OFFICE OF THE DY. COMMISSIONER OF POLICE: PROV. & LOGISTICS, (AN ISO 9001: 2000 CERTIFIED UNIT) 5, RAJPUR ROAD, DELHI-110054 (FAX NO. 011-23993344, 011-23974427) TENDER NOTICE Separate sealed tenders are invited in two-bid system i.e. Technical Bid and Price/commercial bid for Purchase/outsourcing of the following items for use in Delhi Police :Sl. No. Description of Work Pre-Bid Meeting date, time and venue Closing date, time and place of Tender Opening date, time and venue of Tender 30.04.2013 at 1100 Hrs at Reception, Prov. & Logistics, 5, Rajpura Road, Delhi. 30.04.2013 at 1100 Hrs at Reception, Prov. & Logistics, 5, Rajpura Road, Delhi. 30.04.2013 at 1100 Hrs at Reception, Prov. & Logistics, 5, Rajpura Road, Delhi. 30.04.2013 at 1100 Hrs at Reception, Prov. & Logistics, 5, Rajpura Road, Delhi. 30.04.2013 at 1200 Hrs at Committee Hall, Prov. & Logistics, 5, Rajpura Road, Delhi. 30.04.2013 at 1130 Hrs. at Committee Hall, Prov. & Logistics, 5, Rajpura Road, Delhi. 30.04.2013 at 1230 Hrs. at Committee Hall, Prov. & Logistics, 5, Rajpura Road, Delhi. 30.04.2013 at 1300 Hrs. at Committee Hall, Prov. & Logistics, 5, Rajpura Road, Delhi. 1. Providing Tool Specific Skill Argumentation Programs for Cyber Forensics for a period of three years 28.03.2013 at 1100 Hrs at Conference Hall, 3rd Floor, EOW, Mandir Marg, Delhi. 2. Providing Forensic Acquisition and Analysis Services for Cyber Crime Lab, EOW for a period of three years 28.03.2013 at 1130 Hrs at Conference Hall, 3rd Floor, EOW, Mandir Marg, Delhi. 3. Providing Specific Skill Argumentation and ReLearning Program for MAC Systems 28.03.2013 at 1200 Noon at Conference Hall, 3rd Floor, EOW, Mandir Marg, Delhi. 4. Forensic Tool for Mac System for use in EOW of Delhi Police 28.03.2013 at 1230 Hrs at Conference Hall, 3rd Floor, EOW, Mandir Marg, Delhi. The tenders should reach in this office on the date as mentioned above. The detailed tender terms & conditions and requirements can be downloaded from Delhi Police website www.delhipolice.nic.in or can be obtained from the office of the undersigned free of cost on any working day between 10 AM to 5 PM before closing of tender. In case the due date is declared a holiday, tender shall be opened on next working day but tender box will be sealed on scheduled date and time. DY. COMMISSIONER OF POLICE: PROV. & LOGISTICS: DELHI. TENDER FORMAT TENDER FOR PROVIDING TOOL SPECIFIC SKILL ARGUMENTATION PROGRAMS FOR CYBER FORENSICS FOR A PERIOD OF THREE YEARS TO DELHI POLICE 1. NAME OF THE FIRM :___________________________ 2. CORRESPONDENCE ADDRESS WITH TELEPHONE AND FAX NO. :___________________________ LOCAL ADDRESS WITH TELEPHONE AND FAX NO. :___________________________ 4. SERVICE TAX REGISTRATION PROOF :___________________________ 5. COPY OF LATEST SERVICE TAX DEPOSIT RECEIPT/CHALLAN 3. :___________________________ 6. LIST OF OWNERS/PARTNERS AND CERTIFICATION REG. BLACKLIST & CRIMINAL CASE ATTACHED OR NOT :___________________________ 7. APPLICATION FEE :___________________________ 8. EARNEST MONEY DETAIL :___________________________ 9. COPY OF TERMS AND CONDITION DULY SIGNED :___________________________ SIGNATURE OF THE TENDERER WITH STAMP ___________________________ ___________________________ ___________________________ TENDER TERMS & CONDITIONS Sealed tenders are invited in two bid system (i) Technical Bid and (ii) Price Bid by the undersigned from the reputed Private/Government/Semi-Government Computer Training Institute/Labs or their franchise for “Providing Tool Specific Skill Argumentation Programs for Cyber Forensics” for a period of three years to Delhi Police personnel through Regd. post or these can be put personally in the sealed tender box kept in the Reception Room/Prov. & Logistics Unit, 5, Rajpur Road, Delhi-110054 on the following terms and conditions: 1) Separate envelope should be used for Technical Bid as well as Price Bid. The words “Tender for Providing Tool Specific Skill Argumentation Programs For Cyber Forensics For A Period Of Three Years To Delhi Police Personnel” shall be prominently super scribed on the top of each envelop. Both these bids shall further be put in one envelop addressed to the Deputy Commissioner of Police, Provision and Logistics, Rajpur Road, Delhi. 2) The tender should reach this office by 1100 Hrs. on ________.2013. 