The vendor is required to provide a virtual reality (VR) training solution designed to train law enforcement personnel on various topics, including but not limited to defensive tactics, firearms, use of force, de-escalation tactics, etc.
- There is a need for using reality-based scenarios to give new and existing personnel a highly immersive and realistic training to help build muscle memory and make decisions under high stress controlled environments.
• Provides a variety of training capabilities to include de-escalation and/or drills and scenarios, e.g., use of force, active shooter, target assessment, weapons skills, traffic stops, etc.
• Ability to track and compile training metrics for varying levels of review, i.e., end user, supervisor, executive leadership.
• Hyper realistic, high quality/resolution graphics displaying numerous environments, i.e., busy roads, schools, jails, etc.
• Wide field of view for more encompassing virtual environment.
• Intuitive user interface (UI) and user experience (UX) – must show how the system is navigated between person in scenario and person running scenario.
• Provide training documents on how to use the system.
• Provide in person training to training staff in a train the trainer model.
• Provide equipment needed to utilize the system (tablet, laptop, etc.).
- Provide toll-free telephone and e-mail accessibility for department to report issues and must be available during business hours (M-F 7 AM to 5 PM CST).
- Provide the following types of technical support, including, but not limited to:
• Functionality management;
• Administrative system and technological environment functionality management;
• Assisting department administrative users with escalated issues;
• Troubleshooting errors or issues with software solution including, but not limited to, error messages, initiating or exiting the application, freezing, etc. that are non- department infrastructure related.
• Assisting department administrative users with permissions and system user provisioning;
• Providing system configuration, user guides, updated job aides and design reference materials that are accessible to identified department users.
- Comply with data retention and archiving requirements as documented by the department’s records management schedule that comply with statutory requirements.
- The system should employ industry-standard security measures to protect against unauthorized access, data breaches, and information leakage.
- Data encryption, secure user authentication, and access control mechanisms should be implemented.
- Regular security audits and vulnerability assessments should be conducted to ensure system integrity.
- Data retention with auto-purge and pre-purge notifications timelines to be defined by business regulations.
- Ability to redact information based on role.
- Contract Period/Term: 5 years
- Questions/Inquires Deadline: March 25, 2025