 44 of 182

Page 45:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

d. Does the system scale in parallel, i.e. can additional application servers be configured in a load-balanced cluster?

e. Can the database, application, and data analysis components be configured to reside on separate independent servers, so that one impacted subsystem does not affect the overall solution?

9. General

a. Describe any professional services automation and management capabilities that the system provides.

b. Describe licenses required for the software (concurrent / per seat and the number associated). Identify access types for license or any constraints imposed by different license types.

c. Describe how the system protects database records while it is being accessed by one user, so that multiple users will not attempt to change the record at the same time.

d. Identify if the solution’s database is ACID (Atomicity, Consistency, Isolation, and Durability) compliant, and how it provides transaction rollback capability in the event of a failed transaction.

e. Define the requirements for a test system. Include all related components (hardware, software, etc.) Include test system costs.

f. Provide the data dictionary and schema used by the system.

g. Describe the minimum monitor and screen resolution limit.

h. Describe the process for change management or customer notification.

i. Describe the current generally available (GA) version number and release date, including how often new GA releases are made available.

j. Describe how continuous application and system support is provided 24 hours a day, 365 days per year. Describe the process for requesting support during standard business hours and after hours.

k. Provide the company escalation and response plan, and describe how issues are triaged and escalated.

l. Provide the average response time of the proposed system.

m. Describe the level of customization available without a programmer or vendor support.

n. Provide the location of the closest service representative.

o. Define the system uptime. Include planned downtime windows.

10. Equipment and Software

a. Provide detailed workstation hardware specifications, including but not limited to, operating system, RAM, size of the hard drive, type of monitors, etc.

b. Provide detailed hardware specifications for any customer-hosted components being proposed.

c. Describe how the client software components are able to coexist with other software and applications on Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System

Page 45 of 182

Page 46:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

end-user workstations.

d. Describe the proposed system architecture.

e. Describe hardware support and escalation process for any customer-hosted component.

f. Describe any customer-required maintenance/support tasks and any relevant maintenance schedules.

11. Backup/Recovery

a. Describe the backup capabilities for the proposed system.

(1) Process for how backups are performed

(2) Process for Tenant-initiated backups

(3) Service availability guarantee

b. Describe in detail your company’s Disaster Recovery plan, including requirements for zero-downtime.

c. Describe the notification provided if an application failure occurs.

d. Describe the process for automatic reprogramming and/or recovery after a failure due to hardware, software or absence of power.

e. Describe the capabilities for periodically exporting data stored in the database, and if it can be exported to MS Excel, MS Access or other software.

12. Network/Hardware

a. Describe the response time expected with the proposed system.

b. Please describe the per-user network bandwidth requirements for usage of your product. Estimates should be based on a typical end user. Please be sure to detail the expected requirements throughout the entire active session.

13. Storage

a. Describe the system’s data archiving capabilities including:

(1) How data is archived (e.g., on demand, automatically, via optical disk, etc.)

(2) The archival scheme for the system, including the recommended length of time data is retained on the production system and the availability of data for reporting after archiving.

(3) How the system will store the data on non-proprietary media and in an industry-standard format. Offeror should also specify the type of media used for long-term storage and the format in which it is stored.

(4) How the information can be retrieved from the archive. Explain how the data is stored within the database, including if it can be stored in a separate database

(5) The long-term storage options available for the system.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 46 of 182

Page 47:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

b. Describe the maximum size of the database and the largest currently operating production and archive directories.

c. Describe how the system will print information on demand. Offeror must specify any special hardware or required printers necessary for printing.

d. Explain how the data is stored within the database, including if it can be stored in a separate database for disparate customers and/or locations. Explain how data from multiple tenants/customers is segregated and arranged.

e. Explain how long batches (batch processing data) remain in the system.

14. Software Releases

a. Does the solutions support software releases with backward compatibility of interfaces, metadata and configurations?

b. Does the solutions support the ability to have software releases applied to specific product instances independently?

c. Is the solutions software release upgrade process fully automated?

d. Does the solutions software release upgrade process perform an automated upgrade of configuration metadata and databases?

e. Does the solutions software release upgrade process perform an automated backup of the pre-upgrade product state?

f. Does the solutions software release upgrade process perform an automated rollback and restore reverting to the pre-upgrade product state in the event of an upgrade error or operator intervention during the upgrade?

g. Does the solutions software release upgrade process execute within 1 hour?

h. Does the solutions software release upgrade process installation perform validations for all pre-requisite and co-requisite software availability?

i. Does the solutions support software releases with backward compatibility of interfaces, metadata and configurations?

j. Does the solutions software release upgrade provide documentation identifying and describing the functional changes included in the release?

k. What is the format of the documentation?

l. Does the solutions software release upgrade provide documentation that identifying all files changed by the release?

m. What have been the typical frequency of software releases for the solution over the past two years?

n. Describe the expected frequency of software releases in the Vendor Explanations section for the upcoming two years.

o. What is the current duration of support for prior software releases?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 47 of 182

Page 48:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

15. Critical Updates, Patches and Antivirus

a. Describe the process for approving and installing operating system Critical Updates. Attach the Offeror policy regarding Microsoft Critical Updates.

b. Describe or attach the company Service Pack policy for the proposed solution.

c. Describe the Antivirus software used to protect data in real-time on the vendor’s servers.

d. Describe any issues that may occur when running Antivirus software in real-time on the workstations.

e. Describe or attach the company policy regarding the use of anti-virus software with the proposed system.

f. Describe the disclosure policies related to security vulnerabilities found in the system, including procedures in place to notify customers of potential flaws, and the average time between a flaw being discovered and corrective action taken.

16. Escrow

a. Explain your company’s ability to make available a software escrow account and include the source code and all products released during the maintenance term, including third party software. List the products that your company will hold in an escrow account and a list of those products that cannot be held and explain why. NOTE – As Microsoft does not allow for escrow of its software, this requirement is waived for all Microsoft software packages.

b. Explain in detail the process to retrieve the software source code.

c. Provide written evidence of ability to provide and maintain a Software Escrow account in the form of a letter from an escrow agent or other acceptable third party.

d. Explain in detail the build environment needed to support and/or compile the source code in the Software Escrow Account.

17. CSP Redundancy and Downtime

a. Explain in detail your company’s ability to provide 99.9% uptime for remote customer access to the system. Describe the methodology and application/hosting architecture used to ensure this level of reliability.

b. Explain in detail the process used to notify customers of application downtime for both planned and unplanned outages.

c. Explain in detail any geographic separation of redundant datacenters used to mitigate wide area disasters or events.

d. Explain and describe in detail the features used to ensure the security, redundancy, resiliency and integrity of the datacenter(s) hosting the application, infrastructure and other components.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 48 of 182

Page 49:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX B2FEATURES, FUNCTIONALITIES, AND INTEGRATION RESPONSE FORM

(VENDOR HOSTED)

The features, functionalities, and integration requirements for physician group for a county hosted solution are listed in this section. Offerors offering a vendor hosted solution must complete Appendix B2 and include in their proposal.

1. Each item is rated based upon level of importance: “M” means Mandatory, “HD” means Highly Desirable, “D” means Desirable, and “U” means Useful.

M001 – M005 are mandatory requirements. Mandatory requirements must be in the offered current production version by the RFP closing date and time. Solutions that do not meet the mandatory requirements will be deemed non-responsive and the proposal(s) will not be considered. Requirements M004a-M004f anticipate recommendations from the Joint Commission (TJC). Place “Yes” or “No” in the “Availability” column for mandatory requirements and provide proof if answer “Yes.”

REQUIREMENTS:

ID Description Importance Meet Mandatory Requirement? (Yes/No)

Proof if Answering Yes Reference related material by title and include in Tab 6

M001 Supplement and/or replace existing (non-secure) pagers and paging systems with at least equivalent functionality via secure text messaging.

M

M002 The secure text messaging solution must be compatible with Apple iPhone 6 or newer end-user devices running iOS 9 or newer

M

M003 The secure text messaging solution must be capable of storing, managing and protecting a projected message volume of 10’s of thousands of messages per day.

M

M004a Signing on to a device to retrieve messages must be secure as specified by SCVMC. SCVMC must be able to manage the balance between security and access so that users are not tempted to abandon secure text messaging in favor of other mechanisms.

M

M004b Messages must be encrypted whenever transmitted, and whenever stored on a device. That encryption algorithm must be industry-standard AES128 or greater.

M

M004c The status of sent text messages must be visible to the sender; in particular whether or not the text message has been (i) received; and/or (ii) read by the receiver.

M

M004d Messages must be date- and time-stamped; this must be recorded in and retrievable from the solution messaging archive.

M

M004e Message retention time on devices must be customizable to meet the security requirements of SCVMC.

M

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 49 of 182

Page 50:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance Meet Mandatory Requirement? (Yes/No)

Proof if Answering Yes Reference related material by title and include in Tab 6

M004f There must be a centrally-maintained contact list of individuals and their devices authorized to send/receive secure messages.

M

M005 The VMWare Airwatch mobile device management system must be used to deploy and manage the secure text messaging solution to all mobile devices which use it.

M

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 50 of 182

Page 51:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

2. Offeror shall place the appropriate letter response code in the “Availability” column for non-mandatory requirements. If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column.

“A” means specification is one that currently exists in the proposed software, in the current production version and included in the County’s price.

‘B” means specification is not in the proposed software but it is a planned enhancement. The enhancement will be included in the system at no additional cost.

“C” means specification is not part of the proposed software but can be added at an additional cost. Disclose all costs on the Cost Response Form.

“D” means specification is not available in the proposed solution.

7. Offeror may use the “Comments” column to reference, by title, any related technical material and include the material in Tab 6 of the proposal.

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

Messaging

MSG1 Support message priority flags (at least “high”, “normal”)

HD

MSG2 Support request for acknowledgment. HD

MSG3 Support message recall. HD

MSG4 Support group and broadcast messages. HD

MSG5 Send secure messages to non-users of the SVCMC secure text messaging system.

HD

MSG6 Support user-customizable “quick list” of pre-configured response messages to secure text messaging users.

D

MSG7 Send secure messages to patients in at least two circumstances: post-discharge, and pre-visit.

D

MSG8 Support user-customizable “quick list” of pre-configured response messages to patients.

D

System Integration

INT1 Support message initiation from the treatment and care team displays in HealthLink (Epic).

HD

INT2 For messages initiated from the treatment team or care teams in HealthLink (Epic), seamlessly pass the user (sender) and patient contexts along with the message.

HD

INT3 Support group messaging to selected members of treatment and or care team as maintained in HealthLink (Epic).

HD

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 51 of 182

Page 52:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

INT4 Support message initiation from the on-call system (Amion and successor systems TBD)

HD

INT5 For messages initiated from the on-call system, seamlessly pass whatever context information is available (user/sender +/- patient contexts).

HD

INT6 Support group messaging to selected individuals from the on-call system

HD

INT7 Once the user has authenticated via the SCVMC active directory, use those credentials to support secure messaging (no additional sign-on requirement).

HD

INT8 All or part of a thread must be made readily available for copying into nursing documentation (equivalent to Provider Notification documentation currently iimplemented in HealthLink).

HD

INT9 Data from the solution messaging archive must be available from within the Enterprise Reporting Environment at SCVMC

HD

INT10 If standard one-way text paging is still supported, make sure this is indicated on contact lists as “non-secure”, and support numeric paging ONLY on such devices.

D

INT11 Supports web-based portal to view, edit and send text messages

D

Technical

TEC1 Messages must arrive with minimal latency; messaging platform on devices must work however the device is connected – either wifi or cellular.

HD

TEC2 Solution shall be a fully supported vendor product, 24/7 (i.e. to maintain and fix in the event of downtime).

HD

TEC3 Solution shall be able to support Interface engine message File Types (HL7, sFTP, XML, X12 or SOAP Web Services) whichever is appropriate. Also, support real time and batched interfaces.

HD

TEC4 Integrate seamlessly with Microsoft Office applications, including Office, Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web browsers, included, but not limited to, Internet Explorer, Google Chrome, Safari and Mozilla Firefox.

HD

TEC5 Enlist the help of data integration software to sync master data stores with open data repositories for automated or scheduled configurations.

D

TEC6 Ability to use SecureLink as the remote access solution.

D

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 52 of 182

Page 53:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

TEC7 The secure text messaging solution is compatible with other end-user devices running Google Android

D

Contacts

CON1 Support centralized management of contact groups within the secure contact list

HD

CON2 Integrate display of secure contacts with each users list of personal contacts

HD

CON3 Uniform integration of secure contacts across organizations

D

CON4 Support user management of personal groups in the contact list, which may include a mix of secure and non-secure contacts

D

Attachments

ATT1 Support secure capture and share images, audio and video, without storing on the device.

D

ATT2 Support secure exchange of .pdf, .xls and .doc files.

D

Notifications

NOT1 Support user-controlled message notification status (at least “Online”, “Do Not Disturb”, “Away”).

HD

NOT2 Support user-controlled forwarding notification path to be used when notification status is “Away”.

HD

NOT3 Support message escalation up through phone calls; support central escalation management by people with specialized access.

HD

NOT4 Support central customization of notification alerts and behaviors (at least for test results critical values).

D

NOT5 Support redundant notification paths (at least for test result critical values).

D

Security

SEC1 Support remote “wiping” of message archive on specific user devices.

HD

SEC2 Support remote “wiping” of messaging application on specific user devices.

HD

SEC3 Support central management of message archive according to local policy.

HD

SEC4 Call back requests enable recipient to call back with a single tap, embedding phone number directly into message

HD

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 53 of 182

Page 54:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

SEC5 Message notifications displayed do not include any ePHI

HD

SEC6 Vendor solution has been audited and certified by 3rd party. Vendor has training and procedures in place to properly handle PHI

HD

SEC7 The secure texting application can be password protected for use at the discretion of SCVMC; if used this feature can never be disabled

D

SEC8 Passwords generated/used for application are of sufficient complexity (application)

D

SEC9 All login attempts, both successful and failures, are logged and monitored

D

SEC10 Application accounts are locked after a defined number of failed login attempts

D

SEC11 Resetting the application password destroys all saved messages

D

Reporting

REP1 Data from the solution messaging archive must be available from within the Enterprise Reporting Environment at SCVMC

HD

REP2 At least the following times must be recorded for later access via reporting: message initiation, message receipt, message read, message acknowledged

HD

REP3 Links between messages in a conversation (thread) must be recorded for later access via reporting

HD

REP4 Escalations for all messages must be recorded and included as part of links in a conversation

HD

REP5 All data available for reporting from the archive must be retrievable according to at least an ODBC standard interface via SQL

HD

REP6 Support messages to all devices in the message archive, including non-secure devices

HD

Change Management

CM1 Solution shall have built in process to inform all applicable governing bodies (e.g. Medical Executive Committee) of changes prior to implementation

HD

CM2 Capture enhancement and bug fix requests D

CM3 Capture application change and maintenance requests D

CM4 Manage status and disposition of all service and change requests

D

CM5 Manage application down time schedule D

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 54 of 182

Page 55:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ID Description Importance (HD) Highly Desirable

(D) Desirable(U) Useful

Availability(A/B/C/D)

Comments Reference related material by title and include in Tab 6 (If your availability response is “B” or “C”, please provide the estimated delivery date in the Comments column)

CM6 Capture versioning and patch levels related to applications

D

CM8 Provide automated notification for required upgrades and patching

D

System Administration

SA1 System automatically performs incremental and/or full data backups at least nightly.

HD

SA2 Specify access to and control of, and ownership of backup data.

HD

SA1 System automatically performs incremental and/or full data backups at least nightly.

HD

User Interface

UI1 Solution shall have ADA compliant capabilities (e.g. voice recognition, languages, fonts, viewing).

HD

UI2 GUI screens should use reasonable colorful differentiation.

D

UI3 Fully scalable fonts (resizing of workspace for visibility or real estate).

D

UI4 Easy forward and backward navigation between workflow/entry.

D

UI5 Page splitting (side by side viewing) for easy workflow compare on or workflow training.

D

UI6 Intuitive layout for easy navigation. D

UI7 Navigation by workflow. D

UI8 Logical grouping by functionality. D

UI9 Change alerts (email) and logging. D

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 55 of 182

Page 56:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX B3IMPLEMENTATION, PROJECT MANAGEMENT, TRAINING AND ONGOING SUPPORT

(VENDOR HOSTED)

1. Project Implementation Plan and Project Management Team

a. Include the implementation plan and approach the Offeror intends to employ for the project and an explanation of how it will support the project requirements and logically lead to the required deliverables. The description shall include the organization of the project team, including accountability and lines of authority.

b. Describe services to be provided to ensure success of the project e.g. publicize the system to employees, organizing support infrastructure and processes, consulting on content set up and management etc.

c. Describe how the relationship between the County and Offeror will be managed from an account and technical support perspective.

d. Describe what is required of the County to ensure the successful implementation of the system.

e. Include the steps that will be undertaken to identify and resolve any issues or problems before, during and after the implementation.

f. Include a list of proposed project staff and key personnel.

g. Provide resumes, experience narratives and at least one reference for key personnel who will be assigned to the project, if awarded the contract.

h. Explain the relationship of the project management team with the Offeror, including job title and years of employment with the Offeror; role to be played in connection with the proposal; relevant certifications and experience.

2. Statement of Work (SOW) - Training Plan

a. Include a description for training of both real time and batch responses for three different audiences:

i. Power users/administrators, general users, Content creators and Instructors. ii. Technical administrators of the proposed system. iii. Technical operations staff and support staff for the proposed system.

b. Describe the type and quantity of training that will be provided for each audience. The description must include:

i. The methods by which training will be provided e.g. online, on-site, webcast, self-paced online courses etc.;

ii. A recommended training curriculum; iii. Explain how the Offeror will work with the County to determine training needs and tailor the curriculum; iv. Explain the type of training that will be provided at what stage/phase of the project as well as follow-up

training after implementation; v. Explain the ability to provide training at a County location.

c. Describe the training facility requirements for physical layout, communication needs (internet connectivity, etc.), projectors, # of computers, etc. that are needed to fulfill the proposed training plan. Identify which elements of the training facility will be supplied by the Offeror.

3. SOW - Project Work Plan

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 56 of 182

Page 57:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Include a detailed work plan for the implementation and operation of the proposed system.

a. Task Level -The plan shall include all activities necessary for a successful project down to the task level. No task can exceed more than eighty hours in the work plan.

b. Identify All Resources - The plan shall clearly identify all Offeror (including subcontractors) and using agency resources required to successfully complete the project. Provide job descriptions and the number of personnel to be assigned to tasks supporting implementation of the project. Identify County resources needed for each task.

c. Deliverables – describe the deliverables of each task.

d. Time lines – describe the timeline of each task.

e. Acceptance criteria – describe the criteria used to determine completion of each task.

f. Plan Progress Charts - The plan shall include appropriate progress/Gantt charts that reflect the proposed schedule and all major milestones. A sample project plan shall be submitted using Microsoft Project.

4. System Documentation

a. Describe the documentation provided to facilitate system implementation.

b. Describe the System Administrator documentation provided.

c. Describe if user groups exist to collaborate on issues pertaining to the Offeror’s software, including how often and where they meet. Explain if the user group is a separate independent organization or funded and organized by the Offeror.

d. Attach a listing summarizing available stock (“canned”) reports provided by the solution and a sample of each.

e. Describe how system documentation is provided (online, hard copy etc.) for the initial implementation as well as future updates and releases.

f. Describe any user help system that is included as part of the solution.

5. Acceptance Test Plan Include an acceptance test plan. The plan shall individually address each system component that comprises of the proposed system, approach for load testing, and number of people to be involved in testing. The plan should document the acceptance testing approach, resources and/or tools that may be used to validate the functions and features of the proposed system. Include an example test plan that is representative of the structure, content, and level of detail planned for this project.

6. Risk Management Submit a risk assessment using the methodology published by the Project Management Institute or other comparable methodology. Include risk mitigation strategies as well as the resources the using agency may utilize to reduce risk.

7. On-Going Service and Support

a. Describe the post implementation follow-up activities that will be provided by the Offeror, specifically addressing the following tasks:

i. Post-live system debugging to bring application into full conformance with documentation, proposal and modification specifications

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 57 of 182

Page 58:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ii. Six-month and 12-month post live operational (non-technical) audits to review SCVMC utilization of the software and to provide recommendations for optimizing benefits.

iii. Describe how application and support documentation is updated and distributed.

b. Provide the normal hours and describe the channels (phone, email, web, etc.) for support. Describe how after hours support is provided. Describe the support and escalation process, including response times.

c. Indicate the current version of the package. Indicate when the next major version of the package will be available. For major software upgrades, describe how often upgrades are released, how upgrades are defined, developed, tested and released, how customers are notified and educated about the upgrade. Describe the decision process on how new features and functions get included in the product.

d. Explain if the cost of upgrades (including “patches”, corrections to defects, feature enhancements, and minor and major version updates) is included with the proposed solution.

e. Explain if software upgrades, or other maintenance window, will impose a service disruption on the system. If yes, discuss frequency and duration of the service disruptions.

f. Offeror shall describe the method used for change management and advance notification timeframe for application changes.

g. Explain if there is a user group. If yes, explain how often they meet and where the meetings are held. Include if the user group is a separate independent organization or funded and organized by the Offeror.

8. Value Added Services (Optional)

Offerors are encouraged but not required to propose any optional value added services they believe would help the using agency to effectively implement, operate or use the proposed system. Information provided in this section must be directly relevant to and not exceed two (2) pages in length.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 58 of 182

Page 59:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX B4CSP/SaaS SECURITY ASSESSMENT CHECKLIST

(VENDOR HOSTED)

OVERALL INSTRUCTIONS

For Vendors completing the attached checklist, note that detailed responses are required, and not just simple “yes” or “no” answers. Enough information must be provided to allow a valid comparison between Vendor practices and those required by the County. Other “proof” that a particular Vendor meets County security guidelines might include the following:

A signed statement from the Vendor A signed attestation from a responsible third-party, such as a Vendor specializing in conducting security audits/assessments Provision of a copy of any relevant documents (e.g., the required IT Security Policy and Business Continuity Plan)

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 59 of 182

Page 60:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

The following checklist identifies the baseline security criteria that need to be considered when a Cloud Service Provider (CSP) solution is being evaluated. This checklist should be included in RFPs issued to Vendors when a Department is considering a CSP solution. The same checklist can also be used to evaluate the security of existing CSP implementations that may not have been subjected to a security review process prior to implementation. In both of these cases, the Department and the SCCGov Office designee will review the Vendor’s responses in order to determine whether adequate security is provided by the Vendor’s proposed solution.

SCCGov Cloud Service Provider ChecklistIn general, the greater the risk involved in implementing a CSP model, the greater the requirement for demonstrating that the Vendor is in compliance with SCCGov policies. The following material is provided as suggestions for evaluating these application solutions, rather than as hard requirements in which each standard must be complied with in full.

 

The situation for each Department considering the use of a CSP implementation will be unique, and the overall security requirements for such applications should be based on the classification level of the data involved, on the Department’s unique business requirements, and on the overall security measures that are in place. For example, if electronic PCI data will be processed by the application, more stringent PCI regulations should be applied.

 

For Vendors completing the attached checklist, note that detailed responses are required, and not just simple “yes” or “no” answers. Enough information must be provided to allow a valid comparison between Vendor practices and those required by the SCCGov. Attach/embed associated documents mentioned / described in the document for review. These will not be made public.

 

Other “proof” that a particular Vendor meets SCCGov security guidelines might include the following:

A signed statement from the Vendor

A signed attestation from a responsible third-party, such as a Vendor specializing in conducting security audits/assessments

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 60 of 182

Page 61:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Provision of a copy of any relevant documents (e.g., the required IT Security Policy and Business Continuity Plan). These are to be in electronic format and can be embedded within this form. SCCGov will not disclose such policies and procedures but reference them as received. DO NOT provide links to documents. The SCCGov requires point-in-time copies of any/all relevant documents.

 

Cloud Service Provider name:

Solution being proposed:

Briefly describe the purpose of the solution. Include an overview of the solution architecture, and identify the data that will be 1) stored in the solution at the Vendor site, and 2) that will be transmitted between the solution and the SCCGov and/or other third parties. Also include information on the user authentication process. NOTE: More detail is better.

SCCGov CIO’s Office Approval: _____________________________________

Title:

Date:

Compliance Audit Planning CO-01

CO-01.1

Do you produce audit assertions using a structured, industry accepted format (ex. CloudAudit/A6 URI Ontology, CloudTrust, SCAP/CYBEX, GRC XML, ISACA's Cloud Computing Management Audit/Assurance Program, etc.)?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 61 of 182

Page 62:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Compliance Independent Audits

CO-02

CO-02.1

Do you allow (describe/explain/attach/embed associated documents) tenants to view your SAS70 Type II/SSAE 16 SOC2/ISAE3402/ISO27001:2005 or similar third party audit reports?

Compliance CO-02.2

Do you conduct (describe/explain/attach/embed associated documents) network penetration tests of your cloud service infrastructure regularly as prescribed by industry best practices and guidance?

Compliance CO-02.3

Do you conduct (describe/explain/attach/embed associated documents) regular application penetration tests of your cloud infrastructure as prescribed by industry best practices and guidance?

Compliance CO-02.4

Do you conduct (describe/explain/attach/embed associated documents) internal audits regularly as prescribed by industry best practices and guidance?

Compliance CO-02.5

Do you conduct (describe/explain/attach/embed associated documents) external audits regularly as prescribed by industry best practices and guidance?

Compliance CO- Are the results of the network penetration

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 62 of 182

Page 63:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

02.6 tests available to tenants at their request?

Compliance CO-02.7

Are the results of internal and external audits available to tenants at their request?

Compliance Third Party Audits

CO-03

CO-03.1

Do you permit tenants to perform independent vulnerability assessments?

Compliance CO-03.2

Do you have (describe/explain/attach/embed associated documents) external third-party conduct vulnerability scans and periodic penetration tests on your applications and networks?

Compliance Contact / Authority Maintenance

CO-04

CO-04.1

Do you maintain liaisons and points of contact with local authorities in accordance with contracts and appropriate regulations?

Compliance Information System Regulatory Mapping

CO-05

CO-05.1

Do you have (describe/explain/attach/embed associated documents) the ability to logically segment or encrypt customer data such that data may be produced for a single tenant only, without inadvertently accessing another tenant's data?

CO-05.2

Do you have (describe/explain/attach/embed associated documents) capability to logically segment and recover

data for a specific customer in the case of a failure Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System

Page 63 of 182

Page 64:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

or

data loss

Compliance Intellectual Property

CO-06

CO-06.1

Do you have (describe/explain/attach/embed associated documents) policies and procedures in place describing what controls you have in place to protect tenant’s intellectual property?

Compliance Intellectual Property

CO-07

CO-07.1

If utilization of tenants services housed in the cloud is mined for cloud provider benefit, are the tenants IP rights preserved?

Compliance Intellectual Property

CO-08

CO-08.1

If utilization of tenants services housed in the cloud is mined for cloud provider benefit, do you provide (describe/explain/attach/embed associated documents) tenants the ability to opt-out?

Data Governance  

Data Governance

Ownership / Stewardship

DG-01

DG-01.1

Do you follow (describe/explain/attach/embed associated documents) a structured data-labeling standard (ex. ISO 15489, Oasis XML Catalog Specification, CSA data type guidance)?

Data Governance

Classification DG-02

DG-02.1

Do you provide (describe/explain/attach/embed associated documents) a capability to identify virtual machines via policy tags/metadata (ex. Tags

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 64 of 182

Page 65:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

can be used to limit guest operating systems from booting/instantiating/transporting data in the wrong country, etc.)?

