The vendor is required to provide general investment consulting services across all asset classes, periodic asset liability studies, and performance measurement services to its board and staff.
- Propose, develop, revise, and apply consistent methods and metrics for measuring and evaluating the risk profile of how the fund is invested as a whole, and the risk profile for each investment manager retained by the board to invest assets of the fund, which metrics shall include, but not be limited to active return, beta, information ratio, sharpe ratio, standard deviation, and tracking error, and to report to the board the results of all such risk metrics for such time periods, and at such times, as the board shall reasonably direct;
- Propose, develop, revise, and apply consistent evaluation methods and metrics to record and assess the performance of the fund and of all the investment managers or advisors retained by the board to invest assets of the fund, and to report to the board the results of all such evaluations for such time periods, and at such times, as the board or the system staff shall reasonably direct.
- The consultant shall assist the board and the system’s staff in conducting public market investment manager searches and shall facilitate the hiring of suitable managers, including assistance with the contract/fee negotiations.
- The consultant shall perform investment consulting services as persons of prudence, discretion, and intelligence who are experts in those matters exercise in the management of like matters.
- Consultant discovers or learns that any of its own computer, data, network, file storage, technology or other hardware or software systems, or any such systems which the consultant uses or relies upon to perform services pursuant to this agreement (including but not limited to any outsourced cloud-based systems and to third-party systems to which the consultant has access), have experienced any unauthorized intrusion or been accessed by any unauthorized persons or entities regardless of the duration of the unauthorized access; regardless of whether the intrusion was malicious or non-malicious; regardless of the activities undertaken or attempted to be undertaken by the intruders while they had unauthorized access to such systems; and, regardless of whether the intruders gained access to such systems by cracking passwords, phishing, viruses, malware, spooking, rootkits, trojan horses, key loggers, hardware or software alteration or manipulation, or via any other physical, human, computerized, or technological method.
- Contract Period/Term: 5 years
- Goal Information Session Date: July 28, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.