3) A pre-bid meeting will be held on 28.03.2013 at 1100 Hrs in Conference Hall, 3rd Floor, EOW, Mandir Marg, Delhi. All the interested tenderers/firms can attend the meeting on scheduled date, time and venue. Prospective bidders desirous to seek clarifications about training to be imparted/terms & conditions shall submit their queries in writing and duly signed by the bidder at least 48 hours before the pre-bid meeting. A box will be kept in Reception Room of Prov. & Logistics Unit, 5, Rajpur Road, Delhi on 26.03.2013 between 10 AM to 5 PM. The queries will be discussed at the pre-bid conference and within one week necessary clarifications would be posted by Delhi Police on the Websites of Delhi Police apart from furnishing clarification in writing for which the bidders should state their address and fax number very clearly on their query letters. 4) No tender will be accepted by hand and tenders received late will not be entertained. 5) The Technical Bids will be first opened on _______.2013 at 1130 Hrs. in Committee Room, 5, Rajpur Road, Delhi-110054 and the Price Bids will be opened only after scrutiny of technical bid, if the firm is found technically qualified. 6) The participating firms/institutes/labs registered with Service Tax Department are eligible to fill this tender. A copy of Service Tax Registration Certificate and Latest Service Tax deposit receipt should also be attached with the tender. 7) The tendering firm will have to submit application fee Rs.500/- (Rupees Five Hundred only) (non refundable) in the shape of Demand Draft in favour of DCP/P&L at the time of submission of tender. In case the firm fails to attach the draft of application fee, the tender shall be rejected straightway. 8) Incomplete tender will not be accepted. 9) Conditional tender will not be accepted. 10) Optional tender will not be accepted. The firm/Institute should have to quote their rate after careful study of the tender. The option either in model or in rates will not be accepted and the tender will be rejected straightway. 11) No tender will be accepted without requisite Bid Security (E.M.D.). Tenderer must deposit Earnest Money of Rs.1,25,000/- (Rupees One Lac Twenty Five Thousand only) in the shape of A/c Payee Demand Draft, FDR, Bankers Cheque or Bank Guarantee from a Commercial Bank in acceptable form in favour of DCP/P&L, Delhi alongwith the tender. Earnest money deposited with the tender shall bear no interest. 12) All units registered with NSIC/DGS&D for these services are exempted from submission of EMD, provided submission of exemption certificate issued by the authority concerned. They have to enclose valid registration document/exemption certificate with their tender. 13) The participating firm/institute/lab/agency shall submit a certificate issued by the concerned OEM (i.e. the one who is manufacturing/creating/ distributing the said software/hardware at an international level) showing therein that the firm/institute/lab/agency has been certified for providing such software/hardware/services. 14) Tendering firm/institute/lab/agency must have 05 (Five) numbers of computers (minimum) in each lab for participation. 15) The firm whose rates are accepted will have to deposit Performance Security @ 10% in the shape of Account Payee Demand Draft or Bankers Cheque, Fixed Deposit Receipt, or Bank Guarantee from any of the commercial banks in an acceptable form in favour of Deputy Commissioner of Police, Prov. & Logistics, 5, Rajpur Road, Delhi-110054 payable at Delhi, safeguarding the purchaser’s interest in all respects, within a week’s time after acceptance of letter of acceptance. Security Money Deposit shall bear no interest and shall be released only after 60 days beyond completion of all contractual obligations. 16) Tenderers must quote the net price (inclusive of all taxes) both in words as well as in figures in price bid proforma at Annexure-“B”. Any over writing/cutting etc. will render the tender invalid. 17) The rates offered shall remain valid for 06 (six) calendar months from the date of bid opening. A bid valid for a shorter period may be rejected by the Purchaser as non-responsive. 18) The tendering firm will deposit the papers of the Past Performance, if any. 19) The tendering firms will have to submit the list of branches/ offices alongwith address and telephone numbers. 20) The faculty qualification and details may also be enclosed with tender. 21) For the Certification programs mentioned in Annexure A, supporting documents from the respective OEMs (i.e. the one who is manufacturing/creating/ distributing the said software/hardware at an international level) would also have to be provided. 