Data Governance

DG-02.2

Do you provide (describe/explain/attach/embed associated documents) a capability to identify hardware via policy tags/metadata/hardware tags (ex. TXT/TPM, VN-Tag, etc.)?

Data Governance

DG-02.3

Do you have (describe/explain/attach/embed associated documents) a capability to use system geographic location as an authentication factor?

Data Governance

DG-02.4

Can you provide (describe/explain/attach/embed associated documents) the physical location/geography of storage of a tenant’s data upon request?

Data Governance

DG-02.5

Do you allow (describe/explain/attach/embed associated documents) tenants to define acceptable geographical locations for data routing or resource instantiation?

Data Governance

Handling / Labeling / Security Policy

DG-03

DG-03.1

Are Policies and procedures established for labeling, handling and security of data and objects, which contain data?

Data Governance

DG-03.2

Are mechanisms for label inheritance implemented for objects that act as aggregate containers for data?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 65 of 182

Page 66:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Data Governance

Retention Policy

DG-04

DG-04.1

Do you have (describe/explain/attach/embed associated documents) technical control capabilities to enforce tenant data retention policies?

Data Governance

DG-04.2

Do you have (describe/explain/attach/embed associated documents) a documented procedure for responding to requests for tenant data from governments or third parties?

Data Governance

Secure Disposal DG-05

DG-05.1

Do you support (describe/explain/attach/embed associated documents) secure deletion (ex. degaussing / cryptographic wiping) of archived data as determined by the tenant?

Data Governance

DG-05.2

Can you provide (describe/explain/attach/embed associated documents) a published procedure for exiting the service arrangement, including assurance to sanitize all computing resources of tenant data once a customer has exited your environment or has vacated a resource?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 66 of 182

Page 67:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Data Governance

Nonproduction Data

DG-06

DG-06.1

Do you have (describe/explain/attach/embed associated documents) procedures in place to ensure production data shall not be replicated or used in non-production environments?

Data Governance

Information Leakage

DG-07

DG-07.1

Do you have (describe/explain/attach/embed associated documents) controls in place to prevent data leakage or intentional/accidental compromise between tenants in a multi-tenant environment?

Data Governance

DG-07.2

Do you have (describe/explain/attach/embed associated documents) a Data Loss Prevention (DLP) or extrusion prevention solution in place for all systems which interface with your cloud service offering?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 67 of 182

Page 68:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Data Governance

Risk Assessments

DG-08

DG-08.1

Do you provide (describe/explain/attach/embed associated documents) security control health data in order to allow tenants to implement industry standard Continuous Monitoring (which allows continual tenant validation of your physical and logical control status?)

Facility Security  

Facility Security

Policy FS-01

FS-01.1

Can you provide (describe/explain/attach/embed associated documents) evidence that policies and procedures have been established for maintaining a safe and secure working environment in offices, rooms, facilities and secure areas?

Facility Security

User Access FS-02

FS-02.1

Pursuant to local laws, regulations, ethics and contractual constraints are all employment candidates, contractors and third parties subject to background verification?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 68 of 182

Page 69:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Facility Security

Controlled Access Points

FS-03

FS-03.1

Are physical security perimeters (fences, walls, barriers, guards, gates, electronic surveillance, physical authentication mechanisms, reception desks and security patrols) implemented?

Facility Security

Secure Area Authorization

FS-04

FS-04.1

Do you allow (describe/explain/attach/embed associated documents) tenants to specify which of your geographic locations their data is allowed to traverse into/out of (to address legal jurisdictional considerations based on where data is stored vs. accessed)?

Facility Security

Unauthorized Persons Entry

FS-05

FS-05.1

Are ingress and egress points such as service areas and other points where unauthorized personnel may enter the premises monitored, controlled and isolated from data storage and process?

Facility Security

Offsite Authorization

FS-06

FS-06.1

Do you provide (describe/explain/attach/embed associated documents) tenants with documentation that describes scenarios where data may be moved from one physical location to another? (ex. Offsite backups, business continuity failovers, replication)

Facility Security

Offsite equipment

FS-07

FS-07.1

Do you provide (describe/explain/attach/embed associated documents) tenants with documentation

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 69 of 182

Page 70:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

describing your policies and procedures governing asset management and repurposing of equipment?

Facility Security

Asset Management

FS-08

FS-08.1

Do you maintain a complete inventory of all of your critical assets, which includes ownership of the asset?

Facility Security

FS-08.2

Do you maintain a complete inventory of all of your critical supplier relationships?

Human Resources Security  

Human Resources Security

Background Screening

HR-01

HR-01.1

Pursuant to local laws, regulations, ethics and contractual constraints are all employment candidates, contractors and third parties subject to background verification? What is checked during the background verification?

Human Resources Security

Employment Agreements

HR-02

HR-02.1

Do you specifically train your employees regarding their role vs. the tenant's role in providing information security controls?

HR-02.2

Do you document employee acknowledgment of training they have completed?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 70 of 182

Page 71:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Human Resources Security

Employment Termination

HR-03

HR-03.1

Are Roles and responsibilities for following performing employment termination or change in employment procedures assigned, documented and communicated?

Information Security  

Information Security

Management Program

IS-01

IS-01.1

Do you provide (describe/explain/attach/embed associated documents) tenants with documentation describing your Information Security Management Program (ISMP)?

Information Security

Management Support / Involvement

IS-02

IS-02.1

Are policies (describe/explain/attach/embed associated documents) in place to ensure executive and line management take formal action to support information security through clear documented direction, commitment, explicit assignment and verification of assignment execution?

Information Security

Policy IS-03

IS-03.1

Do your information security and privacy policies align with particular industry standards (ISO-27001, ISO-22307, CoBIT, etc.)?

IS- Do you have (describe/explain/attach/embed associated

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 71 of 182

Page 72:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

03.2 documents) agreements, which ensure your providers adhere to your information security and privacy policies?

IS-03.3

Can you provide (describe/explain/attach/embed associated documents) evidence of due diligence mapping of your controls, architecture and processes to regulations and/or standards?

Information Security

Baseline Requirements

IS-04

IS-04.1

Do you have (describe/explain/attach/embed associated documents) documented information security baselines for every component of your infrastructure (ex. Hypervisors, operating systems, routers, DNS servers, etc.)?

Information Security

IS-04.2

Do you have (describe/explain/attach/embed associated documents) a capability to continuously monitor and report the compliance of your infrastructure against your information security baselines?

Information Security

IS-04.3

Do you allow (describe/explain/attach/embed associated documents) your clients to provide their own trusted virtual machine image to ensure conformance to their own internal standards?

Information Policy Reviews IS- IS- Do you notify your tenants when you make material changes to your information

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 72 of 182

Page 73:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security 05 05.1 security and/or privacy policies?

Information Security

Policy Enforcement

IS-06

IS-06.1

Is a formal disciplinary or sanction policy established for employees who have violated security policies and procedures?

Information Security

IS-06.2

Are employees made aware of what action might be taken in the event of a violation and stated as such in the policies and procedures?

Information Security

User Access Policy

IS-07

IS-07.1

Do you have (describe/explain/attach/embed associated documents) controls in place ensuring timely removal of systems access, which is no longer required for business purposes?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 73 of 182

Page 74:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Information Security

IS-07.2

Do you provide (describe/explain/attach/embed associated documents) metrics that track the speed with which you are able to remove systems access which is no longer required for business purposes?

Information Security

User Access Restriction / Authorization

IS-08

IS-08.1

Do you document how you grant and approve access to tenant data?

Information Security

IS-08.2

Do you have (describe/explain/attach/embed associated documents) a method of aligning provider and tenant data classification methodologies for access control purposes?

Information Security

User Access Revocation

IS-09

IS-09.1

Is timely de-provisioning, revocation or modification of user access to the organizations systems, information assets and data implemented upon any change in status of employees, contractors, customers, business partners or third parties?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 74 of 182

Page 75:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Information Security

IS-09.2

Is any change in status intended to include termination of employment, contract or agreement, change of employment or transfer within the organization?

Information Security

User Access Reviews

IS-10

IS-10.1

Do you require at least annual certification of entitlements for all system users and administrators (exclusive of users maintained by your tenants)?

Information Security

IS-10.2

If users are found to have inappropriate entitlements, are all remediation and certification actions recorded?

Information Security

IS-10.3

Will you share user entitlement remediation and certification reports with your tenants, if inappropriate access may have been allowed to tenant data?

Information Security

Training / Awareness

IS-11

IS-11.1

Do you provide (describe/explain/attach/embed associated documents) or make available a formal security awareness training program for cloud-related access and data management issues (i.e., multi-tenancy, nationality, cloud delivery model segregation of duties implications, and conflicts of interest) for all persons with access to tenant data?

Information IS- Are administrators and data stewards

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 75 of 182

Page 76:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security 11.2 properly educated on their legal responsibilities with regard to security and data integrity?

Information Security

Industry Knowledge / Benchmarking

IS-12

IS-12.1

Do you participate in industry groups and professional associations related to information security?

IS-12.2

Do you benchmark your security controls against industry standards?

Information Security

Roles / Responsibilities

IS-13

IS-13.1

Do you provide (describe/explain/attach/embed associated documents) tenants with a role definition document clarifying your administrative responsibilities vs. those of the tenant?

Information Security

Management Oversight

IS-14

IS-14.1

Are Managers responsible for maintaining awareness of and complying with security policies, procedures and standards that are relevant to their area of responsibility?

Information Security

Segregation of Duties

IS-15

IS-15.1

Do you provide (describe/explain/attach/embed associated documents) tenants with documentation on how you maintain segregation of duties within your cloud service offering?

Information User Responsibility

IS-16

IS- How are users made aware of their responsibilities for maintaining awareness

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 76 of 182

Page 77:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security 16.1 and compliance with published security policies, procedures, standards and applicable regulatory requirements?

Information Security

IS-16.2

How are users made aware of their responsibilities for maintaining a safe and secure working environment?

Information Security

IS-16.3

How are users made aware of their responsibilities for leaving unattended equipment in a secure manner?

Information Security

Workspace IS-17

IS-17.1

Do your data management policies and procedures address tenant and service level conflicts of interests?

Information Security

IS-17.2

Do your data management policies and procedures include a tamper audit or software integrity function for unauthorized access to tenant data?

Information Security

IS-17.3

Does the virtual machine management infrastructure include a tamper audit or software integrity function to detect changes to the build/configuration of the virtual machine?

Information Security

Encryption IS-18

IS-18.1

Do you have (describe/explain/attach/embed associated documents) a capability to allow creation of unique encryption keys per tenant?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 77 of 182

Page 78:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Information Security

IS-18.2

Do you support (describe/explain/attach/embed associated documents) tenant generated encryption keys or permit tenants to encrypt data to an identity without access to a public key certificate. (E.g. Identity based encryption)?

Information Security

Encryption Key Management

IS-19

IS-19.1

Do you encrypt tenant data at rest (on disk/storage) within your environment?

Information Security

IS-19.2

Do you leverage encryption to protect data and virtual machine images during transport across and between networks and hypervisor instances?

Information Security

IS-19.3

Do you have (describe/explain/attach/embed associated documents) a capability to manage encryption keys on behalf of tenants?

Information Security

IS-19.4

Do you maintain key management procedures?

Information Security

Vulnerability / Patch Management

IS-20

IS-21.1

Do you conduct (describe/explain/attach/embed associated documents) network-layer vulnerability scans regularly as prescribed by industry best practices?

Information Security

IS-20.2

Do you conduct (describe/explain/attach/embed associated documents) application-layer vulnerability scans regularly as prescribed by industry

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 78 of 182

Page 79:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

best practices?

Information Security

IS-20.3

Do you conduct (describe/explain/attach/embed associated documents) local operating system-layer vulnerability scans regularly as prescribed by industry best practices?

Information Security

IS-20.4

Will you make the results of vulnerability scans available to tenants at their request?

Information Security

IS-20.5

Do you have (describe/explain/attach/embed associated documents) a capability to rapidly patch vulnerabilities across all of your computing devices, applications, and systems?

Information Security

IS-20.6

Will you provide your risk-based systems patching timeframes to your tenants upon request?

Information Security

Antivirus / Malicious Software

IS-21

IS-21.1

Do you have (describe/explain/attach/embed associated documents) anti-malware programs installed on all systems that support your cloud service offerings?

Information Security

IS-21.2

Do you ensure that security threat detection systems that use signatures, lists, or behavioral patterns are updated across all infrastructure components within industry accepted timeframes?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 79 of 182

Page 80:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Information Security

Incident Management

IS-22

IS-22.1

Do you have (describe/explain/attach/embed associated documents) a documented security incident response plan?

Information Security

IS-22.2

Do you integrate customized tenant requirements into your security incident response plans?

Information Security

IS-22.3

Do you publish a roles and responsibilities document specifying what you vs. your tenants are responsible for during security incidents?

Information Security

Incident Reporting

IS-23

IS-23.1

Does your security information and event management (SIEM) system merge data sources (app logs, firewall logs, IDS logs, physical access logs, etc.) for granular analysis and alerting?

Information Security

IS-23.2

Does your logging and monitoring framework allow isolation of an incident to specific tenants?

Information Security

Incident Response Legal Preparation

IS-24

IS-24.1

Does your incident response plan comply with industry standards for legally admissible chain-of-custody management processes & controls?

Information Security

IS-24.2

Does your incident response capability include the use of legally admissible forensic data collection and analysis techniques?

Information IS- Are you capable of supporting litigation holds (freeze of data from a specific point in

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 80 of 182

Page 81:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security 24.3 time) for a specific tenant without freezing other tenant data?

Information Security

IS-24.4

Do you enforce and attest to tenant data separation when producing data in response to legal subpoenas?

Information Security

Incident Response Metrics

IS-25

IS-25.1

Do you monitor and quantify the types, volumes, and impacts on all information security incidents?

Information Security

IS-25.2

Will you share statistical information security incident data with your tenants upon request?

Information Security

Acceptable Use IS-26

IS-26.1

Do you provide (describe/explain/attach/embed associated documents) documentation regarding how you may utilize or access tenant data and/or metadata?

Information Security

IS-26.2

Do you collect or create metadata about tenant data usage through the use of inspection technologies (search engines, etc.)?

Information Security

IS-26.3

Do you allow (describe/explain/attach/embed associated documents) tenants to opt-out of having their data/metadata accessed via inspection technologies?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 81 of 182

Page 82:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Information Security

Asset Returns IS-27

IS-27.1

Are systems in place to monitor for privacy breaches and notify tenants expeditiously if a privacy event may have affected their data?

Information Security

IS-27.2

Is your Privacy Policy aligned with industry standards? What standards are they aligned to?

Information Security

e-commerce Transactions

IS-28

IS-28.1

Do you provide (describe/explain/attach/embed associated documents) open encryption methodologies (3.4ES, AES, etc.) to tenants in order for them to protect their data if it is required to traverse public networks? (ex. the Internet)

Information Security

IS-28.2

Do you utilize open encryption methodologies any time your infrastructure components need to communicate to each other over public networks (ex. Internet-based replication of data from one environment to another)?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 82 of 182

Page 83:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Information Security

Audit Tools Access

IS-29

IS-29.1

Do you restrict, log, and monitor access to your information security management systems? (Ex. Hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.)

Information Security

Diagnostic / Configuration Ports Access

IS-30

IS-30.1

Do you utilize dedicated secure networks to provide management access to your cloud service infrastructure?

Information Security

Network / Infrastructure Services

IS-31

IS-31.1

Do you collect capacity and utilization data for all relevant components of your cloud service offering?

Information Security

IS-31.2

Do you provide (describe/explain/attach/embed associated documents) tenants with capacity planning and utilization reports?

Information Security

Portable / Mobile Devices

IS-32

IS-32.1

Are policies (describe/explain/attach/embed associated documents) and procedures established and measures implemented to strictly limit access to sensitive data from portable and mobile devices, such as

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 83 of 182

Page 84:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

laptops, cell phones, and personal digital assistants (PDAs), which are generally higher-risk than non-portable devices (e.g., desktop computers at the provider organization’s facilities)?

Information Security

Source Code Access Restriction

IS-33

IS-33.1

Are controls in place to prevent unauthorized access to your application, program or object source code, and assure it is restricted to authorized personnel only?

Information Security

IS-33.2

Are controls in place to prevent unauthorized access to tenant application, program or object source code, and assure it is restricted to authorized personnel only?

Information Security

Utility Programs Access

IS-34

IS-34.1

Are utilities that can significantly manage virtualized partitions (ex. shutdown, clone, etc.) appropriately restricted and monitored?

Information Security

IS-34.2

Do you have (describe/explain/attach/embed associated documents) a capability to detect attacks which target the virtual infrastructure directly (ex. shimming, Blue Pill, Hyper

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 84 of 182

Page 85:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

jumping, etc.)?

Information Security

IS-34.3

Are attacks that target the virtual infrastructure prevented with technical controls?

Legal  

Legal Nondisclosure Agreements

LG-01

LG-01.1

Are requirements for non-disclosure or confidentiality agreements reflecting the organization's needs for the protection of data and operational details identified, documented and reviewed at planned intervals?

Legal Third Party Agreements

LG-02

LG-02.1

Do you select and monitor outsourced providers to verify that they comply with laws in the country where the data is processed and stored and transmitted?

Legal LG-02.2

Do you select and monitor outsourced providers in compliance with laws in the country where the data originates?

Legal LG-02.3

Does legal counsel review all third party agreements?

Operations Management  

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 85 of 182

Page 86:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Operations Management

Policy OP-01

OP-01.1

Are policies (describe/explain/attach/embed associated documents) and procedures established and made available for all personnel to adequately support services operations roles?

Operations Management

Documentation OP-02

OP-02.1

Are Information system documentation (e.g., administrator and user guides, architecture diagrams, etc.) made available to authorized personnel to ensure configuring, installing, and operating the information system is completed and performed correctly?

Operations Management

Capacity / Resource Planning

OP-03

OP-03.1

Do you provide (describe/explain/attach/embed associated documents) documentation regarding what levels of system (network, storage, memory, I/O, etc.) oversubscription you maintain and under what circumstances/scenarios?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 86 of 182

Page 87:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Operations Management

OP-03.2

Do you restrict use of the memory oversubscription capabilities present in the hypervisor?

Operations Management

Equipment Maintenance

OP-04

OP-04.1

If using virtual infrastructure, does your cloud solution include hardware independent restore and recovery capabilities?

Operations Management

OP-04.2

If using virtual infrastructure, Do you provide (describe/explain/attach/embed associated documents) tenants with a capability to restore a Virtual Machine to a previous state in time?

Operations Management

OP-04.3

If using virtual infrastructure, Do you allow (describe/explain/attach/embed associated documents) virtual machine images to be downloaded and ported to a new cloud provider?

Operations Management

OP-04.4

If using virtual infrastructure, are machine images made available to the customer in a way that would allow the customer to replicate those images in their own off-site

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 87 of 182

Page 88:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

storage location?

Operations Management

OP-04.5

Does your cloud solution include software / provider independent restore and recovery capabilities?

Risk Management  

Risk Management

Program RI-01

RI-01.1

Is your organization insured by a 3rd party for losses?

Risk Management

RI-01.2

Do your organization's service level agreements provide tenant remuneration for losses they may incur due to outages or losses experienced within your infrastructure?

Risk Management

Assessments RI-02

RI-02.1

Are formal risk assessments aligned with the enterprise-wide framework and performed at least annually, or at planned intervals, determining the likelihood and impact of all identified risks, using qualitative and quantitative methods?

Risk Management

RI-02.2

Is the likelihood and impact associated with inherent and residual risk determined independently, considering all risk categories (e.g., audit results, threat and

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 88 of 182

Page 89:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

vulnerability analysis, and regulatory compliance)?

Risk Management

Mitigation / Acceptance

RI-03

RI-03.1

Are risks mitigated to acceptable levels based on company-established criteria in accordance with reasonable resolution time frames?

RI-03

RI-03.2

Is remediation conducted at acceptable levels based on company-established criteria in accordance with reasonable time frames?

Risk Management

Business / Policy Change Impacts

RI-04

RI-04.1

Do risk assessment results include updates to security policies, procedures, standards and controls to ensure they remain relevant and effective?

Risk Management

Third Party Access

RI-05

RI-05.1

Do you provide (describe/explain/attach/embed associated documents) multi-failure disaster recovery capability?

RI-05.2

Do you monitor service continuity with upstream providers in the event of provider failure?

RI-05.3

Do you have (describe/explain/attach/embed associated documents) more than one provider for each service you depend on?

RI- Do you provide (describe/explain/attach/embed associated

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 89 of 182

Page 90:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

05.4 documents) access to operational redundancy and continuity summaries that include the services on which you depend?

RI-05.5

Do you provide (describe/explain/attach/embed associated documents) the tenant the ability to declare a disaster?

RI-05.6

Do you provide (describe/explain/attach/embed associated documents) a tenant triggered failover option?

RI-05.7

Do you share your business continuity and redundancy plans with your tenants?

Release Management  

Release Management

New Development / Acquisition

RM-01

RM-01.1

Are policies (describe/explain/attach/embed associated documents) and procedures established for management authorization for development or acquisition of new applications, systems, databases, infrastructure, services, operations, and facilities?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 90 of 182

Page 91:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Release Management

Production Changes

RM-02

RM-02.1

Do you provide (describe/explain/attach/embed associated documents) tenants with documentation which describes your production change management procedures and their roles/rights/responsibilities within it?

Release Management

Quality Testing RM-03

RM-03.1

Do you provide (describe/explain/attach/embed associated documents) your tenants with documentation which describes your quality assurance process?

Release Management

Outsourced Development

RM-04

RM-04.1

Do you have (describe/explain/attach/embed associated documents) controls in place to ensure that standards of quality are being met for all software development?

Release Management

RM-04.2

Do you have (describe/explain/attach/embed associated documents) controls in place to detect source code security defects for any outsourced software development activities?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 91 of 182

Page 92:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Release Management

Unauthorized Software Installations

RM-05

RM-05.1

Do you have (describe/explain/attach/embed associated documents) controls in place to restrict and monitor the installation of unauthorized software onto your systems?

Resiliency  

Resiliency Management Program

RS-01

RS-01.1

Are Policy, process and procedures defining business continuity and disaster recovery in place to minimize the impact of a realized risk event and properly communicated to tenants?

Resiliency Impact Analysis RS-02

RS-02.1

Do you provide (describe/explain/attach/embed associated documents) tenants with ongoing visibility and reporting into your operational Service Level Agreement (SLA) performance?

Resiliency RS-02.2

Do you make standards-based information security metrics (CSA, CAMM, etc.) available to your tenants?

Resiliency RS-02.3

Do you provide (describe/explain/attach/embed associated documents) customers with ongoing visibility and reporting into your SLA performance?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 92 of 182

Page 93:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Resiliency Business Continuity Planning

RS-03

RS-03.1

Do you provide (describe/explain/attach/embed associated documents) tenants with geographically resilient hosting options?

Resiliency RS-03.2

Do you provide (describe/explain/attach/embed associated documents) tenants with infrastructure service failover capability to other providers?

Resiliency Business Continuity Testing

RS-04

RS-04.1

Are business continuity plans subject to test at planned intervals or upon significant organizational or environmental changes to ensure continuing effectiveness?

Resiliency Environmental Risks

RS-05

RS-05.1

Is physical protection against damage from natural causes and disasters as well as deliberate attacks anticipated, designed and countermeasures applied?

Resiliency Equipment Location

RS-06

RS-06.1

Are any of your datacenters located in places which have a high probability/occurrence of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes, etc.)?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 93 of 182

Page 94:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Resiliency Equipment Power Failures

RS-07

RS-07.1

Are Security mechanisms and redundancies implemented to protect equipment from utility service outages (e.g., power failures, network disruptions, etc.)?

Resiliency Power / Telecommunications

RS-08

RS-08.1

Do you provide (describe/explain/attach/embed associated documents) tenants with documentation showing the transport route of their data between your systems?

Resiliency RS-08.2

Can Tenants define how their data is transported and through which legal jurisdiction?

Security Architecture  

Security Architecture

Customer Access Requirements

SA-01

SA-01.1

Are all identified security, contractual and regulatory requirements for customer access contractually addressed and remediated prior to granting customers access to data, assets and information systems?

Security Architecture

User ID Credentials

SA-02

SA-02.1

Do you support (describe/explain/attach/embed associated documents) use of, or integration with, existing customer-based Single Sign On (SSO) solutions to your service?

Security Architecture

SA-02.2

Do you use open standards to delegate authentication capabilities to your tenants?

Security SA- Do you support (describe/explain/attach/embed associated

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 94 of 182

Page 95:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Architecture 02.3 documents) identity federation standards (SAML, SPML, WS-Federation, etc.) as a means of authenticating/authorizing users?

Security Architecture

SA-02.4

Do you have (describe/explain/attach/embed associated documents) a Policy Enforcement Point capability (ex. XACML) to enforce regional legal and policy constraints on user access?

Security Architecture

SA-02.5

Do you have (describe/explain/attach/embed associated documents) an identity management system in place which enables both role-based and context-based entitlement to data (enables classification of data for a tenant)?

Security Architecture

SA-02.6

Do you provide (describe/explain/attach/embed associated documents) tenants with strong (multifactor) authentication options (digital certs, tokens, biometric, etc.) for user access?

Security Architecture

SA-02.7

Do you allow (describe/explain/attach/embed associated documents) tenants to use third party identity assurance services?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 95 of 182

Page 96:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security Architecture

Data Security / Integrity

SA-03

SA-03.1

Is your Data Security Architecture designed using an industry standard? (ex. CDSA, MULITSAFE, CSA Trusted Cloud Architectural Standard, FedRAMP CAESARS)

Security Architecture

Application Security

SA-04

SA-04.1

Do you utilize industry standards (Build Security in Maturity Model [BSIMM] Benchmarks, Open Group ACS Trusted Technology Provider Framework, NIST, etc.) to build-in security for your Systems/Software Development Lifecycle (SDLC)?

Security Architecture

SA-04.2

Do you utilize an automated source-code analysis tool to detect code security defects prior to production?

Security Architecture

SA-04.3

Do you verify that all of your software suppliers adhere to industry standards for Systems/Software Development Lifecycle (SDLC) security?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 96 of 182

Page 97:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security Architecture

Data Integrity SA-05

SA-05.1

Are data input and output integrity routines (i.e., reconciliation and edit checks) implemented for application interfaces and databases to prevent manual or systematic processing errors or corruption of data?

Security Architecture

Production / Nonproduction Environments

SA-06

SA-06.1

For your SaaS or PaaS offering, Do you provide (describe/explain/attach/embed associated documents) tenants with separate environments for production and test processes?

Security Architecture

SA-06.2

For your IaaS offering, Do you provide (describe/explain/attach/embed associated documents) tenants with guidance on how to create suitable production and test environments?

Security Architecture

Remote User Multifactor Authentication

SA-07

SA-07.1

Is multi-factor authentication required for all remote user access?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 97 of 182

Page 98:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security Architecture

Network Security

SA-08

SA-08.1

For your IaaS offering, Do you provide (describe/explain/attach/embed associated documents) customers with guidance on how to create a layered security architecture equivalence using your virtualized solution?

Security Architecture

Segmentation SA-09

SA-09.1

Are system and network environments logically separated to ensure Business and customer security requirements?

Security Architecture

SA-09.2

Are system and network environments logically separated to ensure compliance with legislative, regulatory, and contractual requirements?

Security Architecture

SA-09.3

Are system and network environments logically separated to ensure separation of production and non-production environments?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 98 of 182

Page 99:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security Architecture

SA-09.4

Are system and network environments logically separated to ensure protection and isolation of sensitive data?

Security Architecture

Wireless Security

SA-10

SA-10.1

Are policies (describe/explain/attach/embed associated documents), procedures established, and mechanisms implemented to protect network environment perimeter and configured to restrict unauthorized traffic?

