The vendor required to provide offender management system to track and monitor individuals convicted of arson, violent, child victim, and sex crimes.
- The solution must encompass any tools, licensing, and configuration needed in the use and administration of the proposed offender management system.
- Provide maintenance and support activities that include ongoing technical support, troubleshooting and issue resolution, and updates and patches to maintain security and functionality of the private market intelligence platform over term of service.
- Functional requirements
1. Data management
• Capture, store, and update detailed offender records including personal identifiers and descriptors, internet identifiers, phone numbers, professional licenses, victim information, offenses, registration dates, status changes, physical descriptions, photographs, aliases, addresses (school, work and volunteer), vehicles, fees, incarcerations, probation details, compliance status and history, public comments, internal notes, NCIC acceptance and rejection reason and alerts.
• Support multiple offender types.
• Track and manage registration events.
• Enable document upload.
2. Data validation and integrity
• Enforce real-time mandatory fields and validation rules for ncic compliance.
• Support data quality controls.
• Maintain a detailed audit trail of all record changes, including timestamps and user identification.
3. User access and roles
• Implement role-based access control to restrict sensitive data based on user roles.
• Allow administrators to create, modify, and deactivate user accounts with appropriate permissions.
• Provide unlimited user licenses.
4. Search and query functionality
• Enable advanced search capabilities.
• Support both simple and compound queries with filtering, sorting, and exporting.
5. Public access portal
• Provide a public-facing website with limited access to offender information, in compliance with legal disclosure requirements.
• Allow users to submit confidential tips to the county sheriff responsible for the offender, perform name and location-based searches and opt-in to automated notifications for specific geographic areas or individual offenders.
• Clearly display disclaimers, legal notices, and privacy statements.
• Provide customized branding for each state sheriff on public-facing websites and update branding when necessary.
6. Notifications, forms, and alerts
• automate notifications for registration deadlines, compliance checks, address changes, and Violations.
• Support configurable alert settings
• Integrate with email and SMS messaging platforms.
• Produce duty to register forms, field verification and any other customized forms necessary.
7. Reporting and analytics
• Generate both standard and customizable reports that can be saved or exported
• Enable users to save customized report templates.
• Provide dashboards for key performance indicators.
8. Address mapping
• Map addresses according to schools, childcare centers. and any other prohibited offender residential locations.
9. Data migration
• Ingest and transform current and historical data from legacy systems.
10. Integration capabilities
• Support data exchange with internal and external state and federal systems including criminal justice databases, court records, law enforcement dispatch systems, and public notification systems.
• Facilitate real-time and scheduled data synchronization based on current operational capabilities.
• Provide APIs for all registries to include all relevant person, vehicle, addresses, internet identifiers, classifications, compliance status, victim details, and registration dates.
11. Security and privacy controls
• Encrypt sensitive data both in transit and at rest, following industry best practices.
• Log all access and modifications.
• Comply with relevant privacy laws and standards, including security policy.
12. System performance and availability
• Ensure high availability with minimal downtime.
• Support a scalable architecture to accommodate peak usage and data growth.
• Provide disaster recovery and backup solutions.
13. System administration
• Provide administrative tools for managing system configurations, user roles, system parameters, and audit logs.
• Support system health monitoring and automated alerts for potential issues.
- Contract Period/Term: 3 years
- Questions/Inquires Deadline: December 3, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.