The vendor is required to provide a comprehensive mathematical computing software solution that supports teaching, research, and innovation across its 25 campuses (“solution”).
- The solution must offer advanced numerical computing, data analysis, visualization, and simulation capabilities while integrating seamlessly with agency learning management system (bright space), cloud-based tools, and high-performance computing (HPC) infrastructure
• Provide a robust computing environment for disciplines including, but not limited to, engineering, mathematics, physics, computer science, statistics, data science, economics, finance, operations research, chemistry, environmental science, geoscience, astronomy, quantitative psychology, cognitive science, public health, and life sciences.
• Support advanced numerical computation, algorithm development, data visualization, machine learning, and real-time simulation.
• Be capable of integration with bright space HPC clusters, and cloud collaboration platforms such as google drive and drop box.
• Offer browser-based (google chrome is recommended but the solution must also work with Mozilla Firefox, apple safari, and microsoft edge) and device-compatible access (including windows, MACOS, and Linux).
• Enable agency to meet its compliance obligations with respect to the family educational rights and privacy act (FERPA), general data protection regulation (GDPR), and the most current w3c web content accessibility guidelines (WCAG).
• Sign agency data-security rider.
• Solution must support SSO and MFA.
- Technical and security requirements
1. FERPA compliance
• The solution must comply with the family educational rights and privacy act (FERPA) and all other applicable federal, state, and institutional privacy regulations governing educational records.
2. Role-based access control (RBAC)
• The solution must govern access to features, licenses, and data by configurable role-based access controls that allow the university to assign granular permissions to users such as students, faculty, researchers, and administrators.
3. Data encryption
• The solution must encrypt all data—source files, notebooks, research outputs, user profiles, and log records—in transit using TLS 1.2 or higher and at rest using industry-standard algorithms (e.g., aes-256).
4. Audit logging
• The solution must maintain comprehensive, tamper-resistant audit logs that capture user logins, license check-outs, file access, data modifications, and administrative actions.
• Logs must be exportable and searchable by campus security teams for compliance and investigation purposes.
5. Identity and access management
• The solution must support single sign-on (SSO) with institutional identity providers via SAML 2.0 or OAuth 2.0 and must offer (or integrate with) multi-factor authentication (MFA) to protect privileged accounts.
6. Third-party security certifications
• The contractor must maintain current third-party security certifications—such as soc 2 type ii, ISO and IEC 27001, or equivalent—and make the associated reports available to agency upon request.
7. Breach notification
• In the event of a confirmed or suspected data breach, the contractor must notify agency within 24 hours of detection and provide timely status updates, impact assessments, and mitigation steps in accordance with applicable laws and university policy.
8. Security documentation
• The contractor must furnish up-to-date documentation describing its security architecture, data handling procedures, RBAC model, and incident-response protocols.
• Documentation must be kept current and supplied to agency whenever material changes occur. - Contract Period/Term: 5 years
- Questions/Inquires Deadline: July 21, to Aug 04, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.