Security Architecture

SA-10.2

Are policies (describe/explain/attach/embed associated documents) and procedures established and mechanisms implemented to ensure proper security settings enabled with strong encryption for authentication and transmission, replacing vendor default settings? (e.g., encryption keys, passwords, SNMP community strings, etc.)

Security SA- Are policies (describe/explain/attach/embed associated documents) and procedures

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 99 of 182

Page 100:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Architecture 10.3 established and mechanisms implemented to protect network environments and detect the presence of unauthorized (rogue) network devices for a timely disconnect from the network?

Security Architecture

Shared Networks

SA-11

SA-11.1

Is access to systems with shared network infrastructure restricted to authorized personnel in accordance with security policies, procedures and standards? Networks shared with external entities shall have a documented plan detailing the compensating controls used to separate network traffic between organizations. Provide information about your plan.

Security Architecture

Clock Synchronization

SA-12

SA-12.1

Do you utilize a synchronized time-service protocol (ex. NTP) to ensure all systems have a common time reference?

Security Architecture

Equipment Identification

SA-13

SA-13.1

Is automated equipment identification used as a method of connection authentication to validate connection authentication integrity based on known equipment location?

Security Architecture

Audit Logging / Intrusion Detection

SA-14

SA-14.1

Are file integrity (host) and network intrusion detection (IDS) tools implemented to help facilitate timely detection, investigation by root cause analysis and response to incidents?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 100 of 182

Page 101:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Security Architecture

SA-14.2

Is Physical and logical user access to audit logs restricted to authorized personnel?

Security Architecture

SA-14.3

Can you provide (describe/explain/attach/embed associated documents) evidence that due diligence mapping of regulations and standards to your controls/architecture/processes has been done?

Security Architecture

Mobile Code SA-15

SA-15.1

Is mobile code authorized before its installation and use? Is the code configuration checked to ensure that the authorized mobile code operates according to a clearly defined security policy?

Security Architecture

SA-15.2

Is all unauthorized mobile code prevented from executing?

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 101 of 182

Page 102:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX B5PROPOSAL COST RESPONSE FORM

(VENDOR HOSTED)

Page 1 of 2

Offeror: Please complete the applicable sections based upon your proposed solution. The proposed cost shall include all fees, including one-time and recurring, sales tax, and value added options.

All pricing proposals must be submitted using this form. Offerors may submit their own pricing structure/format for further clarity in same tab, if necessary.

Name of Proposed Solution: ___________________ Version: _________________

Section I – One Time Costs

Offeror Name: ________________________________________

Section II – Other One-time Costs

*Please itemize all other costs and enter total in Row 6 in the above table.

Description Cost

1. ______________________________________________ $_________________

2. ______________________________________________ $_________________

3. ______________________________________________ $_________________

Total $ _________________

Page 2 of 2

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 102 of 182

DESCRIPTION PROPOSED PRICE1. Proposed Software Subscription, Complete Section III

2. Implementation

3. Project Management

4. Training, including all materials

5. Travel Expenses (County reimbursement of travel expense shall not exceed rates as specified in Attachment 6 – County Travel Policy)6. Other One-time Costs (Total from Section II below)7. Applicable Sales Tax

Total One Time Cost

Page 103:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Section III – Recurring Annual Costs

List any recurring costs below:

SUBSCRIPTION/HOSTING FEE

LIST PRICE/COST PROPOSED COST DISCOUNT % OFF LIST PRICE/COST

1. Year One

2. Year Two

3. Year Three

4. Year Four

5. Year Five

TOTAL

Section IV – Other Value Added Services:

Please itemize other value added services cost below.

Description Cost

1. ______________________________________________ $_______________

2. ______________________________________________ $_______________

3. ______________________________________________ $_______________

Offeror Name: ________________________________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 103 of 182

Page 104:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX C

NON-COLLUSION DECLARATION

I, ________________________________, am the ________________________

(Print Name) (Position/Title)

of ___________________________________,

(Name of Company)

the party making the foregoing proposal that the proposal is not made in the interest of, or on behalf of, any undisclosed person, partnership, company, association, organization, or corporation; that the bid is genuine and not collusive or sham; that the Offeror has not directly or indirectly induced or solicited any other Offeror to put in a false or sham bid; and has not directly or indirectly colluded, conspired, connived, or agreed with any Offeror or anyone else to put in a sham bid, or that anyone shall refrain from bidding; that the Offeror has not in any manner directly or indirectly, sought by agreement, communication, or conference with anyone to fix the bid price of the Offeror or any other Offeror, or to fix any overhead, profit, or cost element of the bid price, or of that of any other Offeror, or to secure any advantage against the public body awarding the contract of anyone interested in the proposed contract; that all statements contained in the bid are true; and, further, that the Offeror has not, directly or indirectly, submitted his or her bid price or any breakdown thereof, or the contents thereof, or divulged information or data relative thereto, or paid, and will not pay, any fee to any corporation, partnership, company association, organization, bid depository, or to any member or agent thereof to effectuate a collusive or sham bid.

I declare under penalty of perjury under the Laws of the State of California that the foregoing is true and correct:

COMPANY NAME:

_________________________________________________________________

AUTHORIZED SIGNATURE:

_________________________________________________________________

PRINT NAME:

_________________________________________________________________

DATE:

_________________________________________________________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 104 of 182

Page 105:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX D

DECLARATION OF LOCAL BUSINESS

Santa Clara County gives local businesses a preference in formal solicitations of goods and services as set forth in the Board Policy, Section 5.6.5.2. A bidder or offeror has the option of qualifying for the preference by self-declaring its qualification as a “local business.” By signing below, the bidder or offeror is certifying its qualification as a “local business” for purposes of application of Santa Clara County’s policy and is deemed to be applying for the local preference.

All information submitted is subject to investigation, as well as to disclosure to third parties under the California Public Records Act. Incomplete, unclear, or incomprehensible responses to the following will result in the bid or proposal not being considered for application of Santa Clara County’s local preference policy. False or dishonest responses will result in rejection of the bid or proposal and curtail the firm or individual’s ability to conduct business with the County in the future. It may also result in legal action.

Provide the complete physical address of your business with meaningful “production capability” located within the boundary of the County of Santa Clara. The term “production capability” means the term “production capability” means sales, marketing, manufacturing, servicing, provision of services, or research and development capability that substantially and directly enhances the firm's or bidder's ability to perform the proposed contract. Post Office box numbers, residential addresses, a local sales office without any support and/or a local subcontractor hired by the contractor may not be used as the sole basis for establishing status as a “Local Business.” If you have more than one physical address in Santa Clara County, please provide an attachment with all of the addresses in the form specified below.

Please Indicate Business Organization (Check One)

Individual Proprietorship Corporation

Partnership Other

By filling this form, bidder/offeror declares its qualification as a local business as defined in County of Santa Clara Board Policy, Section 5.6.5.2

The undersigned declares that he or she is an official/agent of responding firm or individual and is empowered to represent, bind, and execute contracts on behalf of the firm or individual.

The undersigned declares under penalty of perjury, under the laws of the State of California, that all statements in this Exhibit and response are true and correct, with full knowledge that all statements are subject to investigation and that any incomplete, unclear, false or dishonest response may be grounds for denial or revocation of the accompanying bid or proposal and may result in being barred from doing business with Santa Clara County as well as additional legal consequences.

____________________________________________________________________

Signature Title

_____________________________________ _______________________________

Name Date

_____________________________________

Business License Number (if applicable)

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 105 of 182

Business Name: ______________________________________________________________________

Street: ______________________________________________________________________

City/State: ______________________________________ Zip: ____________________

Page 106:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX E

DECLARATION OF COMPLIANCE WITH WAGE THEFT PREVENTION POLICY

The County of Santa Clara does not tolerate wage theft. Accordingly, Santa Clara County Board of Supervisors’ Policy Manual, Section 5.5.5.4, includes the following:

Wage Theft Prevention

It is the policy of the County that all parties contracting with the County must comply with all applicable federal, state, and local wage and hour laws, including, but not limited to, the Federal Fair Labor Standards Act, the California Labor Code, and any Minimum Wage Ordinance enacted by the County or any city within the County of Santa Clara. A potential contractor that has submitted a formal or informal bid to provide goods and/or services to the County may be disqualified if the potential contractor has been found, by a court or by final administrative action of an investigatory government agency, to have violated applicable wage and hour laws in the five years prior to the submission of a bid to provide goods and/or services. A current contractor found by a court or by final administrative action of an investigatory government agency to have violated applicable wage and hour laws, in the five years prior to or during the term of the contract with the County, may be in material breach of its contract with the County if the violation is not fully disclosed and/or satisfied per County guidelines and contract requirements. Such breach may serve as a basis for contract termination and/or any other remedies available under law, including a stipulated remediation plan.

Please complete the certification below.

Offeror has no violations to disclose pursuant to Board Policy Manual § 5.5.5.4.

Offeror has been found by a court or final administrative action of an investigatory government agency to have violated federal, state, or local wage and hour laws within the last five (5) years.

Offeror has included in the proposal response the following for each violation: (1) a copy of the court order and judgment and/or final administrative decision; and (2) documents demonstrating either that the order/judgment has been satisfied, or, if the order/judgment has not been fully satisfied, a written and signed description of offeror’s efforts to date to satisfy the order/judgment.

The undersigned declares that he or she is an official/agent of responding firm or individual and is empowered to represent, bind, and execute contracts on behalf of the firm or individual.

The undersigned declares under penalty of perjury, under the laws of the State of California, that all statements in this Exhibit and response are true and correct, with full knowledge that all statements are subject to investigation and that any incomplete, unclear, false or dishonest response may be grounds for denial or revocation of the accompanying bid or proposal and may result in being barred from doing business with Santa Clara County as well as additional legal consequences.

________________________________________ ____________________________________

Signature Title

________________________________________ ____________________________________

Printed Name Date

________________________________________ ____________________________________

Company Name Company Address

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 106 of 182

Page 107:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX F

OFFEROR’S TERMS AND CONDITIONS

Below, please initial next to the appropriate statement. Failure to initial shall default to the first response, acceptance of the County’s terms and conditions as is.

Offeror accepts the County’s terms and conditions listed in Attachment 1 as is.

Offeror accepts the County’s terms and conditions listed in Attachment 1 (Sample Agreement) and proposes additional terms and conditions here in Appendix B below. Offeror shall provide specific proposed wording and a brief discussion of the purpose and impact, if any, and include any applicable agreement, such as license, service level, maintenance, etc.

Offeror objects to the County’s terms and conditions listed in Attachment 1and has indicated the reason for objection and/or proposed specific alternative language here in Appendix B below. The County may or may not accept the alternative language. General references to the Offeror’s terms and conditions or attempts at complete substitutions are not acceptable to the County and the County may disqualify the response in its entirety.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 107 of 182

Page 108:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX G

OFFEROR’S ACKNOWLDGEMENT OF BUSINESS ASSOCIATE AGREEMENT

Offerors shall initial and/or provide information based upon the appropriate statement.

Failure to initial, failure to propose additional terms and conditions, and/or failure to provide alternative language as instructed below, shall default to the first response, acceptance of the

County Business Associate Agreement as is.

______ Offeror accepts the County’s Business Associate Agreement listed in Attachment 4 as is.

______ Offeror accepts the County’s Business Associate Agreement listed in Attachment 4 and propose additional terms and conditions here in Appendix G below.  Offeror shall provide specific proposed wording and a brief discussion of the purpose and impact, if any, and include any applicable agreement, such as license, service level, maintenance, etc.

______ Offeror objects to the County’s Business Associate Agreement listed in Attachment 4 and has indicated the reason for objection and/or proposed specific alternative language here in Appendix G below.  Offeror may not defer a submission to a later date. The County may or may not accept the alternative language.  General references to the Offeror’s Business Associate Agreement or attempts at complete substitutions are not acceptable to the County and the County may disqualify the response in its entirety. Offeror must provide a brief discussion of the purpose and impact, if any, of each proposed changed followed by the specific proposed alternate wording for any applicable agreement, such as license, service level, maintenance, etc.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 108 of 182

Page 109:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX H

PREVIOUS CUSTOMER REFERENCE FORM

1. CUSTOMER REFERENCE

Customer Name:

Customer Address:

Customer Contact Name:

Phone:

Email:

Period of Performance: Throug

h

Annual Dollar Value of Contract: $

Description of Scope of Services Performed:

(Please provide a brief description in the area provided)

2. CUSTOMER REFERENCE

Customer Name:

Customer Address:

Customer Contact Name:

Phone:

Email:

Period of Performance: Throug

h

Annual Dollar Value of Contract: $

Description of Scope of Services Performed:

(Please provide a brief description in the area provided)

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 109 of 182

Page 110:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

3. CUSTOMER REFERENCE

Customer Name:

Customer Address:

Customer Contact Name:

Phone:

Email:

Period of Performance: Throug

h

Annual Dollar Value of Contract: $

Description of Scope of Services Performed:

(Please provide a brief description in the area provided)

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 110 of 182

Page 111:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

APPENDIX IINTENT TO RESPOND

RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System

Per the INTRODUCTION section of this RFP, all vendors intending to respond to this RFP should attend the pre-proposal conference either in person or via the conference line provided. While the RFP is comprehensive, there may be further information and details about the project disclosed at the pre-proposal conference which may not be captured in the solicitation documents.

Vendors intending to respond to the solicitation should submit this APPENDIX I, INTENT TO RESPOND, via email to the Procurement Officer, at the due date and time specified in this RFP.

----------------------------------------------------------------------------------------------------------------------------

We/I, _______________________, intend to submit a response to the County of Santa Clara Request for Proposal RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System. We determine that we have sufficient information as obtained from the solicitation documents and pre-proposal conference to enable us to submit a proposal to the County.

COMPANY NAME:

_________________________________________________________________

AUTHORIZED SIGNATURE:

_________________________________________________________________

PRINT NAME AND TITLE:

_________________________________________________________________

DATE:

_________________________________________________________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 111 of 182

Page 112:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

A T T A C H M E N T 1

CONDITIONS GOVERNING THE PROCUREMENT

This Attachment contains the conditions governing the Request for Proposal Process. Offerors are required to adhere to these conditions.

1. I N C U R R I N G C O ST

This RFP does not commit the County to award, nor does it commit the County to pay any cost incurred in the submission of the proposal, or in making necessary studies or designs for the preparation thereof, nor procure or contract for services or supplies. Further, no reimbursable cost may be incurred in anticipation of a contract award.

2. C L AI M S AG A I N ST T HE C O U N T Y O F S A N T A C L A RA

Neither your organization nor any of your representatives shall have any claims whatsoever against the County or any of its respective officials, agents, or employees arising out of or relating to this RFP or these RFP procedures, except as set forth in the terms of a definitive agreement between the County and your organization.

3. BA S I S F O R PR O PO S A L

Only information supplied by the County in writing by the Procurement Lead in connection with this RFP should be used as the basis for the preparation of Offeror’s proposal.

4. LA T E RE S P O N S E S

In order for a proposal to be considered, the proposal must be received in person or via courier or mail to the place specified above no later than the RFP due date and time.

5. N O P U B L I C PROPO S A L OP E N I N G

There will be no public opening for this RFP.

6. CA L I F O R N I A P U B L I C R E C O RDS A C T (C P R A )

All proposals become the property of the County, which is a public agency subject to the disclosure requirements of the California Public Records Act (“CPRA”). If Contractor proprietary information is contained in documents submitted to County, and Contractor claims that such information falls within one or more CPRA exemptions, Contractor must clearly mark such information “CONFIDENTIAL AND PROPRIETARY,” and identify the specific lines containing the information. In the event of a request for such information, the County will make best efforts to provide notice to Contractor prior to such disclosure. If Contractor contends that any documents are exempt from the CPRA and wishes to prevent disclosure, it is required to obtain a protective order, injunctive relief or other appropriate remedy from a court of law in Santa Clara County before the County’s Deadline for responding to the CPRA request. If Contractor fails to obtain such remedy within County’s deadline for responding to the CPRA request, County may disclose the

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 112 of 182

Page 113:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

requested information.

Contractor further agrees that it shall defend, indemnify and hold County harmless against any claim, action or litigation (including but not limited to all judgments, costs, fees, and attorney’s fees) that may result from denial by County of a CPRA request for information arising from any representation, or any action (or inaction), by the Contractor.

7. C O N F I D E N T I A L I TY

All data and information obtained from the County of Santa Clara by the Offerors and its agents in this RFP process, including reports, recommendations, specifications and data, shall be treated by the Offeror and its agents as confidential. The Offerors and its agents shall not disclose or communicate this information to a third party or use it in advertising, publicity, propaganda, or in another job or jobs, unless written consent is obtained from the County. Generally, each proposal and all documentation, including financial information, submitted by a Offeror to the County is confidential until a contract is awarded, when such documents become public record under state and local law, unless exempted under CPRA.

8. ELE C T R O N I C M AI L A D D RE S S

Most of the communication regarding this procurement will be conducted by electronic mail (e-mail). Potential Offerors agree to provide the Procurement Lead with a valid e- mail address to receive this correspondence.

9. U S E OF EL E C T RO N I C V ER SI O N S OF T HE R F P

This RFP is being made available by electronic means. If accepted by such means, the Offeror acknowledges and accepts full responsibility to insure that no changes are made to the RFP. In the event of conflict between a version of the RFP in the Offeror’s possession and the version maintained by the Issuing Department the version maintained by the Issuing Department must govern.

10. A SS I G N M E N T OF C L A Y T ON A C T , C A R T W R I G H T A C T C L AI M S

In submitting a response to a solicitation issued by the County, the responding person and/or entity offers and agrees that if the response is accepted, it will assign to the County all rights, title, and interest in and to all causes of action it may have under Section 4 of the Clayton Act (1 5 U. S .C. S e c. 1 5 ) or under the Cartwright Act (Chapter 2 (commencing with S ecti o n 1 6 7 0 0 ) of Part 2 of Division 7 of the Business and Professions Code), arising from purchases of goods, materials, or services by the responding person and/or entity for sale to the County pursuant to the solicitation document. Such assignment shall be made and become effective at the time the County tenders final payment to the responding person and/or entity.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 113 of 182

Page 114:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

11. COUNTY RIGHTS

The County reserves the right to do any of the following at any time:

a. Reject any or all proposal(s), without indicating any reason for such rejection;

b. Waive or correct any minor or inadvertent defect, irregularity or technical error in a proposal or the RFP process, or as part of any subsequent contract negotiation;

c. Request that Offerors supplement or modify all or certain aspects of their proposals or other documents or materials submitted;

d. Terminate the RFP, and at its option, issue a new RFP;

e. Procure any equipment or services specified in this RFP by other means;

f. Modify the selection process, the specifications or requirements for materials or services, or the contents or format of the proposals;

g. Extend a deadline specified in this RFP, including deadlines for accepting proposals;

h. Negotiate with any or none of the Offerors;

i. Modify in the final agreement any terms and/or conditions described in this RFP;

j. Terminate failed negotiations with an Offeror without liability, and negotiate with other Offerors;

k. Disqualify any Offeror on the basis of a real or apparent conflict of interest, or evidence of collusion that is disclosed by the proposal or other data available to the County;

l. Eliminate, reject or disqualify a proposal of any Offeror who is not a responsible Offeror or fails to submit a responsive offer as determined solely by the County; and/or

m. Accept all or a portion of a Offeror’s proposal.

12. PROTEST PROCEDURE

PROTEST PROCESS

The Procurement Lead will send an email to all proposers informing them of the proposal that was selected. Proposers whose proposals were not selected may file a written protest (“Protesters”) no later than five (5) business days of the email notifying proposers of the County’s selection.

A. Filing a Protest The protest of an award must be in writing. The following must be written on the cover of the protest: “Protest Relating to RFP-PRO-FY17-0098” The written protest must be emailed, faxed and/or mailed to the designated Procurement Lead.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 114 of 182

Page 115:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

All protests must be received by the designated Procurement Lead within 5 business days after the Notice of Intent to Award has been sent to the all proposers. Any protests received after this time will not be considered.

B. Contents of Protest The written protest must contain the following information: (1) the name, street address, electronic mail address, and telephone and facsimile number of the Protester; (2) signature of the Protester or its representative; (3) clearly state the grounds for the protest as set forth below; (4) copies of any relevant documents; and (5) the form of relief requested. Unless otherwise requested, responses or decisions related to the protest will be provided to the Protester via email. The written protest must clearly state the grounds for the protest. Protests should be concise and logically arranged.

C. Grounds for Protest Protests may only be based on one or more of the following grounds:

a. The Protester believes there was abuse of process by County officials or evaluation team members.

b. The Protestor believes there was misconduct or impropriety by County officials or evaluation team members.

c. The Protester believes there was abuse of discretion by County officials or evaluation team members.

D. Protest Resolution Process a. Informal Review by Department

A designee of the requiring department will review a timely protest and attempt to informally resolve it expeditiously. The Director or designee may use all available resources and information, and solicit information from, and reveal information to, other entities in its attempt to informally resolve the protest. The Department shall send a written response to the Protester. If the Protester does not believe the Department’s response resolves the protest, the Protester has 2 business days to request a formal review. The Department is then required to forward the protest to an Independent Reviewing Officer for the solicitation.

b. Formal Review by Independent Reviewing Officer The Director or his or her designee must forward the protest to the Reviewing Officer within 2 business days of the Protester requesting a formal review. The Department is required to provide written notification to the Protester that the protest is being forwarded to an Independent Reviewing Officer and the contact information for the Reviewing Officer. Both the Department and Protester have 5 business days from the date of the written notification issued by the Department to forward any additional documents to the Reviewing Officer that they believe are relevant to the review of the protest. The notification being sent to the Protester by the Department should also state that the Protester has 5 business days from the date of the notification to forward additional documents to the Reviewing Officer. Protester may not present any additional grounds for protest, argument or narrative that was not included in the initial protest.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 115 of 182

Page 116:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

The Reviewing Officer shall conduct an independent review of the protest to determine whether the grounds for the protest have merit. Only the information contained in a timely protest may be considered by the Reviewing Officer. The Reviewing Officer shall only consider the documents each party has submitted, grounds for protest, and grounds to reject the protest. The Reviewing Officer may also use all available resources and information, and solicit information from, and reveal information to, other entities in its attempt to resolve the protest. The Reviewing Officer may also contact the Protester or Agency/Department.

The Reviewing Officer will issue a written decision on a timely written protest within 20 days of receiving a protest; however, the time for decision may be extended by the Reviewing Officer for a reasonable amount of time. The Reviewing Officer will issue the written decision to the Protester and the Department. If the Protester failed to specify in its written protest the method by which the Protester would like to receive the Reviewing Officer’s written protest decision, the Reviewing Officer will send his written decision to the Protester by mail. The decision of the Reviewing Officer shall be the County’s final decision.

E. Remedies If the Reviewing Officer sustains a protest in whole or in part, the Reviewing Officer shall refer the matter back to the Department for redress in conformance with the Reviewing Officer’s decision. If the Reviewing Officer rejects the protest, then the Department may proceed with its solicitation process.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 116 of 182

Page 117:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ATTACHMENT 2

COUNTY OF SANTA CLARA STANDARD TERMS AND CONDITIONS FOR AGREEMENT FOR INFORMATION TECHNOLOGY GOODS AND RELATED SERVICES

This Agreement is entered into and is effective ____________ 2015, between the County of Santa Clara, (hereafter referred to as “County”) and __________________ (hereafter referred to as “Contractor”), to provide ________________________ (hereafter referred to as “_____”) with Contractor including all related services and maintenance. It is mutually agreed between the parties:

1 EXHIBITS

The following Exhibits are attached hereto and incorporated herein by reference:

1.1 Exhibit A – Price Summary and Compensation Plan

1.2 Exhibit B – Statement of Work

1.3 Exhibit C – Additional Terms and Conditions [subject matter specific]

1.4 Exhibit D – Insurance Requirements

1.5 Exhibit E – Software Escrow Agreement

1.6 Exhibit F – Business Associate Agreement

1.7 Exhibit G- Vendor Remote Access/ SecureLink Agreement

2. DEFINITIONS

2.1 “Acceptance Tests" means those tests performed during the Performance Period which are intended to determine compliance of Equipment and Software with the specifications and all other Attachments incorporated herein by reference and to determine the reliability of the Equipment.

2.2 "Application Program" means a computer program which is intended to be executed for the purpose of performing useful work for the user of the information being processed. Application programs are developed or otherwise acquired by the user of the Hardware/Software system, but they may be supplied by the Contractor.

2.3 "Attachment" means a mechanical, electrical, or electronic interconnection to the Contractor-supplied Machine or System of Equipment, manufactured by other than the original Equipment manufacturer that is not connected by the Contractor.

2.4 “Commercial Software” means Software developed or regularly used that: (i) has been sold, leased, or licensed to the general public; (ii) has been offered for sale, lease, or license to the general public; (iii) has not been offered, sold, leased, or licensed to the public but will be available for commercial sale, lease, or license in time to satisfy the delivery requirements of this Agreement; or (iv) satisfies a criterion expressed in (i), (ii), or (iii) above and would require only minor modifications to meet the requirements of this Agreement.

2.5 “County Data” shall mean shall mean data and information received by Contractor from County. County shall remain the owner of County Data.

2.6 “Custom Software” means Software that does not meet the definition of Commercial Software.

2.7 "Data Processing Subsystem" means a complement of Contractor-furnished individual Machines, including the necessary controlling elements (or the functional equivalent) and Operating Software, if any, which are acquired to operate as an integrated group, and which are interconnected

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 117 of 182

Page 118:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

entirely by Contractor-supplied power and/or signal cables; e.g., direct access controller and drives, a cluster of terminals with their controller, etc.

2.8 "Data Processing System (System)" means the total complement of Contractor-furnished Machines, including one or more central processors (or instruction processors) and Operating Software, which are acquired to operate as an integrated group.

2.9 “Deliverables” means Goods, Software, Information Technology, telecommunications technology, and other items (e.g. reports) to be delivered pursuant to this Agreement, including any such items furnished incident to the provision of services.

2.10 "Designated CPU(s)" means for each product, if applicable, the central processing unit of the computers or the server unit, including any associated peripheral units. If no specific “Designated CPU(s)” are specified on the Agreement, the term shall mean any and all CPUs located at the site specified therein.

2.11 "Documentation" means nonproprietary manuals and other printed materials necessary or useful to the County in its use or maintenance of the Equipment or Software provided hereunder. Manuals and other printed materials customized for the County hereunder constitute Documentation only to the extent that such materials are described in or required by the Statement of Work (“SOW”).

2.12 "Equipment" is an all-inclusive term which refers either to individual Machines or to a complete Data Processing System or subsystem, including its Hardware and Operating Software (if any).

2.13 "Equipment Failure" is a malfunction in the Equipment, excluding all external factors, which prevents the accomplishment of the Equipment’s intended function(s). If microcode or Operating Software residing in the Equipment is necessary for the proper operation of the Equipment, a failure of such microcode or Operating Software which prevents the accomplishment of the Equipment’s intended functions shall be deemed to be an Equipment Failure.

2.14 "Facility Readiness Date" means the date specified in the SOW by which the County must have the site prepared and available for Equipment delivery and installation.

2.15 “Goods” means all types of tangible personal property, including but not limited to materials, supplies, and Equipment (including computer and telecommunications Equipment).

2.16 "Hardware" usually refers to computer Equipment and is contrasted with Software. See also Equipment.

2.17 "Installation Date" means the date specified in the SOW by which the Contractor must have the ordered Equipment ready (certified) for use by the County.