22) Delhi Police reserves the right to vary the quantities and/or split the order among the selected Bidders, in case the Technical Quality and Cost matrix are found to be the same. 23) A bidder can bid in any one or more of the line items ( serial numbers ) mentioned in Annexure A and indicated accordingly in Annexure B. The lowest bidder for each line item ( serial number) would be calculated separately. 24) Delhi Police reserves the right to accept or reject any bid, and to annul the bid process and reject all bids at any time, without assigning any reason, prior to signing of contract, without thereby incurring any liability to the affected Bidder(s) or any obligation to inform the affected Bidder(s) of the grounds for the action of Delhi Police. 25) Scope of Work: The Bidder would have to provide all software, hardware, support materials and other training infrastructure in his Training Center. The training shall be provided by the successful bidder in his own Training Center / Facility and by their own faculty so as to train personnel in a batch of 01-05 candidates/trainees at one time. The training must be completed as per required schedule indicated in Annexure-“A”. The training would be provided for at least 06 hours or more per day so as to impart sufficient proficiency in the training subject. The training shall cover the course contents for each course as per Annexure-“A”. For the Certified Training Programs, Certificates of Completion of Training would be issued after successful completion of the program from the OEM concerned. An examination would have to be conducted at the end of each training session and a proficiency certificate alongwith details of the hardware /software and the nature of training would have to be provided to each passing participant. 26) The firm will have to provide relevant training material in the form of hard/soft copy for further reference. Trainees shall be catered with tea and snacks two times a day i.e. before lunch and after lunch and Packed Lunch (Vegetarian) per day by the successful bidder. One Computer will be provided to each trainee for training purposes. 27) Delhi Police reserves the right to suspend training for “Providing Tool Specific Skill Argumentation Programs for Cyber Forensics” due to major law & order arrangement or unforeseen circumstances. However, the training shall be continued immediately thereafter. 28) The training will be imparted in Hindi and English so that trainees can understand the concept clearly. 29) The firm will have to provide training to approximately 01 – 05 candidates/ trainees per batch. 30) Sufficient Hands on session have to be included so as to impart practical training. 31) The bidder shall give certificate to each trainee on successful completion of training and provide the database of trainees to concerned Head of Office/DCP concerned periodically after completion of training. 32) No advance payment shall be made, on any ground. The payment will be made on per candidate basis for a batch of candidates at any one point of time. The firm will have to submit the bills (in triplicate) to DCP/Prov. & Logistics, 5, Rajpur Road, Delhi of each batch duly verified by ACP/ EOW deputed by concerned DCP/EOW. 33) The total number of candidates trained would depend upon the requirement of Delhi Police. There would be no minimum guaranteed number of candidates. 34) The successful bidder would be given 15 days notice to start a training program for a batch. 35) The Payment will be made depending upon the availability/release of funds by the Govt. and the agencies/contractors shall have no claim in case of delayed payment and no interest will be paid for the delayed payment. 36) In case the successful tenderer(s) found in-breach of any conditions(s) at any stage during the contract, legal action as per rules/laws, shall be initiated against the agency concerned. In that case Security deposits can be forfeited and outstanding payments can be held-up, besides debarring/ black-listing the agency concerned for at least 07 (seven) years, for further dealing in this Department. 37) The Purchase Committee reserves the right to reject any or all the tenders without assigning any reason thereof. 38) The competent authority reserves the right to terminate/recall the tender at any stage on administrative reasons. 39) The Purchase Committee can visit the Institute/Lab to assess the suitability of the Institute/Lab and its training infrastructure. 