The vendor is required to provide fully functional, modern integrated library system (ILS) with circulation, cataloging, acquisitions, serials and reporting modules as outlined in the software matrix.
- Provide for county a software-as-a-service (“SaaS”) solution that is a cloud based and hosted software program, developed, owned, and operated by contractor (“system,” “software,” or “solution”) that complies with all federal, state, and local laws, rules, and regulations to provide library management software services.
- All offered software maintenance and support services and tools, including software patches and updates, access to any available online libraries, issue reporting tools, toll-free numbers, hours of service, process for requesting after-hours support in case of emergencies, and the process for issue resolution and/or escalation.
- Provide and adhere to a communication plan for communicating system upgrades and all other maintenance and service interruptions.
- This communication plan in their proposals, which should include, but is not limited to the following:
• The methodology for testing and certifying upgrades and patches to ensure that they work properly and the mechanism of versioning rollback in case of issues;
• The process of applying upgrades and patches including if there are county responsibilities and a responsibility matrix for the tasks involved;
• A brief history of product upgrades and interim patches or fixes released in the last eighteen (18) months; and
• Identification of the most current stable release and patch level, certified for support, for all software and firmware and acknowledge that all software and firmware will be installed to those levels.
- Data security and ownership
• The solution meets any applicable statutory requirements for data;
• Security measures in place to protect the system and its data, including disaster recovery and continuity plans;
• Information on hosted or cloud service provider’s data center, including location and internet connectivity, and information security compliance.
- System users and use.
• Authorized county users should, at a minimum, be able to access the software via local personal computer (PC)-based internet browsers and the internet through secure internet connections and protocols.
• Software should have the ability to keep and maintain account usernames and passwords in a secure manner using industry standard encryption algorithms.
• Software functionality matrix where requested how different types of users would be granted access to the software and how many county users would be given access.
- Contract Period/Term: 15 years
- Non-Mandatory Pre-Proposal Conference Date: July 16, 2025
- Questions/Inquires Deadline: July 22, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.