The Vendor is required to provide to implement financial software that automates document workflows, reduces manual input, eliminates redundancy, and utilizes analytics to streamline operations.
- The system must meet or exceed accepted cybersecurity standards and penetration tests.
- The system must meet or exceed federal financial requirements including, but not limited to, multi-entity capabilities to support the Department’s international operations.
- Data must be located on servers that are physically and virtually secure from any unauthorized access by using the strictest of accepted principles set forth in the International Information Systems Security Certification Consortium ((ISC) 2)
- The system must encrypt any log files that may contain transactional data that could contain personally identifiable data or demographic data related to the transaction by using Advanced Encryption Standard with a 256-bit key (AES-256).
- The system must provide notifications to a designee in the Department and detailed reporting of all security violations or attempts to gain access to the system by unauthorized users
- The system must not negatively impact or interfere with services from the Department’s existing systems.
- The system must be compatible with the Department’s existing systems.
- The system must be implemented with all dependent hosted hardware, to allow for direct network communication with the Contractor’s system and the exchange of data within approved industry protocols for interfacing with other systems as deemed necessary.
- The system must support bi-directional communication with System to ensure real-time data synchronization and enable updates to flow between both systems.
- The system must not include Java.
- The system must include the acquisition and operation by the Contractor, of all hardware, software, and network support related to the hosting services.
- The system must include, at a minimum, functionality for development, testing, staging, software updates, and production.
- The system must be web-based with at least an HTTPS connection.
- The system must provide alerts and status tracking for leadership through email push notifications.
- Web-based solutions must provide email alerts.
- Application-based solutions must provide pop-up alerts.
- The system must be accessible through a secure web-based portal and use Multi-Factor Authentication.
- The system must be browser and operating system neutral for all user types.
- The system must function accurately, at a minimum, on Microsoft Edge, Mozilla Firefox, and Google
Chrome, and Safari.
- Additional browser plug-ins, add-ons, or other helper applications must not be required.
- The system must require a unique username and password for system access.
- Passwords must be able to be reset by email.
- The system must adhere to the Active Directory Password Policies and Procedures.
- The system must use single login functionality that allows users to switch between roles/accounts.
- The system must be configurable to lock out an operator after a Department-assigned number of failed login attempts.
- The system must include the ability to establish “timeout” and “terminate session” limits by user role.
- The system must authenticate and assign the appropriate custom defined levels of access to users based on roles and must have the following capabilities:
- Ability to assign controls for multiple users or roles.
- Ability to define access with security parameters to custom user roles.
- The system must include a Responsive User Interface (RUI) with accessibility and functionality from mobile devices including, but not limited to, iPhones, Android phones, iPads, and tablets.
- The system must include a centralized Enterprise Resource Planning (ERP) function that will serve as the system of record for financial records and documents.
- The ERP must have consolidated reporting and secondary functionality to address statutory reporting to reduce redundancy and disparate ledgers and accounts.
- The system must eliminate manual updates to spreadsheets and other documents and processes.
- The system must automate processes including, but not limited to, purchase requisitioning, position vacancy coding, audit trails, and signature routing.
- The system must automate vendor invoice entry with Optical Character Recognition (OCR) processing for portal submission capabilities.
- The system must streamline, automate, reduce redundancy, and increase the data accuracy of workflows including, but not limited to, contract renewals, project invoicing, and Time & Expense functions.
- The system must provide an Automated Cost Allocation function for annual Centralized Personnel Plan (CPP) calculations.
- The system must have the ability for discrepancy alerts when cross scanning invoices and entries.
- Contract Period/Term: 2 years
- Questions/Inquires Deadline: August 14, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.