40) All disputes in this connection shall be settled in N.C.T. of Delhi Jurisdiction only. 41) All procedure laid down in GFRs and DFPRs shall be adhered to strictly by the undersigned and the subordinates and tenderers are bound to respect the same. 42) A copy of tender documents terms & condition duly sealed and signed by the bidder(s) may also be attached with the tender, un-signed tender documents shall not be accepted. 43) All the firms participating in the tender must submit a list of their owners/ partners etc. and a certificate to the effect that the firm is neither blacklisted by any Govt. Department nor any Criminal Case is registered against the firm or its owner or partners anywhere in India. 44) The tender will be rejected straight way without assigning any reasons if the firm/Institution is found involves in any criminal cases, declared black listed by any Govt/Semi govt. department/agencies etc. 45) Foreign Companies/Institutions/Labs shall participate in the tender, only through their Franchisee/Agent in India. No foreign company shall be entertained directly. NOTE :(A) DOCUMENTS REQUIRED TO BE ATTACHED WITH TECHNICAL BID IN THE FOLLOWING ORDER:1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. Application Fee of Rs.500/- in form of demand draft in favour of DCP/P&L. E.M.D. of Rs.1,25,000/- (Rupees One Lac Twenty Five Thousand only) in the shape of Bankers Cheque/Bank draft/FDR/Bank Guarantee in favour of DCP/P&L, 5-Rajpur Road, Delhi-110054. Copy of Service Tax Registration Certificate. Copy of Latest Service Tax Deposit Receipt. Certificate regarding registration with DGS&D, NSIC if claim EMD exemption. Copy of past performance, if any. List of Branches of Firm alongwith address and telephone numbers. Faculty quality and details thereof. OEM approval for the Certification Courses. Copy of terms and conditions duly signed with seal of the firm, in token of acceptance of terms and conditions. All the firms participating in the Tender must submit a list of their owners/ partners etc. and a Certificate to the effect that the firm is neither blacklisted by any Govt. Department nor any Criminal Case is registered against the firm or its owner or partners anywhere in India. Copy of certificate issued by the concerned OEM showing therein that the firm/institute/Lab/Agency has been certified for providing such software/hardware/service. (As per clause 13 of T&C). All Other supporting documents as required in the tender shall be attached. (B) DOCUMENTS REQUIRED TO BE ATTACHED WITH PRICE- BID IN THE FOLLOWING ORDER :PRICE BID shall contain price only and no other documents shall be enclosed with the price bid. 1. Rates including of all taxes of the item quoted by the tenderer shall be submitted on their Letter Pad as per Annexure “B” format in clear terms, in words and in figures. The cutting & over-writing not valid. The option in the rates will not be entertained. DY. COMMISSIONER OF POLICE: PROV. & LOGISTICS: DELHI. SIGN. OF TENDERER ___________________ NAME IN BLOCK LETTERS:______________ FULL ADDRESS : _______________________ ANNEXURE-“A” Skill Acquisition Programs Sl. No. Name Topic Covered Certification Programs 1. Accessdata Install and configure FTK and its components i.e. Certified FTK Imager, PRTK, Registry Viewer, Preview evidence Examiner with FTK Imager, export evidence files, create (ACE) forensic images, convert existing images, Create a case in FTK, process and analyze documents, metadata, graphics and e-mail, Use bookmarks and check marks, KFF database, file filters, Conduct Live Indexed, Internet Keyword and Regular Expression searches, Import search lists for Indexed searches, Data Carving, Create reports, Different mechanism of password recovery, Password Recovery through PRTK, Use custom dictionaries and dictionary profiles, Identify the basic components of the Windows registry, Review Registry Viewer functions, accessing the Protect Storage System Provider & hidden keys, Create biographical dictionaries. Review features through case studies and Certifications examination. 2. Encase Installation of Encase v7, Creating a case, Navigating Certified within the EnCase v7 environment, timeline viewing Examiner function, Fastbloc SE, Imaging a removable media, The CMOS, BIOS and boot sequence, Interpreting Binary and hexadecimal data, NT/FAT File Systems, Acquisition of a hard disk, Drive-to-drive acquisition, Network crossover-cable acquisition, Processing evidence, Using the EnCase® Evidence Processor, Preparing evidence for processing, Creating and conducting raw and index searches, Bookmarking and tagging search result, File types analysis, Installing external viewers, Signature analysis, Hash analysis, report creation. Review features through case studies and Certifications examination. 