2.18 "Information Technology" includes, but is not limited to, all electronic technology systems and services, automated information handling, System design and analysis, conversion of data, computer programming, information storage and retrieval, telecommunications which include voice, video, and data communications, requisite System controls, simulation, electronic commerce, and all related interactions between people and Machines.

2.19 “Licensed Software” is the computer software in object code format, along with Documentation that is provided to County pursuant to this Agreement.

2.20 "Machine" means an individual unit of a Data Processing System or subsystem, separately identified by a type and/or model number, comprised of but not limited to mechanical, electro-mechanical, and electronic parts, microcode, and special features installed thereon and including any necessary Software, e.g., central processing unit, memory module, tape unit, card reader, etc.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 118 of 182

Page 119:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

2.21 "Machine Alteration" means any change to a Contractor-supplied Machine which is not made by the Contractor, and which results in the Machine deviating from its physical, mechanical, electrical, or electronic (including microcode) design, whether or not additional devices or parts are employed in making such change.

2.22 "Maintenance Diagnostic Routines" means the diagnostic programs customarily used by the Contractor to test Equipment for proper functioning and reliability.

2.23 “Manufacturing Materials” means parts, tools, dies, jigs, fixtures, plans, drawings, and information produced or acquired, or rights acquired, specifically to fulfill obligations set forth herein.

2.24 "Mean Time Between Failure (MTBF)" means the average expected or observed time between consecutive failures in a System or component.

2.25 "Mean Time to Repair (MTTR)" means the average expected or observed time required to repair a System or component and return it to normal operation.

2.26 "Operating Software" means those routines, whether or not identified as Program Products, that reside in the Equipment and are required for the Equipment to perform its intended function(s), and which interface the operator, other Contractor-supplied programs, and user programs to the Equipment.

2.27 "Operational Use Time" means for performance measurement purposes that time during which Equipment is in actual operation by the County. For maintenance Operational Use Time purposes, that time during which Equipment is in actual operation and is not synonymous with power on time.

2.28 "Performance Testing Period" means a period of time during which the County, by appropriate tests and production runs, evaluates the performance of newly installed Equipment and Software prior to its acceptance by the County.

2.29 "Period of Maintenance Coverage" means the period of time, as selected by the County, during which maintenance services are provided by the Contractor for a fixed monthly charge, as opposed to an hourly charge for services rendered. The Period of Maintenance Coverage consists of the Principal Period of Maintenance and any additional hours of coverage per day, and/or increased coverage for weekends and holidays.

2.30 "Preventive Maintenance" means that maintenance, performed on a scheduled basis by the Contractor, which is designed to keep the Equipment in proper operating condition.

2.31 "Principal Period of Maintenance" means any nine consecutive hours per day (usually between the hours of 7:00 a.m. and 6:00 p.m.) as selected by the County, including an official meal period not to exceed one hour, Monday through Friday, excluding holidays observed at the installation.

2.32 "Programming Aids" means Contractor-supplied programs and routines executable on the Contractor’s Equipment which assists a programmer in the development of applications including language processors, sorts, communications modules, data base management systems, and utility routines, (tape-to-disk routines, disk-to-print routines, etc.).

2.33 "Program Product" means programs, routines, subroutines, and related items which are proprietary to the Contractor and which are licensed to the County for its use, usually on the basis of separately stated charges and appropriate contractual provisions.

2.34 "Remedial Maintenance" means that maintenance performed by the Contractor which results from Equipment (including Operating Software) failure, and which is performed as required, i.e., on an unscheduled basis.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 119 of 182

Page 120:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

2.35 "Site License" means for each product, the term “Site License” shall mean the license established upon acquisition of the applicable number of copies of such product and payment of the applicable license fees as set forth in the SOW.

2.36 "Software" means an all-inclusive term which refers to any computer programs, routines, or subroutines supplied by the Contractor, including Operating Software, Programming Aids, Application Programs, and Program Products.

2.37 "Software Failure” means a malfunction in the Contractor-supplied Software, other than Operating Software, which prevents the accomplishment of work, even though the Equipment (including its Operating Software) may still be capable of operating properly. For Operating Software failure, see definition of Equipment Failure.

2.38 "System" means the complete collection of Hardware, Software and services as described in this Agreement, integrated and functioning together, and performing in accordance with this Agreement.

2.39 “U.S. Intellectual Property Rights” means intellectual property rights enforceable in the United States of America, including without limitation rights in trade secrets, copyrights, and U.S. patents.

3. NON-EXCLUSIVE AGREEMENT

This Agreement does not establish an exclusive contract between the County and the Contractor. The County expressly reserves rights to, without limitation, the following: the right to utilize others to provide products, support and services; the right to request proposals from others with or without requesting proposals from the Contractor; and the unrestricted right to bid any such product, support or service.

4. TERM

4.1 This Agreement shall not be effective or binding unless approved in writing by the Director of Procurement, or authorized designee, as evidenced by their signature as set forth in this Agreement. The term of the Agreement shall be for three (3) years from the effective date. The County shall have the right to exercise two (2) one-year optional renewals, or one (1) two-year optional renewal.

4.2 Furthermore, at any time during the term of the Agreement, the Agreement is subject to termination pursuant to Section xx 3 of this Agreement. The County may contract with the Contractor for maintenance beyond the term of this Agreement.

4.3 The effective date of this Agreement is April 2015.

5. TERMINATION

5.1 Termination for Convenience

5.1.1 The County may terminate this Agreement or any contract release purchase order at any time for the convenience of the County by giving thirty (30) calendar days written notice specifying the effective date and scope of such termination.

5.1.2 In no event shall the County be liable for any loss of profits on the resulting order or portion thereof so terminated.

5.1.3 In the event of termination, all finished or unfinished documents, data, studies, maps, photographs, reports, and other materials (collectively referred to as “materials”) prepared by Contractor under this Agreement contract release purchase order shall become the property of the County and shall be promptly delivered to the County. Upon receipt of

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 120 of 182

Page 121:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

such materials, County shall pay the Contractor as full compensation for performance, the unit or pro rata price for the then-accepted portion of Deliverables and/or services.

5.1.4 By termination under this paragraph, neither County nor the Contractor may nullify obligations, if any, already incurred for performance or failure to perform prior to the date of termination.

5.1.5 Termination under this paragraph may be made with or without cause.

5.2 Termination for Cause

5.2.1 County may terminate this Agreement or any contract release purchase order, in whole or in part, for cause upon ten (10) calendar days written notice to Contractor. For purposes of this Agreement, cause includes, but is not limited to, any of the following: (a) material breach of this Agreement or any contract release purchase order by Contractor, (b) violation by Contractor of any applicable laws or regulations; (c) assignment or delegation by Contractor of the rights or duties under this Agreement without the written consent of County or (d) less than perfect tender of delivery or performance by Contractor that is not in strict conformance with terms, conditions, specifications, covenants, representations, warranties or requirements in this Agreement or any contract release purchase order.

5.2.2 In the event of such termination, the Contractor shall be liable for any costs incurred by the County because of Contractor’s default. For instance, the County may purchase or obtain Deliverables elsewhere and the defaulting Contractor shall be liable for the difference between Contractor’s price pursuant to this Agreement, and all costs incurred by the County. The Contractor shall promptly reimburse the County for the full amount of its liability, or, at County’s option, the County may offset such liability from any payment due to the Contractor under any contract or contract release purchase order with the County.

5.2.3 If, after notice of termination under the provisions of this clause, it is determined for any reason that the Contractor was not in default under this provisions of this clause, the rights and obligations of the parties shall be the same as if the notice of termination had been issued pursuant to the Termination For Convenience clause.

5.2.4 In lieu of terminating immediately upon contractor’s default, County may, at its option, provide written notice specifying the cause for termination and allow Contractor ten (10) calendar days (or other specified time period) to cure. If, within ten (10) calendar days (or other specified time) after the County has given the Contractor such notice, Contractor has not cured to the satisfaction of the County, or if the default cannot be reasonably cured within that time period, County may terminate this Agreement at any time thereafter. County shall determine whether Contractor’s actions constitute complete or partial cure. In the event of partial cure, County may, at its option, decide whether to (a) give Contractor additional time to cure while retaining the right to immediately terminate at any point thereafter for cause; or (b) terminate immediately for cause. If County determines that the Contractor’s actions contribute to the curtailment of an essential service or pose an immediate threat to life, health or property, County may terminate this Agreement immediately without penalty upon issuing either oral or written notice to the Contractor and without any opportunity to cure.

5.3 Termination for Lack of Appropriation: The term of the Agreement between Contractor and County, and the purchase of Deliverables and/or services hereunder, are contingent on the appropriation of funds by the County. Should sufficient funds not be appropriated, this Agreement may be terminated by County at any time by providing Contractor with thirty (30) calendar days written notice. In the event of such Termination for Lack of Appropriation, County shall be responsible only

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 121 of 182

Page 122:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

for any undisputed, unpaid balances for Deliverables and/or services provided by Contractor and accepted by County prior to the effective date of termination.

5.4 Termination for Bankruptcy: If Contractor is adjudged to be bankrupt or should have a general assignment for the benefit of its creditors, or if a receiver should be appointed on account of Contractor’s insolvency, the County may terminate this Agreement immediately without penalty.

5.5 Budgetary Contingency: Performance and/or payment by the County pursuant to this Agreement are contingent upon the appropriation of sufficient funds by the County for services covered by this Agreement. If funding is reduced or deleted by the County for services covered by this Agreement, the County may, at its option and without penalty or liability, terminate this Agreement or offer an amendment to this Agreement indicating the reduced amount.

6. NECESSARY ACTS AND FURTHER ASSURANCES

The Contractor shall at its own cost and expense execute and deliver such further documents and instruments and shall take such other actions as may be reasonably required or appropriate to evidence or carry out the intent and purposes of this Agreement.

7. COUNTING DAYS

Days are to be counted by excluding the first day and including the last day, unless the last day is a Saturday, a Sunday, or a legal holiday, and then it is to be excluded.

8. MODIFICATION

This Agreement or any contract release purchase order may be supplemented, amended, or modified only by the mutual agreement of the parties. No supplement, amendment, or modification of this Agreement contract release purchase order will be binding on County unless it is in writing and signed by County’s Director of Procurement, or authorized designee, as evidenced by his/her signature as set forth in this Agreement.

9. SCOPE

9.1 Contractor agrees to provide the County all Deliverables and/or services on terms set forth in this Agreement (including Exhibits), as well as all necessary equipment and resources. However, this Agreement does not provide authority to ship Deliverables. That authority shall be established by contract release purchase orders placed by the County and sent to Contractor throughout the term of the Agreement. Each and every contract release purchase order shall incorporate all terms of this Agreement and this Agreement shall apply to same.

9.2 The County will consider Contractor to be the single point of contact with regards to all contractual matters, including payment of any and all charges for Deliverables and/or services provided under the Agreement and any issues regarding the subcontractor(s), if any. Contractor shall provide to County quarterly and annual spend and usage reports, at no additional cost.

9.3 Any additional or different terms or qualifications sent by Contractor, including, without limitation, in mailings, attached to invoices or with any Deliverables shipped, shall not become part of the contract between the parties. County’s acceptance of Contractor’s offer is expressly made conditional on this statement.

9.4 Contractor shall provide to the County, all documentation and manuals relevant to the Deliverables to be supplied, at no additional cost. Contractor shall deliver such documentation either in advance of or concurrently with the delivery of Deliverables.

9.5 Employees and agents of Contractor, shall, while on the premises of the County, comply with all rules and regulations of the premises, including, but not limited to, security requirements.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 122 of 182

Page 123:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

9.6 Contractor shall be responsible for installation, delivery, training, and knowledge transfer activities in relation to the Deliverables being supplied as reasonably required by County and as set forth in the exhibits to this Agreement.

9.7 All equipment shall be delivered to a County site specified in the contract release purchase order, or if not so specified therein, in the SOW/Specifications.

9.8 Unless stated otherwise and agreed to in writing by County, County shall own all Deliverables provided pursuant to this Agreement. County shall also own all modifications and/or enhancements to the Deliverables paid for by County, as well as any and all derivatives created or paid for by County.

9.9 Contractor holds itself out as an expert in the subject matter of the Agreement. Contractor represents itself as being possessed of greater knowledge and skill in this area than the average person. Accordingly, Contractor is under a duty to exercise a skill greater than that of an ordinary person, and the manner in which performance is rendered will be evaluated in light of the Contractor’s superior skill. Contractor shall provide equipment and perform work in a professional manner consistent, at minimum, with industry standards.

9.10 Contractor represents that all prices, warranties, benefits and other terms being provided hereunder are fair, reasonable and commensurate with the terms otherwise being offered by Contractor to its current customers ordering comparable Deliverables and/or services.

9.11 County does not guarantee any minimum orders.

9.12 This Agreement shall not be effective or binding unless approved in writing by the County Director of Procurement, or authorized designee, as evidenced by their signature as set forth in this Agreement.

9.13 Furthermore, at any time during the term of the Agreement, the Agreement is subject to termination in accordance with this Agreement. The County may contract with Contractor for recurring services beyond the term of this Agreement and any amendments.

10. COST SUMMARY AND COMPENSATION PLAN

10.1 Exhibit A of this Agreement is the basis for the pricing and compensation plan. The maximum compensation paid to the Contractor under this Agreement is $______________.

10.2 In the event of a decrease in the cost of recurring fees, Contractor shall extend the lower price(s) to the County and provide prompt written notification to the County. Contractor shall, on an ongoing basis, inform the County of any such special, promotional or reduced pricing.

10.3 In the event that any product on Exhibit A is discontinued or upgraded, Contractor shall extend the same contract pricing towards a comparable replacement which is functionally equivalent or upgraded version when available. Minimum mandatory hardware specifications must be included. Unless otherwise stated, prices shall be fixed for the term of the Agreement, including all extensions and/or amendments.

10.4 Additional services, if any, will be billed after services have been rendered.

10.5 Both parties acknowledge that during the term of this Agreement, products and services may be added to the Agreement. In the event that such services are identified, and a cost is associated, the County reserves the right to add the additional services to the Agreement and negotiate cost. The County Contract Administrator will approve the additional work and cost by means of an amendment.

10.6 The County will not pay any cost or charge that is not delineated in this Agreement.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 123 of 182

Page 124:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

11. DISPUTED PAYMENTS

If, due to either an issue with the charges on an invoice or the Contractor’s failure to perform its obligations under this Agreement, the County disputes any charge(s) on an invoice, the County may withhold the disputed amount, provided that (a) there is a reasonable basis for the dispute, (b) all other amounts that are not in dispute have been paid in accordance with this Agreement, and (c) the County delivers a written statement to Contractor on or before the due date of the invoice, describing in detail the basis of the dispute and the amount being withheld by the County.

12 TIME OF THE ESSENCE

12.1 Time is of the essence in the delivery of Deliverables and/or services by Contractor under this Agreement and any contract release purchase order. In the event that the Contractor fails to deliver Deliverables and/or services on time, the Contractor shall be liable for any costs incurred by the County because of Contractor’s delay. For instance, County may purchase or obtain the Deliverables and/or services elsewhere and the Contractor shall be liable for the difference between the price in the Agreement and the cost to the County; or County may terminate on grounds of material and Contractor shall be liable for County’s damages.

12.2 The Contractor shall promptly reimburse the County for the full amount of its liability, or, at County’s option, the County may offset such liability from any payment due to the Contractor under any contract with the County.

12.3 The rights and remedies of County provided herein shall not be exclusive and are in addition to any other rights and remedies provided by law. The acceptance by County of late or partial performance with or without objection or reservation shall not waive the right to claim damage for such breach nor constitute a waiver of the rights or requirements for the complete and timely performance of any obligation remaining to be performed by the Contractor, or of any other claim, right or remedy of the County.

13. DOCUMENTATION

13.1 The Contractor agrees to provide to the County, at no charge, a reasonable number of all nonproprietary manuals and other printed materials, as described within the SOW, and updated versions thereof, which are necessary or useful to the County in its use of the Equipment or Software provided hereunder. The Contractor agrees to provide additional Documentation at prices not in excess of charges made by the Contractor to its other customers for similar Documentation, or if appropriate, to permit County to make copies of same for County’s internal use.

13.2 If the Contractor is unable to perform maintenance or the County desires to perform its own maintenance on Equipment purchased under this Agreement then upon written notice by the County the Contractor will provide at Contractor’s then current rates and fees adequate and reasonable assistance including relevant Documentation to allow the County to maintain the Equipment based on Contractor’s methodology. The Contractor agrees that the County may reproduce such Documentation for its own use in maintaining the Equipment. If the Contractor is unable to perform maintenance, the Contractor agrees to license any other contractor that the County may have hired to maintain the Equipment to use the above noted Documentation. The County agrees to include the Contractor’s copyright notice on any such Documentation reproduced, in accordance with copyright instructions to be provided (in writing) by the Contractor.

14. SERVICE LEVEL AGREEMENT

14.1 Contractor warrants that the service provided pursuant to this Agreement shall adhere to the service levels and benchmarks specified in the SOW. Unavailability does not mean an inability to connect to the service due to a failure between the County’s computer and the Internet. System

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 124 of 182

Page 125:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

availability and response time shall be accurately, truthfully and precisely monitored by Contractor on a 24x7x365 basis. Contractor shall provide a system availability and response time report at any time upon request by County.

14.2 This Agreement may be terminated for cause and without penalty if the Contractor fails to meet, for three (3) months in any twelve (12) month period, the service levels and benchmarks specified in the SOW, or experiences any period of total unavailability that has not been cured within three (3) hours to the reasonable satisfaction of the County.

15. HAZARDOUS SUBSTANCES

If any product being offered, delivered or supplied to the County is listed in the Hazardous Substances List of the Regulations of the Director of Industrial Relations with the California Occupational Safety and Health Standards Board, or if the product presents a physical or health hazard as defined in the California Code of Regulations, General Industry Safety Order, Section 5194 (“T8CCR”), Hazard Communication, the Contractor must include a Material Safety Data Sheet (“MSDS”) with delivery, or shipment. Each MSDS must reference the contract/purchase order number, and identify the "Ship To Address." All shipments and containers must comply with the labeling requirements of Title 49, Code of Federal Regulations by identifying the hazardous substance, name and address of manufacturer, and appropriate hazard warning regarding potential physical safety and health hazard.

16. SHIPPING AND RISK OF LOSS

16.1 Deliverables shall be packaged, marked and otherwise prepared by Contractor in suitable containers in accordance with sound commercial practices. Contractor shall include an itemized packing list with each shipment and with each individual box or package shipped to the County. The packing list shall contain, without limitation, the applicable contract release purchase order number.

16.2 Unless otherwise specified in writing, all shipments by Contractor to County will be F.O.B. point of destination. Freight or handling charges are not billable unless such charges are referenced on the order. Transportation receipts, if required by contract release purchase order, must accompany invoice. Regardless of F.O.B. point, Contractor shall bear all risks of loss, injury, or destruction to Deliverables and materials ordered herein which occur prior to acceptance by County; and such loss, injury or destruction shall not release Contractor from any obligation hereunder.

16.3 Any shipments returned to the Contractor shall be delivered as F.O.B. shipping point.

17. INSPECTION, TEST, ACCEPTANCE, REJECTION AND RELATED RIGHTS

Unless otherwise specified in the SOW:

17.1 All Deliverables and/or services are subject to inspection, testing, approval and acceptance by the County. Inspection shall be made within a reasonable time (but in no event longer than sixty (60) calendar days) after delivery. If the Deliverables, services, or the tender of delivery fail in any respect to conform to the Agreement, the County may reject the entire tender, accept the entire tender, or, if the Deliverables are commercially divisible, may, at its option, accept any commercial unit or units and reject the rest.

17.2 Inspection

17.2.1 Contractor and its subcontractors will provide and maintain a quality assurance system acceptable to the County covering Deliverables and/or services under this Contract and will tender to the County only those Deliverables that have been inspected and found to conform to this Agreement’s requirements.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 125 of 182

Page 126:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

17.2.2 Contractor will keep records evidencing inspections and their result, and will make these records available to the County during performance and for three (3) years after final payment. Contractor shall permit the County to review procedures, practices, processes, and related documents to determine the acceptability of Contractor’s quality assurance System or other similar business practices related to performance of the Agreement.

17.2.3 Contractor and its subcontractors shall provide all reasonable facilities for the safety and convenience of inspectors at no additional cost to the County. Contractor shall furnish to inspectors all information and data as may be reasonably required to perform their inspection.

17.2.4 All Deliverables and/or services may be subject to final inspection, test and acceptance by the County at destination, notwithstanding any payment or inspection at source.

17.3 Test

17.3.1 County will use the criteria established in this Agreement, the SOW, or any subsequent sub-SOW to determine the acceptance of each task and to test the Deliverables and/or services.

17.3.2 If the County, in its sole discretion, determines that the Deliverables and/or services have failed to meet a specific task, specification or requirements of the SOW, any sub-SOW, or this Agreement, or that features or functions said to be present in the Contractor’s Documentation are absent or do not function properly, County may execute any or all of the following:

(i) Have the Contractor modify the Deliverables and/or services to conform to the Documentation;

(ii) Extend the acceptance testing period for a reasonable time period to allow time for Contractor to remedy the problems; or

(iii) Cancel this Agreement and its obligations to Contractor. Any pre-payments made to the Contractor shall be prorated to the termination date and the remainder refunded to the County.

17.4 Acceptance

17.4.1 Acceptance is set forth in the SOW.

17.5 Rejection

17.5.1 County shall give written notice of rejection of Deliverables delivered and/or services performed during the period set forth in Section 17.1 of this Agreement. Such notice of rejection will state the respects in which the Deliverables and/or services do not substantially conform to their specifications. Acceptance by County will be final and irreversible, except as it relates to latent defects, fraud, and gross mistakes amounting to fraud. Acceptance shall not be construed to waive any warranty rights that the County might have at law or by express reservation in this Agreement with respect to any nonconformity.

17.5.2 Contractor shall be responsible to reclaim and remove any rejected Deliverables and/or items at its own expense. Should Contractor fail to reclaim or remove any rejected Deliverables and/or items within a reasonable time, County shall, at its option dispose of such Deliverables and/or items and require reimbursement from Contractor for any costs or expenses incurred.

17.6 Corrective Action:Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging System

Page 126 of 182

Page 127:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

17.6.1 Contractor shall comply with all applicable federal state, and local laws and regulations relating to its performance under this Agreement in all material respects.

17.6.2 If County discovers any practice, procedure, or policy of Contractor which materially deviates from the terms or requirements of this Agreement, which violates federal, state or local laws or regulations, the County, in addition to its termination rights, may notify Contractor that corrective action is required.

17.6.3 Contractor shall correct any and all discrepancies, violations, or deficiencies within thirty (30) calendar days, unless the corrective action requires additional time, in which case Contractor shall have a period of time to make corrections.

17.6.4 In the event that the Contractor’s Deliverables and/or services are not accepted by County, the Contractor shall be liable for any costs incurred by the County because of such failure by Contractor. For instance, County may purchase or obtain the Deliverables and/or services elsewhere and the Contractor shall be liable for the difference between the price in the Agreement and the cost to the County, and any other costs incurred; or County may terminate for cause on grounds of material breach and Contractor shall be liable for County’s damages.

17.6.5 Contractor shall promptly reimburse the County for the full amount of its liability, or, at County’s option, the County may offset such liability from any payment due to the Contractor under any contract with the County.

17.6.6 The rights and remedies of County provided herein shall not be exclusive and are in addition to any other rights and remedies provided by law. The acceptance by County of late or partial performance with or without objection or reservation shall not waive the right to claim damage for such breach nor constitute a waiver of the rights or requirements for the complete and timely performance of any obligation remaining to be performed by the Contractor, or of any other claim, right or remedy of the County.

18. ADJUSTMENT BY COUNTY

The County reserves the right to waive a variation in specification of Deliverables and/or services supplied by the Contractor. Contractor may request an equitable adjustment of payments to be made by County if County requires a change in the Deliverables and/or services to be delivered. Any claim by the Contractor for resulting adjustment of payment must be asserted within thirty (30) calendar days from the date of receipt by the Contractor of the notification of change required by County; provided however, that the Procurement Director, if he/she decides that the facts justify such action, may receive and act upon any such claim asserted at any time prior to final payment made for Deliverables and/or services supplied by Contractor. Where the cost of property made obsolete or excess as a result of a change is included in the Contractor’s claim for adjustment, the Procurement Director shall have the right to prescribe the manner of disposition of such property. Nothing in this clause shall excuse performance by Contractor.

19. INVOICING

19.1 Contractor shall invoice according to the pricing exhibit of this Agreement. Invoices shall be sent to the County customer or department referenced in the individual contract release purchase order. Invoices for Deliverables and/or services not specifically listed in the Agreement will not be approved for payment.

19.2 Invoices shall include: Contractor’s complete name and remit-to address; invoice date, invoice number, and payment term; County contract number; pricing per the Agreement; applicable taxes; and total cost.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 127 of 182

Page 128:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

19.3 Contractor and County shall make reasonable efforts to resolve all invoicing disputes within seven (7) calendar days.

20. AVAILABILITY OF FUNDING

The County's obligation for payment of any contract beyond the current fiscal year end is contingent upon the availability of funding and upon appropriation for payment to the Contractor. No legal liability on the part of the County shall arise for payment beyond June 30 of the calendar year unless funds are made available for such performance

21. PAYMENT

The County’s standard payment term shall be Net 45, unless otherwise agreed to by the parties. Payment shall be due Net 45 days from the date of receipt and approval of correct and proper invoices.

Notwithstanding the standard payment term set forth above, the parties agree that the Payment Term for this Agreement shall be the term set forth in the Key Provisions section of the Agreement above. If the Payment Term is a prompt payment discount term, then payment shall be made accordingly. For example, if the Payment Term is 2.25% 10 Net 45, payment shall be due 10 days from the date the County receives and approves the correct and proper invoice, but no later than 45 days from that date, and the County would take a discount of 2.25% of the total amount of the invoice if the payment is made in 10 days. The parties also agree that notwithstanding the Payment Term set forth in the Key Provisions section of the Agreement, that at any time during the contract term, either party may initiate an early payment discount on an invoice-by-invoice basis utilizing the Dynamic Discounting functionality of the Ariba Network. Contractor must have a registered account on the Ariba Network to utilize this functionality.

Payment is deemed to have been made on the date the County mails the warrant or initiates the electronic fund transfer.

22. OTHER PAYMENT PROVISIONS

Notwithstanding anything to the contrary, County shall not make payments prior to receipt of service or goods (i.e. the County will not make “advance payments”). Unless specified in writing in an individual purchase order, the County will not accept partial delivery with respect to any purchase order. Any acceptance of partial delivery shall not waive any of County’s rights on an ongoing basis.

Sales tax shall be noted separately on every invoice. Items that are not subject to sales tax shall be clearly identified.

Contractor shall be responsible for payment of all state and federal taxes assessed on the compensation received under this Purchase Order and such payment shall be identified under the Contractor’s federal and state identification number(s).

The County does not pay Federal Excise Taxes (F.E.T). The County will furnish an exemption certificate in lieu of paying F.E.T. Federal registration for such transactions is: County #94-730482K. Contractor shall not charge County for delivery, drayage, express, parcel post, packing, cartage, insurance, license fees, permits, cost of bonds, or for any other purpose, unless expressly authorized by the County.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 128 of 182

Page 129:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

23. LATE PAYMENT CHARGES OR FEES

The Contractor acknowledges and agrees that the County will not pay late payment charges or fees.

243. DISALLOWANCE

In the event the Contractor receives payment for Deliverables and/or services, which payment is later disallowed by the County or state or federal law or regulation, the Contractor shall promptly refund the disallowed amount to the County upon notification. At County’s option, the County may offset the amount disallowed from any payment due to the Contractor under any contract with the County.

