The Vendor is required to provide to identify a software solution that will enhance efficiency, compliance, and collaboration in achieving agency accreditation reaffirmation.
- Services include:
• Document management: secure storage and retrieval of accreditation-related documentation.
• Collaboration tools: multi-user access with role-based permissions for document review and submission.
• Compliance tracking: automated tracking of accreditation standards, deadlines, and required submissions.
• Reporting & analytics: customizable reporting for internal assessments and agency compliance.
• Technical support: 24/7 customer support, regular updates, and maintenance.
• User training: comprehensive training materials, webinars, and dedicated onboarding support.
• Usage: available for use no later than July 31, 2025
• Customization: customizable to university brands look.
• Customer service: customer service availability during business hours - 8:00 am to 5:00 pm ET, Monday through Friday.
• Response: reasonable and efficient response from vendor.
• Updates: allow for ease of changes and updates by the university administrator
• Cloud-based or on-premises deployment: vendors should specify available deployment models.
• Integration capabilities: seamless integration with the institution’s learning management system (LMS), student information system (sis), and other administrative platforms.
• User accessibility: web-based interface with mobile compatibility.
• Data storage & backup: secure, redundant data storage with regular backup protocols.
• Scalability: ability to support multiple users across different departments with customizable workflows.
• Infrastructure: any additional infrastructure to be purchased by university to use the system must be clearly delineated.
• Application: application must use all it industry standards.
• Termination format: provide standard, usable format if vendor hosting is terminated.
• Single sign-on (SSO): require compatibility with university authentication (azure ad)
• Data encryption: encryption of data at rest and in transit.
• Transfer: design must provide secure transfer of all data to and from the system.
• Upload: design must provide secure file/data upload methods; usually SFTP or web service.
• User authentication: multi-factor authentication (MFA) for secure access.
• Role-based access control (RBAC): configurable user roles and permissions.
• Regulatory compliance: adherence to FERPA, GDPR, and other relevant data protection regulations.
• Incident response plan: vendor must provide a defined incident response and disaster recovery plan.
- Contract Period/Term: 4 years
- Questions/Inquires Deadline: May 22, 2025