The vendor is required to provide to AI camera integration service to use technology in the form of video analytics of security camera feeds to identify and respond to security incidents in a timely fashion.
- Also conducted a pilot of video analytics that has proven itself in various incident detection scenarios and would like to move forward with implementation of a new system. The system must be an Artificial Intelligence (AI) based analysis of video surveillance camera feeds to detect incidents in real-time and report them to department. The desired system will enhance security by immediately identifying potential threats and providing real-time situational awareness.
- The system must be hosted in the cloud and utilize a Software as-a-Service (SaaS) deployment model.
- The system must also require no maintenance updates or support from the customer end, i.e., any system upkeep must be provided as part of the contract to the University by the vendor.
- The vendor should deploy system updates regularly without any impact on the university or end users. (If the system requires on premise hardware, these must be limited to connectors that integrate the campus video management system into the vendor’s cloud-hosted software).
- The cloud hosting environment must be compliant and certified with System and Organization Controls (SOC-2).
- The environment must have some level of geographical redundancy built in to ensure system availability is maximized even during a disaster at the vendor’s primary hosting location.
- regarding hosting must be provided in the vendor’s response.
- The system must be compatible with the campus single sign-on (sso) system; In most cases of sso use, the university prefers to use azure active directory authentication, or in common as a broker for sso integration with cloud-hosted systems; using this method, the vendor must be registered with in common.
- The system must be capable of storing or archiving data collected from the University for a period of no less than three years and preferably at least five years. This data must be available to the University for reviewing trends and inclusion in system reports.
- The system must be capable of managing access rights to specific features or functions within the application using predefined roles or user profiles. The system must be capable of supporting this type of role-based authorization.
- The system must support access to data and reports using a standards-compliant Internet browser such as Google Chrome or Firefox.
- No client software installation must be required to access most system functionality.
- The system must utilize Hypertext Transfer Protocol Secure/Secure Sockets Layer (HTTPS/SSL) for website access.
- The system should maintain an audit trail for important user interactions, including playback and download of video data. The audit trail should be accessible to end users.
- The system must support at least 20 concurrent users or provide an unlimited user license.
- Any data obtained from the University shall not be shared with other customers or third parties without prior written authorization from the University.
- Core Video Analytical Capabilities:
•The system must integrate with department existing campus video surveillance system (Genetec VMS, Axis cameras) to provide real-time alerts using AI-based video analytics.
•The system should be able to identify and alert to the presence of weapons such as knives, handguns, and rifles. The system should be capable of automatically suppressing alerts related to holstered weapons if required.
• The system should be capable of determining the intrusion of individuals or vehicles into a monitored area during specific periods.
•The system should be capable of identifying possible physical altercations or fights between individuals.
•The system should be capable of detecting the assembly of a group of individuals based on a crowd-size threshold (e.g., more than 100 individuals).
•The system should be capable of detecting individuals in a prone position within the monitored area for a given amount of time
•The system should be capable of detecting unattended objects, such as backpacks or parcels, in the monitored area.
- Contract Period/Term: 3 years