3. Certified Understanding steganography applications and data Steganography hiding technology, Creating the case, Selecting the Examiner case evidence, Search for artifacts, Mount and scan forensic images, Search for Microsoft Windows registry artifacts, LSB Analysis, Append Analysis, point-click-and-extract, Creating the report. Review features through case studies and Certifications examination. 4. Logicube Understanding the connections, Understanding the CellXtract graphical user interface (GUI), Connecting the Mobile Device handset, Data extraction, Data Analysis, SIM card No. of Days 05 05 02 02 Examiner acquisition, Memory card/extended memory acquisition, Report preparation. Review features through case studies and Certifications examination. 5 Cellebrite Understanding the connections, understanding the UFED Mobile unit commands, understanding the features of the Devices device, connecting the mobile device, extracting the Examiner data from mobile phone including SIM Card, understanding the logical analysis and physical analysis, taking the hex dump of the phone memory, SIM Card cloning, understanding Physical Analyzer, Physical extraction and analysis, GPS extraction and decoding, Reporting. Review features through case studies and Certifications examination. 6. AccessData The AME credential demonstrates your proficiency Mobile with Mobile Phone Examiner Plus as well as a Examiner general knowledge on process, cellular networks, (AME) technology and procedure. Although there are no prerequisites, AME candidates will benefit from taking the Mobile Forensics 101 Course and/or the Mobile Phone Examiner Plus course as a foundation. In preparation for the process, candidates are encouraged to test their knowledge of the skills acquired in the Mobile Forensics 101 and Mobile Phone Examiner Plus course by reviewing their course manuals for the above-mentioned course. Review features through case studies and Certifications examination. 7. Logicube Understanding the different HDD interfaces, Computer Hashing, Acquiring data from SATA/IDE HDDs, Forensic Acquiring Data from SAS/SCSI HDDs, Protecting the Acquisition HDD with ATA Password, Acquiring Laptop HDD Examiner through USB, write protecting captured HDD for analysis, Connecting high end storage and Net connection with the equipment, Generating Capture Reports, Running Audit Trail on capture reports. Review features through case studies and Certifications examination. Non Certification Oriented Programs 8. Live Data What is live data forensics, difference between offline Acquisition data analysis and live data analysis, understanding using Helix3 the tool capabilities, making the search profiles, Pro and Live imaging the hard drive images, searching the files, Response learning the open source tolls, Understanding the Toolkit tool capabilities, making the profiles, searching the items, preparing the report, Booting the system with bootable CD, making the profiles, searching the items and preparing the reports. Review features through case studies and Certifications examination. 02 02 03 02 9. 10. 11. 12. 13. Live Data Acquisition using AccessData Triage What is live data forensics, difference between offline 02 data analysis and live data analysis, understanding the tool capabilities, making the search profiles, imaging the hard drive images, searching the files, learning the open source tools, Understanding the AD triage capabilities, making the profiles, searching the items, preparing the report, Booting the system with bootable CD, making the profiles, searching the items and preparing the reports. Review features through case studies and Certifications examination. RAID : 0/1/5 Understanding RAID concepts, Difference between 04 Acquisition RAID 0, 1 & 5, connecting the RAID hard drives to acquisition devices, making the images of RAID Hard drives, make 02 images of RAID hard drives, viewing the captured images through computer. HDD data Understanding the SAS, IDE, SATA, SCSI & SSD Acquisition for connectivity, understanding the optional adapters, SAS, connecting the hard drive to duplicator through IDE/SATA, adapter, image SCSI hard drive to SATA hard drive, SCSI, SSD Laptop data Booting the laptop through bootable CD, capturing acquisition