25. DISENTANGLEMENT

25.1 This section shall apply upon termination of this Agreement for any reason.

25.2 Contractor shall cooperate with County and County’s other contractors to ensure a smooth transition at the time of termination of this Agreement, regardless of the nature or timing of the termination. Contractor shall cooperate with County's efforts to ensure that there is no interruption of work required under the Agreement and no adverse impact on the supply of Deliverables, provision of services or the County’s activities. Contractor shall promptly return to County all County assets or information in Contractor’s possession.

25.3 For any software programs developed for use under the County's Agreement, Contractor shall provide a non-exclusive, non-transferable, fully-paid, perpetual, irrevocable, royalty-free worldwide license to the County, at no charge to County, to use, copy, and modify, all work or derivatives that would be needed in order to allow County to continue to perform for itself, or obtain from other providers, the services as the same might exist at the time of termination.

25.4 County shall be entitled to purchase at net book value those Contractor assets used for the provision of services to or for County, other than those assets expressly identified by the parties as not being subject to this provision. Contractor shall promptly remove from County’s premises, or the site of the work being performed by Contractor for County, any Contractor assets that County, or its designee, chooses not to purchase under this provision.

25.5 Contractor shall deliver to County or its designee, at County’s request, all Documentation and data related to County, including, but not limited to, the County Data and client files, held by Contractor, and after return of same, Contractor shall destroy all copies thereof not turned over to County, all at no charge to County.

26. DISPUTES

26.1 The parties shall deal in good faith and attempt to resolve potential disputes informally. If the dispute persists, except as otherwise provided in this Agreement, any dispute concerning a question of fact arising under this Agreement that is not disposed of by agreement shall be decided by the Director of Procurement who shall furnish the decision to the Contractor in writing. The decision of the Director of Procurement shall be final and conclusive unless determined by the court of competent jurisdiction to have been fraudulent or capricious, or arbitrary, or so grossly erroneous as necessarily to imply bad faith. The Contractor shall proceed diligently with the performance of the Agreement pending the Director of Procurement’s decision.

26.2 "Disputes" clause does not preclude consideration of legal questions in connection with decisions provided for in paragraph (a) above. Nothing in this Agreement shall be construed as making final the decision of any administrative official, representative, or board on a question of law.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 129 of 182

Page 130:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

26.3 In the event of a dispute, Contractor shall continue to perform its obligations pursuant to this Agreement for a period not to exceed ninety (90) days from the time that Contractor provides written notice to County of the disputed issue(s).

27. ACCOUNTABILITY

Contractors will be the primary point of contact and assume the responsibility of all matters relating to the purchase, including those involving the manufacturer and deliverer or any subcontractor, as well as payment issues. If issues arise, the Contractor must take immediate action to correct or resolve the issues.

28. NO ASSIGNMENT, DELEGATION OR SUBCONTRACTING WITHOUT PRIOR WRITTEN CONSENT

28.1 Contractor may not assign any of its rights, delegate any of its duties or subcontract any portion of its work or business under this Agreement or any contract release purchase order without the prior written consent of County. No assignment, delegation or subcontracting will release Contractor from any of its obligations or alter any of its obligations to be performed under the Agreement. Any attempted assignment, delegation or subcontracting in violation of this provision is voidable at the option of the County and constitutes material breach by Contractor. Contractor is responsible for payment to sub-contractors and must monitor, evaluate, and account for the sub-contractor(s) services and operations.

28.2 As used in this provision, "assignment" and "delegation" means any sale, gift, pledge, hypothecation, encumbrance, or other transfer of all or any portion of the rights, obligations, or liabilities in or arising from this Agreement to any person or entity, whether by operation of law or otherwise, and regardless of the legal form of the transaction in which the attempted transfer occurs.

29 MERGER AND ACQUISITION

29.1 Neither party may assign this Agreement or transfer any rights to a third party without the prior written consent of the other party, and any such attempt shall be void; provided, however, subject to compliance with the provisions of this Section 28, County shall not unreasonably withhold or delay its consent for Contractor to transfer and/or assign this Agreement to any current wholly owned subsidiary, or pursuant to a corporate plan of merger, reorganization, acquisition or consolidation.

29.2 This Agreement will inure to the benefit of and be binding upon the parties and their respective successors and permitted assigns. The terms of this Agreement will survive an acquisition, merger, divestiture or other transfer of rights or assignment involving Contractor. In the event of an acquisition, merger, divestiture or other transfer of rights, Contractor shall ensure that the acquiring entity or the new entity agrees to be bound by the terms of this Agreement and act in the place of Contractor with respect to all of its obligations as set forth herein. The acquiring entity shall honor all the terms and conditions in this Agreement and (if applicable) provide the functionality of the Deliverables and/or services in a future, separate or renamed product, if the acquiring entity or the new entity reduces or replaces the functionality, or otherwise provide a substantially similar functionality of the Deliverables and/or services at the same pricing levels. No additional license or maintenance fee will apply.

29.3 Contractor shall provide thirty (30) calendar days written notice to the County following the closing of an acquisition, merger, divestiture or other transfer of right involving Contractor.

29.4 Contractor shall provide reasonable assistance to County during the transition period.

30. COMPLIANCE WITH ALL LAWS & REGULATIONS

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 130 of 182

Page 131:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Contractor shall comply with all laws, codes, regulations, rules and orders (collectively, "Regulations") applicable to the Deliverables and/or services to be provided hereunder. Contractor’s violation of this provision shall be deemed a material default by Contractor, giving County a right to terminate the Agreement. Examples of such Regulations include but are not limited to California Occupational Safety and Health Act of 1973, Labor Code §6300 et. seq. the Fair Packaging and Labeling Act, etc. and the standards and regulations issued there under. Contractor shall defend, indemnify and hold the County harmless against any claim, loss, damage, fine, penalty, or any expense whatsoever as a result of Contractor’s failure to comply with the act and any standards or regulations issued there under.

31. FORCE MAJEURE

31.1 Neither party shall be liable for failure of performance, nor incur any liability to the other party on account of any loss or damage resulting from any delay or failure to perform all or any part of this Agreement if such delay or failure is caused by events, occurrences, or causes beyond the reasonable control and without negligence of the parties. Such events, occurrences, or causes will include Acts of God/Nature (including fire, flood, earthquake, storm, hurricane or other natural disaster), war, invasion, act of foreign enemies, hostilities (whether war is declared or not), civil war, riots, rebellion, revolution, insurrection, military or usurped power or confiscation, terrorist activities, nationalization, government sanction, lockout, blockage, embargo, labor dispute, strike, interruption or failure of electricity or telecommunication service.

31.2 Each party, as applicable, shall give the other party notice of its inability to perform and particulars in reasonable detail of the cause of the inability. Each party must use best efforts to remedy the situation and remove, as soon as practicable, the cause of its inability to perform or comply.

31.3 The party asserting Force Majeure as a cause for non-performance shall have the burden of proving that reasonable steps were taken to minimize delay or damages caused by foreseeable events, that all non-excused obligations were substantially fulfilled, and that the other party was timely notified of the likelihood or actual occurrence which would justify such an assertion, so that other prudent precautions could be contemplated.

31.4 The County shall reserve the right to terminate this Agreement and/or any applicable order or contract release purchase order upon non-performance by Contractor. The County shall reserve the right to extend the agreement and time for performance at its discretion.

32. CONFLICT OF INTEREST

32.1 Contractor represents and warrants that, to the best of its knowledge, it presently has no interest and shall not acquire any interest, direct or indirect, that would conflict in any manner or degree with the performance of services required under this Agreement.

32..2 Contractor shall comply, and require its subcontractors to comply, with all applicable (i) professional canons and requirements governing avoidance of impermissible client conflicts applicable to Contractor and such subcontractors; and (ii) federal, state and local conflict of interest laws and regulations applicable to Contractor, such subcontractors and the services, including, without limitation, to the extent applicable, California Government Code section 1090 et. seq., the California Political Reform Act (California Government Code section 87100 et. seq.) and the regulations of the Fair Political Practices Commission concerning disclosure and disqualification (2 California Code of Regulations section 18700 et. seq.). Failure to do so constitutes a material breach of this Agreement and is grounds for termination of this Agreement by the County.

32..3 Contractor shall provide County with the names, description of individual duties to be performed and email addresses of all persons who will be engaged in performance of the agreement,

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 131 of 182

Page 132:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

including without limitation colleagues, employees, agents and subcontractors with the exception of those working solely ministerial, secretarial, manual, or clerical capacity. Contractor shall immediately notify the County of the names of individuals working in such a capacity who, during the course of the Agreement, end their service.

32.4 Contractor shall ensure that all individuals identified pursuant to this section understand that they are subject to the Political Reform Act (“PRA”) and shall conform to all requirements of the PRA and other laws and regulations, including, as required, filing of Statements of Economic Interests (Form 700) within thirty (30) calendar days of commencing service pursuant to this Agreement, annually by April 1, and within thirty (30) calendar days of their termination of service pursuant to this Agreement. Form 700 is available on the website of the Fair Political Practices Commission.

33. INDEPENDENT CONTRACTOR

Contractor shall supply all Deliverables and/or perform all services pursuant to this Agreement as an independent contractor and not as an officer, agent, servant, or employee of County. Contractor shall be solely responsible for the acts and omissions of its officers, agents, employees, contractors, and subcontractors, if any. Nothing herein shall be considered as creating a partnership or joint venture between the County and Contractor. No person performing any services and/or supplying all Deliverables shall be considered an officer, agent, servant, or employee of County, nor shall any such person be entitled to any benefits available or granted to employees of the County.

34. INSURANCE

Contractor shall maintain insurance coverage, throughout the term of this Agreement, pursuant to Exhibit D.

35. DAMAGE AND REPAIR BY CONTRACTOR

Any and all damages caused by Contractor’s negligence or operations shall be repaired, replaced or reimbursed by Contractor at no charge to the County. Repairs and replacements shall be completed with seventy two (72) hours of the incident unless the County requests or agrees to an extension or another time frame. The cleanup of all damage related to accidental or intentional release of any/all non-hazardous or hazardous material (e.g. hydraulic fluid, fuel, grease, etc.) from Contractor’s vehicles or during performance shall be responsibility of the Contractor. All materials must be cleaned up in a manner and time acceptable to County (completely and immediately to prevent potential as well as actual environmental damage). Contractor must immediately report each incident to the County’s Director of Procurement. Damage observed by Contractor, whether or not resulting from Contractor’s operations or negligence shall be promptly reported by Contractor to County. County may, at its option, approve and/or dictate the actions that are in County’s best interests.

36. LIENS, CLAIMS, AND ENCUMBRANCES AND TITLE

The Contractor represents and warrants that all the Deliverables and/or materials ordered and delivered are free and clear of all liens, claims or encumbrances of any kind. Contractor represents and warrants that it has free and clear title (including any and all intellectual property rights) to the Deliverables and/or materials purchased by County. Title to the Deliverables and/or materials purchased shall pass directly from Contractor to County at the F.O.B. point, subject to the right of County to reject upon inspection.

37. CONTRACTOR’S LIABILITY FOR INJURY TO PERSONS OR DAMAGE TO PROPERTY

37.1. Contractor shall be liable for damages arising out of injury to the person and/or damage to the property of the County, employees of the County, persons designated by the County

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 132 of 182

Page 133:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

for training, or any other person(s) other than agents or employees of the Contractor, designated by the County for any purpose, prior to, during, or subsequent to delivery, installation, acceptance, and use of the Deliverables either at the Contractor’s site or at the County’s place of business, provided that the injury or damage was caused by the fault or negligence of the Contractor.

37.2 Contractor shall not be liable for damages arising out of or caused by an alteration not made or installed by the Contractor.

38. INDEMNITY

Contractor shall defend, indemnify, and hold harmless the County, its officers, agents and employees from any claim, liability, loss, injury or damage arising out of, or in connection with, performance of this Agreement by Contractor and/or its agents, employees or sub-contractors, excepting only loss, injury or damage caused by the sole negligence or willful misconduct of personnel employed by the County. It is the intent of the parties to this Agreement to provide the broadest possible coverage for the County. The Contractor shall reimburse the County for all costs, attorneys' fees, expenses and liabilities incurred with respect to any litigation in which the Contractor is obligated to defend, indemnify, and hold harmless the County under this Agreement.

39. INTELLECTUAL PROPERTY INDEMNITY

Contractor represents and warrants for the benefit of the County and its users that, to its knowledge, as of the effective date of this Agreement, Contractor is the exclusive owner of all rights, title and interest in the Deliverables and/or services provided pursuant to this Agreement. Contractor shall defend, indemnify and hold the County harmless against any claim, action or litigation (including but not limited to all judgments, costs, fees, and reasonable attorney’s fees) by a third party alleging the Deliverables and/or services provided pursuant to this Agreement infringe upon any intellectual property rights of third parties.

40. LIMITATION OF LIABILITY

40.1 Contractor’s liability for damages to the County for any cause whatsoever, and regardless of the form of action, whether in contract or in tort, shall be limited to greater of (i) the insurance limits set forth in Exhibit D to this Agreement, or (ii) three (3) times the Purchase Price. For purposes of this Section, “Purchase Price” will mean the aggregate Agreement price as set forth in Section 10 of this Agreement, and any subsequent amendments to this Agreement.

40.2 The foregoing limitation of liability shall not apply to (i) any indemnity or warranty obligation set forth in this Agreement, (ii) Contractor’s willful misconduct, gross negligence, or fraud, or (iii) costs or attorney’s fees that the County becomes entitled to recover.

40.3 The County’s liability for damages for any cause whatsoever, and regardless of the form of action, whether in contract or in tort, shall be limited to the Purchase Price. Nothing herein shall be construed to waive or limit the County’s sovereign immunity or any other immunity from suit provided by law.

41. WARRANTY

41.1 Any Deliverables and/or services furnished under this Agreement shall be covered by the most favorable commercial warranties that Contractor gives to any of its customers for the same or substantially similar Deliverables and/or services. Any warranties so provided shall supplement, and shall not limit or reduce, any rights afforded to County by any clause in this Agreement, any applicable Uniform Commercial Code warranties, including, without limitation, Implied Warranty of Merchantability and Implied Warranty of Fitness for a Particular Purpose as well as any other express warranty.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 133 of 182

Page 134:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

41.2 Unless otherwise specified, the warranties in this Section begin upon County’s final acceptance of the Deliverables and/or services in question and end one (1) year thereafter. Contractor warrants that:

41.2.1 Deliverables and/or services furnished hereunder shall strictly conform to the requirements of this Agreement (including without limitation all descriptions, specifications, and drawings identified in the SOW) and Contractor’s Documentation;

41.2.2 Deliverables shall:

(i) be free from material defects in materials and workmanship;

(ii) be free of illicit or harmful code (i.e. computer viruses, worms, trap doors, time bombs, disabling code, or any similar malicious mechanism designed to interfere with the intended operation of, or cause damage to, computers, data, or Software);

(iii) not contain hidden files or viruses;

(iv) not replicate, transmit or activate themselves;

(v) not alter, damage or erase data or computer programs;

(vi) not contain open source code; and

(vii) not infringe or violate any U.S. Intellectual Property Right.

41.2.3 If the Agreement calls for delivery of Commercial Software, Contractor warrants that such Software will perform in accordance with its license and accompanying Documentation.

4012.4 All Deliverables supplied shall be new, suitable for the use intended, of the grade and quality specified, free from all defects in design, material and workmanship, in conformance with all samples, drawings, descriptions and specifications furnished by the County, in compliance with all applicable federal, state and local laws and regulations and free of liens, claims and encumbrances.

41.2.5 All Deliverables containing embedded or third party software shall contain a nonexclusive, perpetual, worldwide, and royalty free license to use, reproduce, distribute, demonstrate and prepare derivative works. Should a conflict exist between the terms of any such embedded or third party software license and this Agreement, this Agreement shall take precedence and supersede such other license terms and conditions. Contractor also represents and warrants that it has all rights to license to County. Contractor shall pass through all applicable third party warranties to County.

41.2.6 All Deliverables are compatible with County’s operating environment.

41.2.7 Contractor shall perform all services in a workmanlike manner and in accordance with Contractor’s industry’s standards, but in no event less than a reasonable manner.

41.2.8 Security features shall be embedded, enabled and active upon delivery to County, including baseline security configurations for all Deliverables and a defined process to discover and report to County areas within the Deliverables that are vulnerable to security breaches.

41.3 Contractor shall immediately repair and/or replace any Deliverable not conforming to any warranty, or provide services to conform to County’s requirements. If after notice, Contractor fails to repair or replace Deliverables, or to provide services to conform to County’s requirements,

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 134 of 182

Page 135:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Contractor shall promptly refund to County the full purchase price paid by the County and the County’s Cost to Cover. This remedy is non-exclusive of other remedies and rights that may be exercised by the County. Claims for damages may include direct damages, such as cost to repair, as well as incidental and consequential damages. “Cost to Cover” means the cost, properly mitigated, of procuring Deliverables and/or services of equivalent capability, function, and performance. Contractor shall also extend the warranty period for the equivalent period of time that the Deliverables are not in conformance with the County’s requirements.

41.4 At County’s option, Contractor shall use best efforts to repair and/or replace any Deliverable containing open source code or illicit or harmful code. Contractor shall also extend the warranty period for the equivalent period of time that the Deliverables are not in conformance with the County’s requirements. Contractor shall also extend the warranty period for the equivalent period of time that the Deliverables are not in conformance with the County’s requirements.

41.5 If Contractor is unable to repair and/or replace to the County’s satisfaction and within a reasonable period of time, County may immediately terminate this Agreement for cause pursuant to section 5 of this Agreement and Contractor shall refund to County a proportionate refund of any pre-paid fees.

41.6 During the provision of Deliverables and/or services, Contractor may not disclaim any warranty, express or implied, and any such disclaimer shall be void. Additionally, the warranties above shall not be deemed to exclude Contractor’s standard warranties or other rights and warranties that the County may have or obtain.

41.7 Unless otherwise specified, the Contractor does not warrant that any Software provided hereunder is error-free or that it will run without immaterial interruption.

41.8 Contractor does not warrant and will have no responsibility for a claim to the extent that it arises directly from (A) a modification made by the County, unless such modification is approved or directed by Contractor, (B) use of Software in combination with or on products other than as specified by Contractor, or (C) misuse by the County.

41.9 Where Contractor resells Hardware or Software it purchased from a third party, and such third party offers additional or more advantageous warranties than those set forth herein, Contractor will pass through any such warranties to the County and will reasonably cooperate in enforcing them. Such warranty pass-through will be supplemental to, and not relieve Contractor from, Contractor’s warranty obligations set forth above.

41.10 All warranties, including special warranties specified elsewhere herein, shall inure to the County, its successors, assigns, customer agencies, and governmental users of the Deliverables and/or services.

41.11 Should any Deliverable contain embedded or third party software without a license as specified in section 40.2.5, Contractor shall immediately obtain a license for County’s benefit at no cost to the County. Said license shall conform to the requirements set forth in section 40.2.5.

42. COOPERATION WITH REVIEW

42.1 Contractor shall cooperate with County’s periodic review of Contractor’s performance. Contractor shall make itself available onsite to review the progress of the project and Agreement, as requested by the County, upon reasonable advanced notice.

42.2 Contractor agrees to extend to the County or his/her designees and/or designated auditor of the County, the right to monitor or otherwise evaluate all work performed and all records, including service records and procedures to assure that the project is achieving its purpose, that all

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 135 of 182

Page 136:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

applicable federal, state, and local laws and regulations are met, and that adequate internal fiscal controls are maintained.

43. AUDIT RIGHTS

43.1 Pursuant to California Government Code Section 8546.7, the parties acknowledge and agree that every contract involving the expenditure of public funds in excess of Ten Thousand Dollars ($10,000 USD) shall be subject to audit by the State Auditor.

43.2 All payments made under this Agreement shall be subject to an audit at County’s option, and shall be adjusted in accordance with said audit. Adjustments that are found necessary as a result of auditing may be made from current billings.

43.3 Contractor shall be responsible for receiving, replying to, and complying with any audit exceptions set forth in any County audits. Contractor shall pay to County the full amount of any audit determined to be due as a result of County audit exceptions. This provision is in addition to other inspection and access rights specified in this Agreement.

44. ACCESS AND RETENTION OF RECORDS AND PROVISION OF REPORTS

44.1 Contractor shall maintain financial records adequate to show that County funds paid were used for purposes consistent with the terms of the Agreement between Contractor and County. Records shall be maintained during the terms of the Agreement and for a period of four (4) years from its termination, or until all claims have been resolved, whichever period is longer, unless a longer period is required under any contract.

44.2 All books, records, reports, and accounts maintained pursuant to the Agreement, or related to the Contractor's activities under the Agreement, shall be open to inspection, examination, and audit by County, federal and state regulatory agencies, and to parties whose Agreements with the County require such access. County shall have the right to obtain copies of any and all of the books and records maintained pursuant to the Agreement, upon the payment of reasonable charges for the copying of such records.

44.3 Contractor shall provide annual reports that include, at minimum, (i) the total contract release purchase order value for the County as a whole and individual County departments, (ii) the number of orders placed, the breakdown (by customer ID/department and County) of the quantity and dollar amount of each product and/or service ordered per year. Annual reports must be made available no later than thirty (30) calendar days of the Agreement anniversary date unless otherwise requested.

44.4 Contractor shall also provide quarterly reports to the County that show a breakdown by contract release purchase order (i) the order date (ii) ship date (iii) estimated arrival date (iv) actual arrival date (v) list of products, services and maintenance items (vi) the number and details of problem/service calls and department name that each such call pertains to (including unresolved problems). Quarterly reports must be made available to the County in electronic format, two (2) business days after the end of each quarter unless otherwise requested.

45. ACCESS TO BOOKS AND RECORDS PURSUANT TO THE SOCIAL SECURITY ACT

If and to the extent that, Section 1861 (v) (1) (1) of the Social Security Act (42 U.S.C. Section 1395x (v) (1) (1) is applicable, Contractor shall maintain such records and provide such information to County, to any payor which contracts with County and to applicable state and federal regulatory agencies, and shall permit such entities and agencies, at all reasonable times upon request, to access books, records and other papers relating to the Agreement hereunder, as may be required by applicable federal, state and local laws, regulations and ordinances. Contractor agrees to retain such books, records and information for a period of at least four (4) years from and after the termination of

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 136 of 182

Page 137:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

this Agreement. Furthermore, if Contractor carries out any of its duties hereunder, with a value or cost of Ten Thousand Dollars ($10,000 USD) or more over a twelve (12) month period, through a subcontract with a related organization, such subcontract shall contain these same requirements. This provision shall survive the termination of this Agreement regardless of the cause giving rise to the termination.

46. NON-DISCRIMINATION

Contractor shall comply with all applicable federal, state, and local laws and regulations, including Santa Clara County’s policies, concerning nondiscrimination and equal opportunity in contracting. Such laws include, but are not limited to, the following: Title VII of the Civil Rights Act of 1964 as amended; Americans with Disabilities Act of 1990; The Rehabilitation Act of 1973 (§§ 503 and 504); California Fair Employment and Housing Act (Government Code §§ 12900 et seq.); and California Labor Code §§ 1101 and 1102. Contractor shall not discriminate against any employee, subcontractor or applicant for employment because of age, race, color, national origin, ancestry, religion, sex/gender, sexual orientation, mental disability, physical disability, medical condition, political beliefs, organizational affiliations, or marital status in the recruitment, selection for training including apprenticeship, hiring, employment, utilization, promotion, layoff, rates of pay or other forms of compensation. Nor shall Contractor discriminate in provision of services provided under this Agreement because of age, race, color, national origin, ancestry, religion, sex/gender, sexual orientation, mental disability, physical disability, medical condition, political beliefs, organizational affiliations, or marital status. Contractor’s violation of this provision shall be deemed a material default by Contractor giving County a right to terminate the Agreement for cause.

47. DEBARMENT

Contractor represents and warrants that it, its employees, contractors, subcontractors or agents (collectively “Contractor”) are not suspended, debarred, excluded, or ineligible for participation in Medicare, Medi-Cal or any other federal or state funded health care program, or from receiving federal funds as listed in the List of Parties Excluded from Federal Procurement or Non-procurement Programs issued by the Federal General Services Administration. Contractor must within thirty (30) calendar days advise the County if, during the term of this Agreement, Contractor becomes suspended, debarred, excluded or ineligible for participation in Medicare, Medi-Cal or any other federal or state funded health care program, as defined by 42. U.S.C. 1320a-7b(f), or from receiving federal funds as listed in the List of Parties Excluded from Federal Procurement or Non-procurement Programs issued by the Federal General Services Administration. Contractor shall defend, indemnify, and hold the County harmless for any loss or damage resulting from the conviction, debarment, exclusion or ineligibility of the Contractor.

48. RIGHTS IN WORK PRODUCT

48.1 All inventions, discoveries, intellectual property, technical communications and records originated or prepared by the Contractor pursuant to this Agreement including papers, reports, charts, computer programs, and other Documentation or improvements thereto, and including Contractor’s administrative communications and records relating to this Agreement (collectively, the “Work Product”), shall be County’s exclusive property. The provisions of this section may be revised in a SOW.

48.2 Software and other materials developed or otherwise obtained by or for Contractor or its affiliates independently of this Agreement or applicable purchase orders (“Pre-Existing Materials”) do not constitute Work Product. If Contractor creates derivative works of Pre-Existing Materials, the elements of such derivative works created pursuant to this Contract constitute Work Product, but other elements do not. Nothing in this section will be construed to interfere with Contractor’s or its affiliates’ ownership of Pre-Existing Materials.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 137 of 182

Page 138:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

49. PROTECTION OF PROPRIETARY SOFTWARE AND OTHER PROPRIETARY DATA

49.1 The County agrees that all material appropriately marked or identified in writing as proprietary, and furnished hereunder are provided for County’s exclusive use for the purposes of this Agreement only. All such proprietary data shall remain the property of the Contractor. County agrees to take reasonable steps to insure that such proprietary data is not disclosed to others, without prior written consent of the Contractor, subject to the California Public Records Act (“CPRA”).

49.2 The County will insure, prior to disposing of any media, that any licensed materials contained thereon have been erased or otherwise destroyed.

49.3 The County agrees that it will take appropriate action by instruction, agreement or otherwise with its employees or other persons permitted access to licensed software and other proprietary data to satisfy its obligations under this Agreement with respect to use, copying, modification, protection and security of proprietary software and other proprietary data.

50. COUNTY DATA

50.1 “County Data” shall mean data and information received by Contractor from County. As between Contractor and County, all County Data shall remain the property of the County. Contractor shall not acquire any ownership interest in the County Data.

50.2 Contractor shall not, without County’s written permission consent, use or disclose the County Data other than in the performance of its obligations under this Agreement.

50.3 Contractor shall be responsible for establishing and maintaining an information security program that is designed to ensure the security and confidentiality of County Data, protect against any anticipated threats or hazards to the security or integrity of County Data, protect against unauthorized access to or use of County Data that could result in substantial harm or inconvenience to County or any end users; and ensure the proper disposal of County data upon termination of this Agreement.

50.4 Contractor shall take appropriate action to address any incident of unauthorized access to County Data, including addressing and/or remedying the issue that resulted in such unauthorized access, notifying County as soon as possible of any incident of unauthorized access to County Data, or any other breach in Contractor’s security that materially affects County or end users; and be responsible for ensuring compliance by its officers, employees, agents, and subcontractors with the confidentiality provisions hereof.

50.5 Should confidential and/or legally protected County Data be divulged to unauthorized third parties, Contractor shall comply with all applicable federal and state laws and regulations, including but not limited to California Civil Code Sections 1798.29 and 1798.82 at Contractor’s sole expense (if applicable). Contractor shall not charge the County for any expenses associated with Contractor’s compliance with the obligations set forth in this section.

