The Vendor is required to provide to gather information from qualified security service providers capable of delivering comprehensive, district-wide monitoring and support services across multiple school and administrative facilities.
- The District seeks information regarding vendor capabilities related to:
• Multi-site intrusion and fire alarm monitoring
• Critical systems and environmental monitoring
• System takeover and transition services
• Maintenance and service response
• Cybersecurity and data governance
• Contract structure and risk allocation
- Multi-Site Monitoring Services
• 24/7 central station monitoring
• Burglar alarm monitoring
• Fire alarm monitoring
• Cellular and IP backup communications
• Supervisory and trouble signal monitoring
• Power failure and communication loss monitoring
- Critical Systems & Environmental Monitoring
• Boiler alarms and failure alerts
• Walk-in refrigerator and freezer temperature alerts
• Mechanical room supervisory alarms
• Motion detection sensors
• Glass break detection sensors
• Hallway and classroom intrusion sensors
• Door position and access status
• Tamper signals
• Building system trouble signals
- System Takeover & Transition Services
• Replacement of existing cellular communicators
• Panel zone download and programming verification
• Identification and documentation of active devices
• Device mapping to building diagrams
• Full system walk-testing
• Written deficiency and action-item reporting
• AHJ coordination
• Permit acquisition process
• Low-voltage licensing credentials
- Maintenance & Service
• Preventive maintenance programs
• Warranty structure (minimum duration required)
• Emergency service response time (after-hours)
• On-site technician dispatch times
• Spare parts availability
• Service level agreements (SLAs)
• Technician background check procedures for personnel entering K–12 facilities
- Monitoring & Dispatch Protocols
• Alarm handling workflow
• Customer notification process
• Emergency responder notification process
• Escalation matrix
• False alarm mitigation process
• Guard response capabilities (if offered)
• Reporting frequency and format
- Cybersecurity & Data Governance
• Encryption standards (AES-256 or equivalent required for data in transit and at rest)
• Data ownership structure
• Data retention period
• Data storage location
• Third-party data access policies
• SOC 2 Type II or equivalent certification
• CJIS compliance (if applicable)
• Protection against unauthorized access
• Breach notification procedures
- Equipment Ownership & Technology
• Equipment ownership during term
• Equipment ownership at end of term
• Upgrade cycles
• Compatibility with existing fire panels
• Compatibility with legacy intrusion systems
• Open-platform vs proprietary systems
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.