laptop hard drives through USB, Capturing the laptop hard drive through PCMCIA. HDD data Understanding the SAS, IDE, SATA, SCSI & SSD 02 Acquisition for connectivity, understanding the optional adapters, SAS, connecting the hard drive to duplicator through IDE/SATA, adapter, image SCSI hard drive to SATA hard drive, SCSI, SSD and also capture laptop hard drive and SD card data using IDAS HDD data Connecting the hard drive with write blocker, 02 Analysis using Acquiring image, Make a new case, add acquired X way image to the case, Indexing the case, search for forensics and deleted items, search for data files such as doc, xls, WinHex pdf, search for internet history, search for USB history, identification of encrypted files, decryption of files, email searching, understanding the KFF, applying the filters, exporting the files, installed application analysis, Unknown user search, preparing the report RAM Analysis Capturing the RAM dump through software, text using X-ways string searching, searching for running programs Forensics with Winhex Remote Data Connecting to remote system, preview the remoter analysis using system disk, acquisition of logical drives, acquisition X-ways of physical drives, ram dump acquisition, preparing Forensics with the report. Winhex HDD data Connecting the hard drive with write blocker, Make a 05 Analysis using new case, add acquired image to the case, Indexing Encase RAM Analysis using Encase Remote Data Analysis using Encase 14. 15. HDD data Analysis using AccessData the case, search for deleted items, search for data files such as doc, xls, pdf, search for internet history, search for USB history, identifications of encrypted files, decryption of files, email searching understanding the KFF, applying the filters, exporting the files, installed applications analysis, Unknown user search, preparing the report. Capturing the RAM dump through software, text string searching, searching for running programs Connecting to remote system, preview the remoter system disk, acquisition of logical drives, acquisition of physical drives, RAM dump acquisition, preparing the report. Connecting the hard drive with write blocker, Make a 05 new case, add acquired image to the case, Indexing the case, search for deleted items, search for data files such as doc, xls, pdf, search for internet history, search for USB history, identifications of encrypted files, decryption of files, email searching understanding the KFF, applying the filters, exporting the files, installed applications analysis, Unknown user search, preparing the report. Capturing the RAM dump through software, text string searching, searching for running programs RAM Analysis using AccessData Remote Data Connecting to remote system, preview the remoter Analysis using system disk, acquisition of logical drives, acquisition AccessData of physical drives, RAM dump acquisition, preparing the report. iPhone, iPAD Understanding the iOS storage technology, selection 05 Forensics of tool for data capturing, difference between physical and file system acquisition, Passcode recovery, deleted data recovery SQLite databases such as messages, images, videos, calls history, contacts and much more, extracts and presents GPS fixes, Wi-Fi networks and cell towers IDs from all iOS devices, integration of Google maps and google earth, extracting the keychain file, iOS data decoding, Safari data decoding, application data decoding, preparing the report. Android Understanding OS, Physical extraction of Android Forensics Phone, bypassing any type of lock of Android based devices, Physical extraction and advanced decoding, via USB debugging, Data decoding of Android phones, deleted data recovery, decoding installed applications, preparing the report. Blackberry Understanding Blackberry OS, data storage Forensics technique of Blackberry, physical extraction and logical extraction of BB, decoding of Address Book including contact, photos, SMS MMS, Emails and PIN messages, Recent email contacts (BB OS 6 and 16. 17. 18. 19. 