51. SOFTWARE SOURCE CODE ESCROW

51.1 Software in Escrow: Contractor shall place in escrow with an independent escrow agent approved by the County, at Contractor’s expense, all software that is relevant to functionality, setup, configuration, and operation of the System, including, but not limited to, a complete copy of the source and executable code, build scripts, object libraries, application program Interfaces, and complete Documentation of all aspects of the System including, but not limited to, compiling instructions, design Documentation, technical Documentation, user Documentation, hardware and software specifications, drawings, records, and related data (the “Deposit Material”). Contractor shall promptly deposit all new updates, versions or releases as they become available to customers. The Documentation shall include a sworn affidavit that the Deposit Material provided includes all relevant components mentioned in this section above and programs and materials necessary to compile and

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 138 of 182

Page 139:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

operate the System and use the source code for the purpose of maintaining the System as contemplated in Section 50.2 below. Contractor shall add County as a beneficiary to its source code escrow agreement.

51.2 Access to Source Code: Pursuant to Exhibit E, if Contractor ceases to do business (whether by bankruptcy, insolvency, or an assignment without consent of the County) or refuses to provide Maintenance (provided County is current on Maintenance fees), or if this Agreement is terminated for cause by County due to Contractor’s material breach of this Agreement, Contractor shall make available to County the most recent Deposit Material. County shall have the right to copy, modify, and use said Deposit Material. Upon release of the Deposit Material, County agrees that (a) Contractor retains ownership of the Deposit Material, (b) the Deposit Material is licensed to County subject to the restrictions of this Agreement, (c) County may not remove or destroy any proprietary markings or legend placed upon or contained with the Deposit Material, (d) County may not market, sell, publish, disclose or otherwise make available the Deposit Material to any third party not permitted by this Agreement to use the Licensed Software, (e) County shall hold the Deposit Material of Contractor in strict confidence and not make any disclosure except as necessary for its use thereof, and (f) except when actually being utilized for the sole purpose of continuing the benefits afforded to County by the Agreement, County shall keep the Deposit Material in a restricted, limited access area with access thereto limited to designated personnel of County who have a need to use the Deposit Material for the purposes permitted hereunder for the duration of time as necessary to complete such permitted purpose. County shall return all Deposit Material if the event giving rise to the release of the Deposit Material is cured by Contractor.

51.3 Exhibit E lists the annual fee to be paid by Contractor for third party escrow fees.

51.4 The source code may be made available by electronic transmission, at County’s option.

52. CALIFORNIA PUBLIC RECORDS ACT INDEMNITY

The County is a public agency subject to the disclosure requirements of the CPRA. If the County receives a CPRA request for documents (as defined by the CPRA) and said request relates to the Deliverables and/or services provided pursuant to this Agreement, the County will notify Contractor of the request and confer with Contractor regarding an appropriate response to said request. If Contractor contends that any documents are Contractor’s confidential or proprietary material, not subject to the CPRA, and/or exempt from the CPRA, and Contractor wishes to prevent disclosure of said documents, Contractor shall instruct County to withhold said documents. If Contractor fails to respond to County in writing prior to the County’s deadline for responding to the CPRA request, the County may disclose the requested information under the CPRA without liability to the County. Contractor shall defend, indemnify and hold the County harmless against any claim, action or litigation (including but not limited to all judgments, costs, fees, and reasonable attorney’s fees) that may result from denial of a CPRA request.

53. SEVERABILITY

Should any part of the Agreement between County and the Contractor or any individual contract release purchase order be held to be invalid, illegal, or unenforceable in any respect, such invalidity, illegality, or unenforceability shall not affect the validity of the remainder of the Agreement or any individual contract release purchase order which shall continue in full force and effect, provided that such remainder can, absent the excised portion, be reasonably interpreted to give the effect to the intentions of the parties.

54. NON-WAIVER

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 139 of 182

Page 140:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

No waiver of a breach, failure of any condition, or any right or remedy contained in or granted by the provisions of this Agreement will be effective unless it is in writing and signed by County. No waiver of any breach, failure, right, or remedy will be deemed a waiver of any other breach, failure, right, or remedy, whether or not similar, nor will any waiver constitute a continuing waiver unless the writing signed by the County so specifies.

55. USE OF COUNTY’S NAME FOR COMMERCIAL PURPOSES

Contractor may not use the name of the County or reference any endorsement from the County in any fashion for any purpose, without the prior express written consent of the County as provided by the Director of Procurement, or authorized designee.

56. HEADINGS AND TITLES

The titles and headings in this Agreement are included principally for convenience and do not by themselves affect the construction or interpretation of any provision in this Agreement, nor affect any of the rights or obligations of the parties to this Agreement.

57. HANDWRITTEN OR TYPED WORDS

Handwritten or typed words have no greater weight than printed words in the interpretation or construction of this Agreement.

58. AMBIGUITIES

Any rule of construction to the effect that ambiguities are to be resolved against the drafting party does not apply in interpreting this Agreement. Should any ambiguities or conflicts between contract terms and conditions contained in this Agreement and its exhibits exist, the terms and conditions in this Agreement shall control over its exhibits.

59. ENTIRE AGREEMENT

This Agreement and its exhibits (if any) constitute the final, complete and exclusive statement of the terms of the agreement between the parties. It incorporates and supersedes all the agreements, covenants and understandings between the parties concerning the subject matter hereof, and all such agreements, covenants and understandings have been merged into this Agreement. No prior or contemporaneous agreement or understanding, verbal or otherwise, of the parties or their agents shall be valid or enforceable unless embodied in this Agreement.

60. EXECUTION & COUNTERPARTS

This Agreement may be executed in one or more counterparts, each of which will be considered an original, but all of which together will constitute one and the same instrument. The parties agree that this Agreement, its amendments, and ancillary agreements to be entered into in connection with this Agreement will be considered signed when the signature of a party is delivered by facsimile transmission. Such facsimile signature must be treated in all respects as having the same effect as an original signature. The original signature copy must be sent to the County by United States Postal Service mail, sent by courier or delivered by hand.

61. NOTICES

All deliveries, notices, requests, demands or other communications provided for or required by this Agreement shall be in writing and shall be deemed to have been given when sent by registered or certified mail, return receipt requested; when sent by overnight carrier; or upon email confirmation to sender of receipt of a facsimile communication which is followed by a mailed hard copy from sender. Notices shall be addressed to:

COUNTY:

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 140 of 182

Page 141:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Name:      

Contract Administrator

C/o Procurement Department

2310 North First Street, Suite 201

San Jose, CA 95131-1040

CONTRACTOR:

Name:      

Title:      

Company:      

Address 1:      

Address 2:      

City:      

State:   

Zip:      

Each party may designate a different person and address by sending written notice to the other party, to be effective no sooner than ten (10) calendar days after the date of the notice.

62. ACCOUNT MANAGER

Contractor must assign an Account Manager to the County to facilitate the contractual relationship, be fully responsible and accountable for fulfilling the County’s requirements. Contractor represents and warrants that such person will ensure that the County receives adequate pre- and post-sales support, problem resolution assistance and required information on a timely basis.

63. SURVIVAL

All representations, warranties, indemnities, and covenants contained in this Agreement, or in any instrument, certificate, exhibit, or other writing intended by the parties to be a part of their Agreement, will survive the termination of this Agreement.

64. GOVERNING LAW, JURISDICTION AND VENUE

This Agreement shall be construed and interpreted according to the laws of the State of California, excluding its conflict of law principles. Proper venue for legal actions shall be exclusively vested in state court in the County of Santa Clara. The parties agree that subject matter and personal jurisdiction are proper in state court in the County of Santa Clara, and waive all venue objections.

65. HIPAA

Contractor shall comply with Exhibit F, which sets forth certain requirements pursuant to the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

66. NO SMOKING

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 141 of 182

Page 142:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Contractor and its employees, agents and subcontractors, shall comply with the County’s No-Smoking Policy, as set forth in the Board of Supervisors Policy Manual section 3.47 (as amended from time to time), which prohibits smoking: (1) at the Santa Clara Valley Medical Center Campus and all County-owned and operated health facilities, (2) within 30 feet surrounding County-owned buildings and leased buildings where the County is the sole occupant, and (3) in all County vehicles.

67. BEVERAGE NUTRITIONAL

If Contractor provides beverages through County departments, or at County programs, sponsored meetings, sponsored events, or at County owned/operated facilities, Contractor shall not use County funds to purchase beverages that do not meet the County’s nutritional beverage criteria, if applicable. The six categories of nutritional beverages that meet these criteria are (1) water with no additives; (2) 100% fruit juices with no added sugars, artificial flavors or colors (limited to a maximum of 10 ounces per container); (3) dairy milk, non-fat, 1% and 2% only, no flavored milks; (4) plant derived (i.e., rice, almond, soy, etc.) milks (no flavored milks); (5) artificially-sweetened, calorie-reduced beverages that do not exceed 50 calories per 12-ounce container (teas, electrolyte replacements); and (6) other non-caloric beverages, such as coffee, tea, and diet sodas. These criteria may be waived in the event of an emergency or in light of medical necessity.

68. ASSIGNMENT OF CLAYTON ACT, CARTWRIGHT ACT CLAIMS

Contractor hereby assigns to the County all rights, title, and interest in and to all causes of action it may have under Section 4 of the Clayton Act (15 U.S.C. Sec. 15) or under the Cartwright Act (Chapter 2 (commencing with Section 16700) of Part 2 of Division 7 of the Business and Professions Code), arising from purchases of goods, materials, or services by the Contractor for sale to the County pursuant to this Agreement.

69. ELECTRONIC COPY OF SIGNED AGREEMENT

All parties agree that an electronic copy of a signed contract shall have the same force and effect as an original signed contract provided that the Contractor agrees to deliver to the County the original signed contract within 7 business days of sending an electronic copy. The term “electronic copy” for purposes of this provision refers to a transmission by facsimile or electronic mail in a portable document format.

70.THIRD PARTY BENEFICIARIES

This agreement does not, and is not intended to, confer any rights or remedies upon any person or entity other than the parties

71. AUTHORITY

Each party executing the Agreement on behalf of such entity represents that he or she is duly authorized to execute and deliver this Agreement on the entity’s behalf, including the entity’s Board of Directors or Executive Director. This Agreement shall not be effective or binding unless it is in writing and approved by the County Director of Procurement, or authorized designee, as evidenced by their signature as set forth in this Agreement.

72. WAGE THEFT PREVENTION

(1) Compliance with Wage and Hour Laws: Contractor, and any subcontractor it employs to complete work under this Agreement, must comply with all applicable federal, state, and local wage and hour laws. Applicable laws may include, but are not limited to, the Federal Fair Labor Standards Act, the California Labor Code, and any local Minimum Wage Ordinance or Living Wage Ordinance.

(2) Final Judgments, Decisions, and Orders: For purposes of this Section, a “final judgment, decision, or order” refers to one for which all appeals have been exhausted. Relevant investigatory government

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 142 of 182

Page 143:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

agencies include: the federal Department of Labor, the California Division of Labor Standards Enforcement, a local enforcement agency, or any other government entity tasked with the investigation and enforcement of wage and hour laws.

(3) Prior Judgments against Contractor and/or its Subcontractors: BY SIGNING THIS AGREEMENT, CONTRACTOR AFFIRMS THAT IT HAS DISCLOSED ANY FINAL JUDGMENTS, DECISIONS, OR ORDERS FROM A COURT OR INVESTIGATORY GOVERNMENT AGENCY FINDING—IN THE FIVE YEARS PRIOR TO EXECUTING THIS AGREEMENT—THAT CONTRACTOR OR ITS SUBCONTRACTOR(S) HAS VIOLATED ANY APPLICABLE WAGE AND HOUR LAWS. CONTRACTOR FURTHER AFFIRMS THAT IT OR ITS SUBCONTRACTOR(S) HAS SATISFIED AND COMPLIED WITH—OR HAS REACHED AGREEMENT WITH THE COUNTY REGARDING THE MANNER IN WHICH IT WILL SATISFY—ANY SUCH JUDGMENTS, DECISIONS, OR

ORDERS.

(4) Judgments During Term of Contract: If at any time during the term of this Agreement, a court or investigatory government agency issues a final judgment, decision, or order finding that Contractor or any subcontractor it employs to perform work under this Agreement has violated any applicable wage and hour law, or Contractor learns of such a judgment, decision, or order that was not previously disclosed, Contractor must inform the Office of the County Executive-Countywide Contracting, no more than 15 days after the judgment, decision, or order becomes final or of learning of the final judgment, decision or order. Contractor and its subcontractors shall promptly satisfy and comply with any such judgment, decision, or order, and shall provide the Office of the County Executive-Countywide Contracting with documentary evidence of compliance with the final judgment, decision or order within 5 days of satisfying the final judgment, decision, or order. The County reserves the right to require Contractor to enter into an agreement with the County regarding the manner in which any such final judgment, decision or order will be satisfied.

(5) County’s Right to Withhold Payment: Where Contractor or any subcontractor it employs to perform work under this Agreement has been found in violation of any applicable wage and hour law by a final judgment, decision, or order of a court or government agency, the County reserves the right to withhold payment to Contractor until such judgment, decision, or order has been satisfied in full.

(6) Material Breach: Failure to comply with any part of this Section constitutes a material breach of this Agreement. Such breach may serve as a basis for termination of this Agreement and/or any other remedies available under this Agreement and/or law.

(7) Notice to County Related to Wage Theft Prevention: Notice provided to the Office of the County Executive as required under this Section shall be addressed to: Office of the County Executive—Countywide Contracting; 70 West Hedding Street; East Wing, 11th Floor; San José, CA 95110. The Notice provisions of this Section are separate from any other notice provisions in this Agreement and, accordingly, only notice provided to the above address satisfies the notice requirements in this Section.

73.  SAFEHARBOR / ANTI-KICKBACK

                     In reference to SCVHHS POLICY #583.0

(a) The Parties intend that any price reductions or discounts   under this Agreement will satisfy  the federal safe harbor regulation for discounts, 42 C.F.R. § 1001.952(h) as it may be amended from time to time, and will provide all information required to satisfy the safe har-bor. 

(b) Contractor shall fully and accurately report any discount  on the invoices, coupons or statements submitted to the County (including showing on such invoices, statements, and coupons the products furnished at no-charge); inform the County in a manner reasonably calculated to give the County notice of its obligations to report discounts and provide

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 143 of 182

Page 144:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

information upon request as required by the safe harbor regulation; and refrain from doing anything that would impede the County from meeting its obligations under the safe harbor regulation.

(c) Where the value of a discount   is not known at the time of sale, Contractor shall fully and accurately report the existence of the applicable discount  program   program on the in-voice, coupon or statements submitted to the County; inform the County in a manner rea-sonably calculated to give notice to the County of its obligations to report discounts  and provide information as required by the safe harbor regulation when the value of the dis-count   becomes known, provide the County with documentation of the calculation of the discount  identifying the specific goods or services purchased to which the discount   will be applied; and refrain from doing anything which would impede the County from meeting its obligation under the safe harbor regulation.

(d)  The County will fully and accurately report any discount   it is provided under this Agree-ment in its Medicare and Medi-Cal cost reports.  The County will provide upon request by the Secretary of the United States Department of Health and Human Services or a State agency, information provided to it by Contractor as necessary to comply with the safe har-bor regulation.

(e) Contractor also agrees to cooperate with the County by providing any information the County needs in order to comply with federal safe harbor regulation for discounts. 

74. PRODUCTS

Contractor agrees to provide the County all goods on terms set forth in the Agreement, including all Exhibits that are attached to the Agreement and incorporated, as well as all necessary equipment and resources. However, this Agreement does not provide authority to ship goods. That authority shall be established by contract release purchase orders placed by the County and sent to Contractor throughout the term of the Agreement. Each and every contract release purchase order shall incorporate all terms of this Agreement and this Agreement shall apply to same.

ANY ADDITIONAL OR DIFFERENT TERMS OR QUALIFICATIONS SENT BY CONTRACTOR, INCLUDING, WITHOUT LIMITATION, ELECTRONICALLY OR IN MAILINGS, ATTACHED TO INVOICES OR WITH ANY GOODS SHIPPED, SHALL NOT BECOME PART OF THE CONTRACT BETWEEN THE PARTIES. COUNTY’S ACCEPTANCE OF CONTRACTOR’S OFFER IS EXPRESSLY MADE CONDITIONAL ON THIS STATEMENT.

Contractor shall provide to the County, all documentation and manuals relevant to the goods to be supplied, at no additional cost. Such documentation shall be delivered either in advance of the delivery of goods or concurrently with the delivery of goods.

Employees and agents of Contractor, shall, while on the premises of the County, comply with all rules and regulations of the premises, including, but not limited to, security requirements.

If required, Contractor shall be responsible for installation, training and knowledge transfer activities in relation to the goods being supplied.

All equipment shall be delivered to a County site specified in the contract release purchase order, or if not so specified therein, in the Statement of Work/Specifications.

Contractor holds itself out as an expert in the subject matter of the Agreement. Contractor represents itself as being possessed of greater knowledge and skill in this area than the average person. Accordingly, Contractor is under a duty to exercise a skill greater than that of an ordinary person, and the manner in which performance is rendered will be evaluated in light of the Contractor’s superior skill. Contractor shall provide equipment and perform work in a professional manner consistent, at minimum, with industry standards.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 144 of 182

Page 145:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Contractor represents that all prices, warranties, benefits and other terms being provided hereunder are fair, reasonable and commensurate with the terms otherwise being offered by Contractor to its current customers ordering comparable goods and services.

County does not guarantee any minimum orders.

75. FOOD AND BEVERAGE STANDARDS

Except in the event of an emergency or medical necessity, the following nutritional standards shall apply to any foods and/or beverages purchased by Contractor with County funds for County-sponsored meetings or events.

If food is to be provided, healthier food options shall be offered. “Healthier food options” include (1) fruits, vegetables, whole grains, and low fat and low calorie foods; (2) minimally processed foods without added sugar and with low sodium; (3) foods prepared using healthy cooking techniques; and (4) foods with less than 0.5 grams of trans fat per serving. Whenever possible, Contractor shall (1) offer seasonal and local produce; (2) serve fruit instead of sugary, high calorie desserts; (3) attempt to accommodate special, dietary and cultural needs; and (4) post nutritional information and/or a list of ingredients for items served. If meals are to be provided, a vegetarian option shall be provided, and the Contractor should consider providing a vegan option. If pre-packaged snack foods are provided, the items shall contain: (1) no more than 35% of calories from fat, unless the snack food items consist solely of nuts or seeds; (2) no more than 10% of calories from saturated fat; (3) zero trans-fat; (4) no more than 35% of total weight from sugar and caloric sweeteners, except for fruits and vegetables with no added sweeteners or fats; and (5) no more than 360 mg of sodium per serving.

If beverages are to be provided, beverages that meet the County’s nutritional criteria are (1) water with no caloric sweeteners; (2) unsweetened coffee or tea, provided that sugar and sugar substitutes may be provided as condiments; (3) unsweetened, unflavored, reduced fat (either nonfat or 1% low fat) dairy milk; (4) plant-derived milk (e.g., soy milk, rice milk, and almond milk) with no more than 130 calories per 8 ounce serving; (5) 100% fruit or vegetable juice (limited to a maximum of 8 ounces per container); and (6) other low-calorie beverages (including tea and/or diet soda) that do not exceed 40 calories per 8 ounce serving. Sugar-sweetened beverages shall not be provided

76. CALIFORNIA PUBLIC RECORDS ACT

The County is a public agency subject to the disclosure requirements of the California Public Records Act (“CPRA”). If Contractor’s proprietary information is contained in documents or information submitted to County, and Contractor claims that such information falls within one or more CPRA exemptions, Contractor must clearly mark such information “CONFIDENTIAL AND PROPRIETARY,” and identify the specific lines containing the information. In the event of a request for such information, the County will make best efforts to provide notice to Contractor prior to such disclosure. If Contractor contends that any documents are exempt from the CPRA and wishes to prevent disclosure, it is required to obtain a protective order, injunctive relief or other appropriate remedy from a court of law in Santa Clara County before the County is required to respond to the CPRA request. If Contractor fails to obtain such remedy within the time the County is required to respond to the CPRA request, County may disclose the requested information.

Contractor further agrees that it shall defend, indemnify and hold County harmless against any claim, action or litigation (including but not limited to all judgments, costs, fees, and attorney’s fees) that may result from denial by County of a CPRA request for information arising from any representation, or any action (or inaction), by the Contractor.

77. POLITICAL REFORM ACT DISCLOSURE REQUIREMENT

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 145 of 182

Page 146:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Contractor, including but not limited to contractor’s employees and subcontractors, may be subject to the disclosure and disqualification provisions of the California Political Reform Act of 1974 (the “Act”), that (1) requires such persons to disclose economic interests that may foreseeably be materially affected by the work performed under the Contract, and (2) prohibits such persons from making or participating in making decisions that will foreseeably financially affect such interests.

If the disclosure provisions of the Act are applicable to any individual providing service under the Contract, Contractor shall, upon execution of the Contract, provide the County with the names, description of individual duties to be performed, and email addresses of all individuals, including but not limited to Contractor’s employees, agents and subcontractors, that could be substantively involved in “making a governmental decision” or “serving in a staff capacity and in that capacity participating in making governmental decisions or performing duties that would be performed by an individual in a designated position,” (2 CCR 18701(a)(2)), as part of Contractor’s service to the County under the Contract. Contractor shall ensure that such individuals file Statements of Economic Interests within 30 days of commencing service under the Contract, annually by April 1, and within 30 days of their termination of service under the Contract.

78. CONTRACT EXECUTION

Unless otherwise prohibited by law or County policy, the parties agree that an electronic copy of a signed contract, or an electronically signed contract, has the same force and legal effect as a contract executed with an original ink signature. The term “electronic copy of a signed contract” refers to a transmission by facsimile, electronic mail, or other electronic means of a copy of an original signed contract in a portable document format.  The term “electronically signed contract” means a contract that is executed by applying an electronic signature using technology approved by the County. 

79. ACCEPTANCE TESTING

Contractor Validation: Contractor will provide consumables, other materials as required and personnel to demonstrate that the installed system meets or exceeds the Offeror’s published performance specifications for basic operation. The Santa Clara County Public Health Department (SCC PHD) acknowledges that any data samples required by the vendor for validation purposes will be provided by SCC PHD at its expense. All validation data will be documented and presented to the Public Health Director of Assessment, Planning and Evaluation for approval. The Validation phase will be considered complete when validation testing sign-off is obtained from both SCC PHD and the Contractor’s technical field personnel indicating that the performance of all components of the product meet or exceed the Contractor’s published product specifications.

SCC PHD Validation: Upon acceptance of vendor validation, SCC PHD will continue validation of the system listed in the RFP by its personnel. System validation may include accuracy, precision and analytical sensitivity when not done so in Vendor Validation. These parameters will be compared to vendor’s provided application specifications such as submission documents, which must be met or exceeded. In the event that SCC PHD personnel are unable to meet the application specifications, Contractor will provide application support to assist SCC PHD personnel in achieving assay performance equal to or exceeding application data.  Upon completion of this testing, the data will be presented to the Public Health Director of Assessment, Planning & Evaluation for acceptance.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 146 of 182

Page 147:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ATTACHMENT 3

INSURANCE REQUIREMENTS FOR

STANDARD CONTRACTS ABOVE $100,000

Indemnity

The Contractor shall indemnify, defend, and hold harmless the County of Santa Clara (hereinafter "County"), its officers, agents and employees from any claim, liability, loss, injury or damage arising out of, or in connection with, performance of this Agreement by Contractor and/or its agents, employees or sub-contractors, excepting only loss, injury or damage caused by the sole negligence or willful misconduct of personnel employed by the County. It is the intent of the parties to this Agreement to provide the broadest possible coverage for the County. The Contractor shall reimburse the County for all costs, attorneys' fees, expenses and liabilities incurred with respect to any litigation in which the Contractor is obligated to indemnify, defend and hold harmless the County under this Agreement.

Insurance

Without limiting the Contractor's indemnification of the County, the Contractor shall provide and maintain at its own expense, during the term of this Agreement, or as may be further required herein, the following insurance coverages and provisions:

A. Evidence of Coverage

Prior to commencement of this Agreement, the Contractor shall provide a Certificate of Insurance certifying that coverage as required herein has been obtained. Individual endorsements executed by the insurance carrier shall accompany the certificate. In addition, a certified copy of the policy or policies shall be provided by the Contractor upon request.

This verification of coverage shall be sent to the requesting County department, unless otherwise directed. The Contractor shall not receive a Notice to Proceed with the work under the Agreement until it has obtained all insurance required and such insurance has been approved by the County. This approval of insurance shall neither relieve nor decrease the liability of the Contractor.

B. Qualifying Insurers

All coverages, except surety, shall be issued by companies which hold a current policy holder's alphabetic and financial size category rating of not less than A- V, according to the current Best's Key Rating Guide or a company of equal financial stability that is approved by the County's Insurance Manager.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 147 of 182

Page 148:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

C. Notice of Cancellation All coverage as required herein shall not be canceled or changed so as to no

longer meet the specified County insurance requirements without 30 days' prior written notice of such cancellation or change being delivered to the County of Santa Clara or their designated agent.

D. Insurance Required

1. Commercial General Liability Insurance - for bodily injury (including death) and property damage which provides limits as follows:

a. Each occurrence - $1,000,000

b. General aggregate - $2,000,000

c. Products/Completed Operations aggregate - $2,000,000

d. Personal Injury - $1,000,000

2. General liability coverage shall include:

a. Premises and Operations

b. Products/Completed

c. Personal Injury liability

d. Severability of interest

3. General liability coverage shall include the following endorsement, a copy of which shall be provided to the County:

Additional Insured Endorsement, which shall read:

“County of Santa Clara, and members of the Board of Supervisors of the County of Santa Clara, and the officers, agents, and employees of the County of Santa Clara, individually and collectively, as additional insureds.”

Insurance afforded by the additional insured endorsement shall apply as primary insurance, and other insurance maintained by the County of Santa Clara, its officers, agents, and employees shall be excess only and not contributing with insurance provided under this policy. Public Entities may also be added to the additional insured endorsement as applicable and the contractor shall be notified by the contracting department of these requirements.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 148 of 182

Page 149:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

4. Automobile Liability Insurance

For bodily injury (including death) and property damage which provides total limits of not less than one million dollars ($1,000,000) combined single limit per occurrence applicable to all owned, non-owned and hired vehicles.

4a. Aircraft/Watercraft Liability Insurance (Required if Contractor or any of its agents or subcontractors will operate aircraft or watercraft in the scope of the Agreement)

For bodily injury (including death) and property damage which provides total limits of not less than one million dollars ($1,000,000) combined single limit per occurrence applicable to all owned, non-owned and hired aircraft/watercraft.

5. Workers' Compensation and Employer's Liability Insurance

a. Statutory California Workers' Compensation coverage including broad form all-states coverage.

b. Employer's Liability coverage for not less than one million dollars ($1,000,000) per occurrence.

E. Special Provisions

The following provisions shall apply to this Agreement:

1. The foregoing requirements as to the types and limits of insurance coverage to be maintained by the Contractor and any approval of said insurance by the County or its insurance consultant(s) are not intended to and shall not in any manner limit or qualify the liabilities and obligations otherwise assumed by the Contractor pursuant to this Agreement, including but not limited to the provisions concerning indemnification.

