Infrastructure - General IT 1 The system should utilize a system architecture that is, nonvendor proprietary, and portable and will use published APIs. IT 2 The system should be adaptable and use extensible architecture for future expansion and scalability without the need for architectural modifications. IT 3 The system should provide robust system diagnostics. IT 4 The operational production availability of the system should be at least 99.9% on a 24×7 basis, including a description/justification of how the system will meet this reliability requirement IT 5 The Offeror will provide their strategy for a clustered and loadbalanced environment. IT 6 The system should be capable of supporting production test, training, and development environments. IT 7 The system’s user interface response time should be 2 seconds or less, unless the operation is external to DMV; the offeror should include a description of how the system will meet this response requirement as well as methods for verification of performance. IT 8 If the proposed system is on physical hardware, it should be capable of running under a virtualized environment, using a VMWare 5.x or later environment. Not Available Custom Dev. Infrastructure Future Rel. Req. ID Current/Configur. Colorado DRIVES – Technical Requirements – Response Tables The system architecture should be identifiable (respondent shall identify and justify the classification) from the following: IT 9 ● ● ● ● ● ● ● ● ● ● Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Private Cloud (IaaS), Hybrid Cloud (private and public), Hosted Application or Architecture, Physical Infrastructure Architecture, Commercial Off-the-shelf (COTS), Modified Off-the-shelf (MOTS) or Custom architecture, with an understanding that architectures more in compliance with OIT’s “Cloud First” initiative are preferred. IT 10 The system should provide for any citizen-facing interfaces and artifacts to be mobile-enabled and accessible, at minimum, to Android and iOS7 mobile devices as required by OIT’s “Mobile First” initiative. Additional sensitivity to device type and format (tablet, cellular phone; portrait, landscape) and/or capabilities on other platforms (Kindle, Blackberry, Symbian, Windows Phone) are preferred. IT 11 An architectural overview detailing the necessary components of the system shall be provided, from critical to periphery; with third-party components demarked and identified. Any proposed architecture should include a previous experience reference and performance characteristics (target and present day, if available). Not Available Custom Dev. Future Rel. Infrastructure Current/Configur. Req. ID IT 14 The system should be capable of reporting performance metrics useful to capacity provisioning and diagnostics. IT 15 The Offeror shall provide a description of the backup, recovery, and disaster recovery (including identifying diminished capacity under disaster) operational characteristics. At minimum, a recommendation for backup and disaster recovery (DR) should be provided, with more mature planning including identification of diminished capacity under DR condition and instructions detailing paths to full operation. Not Available IT 13 The system should be scalable and expandable. Specifically, the system should be able to support a performance of 2,000 concurrent transactions with no greater than a three (3) second response time and/or ten (10) second transaction time, for create, query, update and delete customer record. The business transactions that will serve for evaluation is “motor vehicle registration renewal” and “simple driver’s license renewal”. These performance constraints include only system processing time, not human-computer interaction time manipulating the user interface. A description of each system component configuration and its ability to meet the availability and performance specifications should be provided, including strategies for expected increases in throughput and workload over the lifetime of the proposed system. Custom Dev. IT 12 The system should be open and non-proprietary whenever possible, with options available without contract penalty (thirdparty hardware and software components). Any proprietary components shall be noted in the architectural overview, with supporting documentation such as license restrictions, copyright, patent or similar intellectual property documentation. Future Rel. Infrastructure Current/Configur. Req. ID IT 18 Wherever practical or applicable, the system should incorporate or cooperate with the following standard technologies already employed at OIT: Windows Desktop OS, Windows Server OS, Red Hat Enterprise Linux, Symantec Altiris, CA Service Desk, CA Clarity, Salesforce, Google App Engine / Google Apps, and EMC Documentum. Hardware IT 19 The system should use open standards for interfaces such as HTML5, XML with third-party hardware and software components through open architecture. Not Available IT 17 System operational production availability, including maintenance windows, shall be no less than 99.9% on a 24x7 basis. Availability shall be considered synonymous with uptime. Should the system require physical hardware, system reliability, the probability of the system (including all subcomponents) performing adequately under normal operating conditions for any given one year period, should consistently exceed 0.90 for the purposes of hardware replacement planning. The mean time between failure of any and all components of the system should always be in excess of 180 days, including series or parallel failure (including redundancy). A description and/or justification of how the system will meet these requirements should be included. Custom Dev. IT 16 For systems including custom software development, Offeror shall identify ownership, maintenance and liability boundaries with respect to code. For example, if the system uses a “basecode” or “core” solution to which “extensions” as “site code” are added (as in the case of MOTS), the relationship of all code regions with respect to development and support should be detailed. Future Rel. Infrastructure Current/Configur. Req. ID IT 20 Offeror shall provide their user interface strategy, their futures, their currently supported interfaces and their user interface roadmap. IT 21 The system should provide a description of each system configuration and its ability to meet the availability specification. The offeror should include a system diagram, previous experience achieving these performance specifications, and options in SOW. IT 22 The system should be designed to support the capacity requirements to accommodate increases in DMV throughput and workload over the lifetime of the system. IT 23 Any hardware included should be open architecture with options available without contract penalty (third-party hardware components). Any server hardware included shall be capable of being virtualized using VMware 5.x or later. IT 24 The system should use a uniform server operating system type (e.g., Microsoft Windows, Red Hat Enterprise Linux) for all production servers. Interfaces IT 25 The system strategy should utilize separate environments for development, testing