20. above, where available), Bluetooth devices, Calendar entries, Memo pad notes, Web browser history, Web bookmarks, Cookies, BlackBerry messenger – contacts and chats (excluding group contacts, group chats, attachments and deleted entries), BlackBerry messenger history (if enabled by the user), BlackBerry messenger history (if enabled by the user), Installed applications, Device Info (Model, IMEI/MEID, ICCID, PIN, OS version, Platform, Supported Networks) Mobiles Phone Understanding the data storage technology of Forensics phones, connecting the phone to device, pushing the agent, data acquisition, physical data acquisition, data display, data analysis and report generation. Chinese Difference between Chinese phones and standard Phones phones, Chinese phone chipsets, connectivity of Chinese phones, understanding the connectivity options, data acquisition, physical data acquisition, GPS data analysis (if phone supports) data viewing, deleted data recovery, report preparation. E-discovery Configuring the software, Acquiring email data from 03 and Email the seized media, link analysis, content analysis and Analysis using reporting of email and e-discovery results NUIX Password Understanding the password recovery processes, 02 Recovery connecting the HDD to the password recovery hardware, password recovery, analysis and report generation. Mac Using Apple Mac Operating System incl overview, 10 familiarization orientation to the desktop, navigation, system & Forensics features, preferences, window elements, applications, multitasking, usage of different applications, security, various mac softwares and handson. Digital forensics of apple devices, setting up of a system, imaging and acquisition, forensic tools and evidence gathering advanced file system analysis. Usages of various tools like Backlight R5. Macdisk for Windows, MacQuisition – Stand alone USB Forensic image, Hex Fiend, Softblock – Software based write block, EmailChemy 11.2, Mac Marshall Forensic as well as Field Edition etc. Link Analysis Using l2 Notebook for data acquisition and analysis 04 for diverse databases incl. bank a/c details, CDRS, Access logs and interpretation of results. CDR Analysis Using CDR Analysis Toolkit for multiple CDR 03 Analysis and Interpretation. ANNEXURE-“B” PROFORMA FOR PRICE SCHEDULE Sl. No. Description Name Rates Offered per person/trainee for the indicated number of days for providing complete training for “Providing Tool Specific Skill Argumentation Programs for Cyber Forensics” for a period of three years to Delhi Police Personnel [including all taxes and cost for providing relevant training materials in the form of hard/soft copy, catering tea and snacks two times a day i.e. before lunch and after lunch, Packed Lunch (Vegetarian) and any other services associated with the training etc.] Accessdata Certified Examiner (ACE) Encase Certified Examiner Certified Steganography Examiner Certified Logicube CellXtract Mobile Device Examiner Certified Cellebrite UFED Mobile Devices Examiner Certified AccessData Mobile Examiner (AME) Certified Logicube Computer Forensic Acquisition Examiner Live Data Acquisition using Helix3 Pro and Live Response Toolkit Live Data Acquisition using AccessData Triage RAID : 0/1/5 Acquisition HDD data Acquisition for SAS, IDE/SATA, SCSI, SSD Laptop data acquisition 05 05 02 02 HDD data Acquisition for SAS, IDE/SATA, SCSI, SSD using IDAS HDD data Analysis using X way forensics and WinHex RAM Analysis using X-ways Forensics with Winhex Remote Data analysis using X-ways Forensics with Winhex 02 13. HDD data Analysis using Encase RAM Analysis using Encase Remote Data Analysis using Encase 05 14. HDD data Analysis using AccessData RAM Analysis using AccessData Remote Data Analysis using AccessData 05 15. iPhone, iPAD Forensics Android Forensics Blackberry Forensics Mobiles Phone Forensics Chinese Phones 05 16. E-discovery and Email Analysis using NUIX Password Recovery Mac familiarization & Forensics Link Analysis CDR Analysis 03 1. 2. 3. 4. 5 6. 7. 8. 9. 10. 11. 12. 17. 18. 19. 20. NOTE: 1. 2. No. of Days Rates offered inclusive of all taxes [in Indian Rupees] In figure Rates offered inclusive of all taxes [in Indian Rupees] In words 02 02 03 02 02 04 02 02 10 04 03 RATES SHOULD BE OFFERED ONLY FOR EACH SL. No. OPTIONAL BID WILL NOT BE ENTERTAINED AS CLARIFIED IN CLAUSE NO. 10 OF TENDER TERMS & CONDITIONS. 3. NO CONDITION SHOULD BE INSERTED IN THE PRICE BID AS CLARIFIED IN CLAUSE NO.9 OF TENDER TERMS & CONDITIONS. It is hereby certified that we have understood all the terms and conditions specified in the tender document and are thoroughly aware of the nature of job required to be done and stores/items to be supplied. We agree to abide by all the tender terms and conditions. We hereby offer to carry out the job and (or) supply the stores/items detailed above or such portion(s) thereof as you specify in the notification of award. (Signature and seal of Bidder) Dated: _______________