2. The County acknowledges that some insurance requirements contained in this Agreement may be fulfilled by self-insurance on the part of the Contractor. However, this shall not in any way limit liabilities assumed by the Contractor under this Agreement. Any self-insurance shall be approved in writing by the County upon satisfactory evidence of financial capacity. Contractors obligation hereunder may be satisfied in whole or in part by adequately funded self-insurance programs or self-insurance retentions.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 149 of 182

Page 150:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

3. Should any of the work under this Agreement be sublet, the Contractor shall require each of its subcontractors of any tier to carry the aforementioned coverages, or Contractor may insure subcontractors under its own policies.

4. The County reserves the right to withhold payments to the Contractor in the event of material noncompliance with the insurance requirements outlined above.

F. Fidelity Bonds (Required only if contractor will be receiving advanced funds or payments)

Before receiving compensation under this Agreement, Contractor will furnish County with evidence that all officials, employees, and agents handling or having access to funds received or disbursed under this Agreement, or authorized to sign or countersign checks, are covered by a BLANKET FIDELITY BOND in an amount of AT LEAST fifteen percent (15%) of the maximum financial obligation of the County cited herein. If such bond is canceled or reduced, Contractor will notify County immediately, and County may withhold further payment to Contractor until proper coverage has been obtained. Failure to give such notice may be cause for termination of this Agreement, at the option of County.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 150 of 182

Page 151:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ATTACHMENT 4VENDOR REMOTE ACCESS / SECURELINK DOCUMENT

The Agreement entered into _______________ between Santa Clara County [Santa Clara Health & Hospital System] (“Customer”) and [Vendor] (“Contractor”) is hereby amended, effective __________, to add the following terms and conditions relating to Contractor’s ability to remotely access Customer’s systems as set forth below. In the event of any conflict or inconsistency between the applicable terms of this ________Amendment and the terms of the Agreement, the terms of the Agreement will apply and control in all instances.

1. Definitions

County: “County” shall mean Santa Clara County, in the State of California.

Remote Access: Remote access is the act of connecting to County systems from a non-County system through a public network or non-County network infrastructure. Systems include personal computers, workstations, servers and/or any device with network capabilities (e.g., a workstation with an attached modem, routers, switches, laptop computers, handheld devices).

2. Scope of Access

a. Customer hereby grants remote access to the following Customer systems at the locations listed, collectively referred to as “IS”, in accordance with the terms of the Agreement and this Amendment:

Customer Systems: ____________________________________________________

All other access is prohibited.

b. Access is granted for the purpose of Contractor providing services and performing its obligations as set forth in the Agreement including, but not limited to, supporting Contractor-installed programs. Unauthorized or illegitimate access to IS and/or County data/information is prohibited.

c. Modifications to Access Right: Customer will review the scope of Contractor’s access rights periodically. In no instance will Contractor’s access rights be reduced, limited or modified in any way that prevents or delays Contractor from performing it’s obligations set forth in the Agreement. Any modifications to these access rights must be mutually agreed to in writing by Customer and Contractor.

3. Security Requirements

a. Contractor will not install any remote access capabilities on any Customer owned or managed system or network unless such installation and configuration is approved in writing by Customer’s and Contractor’s respective designees.

b. Contractor may only install and configure remote access capabilities on Customer systems in accordance with industry standard protocols and procedures, which must be reviewed and approved by Customer’s designee.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 151 of 182

Page 152:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

c. Contractor may only remotely access County systems, including those connections initiated from a County system, if the following conditions are met:

1. Contractor will submit documentation verifying it’s network security mechanisms to Customer for Customer’s review and approval. Advanced written approval of

Contractor’s security mechanisms is required prior to Contractor being granted remote access.

2. Contractor security systems must include the following minimum control mechanisms: a. Two Factor Authentication: an authentication method that requires two of the

following three factors to confirm the identity of the user attempting remote access. Those factors include: 1) something you possess (e.g., security token and/or smart card), 2) something you know (e.g., a personal identification number (PIN)), 3) something you are (e.g., fingerprints, retina scan). The only exceptions are County approved County site to Contractor site VPN infrastructure.

b. Centrally controlled authorizations (permissions) that are user specific (e.g., access lists that limit access to specific systems or LANs).

c. Audit tools that create detailed records/logs of access attempts.

d. All systems used to remotely access County systems must have installed and activated industry-standard anti-virus and other security measures that

might be required by the County (e.g., software firewall).

e. Access must be established through a centralized collection of hardware and software centrally managed and controlled by Customer’s and Contractor’s respective designees.

4. Monitoring/AuditCustomer will monitor access to and activities on Customer owned or managed systems and networks. All remote access attempts to Customer networks and/or systems will be logged on a Customer managed and monitored system with the date, time, and user identification.

5. Copying Deleting or Modifying DataContractor is prohibited from copying, modifying, or deleting any data contained in or on any IS unless otherwise stated in the Agreement or unless Contractor receives prior written approval from Customer. This does not include data installed by the Contractor to fulfill it’s obligations set forth in the Agreement.

6. Connections to Non-County Networks and/or Systems

Contractor agrees to make every effort to protect Customer’s data contained on Customer owned and/or managed systems and networks within Contractor’s control from unauthorized access. Prior written approval is required before Contractor may connect Customer networks or systems to non-Customer owned and/or managed networks or systems. Such connections shall be made in accordance with industry standard protocols and procedures as mutually agreed upon and shall be timely approved in writing by Customer. All modem access and other forms of remote access, such as but not limited to, Virtual Private Network (VPN) access, shall be made in accordance with mutually agreed upon industry standard protocols and procedures, which shall be timely approved in writing by the Customer.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 152 of 182

Page 153:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

7. Term and Termination a. Term: The term of this Amendment will begin on it’s effective date set forth above and will run co-terminous with the Agreement unless terminated earlier as set forth herein.

b. Termination: Customer may terminate this Amendment in accordance with the Termination section of the Agreement following Contractor’s violation of any of the provisions set forth herein or in the Agreement.

8. Person Authorized to Act on Behalf of Parties: The following persons are the designees for purposes of this Amendment:

Contractor: Title/ Designee ________________________________Customer: Title/ Designee _________________________________

Either party may change the aforementioned names and or designees by providing the other party with no less than three (3) business days prior written notice.

9. REMOTE ACCESS BACK-UP MODEL: This Remote Access Back-Up Model shall only be used in the event that the primary model selected below is inoperable. Contractor will abide by the additional provisions relating to the backup model selected below in the event Contractor utilizes the backup model.

10. ACCESS MODELS: Contractor agrees to abide by the following additional provisions relating to the primary model selected as indicated below. Please mark appropriate box for each model or if a model is inapplicable, please check the box marked N/A.

A. VPN - Site-to-Site [ ] Primary 1[ ] 1Backup 1[ ] N/AContactor support staff will have 24X7 access to all Contractor supported software, devices and systems (including applicable third party software products).

In addition to the above terms, the Contractor agrees to the following:

Only staff providing services or fulfilling Contractor obligations under the Agreement will be given remote access rights.

Only Contractor supported software, devices and systems (including applicable third party software products) will be accessed.

An encryption method reviewed and approved by the County will be used. Customer shall be solely responsible and liable for any delay or failure of Customer, as applicable, to approve the encryption method to be used by Contractor where such delay or failure causes Contractor to fail to meet or perform, or be delayed in meeting or performing, any of its obligations under the Agreement.

Contractor will be required to log all access activity to the Customer. These logs will be kept for a minimum of 90 days and be made available to Customer no more frequently than once every 90 days.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 153 of 182

Page 154:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Contractor will promptly report to Customer all system changes made via remote access.

B. Client based VPN and SSLVPN County System Administrator Authentication [ ] Primary 1[ ] 1Backup 1[ ] N/A

A PIN number will be provided to the Contractor to use as identification for remote access. The Customer’s [TITLE] or his/her designee will verify the PIN number provided by the Contractor. After verification the Customer [TITLE] or his/her designee will give the Contractor a one-time password which will be used to authenticate Contractor when accessing the Customer’s IS. All system changes will be subject to prior approval by Customer’s [TITLE] or his/her designee. All remote access will be initiated only after a support case has been opened either by Customer or Contractor.

Because the PIN number allows access to privileged or confidential information residing on the Customer’s IS, the Contractor agrees to treat the PIN number as it would a signature authorizing a financial commitment of a Contractor executive every time the PIN number is used.

In addition to the above terms, Contractor agrees to the following:

The PIN number is confidential, County-owned, and will be identified as such.

The PIN number must be kept in a secured environment under the direct control of the County, such as a locked office where public or other unauthorized access is not allowed.

The PIN number can only be released to an authorized employee of the Contractor and may only be used by the designated individual.

If the PIN number is compromised or misused, the Contractor shall notify the Customer’s [TITLE] or his/her designee within one (1) business day.

Contactors use the PIN number as part their normal business operations and for legitimate business purposes only. Use of the PIN number to gain unauthorized or illegitimate access to County information is prohibited and may result in contract termination and other potential consequences provided by law.

The PIN number will be issued to Contractor following execution of this Agreement.

The PIN number will be inactivated by the Customer’s [TITLE] or his/her designee within five (5) business days following contract termination, or upon written request of the County for any reason.

C. County-Controlled Enexity (Secure Link) Access [X] Primary 1[ ] 1Backup 1[ ] N/A

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 154 of 182

Page 155:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

The County-Controlled Enexity Access method involves using Securelink’s Enexity tool installed in the County. County will establish a gateway where the vendor can access the designated software, devices and systems, within the County, as in Paragraph 1.b, from selected network-attached devices at the county site. County will control the access list for Vendors with access through Enexity gateways.

By executing this Amendment, both Contractor and Customer agree to abide by the terms and conditions contained herein.

SANTA CLARA COUNTY INFORMATION TECHNOLOGY

USER RESPONSIBILITY STATEMENT INSTRUCTIONS

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 155 of 182

Customer: Santa Clara County [Agency Name]Name: ___________________________Title: ___________________________ Date: ___________________________

Contractor: [Vendor Name]Name: ___________________________Title: ___________________________ Date: ___________________________

Page 156:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

In May 1995 the Board of Supervisors charged each County organization with the responsibility for ensuring that all County employees had read and signed a statement of responsibility concerning use of the County’s networks and information systems. The resulting County-wide User Responsibility Statement is intended as a minimum statement of User responsibility, and individual County Agencies and Departments may require Users to read and sign additional statements to meet any special requirements that apply within their own environments.

•The County User Responsibility Statement must be signed by anyone who might reasonably require access to a County network and/or information system. This includes all County employees, as well as any other individual who needs authorized access for County business purposes. All Users who are allowed to access County resources remotely must also sign an additional attachment specifically related to remote access; this is included as Attachment A of the User Responsibility Statement. In addition, Users who are granted approval to use a personally-owned device for County business must also sign Attachment B of the User Responsibility Statement.

•By signing the Statement or its attachments, Users acknowledge that they have read and understand the contents and that violation of any of the provisions may result in disciplinary action, up to and including termination of employment and/or criminal prosecution.

•If an individual refuses to sign the Statement, the Department can choose to read the Statement to the individual, who will be required to verbally acknowledge understanding of the Statement’s contents in the presence of two or more responsible managers. These managers will attest in writing that this reading and verbal attestation of understanding occurred. Failing this verbal acknowledgement of understanding, the involved individual will be denied access to all County information systems and networks.

• Each County organization is responsible for storing and maintaining the signed

Statements of its own Users.

•All County organizations shall have their Users re-execute the Statement and/or attachments annually, or whenever there is an update or other change to the Statement or attachments (Department Heads will be notified by the County CIO’s office of any updates or changes to the Statement or attachments).

•Each County o r ga n i z a t i o n s h o u l d i d e n t i f y a “ User R e s p o n s i b i l i t y S t a t e m e n t Administrator.”

This is an occasional personnel function that should NOT be filled by a member of the Organization’s information system support staff. Because it is a personnel function, a good choice would be an employee in an administrative position who is responsible for other routine personnel issues.

The User Responsibility Statement Administrator is responsible for the following tasks:

1. Identifying employees and other Users within the organization that will need to read and sign the Statement, as well as the relevant attachments.

2. Managing the signing process, including arranging for any briefings to be held in conjunction with Users signing the Statement and attachments.

3. Maintaining the signed Statements and attachments.

4. Ensuring that new employees and other new Users read and sign the basic Statement and any relevant attachments, and that the Department signing process is performed by all Users on an annual basis.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 156 of 182

Page 157:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

USER RESPONSIBILITY STATEMENT FOR

THIRD PARTIES

1. GENERAL PROVISIONS

a. In consideration for accessing the County of Santa Clara (“County”) networks and/or information systems, User agrees to the terms and conditions contained in this County User Responsibility Statement for Third Parties (“URS”), as evidenced by User’s signature on the URS.

b. Users allowed access to County resources remotely shall sign Attachment A.

c. Users allowed to use a personally owned device for County business shall sign Attachment ‐B.

d. County in its sole discretion may require Users to execute a separate Business Associate Agreement as a condition to access County networks and/or information systems.

e. This URS and its attachments shall be effective until terminated. User or County may terminate this URS by giving three (3) days written notice to the other party.

2. DEFINITIONS

a. “County Confidential Information” is all material non-public information, written or oral, disclosed, directly or indirectly, through any means of communication or observation by County to Contractor or any of its affiliates or representatives

b. “County information systems and networks” include, but are not limited to, all County‐owned, rented, or leased servers, mainframe computers, desktop computers, laptop computers, handheld devices (including smart phones, wireless PDAs and Pocket PCs), equipment, networks, application systems, data bases and software. These items are typically under the direct control and management of County information system support staff. Also included are information systems and networks under the control and management of a service provider for use by County, as well as any personally owned ‐device that a User has express written permission to use for County purposes.

c. “County owned information/data” ‐ is any information or data that is transported across a County network, or that resides in a County owned information system, or on a network or ‐system under the control and management of a service provider for use by County. This information/data is the exclusive property of County, unless constitutional provision, State or Federal statute, case law, or contract provide otherwise. County owned ‐information/data does not include a User’s personal, non County business information, ‐communications, data, files and/or software transmitted by or stored on a personally‐owned device if that information/data is not transported across a County network or does

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 157 of 182

Page 158:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

not reside in a County owned information system or on a network or system under the ‐control and management of a service provider for use by County.

d. “Mobile device” is any computing device that fits one of the following categories: laptops; Personal Digital Assistants (PDAs); handheld notebook computers and tablets, including but not limited to those running Microsoft Windows CE, Pocket PC, Windows Mobile, or Mobile Linux operating systems; and “smart phones” that include email and/or data storage functionality, such as BlackBerry, Treo, Symbian based devices, iPhones and Android ‐devices. Note that the category “Mobile Device” does not include devices that are used exclusively for the purpose of making telephone calls.

e. “Public record” is any writing, including electronic documents, relating to the conduct of the people’s business as defined by Government Code section 6252.

f. “Remote access” is defined as any access to County Information Technology (“IT”) resources (networks or systems) that occurs from a non County infrastructure, no matter what ‐technology is used for this access. This includes, but is not limited to, access to County IT resources from personal computers located in User’s homes.

g. “Users” include individuals who have been authorized to access County networks and systems.

3. GENERAL CODE OF RESPONSIBILITY

a. The following General Code of Responsibility defines the basic standards for User interaction with County information systems and networks. All Users of County information systems and networks shall comply with these minimum standards.

b. Users are personally responsible for knowing and understanding the appropriate standards for user conduct, and are personally responsible for any actions they take that do not comply with County policies and standards. If a User is unclear as to the appropriate standards, User shall ask County for guidance.

c. Users shall comply with County standards for password definition, use, and management.

d. Only authorized County staff may attach any form of computer equipment to a County network or system. This includes, but is not limited to, attachment of such devices as laptops, PDAs, peripherals (e.g., external hard drives, printers), and USB storage media.

e. User shall not use USB storage media on any County computer system. All such devices shall be County owned, formally issued to User by County, and used only for legitimate ‐County purposes.

f. User shall not connect County-owned computing equipment, including USB storage media, to non County systems or networks, unless County gives its express written permission. ‐

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 158 of 182

Page 159:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

This formal approval process ensures that the non-County system or network in question has been evaluated for compliance with County security standards. An example of a permitted connection to a non-County system or network would be approved connection of a County issued laptop to a home network.

g. User shall not install, configure, or use any device intended to provide connectivity to a non‐County network or system (such as the Internet), on any County system or network, without County’s express written permission. If authorized to install, configure or use such a device, User shall comply with all applicable County standards designed to ensure the privacy and protection of data, and the safety and security of County systems.

h. The unauthorized implementation or configuration of encryption, special passwords, biometric technologies, or any other methods to prevent access to County resources by those individuals who would otherwise be legitimately authorized to do so is prohibited.

i. Users shall not attempt to elevate or enhance their assigned level of privileges unless County gives its express written permission. Users who have been granted enhanced privileges due to their specific jobs, such as system or network administrators, shall not abuse these privileges and shall use such privileges only in the performance of appropriate, legitimate job functions.

j. Users shall use County approved authentication mechanisms when accessing County ‐networks and systems, and shall not deactivate, disable, disrupt, or bypass (or attempt to deactivate, disable, disrupt, or bypass) any security measure or security configuration implemented by County.

k. Users shall not circumvent, or attempt to circumvent, legal guidelines on software use and licensing. If a User is unclear as to whether a software program may be legitimately copied or installed, it is the responsibility of the User to check with County.

l. All software on County systems shall be installed by authorized County support staff. Users may not download or install software on any County system unless express written permission has been obtained from County.

m. Users shall immediately report to County the loss or theft of County owned computer ‐equipment, or of personally owned computer equipment that has been approved for use in ‐conducting County business. Users are also expected to be aware of security issues, and shall immediately report incidents involving breaches of security to County, such as the installation of an unauthorized device, or a suspected software virus.

n. Users shall respect the sensitivity, privacy and confidentiality aspects of all County owned ‐information. In particular:

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 159 of 182

Page 160:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

i. Users shall not access, or attempt to access, County systems or information unless specifically authorized to do so, and there is a legitimate business need for such access.

ii. Users shall not allow unauthorized individuals to use their assigned computer accounts; this includes the sharing of account passwords.

iii. Users shall not knowingly disclose County information to anyone who does not have a legitimate need for that information.

iv. Users shall take every precaution to ensure that all confidential or restricted information is protected from disclosure to unauthorized individuals.

v. Users shall not make or store paper or electronic copies of information unless it is a necessary part of that User’s job.

o. Users shall respect the importance of County-owned systems and data as a valuable asset, and should understand that any data stored or processed on any County computer, or transmitted over any County network, is County property. In particular:

i. Users shall not change or delete data or information unless performing such changes or deletions is a legitimate part of the User’s job function.

ii. Users shall avoid actions that might introduce malicious software, such as viruses or worms, onto any County system or network.

iii. A User whose relationship with County terminates or expires shall not retain, give away, or remove any County data or document from County premises, other than information provided to the public or copies of correspondence directly related to the terms and conditions of employment. User shall return all other County information to County at the time of departure.

p. Users should be aware that electronic information transported across any County network, or residing in any County information system, is potentially subject to access by County technical support staff, other County Users, and the general public. Users should not presume any level of privacy for data transmitted over a County network or stored on a County information system.

q. Users shall respect all intellectual property rights, including but not limited to rights associated with patents, copyrights, trademarks, trade secrets, proprietary information, and confidential information belonging to the County or any other third party.

r. All information resources on any County information system or network are the property of County and are therefore subject to County policies regarding acceptable use. No User may

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 160 of 182

Page 161:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

use any County owned network, computer system, or any other County owned device or ‐ ‐data for the following purposes:

i. Personal profit, including commercial solicitation or conducting or pursuing their own business interests or those of another organization that are not related to the User conducting County business.

ii. Unlawful or illegal activities, including downloading licensed material without authorization, or downloading copyrighted material from the Internet without the publisher’s permission.

iii. To access, create, transmit, print, download or solicit material that is, or may be construed to be, harassing or demeaning toward any individual or group for any reason, including but not limited to on the basis of sex, age, race, color, national origin, creed, disability, political beliefs, organizational affiliation, or sexual orientation, unless doing so is legally permissible and necessary in the course of conducting County business.

iv. To access, create, transmit, print, download or solicit sexually oriented messages or ‐images, or other potentially offensive materials such as, but not limited to, violence, unless doing so is legally permissible and necessary in the course of conducting County business.

v. Knowingly propagating or downloading viruses or other malicious software.

vi. Disseminating hoaxes, chain letters, or advertisements.

4. INTERNET AND EMAIL

a. The following items define the basic standards for use of County Internet and email resources. All Users of County information systems and networks shall comply with these minimum standards.

b. Users shall not use County systems or networks for personal activities. However, reasonable incidental (de minimus) personal use of County resources, such as Internet access and email, is allowed as long as such use does not violate the County’s acceptable use policies, and does not interfere with the performance of work duties or the operation of the County’s information systems.

c. When conducting County business, Users shall not configure, access, use, or participate in any Internet-based communication or data exchange service unless express written permission has been given by County. Such services include, but are not limited to, Instant Messaging (such as AOL IM), email services (such as Hotmail and Gmail), peer-to-peer networking services (such as Kazaa), and social networking services (such as blogs, Instagram, Snapchat, MySpace, Facebook and Twitter).

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 161 of 182

Page 162:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

d. User shall become familiar with County policies, procedures, and guidelines associated with the use of Internet-based communication and data exchange services. Users who have been granted permission to use an Internet-based communication or data exchange service for conducting County business shall comply with all relevant County policies, procedures, and guidelines.

e. Users shall comply with County’s Records Retention and Destruction Policy, and Social Media Policy.

f. Users shall not use an internal County email account assigned to another individual to either send or receive email messages.

g. Users shall not configure their County email account so that it automatically forwards messages to an external Internet email system unless County gives its express written permission. When automated forwarding is used, it shall be for legitimate business purposes only, and User is responsible for the associated risks for disclosure of sensitive information.

5. REMOTE ACCESS

a. The following items define the basic standards for remote access to County information systems and networks. All Users of County information systems and networks shall comply with these minimum standards. Users granted remote access privileges shall sign Attachment A.

b. All remote access to County resources shall be via secure, centralized, County-controlled mechanisms and technologies approved by County, and installed by County. Users are not permitted to implement, configure, or use any remote access mechanism other than County-owned and managed remote access systems that have been formally approved and implemented by County.

c. County may, on a case-by-case basis, give written approval to a User to use County remote access mechanisms. Users shall execute the URS and Remote Access agreement (Attachment A).

d. County may monitor and/or record remote access sessions, and complete information on the session logged and archived. Users have no right, or expectation, of privacy when remotely accessing County networks, systems, or data. County may use audit tools to create detailed records of all remote access attempts and remote access sessions, including User identifier, date, and time of each access attempt.

e. User shall configure all computer devices used to access County resources from a remote location according to County-approved security standards. These include approved, installed, active, and current: anti-virus software, software or hardware-based firewall, full

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 162 of 182

Page 163:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

hard drive encryption, and any other security software or security-related system configurations that are required and approved by County.

f. Users that have been provided with a County-owned device intended for remote access use, such as a laptop or other Mobile Device, shall ensure that the device is protected from damage, access by third parties, loss, or theft. Users shall immediately report loss or theft of such devices to County.

g. Users shall protect the integrity of County networks, systems, and data while remotely accessing County resources, and shall immediately report any suspected security incident or concern to County.

h. Remote access sessions are subject to all other relevant County IT security policies and standards, including Local User Authentication (passwords), Data Classification, Internet Use, and Email.

6. PERSONALLY-OWNED DEVICES

a. The following items define the basic standards for the use of personally owned devices to ‐conduct County business. Users of County information systems and networks shall comply with these minimum standards. Users given permission to use a personally owned device ‐shall sign Attachment B. The following provisions apply to Mobile Devices that include email and/or data storage capability (such as BlackBerry devices and other “smart” phones), and do not apply to devices that are used strictly for the purpose of making telephone calls.

b. Use of personally owned devices to conduct‐ County business is prohibited unless County grants User express written permission.

c. The personally owned device in question shall use existing, County approved and County-‐ ‐owned access/authentication systems when accessing County resources. Users shall not install any hardware, software, or network interface components that provide unauthorized network connectivity, either wired or wireless.

d. Users shall allow County to configure personally owned devices as appropriate to meet ‐security requirements, including the installation of specific security software mandated by County policy.

e. Users authorized to use a personally owned device shall comply with County policies and ‐procedures for ensuring that software updates and patches are applied to the device according to a regular, periodic schedule. County may verify software installations and updates.

f. Users have no expectation of privacy with respect to any County owned communications, ‐information, or files on any personally owned device. Users agree that, upon request, the ‐

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 163 of 182

Page 164:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

County may immediately access the personally-owned device to ensure compliance with County policies.

g. Upon reasonable suspicion by County that a User has failed to comply with a County policy, the User consents to and the County may take possession of, search and access User’s personally-owned device and all communications, information, data, or files on the personally owned device. User or its designee may be present during the County’s search. ‐User shall provide to County a copy of all work-related or County owned communications, ‐information, or files stored on the personally-owned device.

h. User shall adhere to all relevant County security policies and standards, just as if the personally owned device were County property. This includes, but is not limited to, policies ‐regarding password construction and management, physical security of the device, device configuration, and hard drive sanitization prior to disposal. This does not restrict the User’s personal use of the device so long as that personal use does not include or result in (a) the User’s failure to adhere to all relevant County security policies and standards, or (b) the breach of the County’s security policies or standards.

i. User shall not make modifications of any kind to operating system configurations implemented by County on the device for security purposes, or to any hardware or software installed on the device by County.

j. User shall treat the device and the work-related or County owned communications, ‐information or files it contains as County property. User shall not allow access to or use of any work related or County owned communications, information, or files by individuals who‐ ‐ have not been authorized by County to access or use that data.

k. User shall immediately report to County any incident or suspected incident of unauthorized access and/or disclosure of County resources, data, or networks that involve the device, including loss or theft of the device.

7. MISCELLANEOUS

a. Ambiguities: Any rule of construction to the effect that ambiguities are to be resolved against the drafting party does not apply in interpreting this URS.

b. Assignment: User shall not assign this URS or its attachments. Any attempted assignment is void.

c. Authorization: An individual signing the URS on behalf of an entity represents and warrants that he/she is duly authorized to execute and deliver this URS on the entity’s behalf, has authority to bind the entity, and that the URS shall bind all employees, agents and/or representatives of that entity.

d. Compliance with all laws: User shall comply with all applicable laws, codes, and regulations.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 164 of 182

Page 165:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

e. County Confidential Information: Contractor shall not use or disclose County Confidential Information other than in the performance of its obligations for County. All County Confidential Information shall remain the property of the County. Contractor shall not acquire any ownership interest in the County Confidential Information.

f. Entire Agreement: This URS and its attachments constitute the final, complete and exclusive statement of the terms of the agreement between User and County. No prior or contemporaneous agreement or understanding, verbal or otherwise, of the parties or their agents shall be valid or enforceable unless embodied in this URS.

g. Governing Law, Jurisdiction and Venue: This URS shall be construed and interpreted according to the laws of the State of California, excluding its conflict of law principles. Proper venue for legal actions shall be exclusively vested in a state court in the County of Santa Clara. The parties agree that subject matter and personal jurisdiction are proper in state court in the County of Santa Clara, and waive all venue objections.

h. Indemnity: User shall defend, indemnify and hold harmless County against any and all claims, demands, liability, judgments, awards, fines, mechanics' liens or other liens, labor disputes, losses, damages, expenses, charges or costs of any kind or character, including without limitation attorneys' fees and court costs (hereinafter collectively referred to as "Claims"), arising out of or in connection with performance of this URS and its attachments, excepting only Claims caused by County’s sole negligence or willful misconduct.

i. Modification: This URS may be supplemented, amended, or modified only by the mutual agreement of the parties.

j. Non-Waiver: No waiver of a breach, failure of any condition, or any right or remedy contained in or granted by the provisions of this URS shall be effective unless it is in writing and signed by County. No waiver of any breach, failure, right, or remedy shall be deemed a waiver of any other breach, failure, right, or remedy, whether or not similar, nor shall any waiver constitute a continuing waiver unless the writing signed by County so specifies.

k. Severability: Should any part of this URS be held to be invalid, illegal, or unenforceable in any respect, such invalidity, illegality, or unenforceability shall not affect the validity of the remainder of the URS which shall continue in full force and effect, provided that such remainder can, absent the excised portion, be reasonably interpreted to give the effect to the intentions of the parties.

l. Survival: All representations, warranties, and covenants contained in this URS and its attachments shall survive the termination of this URS.

