The Vendor is required to provide for collections on delinquent utility accounts and other miscellaneous accounts.
- System Authentication
• Processing system/solution shall ensure that only predefined, authenticated users and system components are allowed access to the operating environment.
• Processing system/solution shall ensure that the authentication methods used shall identify and categorize all endpoints, including but not limited to applications, people, processes, and systems, to ensure the appropriate level of access is granted.
• Processing system/solution shall ensure segregation of the various endpoints including but not limited to production applications and systems to reduce risks of compromises of the processing environment.
• Processing system/solution shall provide identification of each component of the endpoint and provide additional, enhanced security to validate roles, accesses and behaviors of such identity.
• Processing system/solution shall maintain mechanisms for enrolling uniquely defined identity for each endpoint components.
• Processing system/solution shall maintain mechanisms for authentication of identity including provisions for revoking / denying / revocation of accesses timely.
• Processing system/solution shall maintain mechanisms for hardening authorization of various endpoint components to interact with the processing environment.
• Processing system/solution shall maintain mechanisms for terminating various endpoint components accesses timely
- File Transfer Operations
• All file transfer operations shall utilize secured ftp client to client or client to server end points between the vendor and the city.
• All encryption and decryption keys used for communication shall be protected from disclosure and compromise.
• All encryption and decryption keys used for communication shall be rotated regularly, at least once annually, to prevent breach or compromise.
- System edits, passwords, access logs, badges, or other methods reasonably expected to prevent loss or unauthorized access to electronically or mechanically held data; limited terminal access, access to input documents and output documents, and design provisions to limit use of client or applicant name.
- Contract Period/Term: 5 years
- Pre Bid Meeting Date: October 14, 2025
- Questions/Inquires Deadline: October 17, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.