The Vendor is required to provide to distribute daily summaries of available radio media monitoring transcripts that are available for order.
- Transcripts and monitoring notes are to be delivered electronically via email or secure file transfer protocol (SFTP) in a consistent format (either plain text, HTML or a Microsoft Word Document) to integrate with the EMMS.
- Upon ordering a transcript, it must be received by the client in less than one hour.
- Each client ministry will be billed individually for the transcripts they order but cannot be charged for a transcript already produced for, or ordered by, another group.
- The ability to provide audio clips or radio segments is also required.
- A high-level diagram and conceptual layout of the solution components regarding the recommended system architecture;
- Achieving this vision requires a consistent approach for application authentication, integrated platforms, increased reuse of common services, common platforms, and common data.
- Business requirements are expected to be met by using an “Out of the Box” (OOTB) deployment and product configuration
- The Solution is expected to have the ability to be re-used on the Enterprise platform for one or more tenants (Ministries), as a whole solution
- The Solution is expected to include change management and associated governance
- The Solution is expected to optimize user licensing at the enterprise level
- The Solution is expected to accommodate the standards, processes, procedures, and policies that enforce each enterprise service
- The Solution Provider is expected to work with government designated third-party service partners and with other development Proponents as needed on the enterprise platform
- The Solution is required to prevent access to application data via methods other than through the application. Ad hoc queries/reports that are not authenticated and logged are NOT permitted, even by administrative staff
- The Solution is required to support Single Sign On capability
- The Solution requires an Identity and Access Management policy that enforces Conditional Access and Multifactor Authentication
- Custom-developed identity access management approaches are not eligible for consideration
- The Solution and Services are required to demonstrate mature, documented application and data integration capabilities and methodologies based on industry standard technologies
- The Solution and Services are required to use industry standard secure protocols for all data in transit
- Backups should include file-level backups for all servers utilized in providing the solution
- Must disclose if the solution suitability is not optimal under limited network capabilities
• Some access locations have speeds as low as 1.5 Mbps
• Some access locations have minimal cellular coverage and internet access
• Some access locations experience high latencies
- The Solution and Services should be able to accommodate scaling-up or scaling-down to meet increased or decreased demand over the lifecycle of the Solution
- Hosting facilities should hold an Uptime Institute certification or other industry data centre recognitions for data center capabilities and performance.
- Individual Proponent Conferences Date: March 4-5, 2026
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.