The Vendor is required to provide computerized criminal history and criminal justice data transparency (CJIS) data collections systems for include:
- Solution capabilities - shared
1. Security and governance
• Provide multi-factor authentication (MFA) – single sign on (SSO).
• The solution should provide the ability to assign user groups and roles to a user.
• The solution should provide the ability to allow department administrator(s) to grant or restrict user access.
2. Vision and strategy
• Utilize AI ad-hoc reporting.
o AI hosted within a dedicated environment that ensures all department data remains segregated and is not exposed to or utilized by any public or multi-tenant AI services.
o Department data will not be used for training or improving any external or generalized AI models.
3. Technology and tools
• Provide error queue integration for data correction.
• Provide 24/7/365 access to the system for all users and contributors, with exceptions made for mutually agreed upon maintenance windows.
- Solution capabilities - computerized criminal history (CCH)
1. Organization and people
• Provide enhanced productivity metrics for management.
2. Time, process, cost
• Have data correction and cleansing capability prior to system migration.
• Have the ability to see batch submission status and errors for internal and external users.
• Provide department with the capability to make workflow changes to correspondence without vendor involvement.
• Provide the capability to make form changes in UI (1500 users agency and internal).
3. Ongoing operational support
• Provide workflow capabilities (ability to work on defects and enhancements simultaneously).
• Have the log tracking capability and notifications of system errors in a dashboard with active vendor monitoring.
• Have proactive system monitoring and messaging.
4. Technology and tools
• Have data reporting capabilities.
• Have consistent data management for new and legacy records.
• Have a unified reporting platform.
• Be hosted in a Gov-cloud or another cloud provider that can comply with the FBI CJIS security policy.
5. Vision and strategy
• Should not be reliant on other department applications or infrastructure, except as data sources
• Have customer-facing direct integration (web form that can marry multiple types of information (ex. Fingerprint, payment info) and eliminate the need for customers to complete manual intake forms.
- Solution capabilities - data collections
1. Organization and people
• Minimize impact on the end user and optimize the end user experience.
• Should provide enhanced training options and processes.
2. Time, process, cost
• Provide improved cost efficiency (a seas solution should remove the need for department to purchase and manage additional and separate hardware, software, and licensing).
3. Security and governance
• Remain in national information exchange model (NIEM) and uniform standards in all data collections.
• Establish a data retention policy.
4. Technology and tools
• Simplify the IEPD creation process and create a robust method for technical documentation.
• Build funding timelines and cycles for the information exchange package documentation (IEPD) process as a dependency.
5. Ongoing operational support
• Provide a mechanism for system performance reporting.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.