The vendor required to provide secured education apps management platform solution capabilities, implementation approaches, security posture, and cost structures to inform a potential future competitive procurement.
- Objectives
• Understand available solutions for secure educational content delivery in correctional settings, including tablet-based, chrome books, apple devices and lab-based deployments.
• Assess vendor capabilities, experience, and outcomes in correctional and workforce environments, including measurable impacts on education, training, and workforce readiness.
• Identify potential implementation strategies, technical architecture, and associated non-binding cost models suitable for statewide or phased deployment.
- Requirement:
1. Platform overview and core features
• iOS platforms such as chrome books and apple devices (iPhone, iPad, iMac, MacBook) –
• Windows devices: pcs and thin clients, including via-path tablets.
• SSO capabilities, specifically for google workspace (IDP).
• include mobile device support, note that agency uses laptops and pcs in addition to tablets (chrome books and apple devices).
• Active directory integration must be supported.
• Ada features for accessibility.
• Explain how the platform supports monitoring student use, including recordings (pictures or face recognition), hours and days of use.
• Describe secure printing capabilities for sites such as encyclopedia, canvas, blackboard, and google workspace for students.
• List any free content included with the package(s), if applicable.
• Provide a list of partnering providers your platform integrates with.
• Description of the platform, its primary use cases in corrections, and high-level architecture.
• Core features such as secure content delivery, LMS, learner records, assessment tools, reporting and analytics, integration with existing educational content providers, and offline and online operation modes as applicable.
2. Security, compliance, and controls
• Security architecture, including data encryption in transit and at rest, identity and access management, and logging and monitoring capabilities.
• The solution supports compliance with relevant standards and policies, including any third-party assessments or certifications.
• Controls to prevent unauthorized communication, limit internet exposure, and restrict access to only approved educational and rehabilitative content in correctional environments.
3. Deployment models and scalability
• Supported deployment models (e.g., on-premises, cloud, hybrid) and how each model addresses security and connectivity constraints typical in secure facilities.
• End-user device options (e.g., secure Chromebook, apple devices, tablets, pcs, computer labs, shared kiosks), and how the platform manages devices and user access within housing units, classrooms, and workforce centers.
• Scalability considerations, including ability to support multiple institutions, thousands of concurrent users, and phased rollouts across a statewide system.
- Questions/Inquires Deadline: February 17, 2026
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.