The Vendor is required to provide information technology oversight, cybersecurity services, and systems support.
- Requirement:
1. General oversight and collaboration
• Provide oversight (not replacement) of ELC’s computer performance management, cybersecurity, and software and hardware services.
• Work collaboratively with an ELC-assigned IT staff member responsible for day-to-day on-site operations.
• Serve as an escalation resource for complex or high-risk technical issues.
• Support efficiency, reliability, preventative maintenance, and staff capability building.
2. Compliance and cybersecurity standards
• Chapter 60gg-2, state administrative code – state cybersecurity standards
• Rule chapter 74-2, FAC
• Office information technology security manual
• All applicable federal and state data privacy and confidentiality laws
3. Transition services
A. Transition-in (first 90 days)
• Remote access configuration for ELC networks and systems, as authorized.
• Secure access to required software, systems, credentials, and permissions.
• Documentation review and knowledge transfer.
• Coordination with the assigned IT staff to ensure continuity of operations.
• Access to firewalls, active directory, networking infrastructure, and server environments as approved by ELC.
B. Transition-out (contract end or termination)
• Transfer all documentation, credentials, and system knowledge to ELC.
• Terminate all proposer access to ELC systems.
• Provide a final system status and security summary.
• Cooperate fully to ensure no disruption to ELC operations.
4. Ongoing support services
A. Technical oversight and escalation
• Serve as liaison for high-level software and hardware issues when resolution exceeds on-site capacity.
• Provide advisory support for system architecture and infrastructure improvements.
B. Preventative maintenance
• Preventative maintenance of network infrastructure.
• Coordination with third-party vendors or contractors as needed.
• Monitoring and review of system health indicators.
C. Server, network and systems management
• SharePoint server monitoring and security.
• Backup verification and oversight.
• Active directory administration oversight.
• Review of critical event logs and operating system health.
D. Mobile device and endpoint management
• Oversight of mobile device management.
• Endpoint security coordination and monitoring.
E. Procurement advisory
• Purchasing recommendations.
• Evaluation of technology products and services.
• Lifecycle and cost-effectiveness guidance.
5. Cybersecurity and protection services
A. Security oversight
• Threat detection oversight.
• Endpoint protection.
• Whitelisting and filtering.
• Systems log monitoring.
• Security configuration guidance.
B. Emergency and incident response
• Develop an IT emergency plan aligned with state requirements.
• Maintain compliance with cybersecurity standards.
• Cooperate fully with early learning coalition (ELC) staff and ELC’s cybersecurity insurance firm during security incidents.
• Provide immediate response support when a cyber incident occurs.
• Notify the coalition of any security incident within 24 hours of discovery
• Cooperate fully with any investigation, including coordination with insurers and governmental authorities
• Maintain audit logs and provide access upon request.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.