8. ACKNOWLEDGEMENT AND RECEIPT

a. This Acknowledgement hereby incorporates the URS. Attachments A and B are additional signature pages that apply only to those individuals that have been granted either remote

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 165 of 182

Page 166:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

access privileges (Attachment A) or permission to use a personally-owned device (Attachment B).

b. By signing below, I acknowledge that I have read and understand all sections of this URS. I also acknowledge that violation of any of its provisions may result in disciplinary action, up to and including termination of my relationship with County and/or criminal prosecution.

User Signature: Date:

____________________________________________ _____________________________

Print User Name:

____________________________________________

County Signature: Date:

____________________________________________ _____________________________

Print Name:

____________________________________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 166 of 182

Page 167:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Attachment A – Remote Access Signature Page

I have read and understand the contents of the URS regarding Remote Access. I understand that violation of these provisions may result in disciplinary action, up to and including termination of my relationship with the County and/or criminal prosecution. I received approval from County for remote access for legitimate County business, as evidenced by the signatures below.

User Signature: Date:

____________________________________________ _____________________________

Print User Name:

____________________________________________

County Signature: Date:

____________________________________________ _____________________________

Print Name:

____________________________________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 167 of 182

Page 168:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Attachment B – Personally Owned Device Signature Page‐

I have read and understand the contents of the URS regarding the use of Personally Owned Devices. I ‐understand that violation of these provisions may result in disciplinary action, up to and including termination of my relationship with the County and/or criminal prosecution. I own the following device(s), which I shall use for legitimate business reasons in compliance with County policies:

Manufacturer Model Number Serial Number Operating System

I received approval from County to use the device(s) listed above for legitimate County business, as evidenced by the signatures below.

User Signature: Date:

____________________________________________ _____________________________

Print User Name:

____________________________________________

County Signature: Date:

____________________________________________ _____________________________

Print Name:

____________________________________________

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 168 of 182

Page 169:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ATTACHMENT 5BUSINESS ASSOCIATE AGREEMENT

WHEREAS, County of Santa Clara (“County” or “Covered Entity”) is a Covered Entity, as defined below, and wishes to disclose certain Protected Health Information (“PHI”) to (Enter Name of Contractor____) “Business Associate” pursuant to the terms of the Agreement and this Business Associate Agreement (“BAA”); and

WHEREAS, the County is a hybrid entity pursuant to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) performing both covered and non-covered functions; and

WHEREAS, the Santa Clara Valley Health and Hospital System, which is part of the County is comprised of multiple County Departments, including Valley Medical Center and Clinics (“VMC”), the County Mental Health Department (“MHD”), the County Department of Alcohol and Drug Services (“DADS”), the County Public Health Department (“PHD”) and the County Custody Health Services (“Custody Health”) and County Valley Health Plan (“VHP”), all of which are “Covered Entities” under the Health Insurance Portability and Accountability Act of 1996, Public Law 104-191 (“HIPAA”); and

WHEREAS, the Covered Entity and Business Associate are “qualified service organizations” or “QSO” within the meaning of the federal law governing Confidentiality of Alcohol and Drug Abuse Patient Records and its implementing regulations, 42 Code of Federal Regulations (“C.F.R.”) Part 2; and

WHEREAS, the Covered Entity and Business Associate intend to protect the privacy and provide for the security of PHI used and disclosed pursuant to this BAA in compliance with HIPAA, the Health Information Technology for Economic and Clinical Health Act, Public Law 111-005 (“the HITECH Act”), and regulations promulgated thereunder by the U.S. Department of Health and Human Services (the “HIPAA Regulations”), California Welfare & Institutions Code 5328, 42 U.S.C. Section 290dd-2, 42 C.F.R part 2, California Confidentiality of Medical Information Act Civil Code Section 56, California Health & Safety Code 1280.15, and other applicable laws; and to the extent the Business Associate is to carry out the covered entity’s obligation under the Privacy Rule, the Business Associate must comply with the requirements of the Privacy Rule that apply to the covered entity in the performance of such obligation.

WHEREAS, part of the HIPAA Regulations, the Privacy Rule and the Security Rule (defined below) require Covered Entities to enter into a contract containing specific requirements with any Business Associate prior to the disclosure of PHI, as set forth in, but not limited to, Title 45, Sections 164.314(a), 164.502(e) and 164.504(e) of the Code of Federal Regulations (“C.F.R.”) and contained in this BAA.

NOW, THEREFORE, in consideration of the mutual promises below and the exchange of information pursuant to the BAA, the parties agree as follows:

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 169 of 182

Page 170:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

I. DefinitionsTerms used, but not otherwise defined, and terms with initial capital letters in the BAA

have the same meaning as defined under the Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, the Health Information Technology for Economic and Clinical Health Act, Public Law 111-005, and regulations promulgated thereunder by the U.S. Department of Health and Human Services (the “HIPAA Regulations”) and other applicable laws.

Privacy Breach Any acquisition, access, use or disclosure of Protected Health Information in a manner not permitted or allowed under state or federal privacy laws.

Business Associate is a person, organization, or agency other than a workforce member that provides specific functions, activities, or services that involve the use, creation, or disclosure of PHI for, or on behalf of, a HIPAA covered health care component. Examples of business associate functions are activities such as claims processing or administration, data analysis, utilization review, quality assurance, billing, benefit management, practice management, repricing; and legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation, or financial services.

Covered Entity shall have the meaning given to such term under the Privacy Rule and the Security Rule, including, but not limited to, 45 C.F.R. Section 160.103.

Designated Record Set shall have the meaning given to such term under the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.501.

Electronic Protected Health Information means Protected Health Information that is maintained in or transmitted by electronic media.

Electronic Health Record shall have the meaning given to such term in the HITECH Act, including, but not limited to, 42 U.S.C. Section 17921.

Health Care Operations shall have the meaning given to such term under the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.501.

Privacy Rule shall mean the HIPAA Regulation that is codified at 45 C.F.R. Parts 160 and 164, Subparts A and E.

Protected Health Information or PHI means any information, whether oral or recorded in any form or medium: (i) that relates to the past, present or future physical or mental condition of an Individual; the provision of health care to an Individual; or the past, present or future payment for the provision of health care to an Individual; and (ii) that identifies the Individual or with respect to which there is a reasonable basis to believe the information can be used to identify the Individual, and shall have the meaning given to such term under the Privacy Rule, including, but not limited to, 45 C.F.R. Section 160.103. Protected Health Information includes Electronic Protected Health Information [45 C.F.R. Sections 160.103, 164.501].

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 170 of 182

Page 171:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Protected Information shall mean PHI provided by Covered Entity to Business Associates or created or received by Business Associates on Covered Entity’s behalf.

Security Rule shall mean the HIPAA Regulation that is codified at 45 C.F.R. Parts 160 and 164, Subparts A and C.

Unsecured PHI shall have the meaning given to such term under the HITECH Act and any guidance issued pursuant to such Act including, but not limited to, 42 U.S.C. Section 17932(h)(1) and 45 C.F.R. 164.402.

II. Duties & Responsibilities of Business Associates

a. Permitted Uses. Business Associate shall use Protected Information only for the purpose of performing Business Associate’s obligations under the Contract and as permitted or required under the Contract or Addendum, or as required by law.

Further, Business Associate shall not use Protected Information in any manner that would constitute a violation of the Privacy Rule, Welfare & Institutions Code Section 5328, 42 C.F.R. Part 2, or the HITECH Act, if so used by Covered Entity. However, Business Associate may use Protected Information (i) for the proper management and administration of Business Associate, (ii) to carry out the legal responsibilities of Business Associate, or (iii) for Data Aggregation purposes for the Health Care Operations of Covered Entity. [45 C.F.R. Sections 164.502(a)(3), 164.504(e)(2)(ii)(A) and 164.504(e)(4)(i)].

b. Permitted Disclosures. Business Associate shall not disclose Protected Information except for the purpose of performing Business Associate’s obligations under the Agreement and as permitted under the Agreement and this BAA. Business Associate shall not disclose Protected Information in any manner that would constitute a violation of the Privacy Rule, 42 C.F.R., Welfare & Institutions Code Section 5328, or the HITECH Act if so disclosed by Covered Entity. However, Business Associates may disclose Protected Information (i) for the proper management and administration of Business Associate; (ii) to carry out the legal responsibilities of Business Associate; (iii) as required by law; or (iv) for Data Aggregation purposes for the Health Care Operations of Covered Entity. If Business Associate discloses Protected Information obtained pursuant to the Agreement and this BAA to a third party, Business Associate must obtain, prior to making any such disclosure, (i) reasonable written assurances from such third party that such Protected Information will be held confidential as provided pursuant to this BAA and only disclosed as required by law or for the purposes for which it was disclosed to such third party, and (ii) a written agreement from such third party to immediately notify Business Associate of any Breaches of confidentiality of the Protected Information within twenty-four (24) hours of discovery, to the extent it has obtained knowledge of such Breach. [42 U.S.C. Section 17932; 45 C.F.R. Sections 164.504(e)(2)(i)-(ii)(A) and 164.504(e)(4)(ii)].

c. Prohibited Uses and Disclosures. Business Associate shall not use or disclose Protected Information for fundraising or marketing purposes. [42 U.S.C. Section 17936(a) and 45 C.F.R. 164.501]. Business Associate shall not disclose Protected Information to a health plan

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 171 of 182

Page 172:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

for payment or health care operations purposes if the Individual has requested this special restriction, and has paid out of pocket in full for the health care item or service to which the PHI solely relates. [42 U.S.C. Section 17935(a); 45 C.F.R. Section 164.502(a)(5)(ii)]. Business Associate shall not directly or indirectly receive remuneration in exchange for Protected Information, except with the prior written consent of Covered Entity and as permitted by the HITECH Act. [42 U.S.C. Section 17935(d)(2)]. This prohibition shall not affect payment by Covered Entity to Business Associate for services provided pursuant to the Agreement.

d. Appropriate Safeguards. Business Associate shall implement appropriate administrative, technological and physical safeguards as are necessary to prevent the use or disclosure of Protected Information other than as permitted by this BAA that reasonably and appropriately protect the confidentiality, integrity and availability of the Protected Information, and comply, where applicable, with the HIPAA Security Rule with respect to Electronic PHI.

e. Reporting of Improper Access, Use or Disclosure. Consistent with Section (h)(4) of this agreement, Business Associate shall notify Covered Entity within twenty – four (24) hours of any suspected or actual breach of Protected Information; any use or disclosure of Protected Information not permitted by the Contract or Addendum; any security incident (i.e. any attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in any information system) related to Protected Information, and any actual or suspected use or disclosure of data in violation of any applicable federal or state laws by Business Associate or its agents or subcontractors.

Business Associate shall report to SCVHHS Compliance & Privacy Officer in writing any access, use or disclosure of Protected Information not permitted by the Agreement and this BAA. As set forth below, [42 U.S.C. Section 17921; 45 C.F.R. Section 164.504(e) (2) (ii) (C); 45 C.F.R. Section 164.308(b); California Health & Safety Code 1280.15, California Confidentiality of Medical Information Act 56.10, California Welfare & Institutions 5328].

Compliance & Privacy OfficerSanta Clara Valley Health & Hospital System2325 Enborg Lane, Suite 240San Jose, California 95128Facsimile: (408) 885-6886Telephone: (408) 885-3794

The Breach notice must contain: (1) a brief description of what happened, including the date of the Breach and the date of the discovery of the Breach, if known; (2) the location of the breached information; (3) the unauthorized person who used the PHI or to whom the disclosure was made; (4) whether the PHI was actually acquired or viewed; (5) a description of the types of PHI that were involved in the Breach; (6) safeguards in place prior to the Breach; (7) actions taken in response to the Breach; (8) any steps Individuals should take to protect themselves from potential harm resulting from the Breach; (9) a brief description of what the business associate is doing to investigate the Breach, to mitigate harm to Individuals, and to protect against further

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 172 of 182

Page 173:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Breaches; and (10) contact procedures for Individuals to ask questions or learn additional information, which shall include a toll-free telephone number, an e-mail address, website or postal address. [45 C.F.R. Sections 164.410(c) and 164.404(c)]. Business Associate shall take any action pertaining to such unauthorized disclosure required by applicable federal and state laws and regulations. Business Associate shall otherwise comply with 45 C.F.R. Section 164.410 with respect to reporting Breaches of Unsecured PHI. [42 U.S.C. Section 17921; 45 C.F.R. Section 164.504(e)(2)(ii)(C); 45 C.F.R. Section 165.308(b)]

f. Business Associate’s Agents and Subcontractors. Business Associate shall ensure that any agents or subcontractors, to whom it provides Protected Information, agree in writing to the same restrictions and conditions that apply to Business Associate with respect to such PHI and implement the safeguards required by paragraph (II) d above with respect to Electronic PHI. [45 C.F.R. Sections 164.502(e)(1)(ii), 164.504(e)(2)(ii)(D)and 164.308(b)]. If Business Associate knows of a pattern of activity or practice of an agent or subcontractor that constitutes a material breach of violation of an agent or subcontractor’s obligations under the Contract or Addendum or other arrangement, the Business Associate must take reasonable steps to cure the breach or end the violation. If these steps are unsuccessful, Business Associate shall terminate the contract or arrangement with agent or subcontractor, if feasible. [45 C.F.R. Section 164.504(e)(1)(iii)]. Business Associate shall provide written notification to Covered Entity of any pattern of activity or practice of a subcontractor or agent that Business Associate believes constitutes a material breach or violation of the agent or subcontractor’s obligations under the Contract or Addendum or other arrangement with twenty four (24) hours of discovery and shall meet with Covered Entity to discuss and attempt to resolve the problem as one of the reasonable steps to cure the breach or end the violation.

The Business Associate shall implement and maintain sanctions against agents and subcontractors that violate such restrictions and conditions and shall mitigate the effects of any such violation.

g. Access to Protected Information. Business Associate shall make Protected Information maintained by Business Associate or its agents or subcontractors in Designated Record Sets available to Covered Entity for inspection and copying within ten (10) days of a request by Covered Entity to enable Covered Entity to fulfill its obligations under the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524. [45 CF.R. Section 164.504(e)(2)(ii) (E); 42 C.F.R. part 2 and Welfare & Institutions Code Section 5328]. If Business Associate maintains an Electronic Health Record, Business Associates shall provide such information in electronic format to enable Covered Entity to fulfill its obligations under the HITECH Act, including, but not limited to, 42 U.S.C. Section 17935(e)(1). If any Individual requests access to PHI directly from Business Associate or its agents or subcontractors, Business Associate shall notify Covered Entity in writing within five (5) days of the request.

h. Electronic PHI. If Business Associate receives, creates, transmits or maintains Electronic PHI on behalf of Covered Entity, Business Associates will, in addition, do the following:

(1) Develop, implement, maintain and use appropriate administrative, physical, and technical safeguards in compliance with Section 1173(d) of the Social Security Act, Title 42, Section 1320(s) or the United States Code and Title 45, Part 162

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 173 of 182

Page 174:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

and 164 of CFR to preserve the integrity and confidentiality of all electronically maintained or transmitted PHI received from or on behalf of Covered Entity.

(2) Document and keep these security measures current and available for inspection by Covered Entity.

(3) Ensure that any agent, including a subcontractor, to whom the Business Associate provides Electronic PHI, agrees to implement reasonable and appropriate safeguards to protect it.

(4) Report to the Covered Entity any Security Incident of which it becomes aware. For the purposes of this BAA and the Agreement, Security Incident means, as set forth in 45 C.F.R. Section 164.304, “the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.” Security incident shall not include, (a) unsuccessful attempts to penetrate computer networks or servers maintained by Business Associate, or (b) immaterial incidents that occur on a routine basis, such as general “pinging” or “denial of service” attacks.

i. Amendment of PHI. Within ten (10) days of receipt of a request from Covered Entity for an amendment of Protected Information or a record about an individual contained in a Designated Record Set, Business Associate or its agents or subcontractors shall make such Protected Information available to Covered Entity for amendment and incorporate any such amendment to enable Covered Entity to fulfill its obligations under the Privacy Rule. If any Individual requests an amendment of Protected Information directly from Business Associate or its agents or subcontractors, Business Associate must notify Covered Entity in writing within five (5) days of the request. Any approval or denial of amendment of Protected Information maintained by Business Associate or its agents or subcontractors shall be the responsibility of Covered Entity.

j. Accounting Rights. Business Associate agrees to document such disclosures of PHI and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with Privacy Rule and the HITECH Act. [42 U.S.C. Section 17935(c) and 45 C.F.R. Section 164.528]. Business Associate agrees to implement a process that allows for an accounting of disclosures to be collected and maintained by Business Associate and its agents or subcontractors for at least six (6) years prior to the request. Accounting of disclosures from an Electronic Health Record for treatment, payment or health care operations purposes are required to be collected and maintained for three (3) years prior to the request, and only to the extent Business Associate maintains an electronic health record and is subject to this requirement.

At a minimum, the information collected and maintained shall include: (i) the date of disclosure; (ii) the name of the entity or person who received Protected Information and, if known, the address of the entity or person; (iii) a brief description of Protected Information disclosed and (iv) a brief statement of purpose of the disclosure that reasonably informs the Individual of the basis for the disclosure, or a copy of the Individual’s authorization, or a copy of the written request for disclosure. [45 C.F.R. Section 164.528(b)]. In the event that the request for an accounting is delivered directly to Business Associate or its agents or subcontractors, Business Associate shall forward it to Covered Entity in writing within five (5) days of the request. It shall be Covered Entity’s responsibility to prepare and deliver any such accounting

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 174 of 182

Page 175:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

requested. Business Associate shall not disclose any Protected Information except as set forth in the Agreement and this BAA.

k. Governmental Access to Records. Business Associate shall make its internal practices, books and records relating to the use and disclosure of Protected Information available to Covered Entity and to the Secretary of the U.S. Department of Health and Human Services (the “Secretary”) for purposes of determining Business Associate’s compliance with the Privacy Rule [45 C.F.R. Section 165.504(e)(2)(ii)(I). Business Associate shall concurrently provide to Covered Entity a copy of any internal practices, books, and records relating the use and disclosure of PHI that Business Associate provides to the Secretary.

l. Minimum Necessary. Business Associate and its agents or subcontractors shall request, use and disclose only the minimum amount of Protected Information reasonably necessary to accomplish the purpose of the request, use, or disclosure in accordance with 42 U.S.C. Section 17935(b). Business Associate understands and agrees that the definition of “minimum necessary” is defined in HIPAA and may be modified by the Secretary. Each party has an obligation to keep itself informed of guidance issued by the Secretary with respect to what constitutes “minimum necessary.”

m. Adherence to the Requirements of 42 C.F.R. Business Associate acknowledges that in receiving, transmitting, transporting, storing, processing or otherwise dealing with patient records and information in connection with providing drug testing services to patients covered by SCVHHS under this Agreement and BAA, it is fully bound by the regulations governing confidentiality of alcohol and drug abuse patient records, 42 C.F.R. Section 2.1, et seq.., and HIPAA, and may not use or disclose the information except as permitted or required by this BAA or applicable law.

n. Resist Efforts in Judicial Procedures. Business Associates agree to resist any efforts in judicial proceedings to obtain access to the protected information except as expressly provided for in the regulations governing the Confidentiality of Alcohol and Drug Abuse Records, 42 C.F.R. Part 2.

o. Data Ownership. Business Associate acknowledges that Business Associate has no ownership rights with respect to the Protected Information governed by this BAA, and all rights, interests, and title remain vested in the County at all times.

p. Warranties and Disclosures. Business Associate assumes risk for any and all use of PHI. SCVHHS assumes no liability or responsibility for any errors or omissions in, or reliance upon, the PHI, including, but not limited to information electronic systems. SCVHHS makes no representations or warranties of any kind, express or implied, including but not limited to: accuracy, completeness, or availability of content, non-infringement, merchantability or fitness for a particular use or purpose, the fullest extent of the law. SCVHHS does not warrant that PHI is free of viruses or other harmful components or that service will be uninterrupted or error-free, or that defects will be corrected.

q. Audits, Inspection and Enforcement. Within ten (10) days of a written request by Covered Entity, Business Associate and its agents or subcontractors shall allow Covered Entity to conduct a reasonable inspection of the facilities, systems, books, records, agreements, policies and procedures relating to the use or disclosure of Protected Information pursuant to this BAA for the purpose of determining whether Business Associate has complied with this BAA; provided, however, that (i) Business Associate and Covered Entity shall mutually agree in advance upon the scope, timing and location of such an inspection, (ii) Covered Entity shall protect the confidentiality of all confidential and proprietary information of Business Associate to which Covered Entity has access during the course of such inspection; and (iii) Covered Entity shall execute a nondisclosure agreement, upon terms mutually agreed upon by the parties, if requested by Business Associate.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 175 of 182

Page 176:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

The fact that Covered Entity inspects, or fails to inspect, or has the right to inspect, Business Associate’s facilities, systems, books, records, agreements, policies and procedures does not relieve Business Associate of its responsibility to comply with the BAA, nor does Covered Entity’s (i) failure to detect or (ii) detection, but failure to notify Business Associate or require Business Associate’s remediation of any unsatisfactory practices, constitute acceptance of such practice or a waiver of Covered Entity’s enforcement rights under the Agreement or BAA, Business Associate shall notify Covered Entity within five (5) days of learning that Business Associate has become the subject of an audit, compliance review, or complaint investigation by the Office for Civil Rights.

III. Termination

a. Material Breach. A Breach by Business Associate of any provision of this BAA shall constitute a material Breach of the Agreement and shall provide grounds for immediate termination of the Agreement, any provision in the Agreement to the contrary notwithstanding. [45 C.F.R. Section 164.504(e)(2)(iii)].

b. Judicial or Administrative Proceedings. Covered Entity may terminate the Agreement, effective immediately, if (i) Business Associate is named as a defendant in a criminal proceeding for a violation of HIPAA, the HITECH Act, 42 C.F.R. Part 2, the HIPAA Regulations or other security or privacy laws or (ii) a finding or stipulation that the Business Associate has violated any standard or requirement of HIPAA, the HITECH Act, 42 C.F.R. Part 2, the HIPAA Regulations or other security or privacy laws is made in any administrative or civil proceeding in which the party has been joined.

c. Effect of Termination. Upon termination of the Agreement for any reason, Business Associate shall, at the option of Covered Entity, return or destroy all Protected Information that Business Associate or its agents or subcontractors still maintain in any form, and shall retain no copies of such Protected Information. If return or destruction is not feasible, Business Associate shall continue to extend the protections of Section 2 of the BAA to such information, and limit further use of such PHI to those purposes that make the return or destruction of such PHI infeasible. [45 C.F.R. Section 164.504(e) (ii)(2)(I)]. If County elects destruction of the PHI, Business Associate shall certify in writing to County that such PHI has been destroyed.

IV. General Provisions

a. Indemnification. In addition to the indemnification language in the Agreement, Business Associate agrees to be responsible for, and defend, indemnify and hold harmless the Covered Entity for any Breach of Business Associate’s privacy or security obligations under the Agreement, including any fines, penalties and assessments that may be made against Covered

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 176 of 182

Page 177:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Entity or the Business Associate for any privacy breaches or late reporting and agrees to pay the cost of and notice for any credit monitoring services.

b. Disclaimer. Covered Entity makes no warranty or representation that compliance by Business Associate with this BAA, HIPAA, the HITECH Act, or the HIPAA Regulations will be adequate or satisfactory for Business Associate’s own purposes. Business Associate is solely responsible for all decisions made by Business Associate regarding the use and safeguarding of PHI.

c. Amendment to Comply with Law. The parties acknowledge that state and federal laws relating to data security and privacy are rapidly evolving and that amendment of the Agreement or BAA may be required to provide for procedures to ensure compliance with such developments. The parties specifically agree to take such action as is necessary to implement the standards and requirements of HIPAA, the HITECH Act, the Privacy Rule, the Security Rule and other applicable California laws relating to the security or confidentiality of PHI.

d. Upon the request of any party, the other party agrees to promptly enter into negotiations concerning the terms of an amendment to the BAA embodying written assurances consistent with the standards and requirements of HIPAA, the HITECH Act, the Privacy Rule, the Security Rule and other applicable California laws relating to the security or confidentiality of PHI.

Covered Entity may terminate Contract upon thirty (30) days written notice in the event (i) Business Associate does not promptly enter into negotiations to amend the Contract or Addendum when requested by Covered Entity pursuant to this section or (ii) Business Associate does not enter into an amendment to the Contract or Addendum providing assurances regarding the safeguarding of PHI that Covered Entity, in its sole discretion, deems sufficient to satisfy the standards and requirements of applicable laws.

e. Assistance in Litigation of Administrative Proceedings. Business associate shall notify Covered Entity within forty-eight (48) hours of any litigation or administrative proceedings commenced against Business Associate or its agents or subcontractors. Business Associate shall make itself, and any subcontractors, employees or agents assisting Business Associate in the performance of its obligations under the Agreement or BAA, available to Covered Entity, at no cost to Covered Entity, to testify as witnesses, or otherwise, in the event of litigation or administrative proceedings being commenced against Covered Entity, its directors, officers or employees based upon a claimed violation of HIPAA, the HITECH Act, the Privacy Rule, the Security Rule, or other laws relating to security and privacy, except where Business Associate or its subcontractor, employee or agent is named as an adverse party.

f. No Third-Party Beneficiaries. Nothing express or implied in the Agreement or this BAA is intended to confer, nor shall anything herein confer, upon any person other than

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 177 of 182

Page 178:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Covered Entities, Business Associate and their respective successors or assigns, any rights, remedies, obligations or liabilities whatsoever.

g. Effect on Agreement. Except as specifically required to implement the purposes of the BAA, or to the extent inconsistent with this BAA, all other terms of the Agreement shall remain in force and effect.

h. Interpretation. The BAA shall be interpreted as broadly as necessary to implement and comply with HIPAA, the HITECH Act, the Privacy Rule and the Security Rule. The parties agree that any ambiguity in this BAA shall be resolved in favor of a meaning that complies and is consistent with HIPAA, the HITECH Act, 42 Code of Federal Regulations (“C.F.R.”) Part 2, the Privacy Rule and the Security Rule and other applicable California laws relating to the security or confidentiality of PHI.

i. Governing Law, Venue. This agreement has been executed and delivered in, and shall be construed and enforced in accordance with, the laws of the State of California. Proper venue for legal action regarding this Agreement shall be in the County of Santa Clara.

j. Survivorship. The respective rights and responsibilities of Business Associate related to the handling of PHI survive termination of this Agreement.

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 178 of 182

Page 179:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

ATTACHMENT 6

COUNTY TRAVEL POLICY

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 179 of 182

Page 180:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 180 of 182

Page 181:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 181 of 182

Page 182:  · Web viewCisco ASA VPN . Citrix XenDesktop . Citrix Netscaler SDX 10.x . ... Access, Word, Excel, and SharePoint. Also, provides compatibility with Microsoft Windows and web

Request for Proposal # RFP-PRO-FY17-0098 SCVMC Secure Text Messaging SystemPage 182 of 182