and staging prior to production, with the appropriate isolation between. Providing documentation regarding the promotion of code through environments and the use of obfuscated data is strongly recommended. IT 26 The system should support and implement interfaces with the systems listed in Table 3 – Current DLS and CSTARS Interfaces, located at the end of this appendix. IT 27 The system should, when practicable, utilize the following: an Open source content management system (CMS), breadcrumbs for a navigational aid, interactive maps/charts/graphs, social networking integration, print friendly pages, a site map, and website traffic measurement tools. Not Available Custom Dev. Future Rel. Infrastructure Current/Configur. Req. ID Network IT 29 The system should support Simple Network Management Protocol (SNMP) and the Web-based tool set for centralized control of the system using an enterprise management platform. IT 30 The system should be compatible with current wired networking standards for OIT. IT 31 The system should support TCP/IP addressability for all components throughout the network. IT 32 The system should utilize TCP/IP as the primary means of network transport. IT 33 The system should utilize standard Web-based protocols, including HTTP and HTTPS, for all Web-based traffic. IT 34 The system should use the existing State of Colorado network which is used for all DMV traffic. IT 35 There should be network monitoring and notification capabilities available to DMV. OIT staff should be able to monitor activities on the network. IT 36 The system should be capable of operating within the framework of existing OIT tools used for network management purposes, whenever possible. IT 37 Offeror shall provide specifications for network & bandwidth requirements to support the system. IT 38 All network ports and protocols utilized by the system are to be provided, including documentation regarding capacity (bandwidth), purpose and criticality. Not Available Custom Dev. IT 28 The system should allow for module expansion, and further for the compartmentalization of legislative-necessitated changes. It should be possible to enable business intelligence at a particular time and day based on legislative constraint, and disable in case of repeal. Future Rel. Infrastructure Current/Configur. Req. ID Current/Configur. Future Rel. Custom Dev. Not Available Future Rel. Custom Dev. Not Available IT 39 Infrastructure Current/Configur. Req. ID The system should use standard TCP/IP protocols; specifically it should be compliant with the following Internet Engineering Task Force RFCs: 768, 783, 791-793, 816, 826, 854, 862865, 867, 894, 919, 922, 950, 959, 1001, 1002, 1009, 1034, 1035, 1042, 1055, 1065, 1112, 1122, 1123, 1144, 1157, 1179, 1188, 1191, 1201, 1256, 1323, 1332, 1518, 1519, 1534, 1542, 1552, 1661, 1662, 1748, 1749, 1812, 1828, 1829, 1851, 1852, 1878, 1886, 1994-1996, 2018, 2085, 2104, 2131, 2136, 2181, 2236, 2308, 2401, 2402, 2406, and 2581. Req. ID Applications Applications - General IT 40 The system shall conform to all of the Colorado Information Security Policies pertaining to access control, which are outlined in Table 4 – OIT Access Control Policies. IT 41 The system should require users to log on to the system through Directory and cross domain authentication. The system should generally support one user, system-wide. This sign-on should include, at a minimum: User classification or role. Password. IT 42 The system should allow for the ability to change password at setup, at sign-on, and during the course of a logged-in session. IT 45 The system shall have self-service password reset capabilities IT 46 The system should integrate with OIT’s ITSM so employees or the application can log incidents directly without having to go through the service desk. IT 47 The system should afford system administrators the ability to easily configure and update user roles while the system is online. IT 48 The system should have a single centralized repository for users and their access information (authentication, authorization, and accounting, also referred to as AAA) so that users have one username and one set of authentication credentials (such as a password) and that all user attributes and authorization are managed in one place, including date of entry. This may be accomplished by using a Lightweight Directory Access Protocol (LDAP) server. Not Available IT 44 The system should be able to be configured such that users are notified of impending password expiration. If a user’s password has expired, the system should prompt the user to change the password at sign-on. Custom Dev. IT 43 The system should provide a means for users to recall or reset their password using techniques including, but not limited to: Forgot My Password techniques used extensively on Internet sites. Challenge questions and answers established during user setup. If the user successfully answers the challenge question, provide a temporary complex password and require a new user password upon successful session sign-on. Ability for the service desk or authorized designee to reset a password if necessary. Future Rel. Applications Current/Configur. Req. ID IT 49 The system should automatically log off users that have been inactive for a specified period of time. Users can simply sign back on to system to resume activity from the point of timeout IT 50 The system should support Web services that comply with the OIT Web Services (the current version is the 2012v1 standard). IT 51 The system should support the use of pointing devices, hot keys, key combinations, buttons, touch screens, and hyperlinks. IT 52 Field and screen validation: The system should provide a visual distinction between mandatory and non-mandatory fields. The system could do field validation of data upon entry of the screen for posting. The system shall do screen validation upon submission. The system should display errors on the appropriate screen for the user. IT 53 The system’s user applications should be browser-based and utilize best-of-breed form design and usability elements. IT 54 The system’s user application screens should be printable to configurable local or networked printers, using print commands provided by the browser. The system’s user application screens should be able to be captured using commands provided by the browser. IT 55 The system should support the import or export of descriptor tables for DMV use for other systems. End User Client IT 56 If the system is to be installed as an application on client computers, the minimum and recommended desktop requirements (hardware configuration, software compliment) should be specified with purpose clearly identified. If the system can be made as a ThinApp, or otherwise served by Thin Clients, it should be noted. Not Available Custom Dev. Future Rel. Applications Current/Configur. Req. ID Current/Configur. Future Rel. Custom Dev. Not Available Future Rel. Custom Dev. Not Available IT 57 Applications Current/Configur. Req. ID If the system is browser-based, the compatibility (both name and version) and any additional client-side controls, apps, or other executable components should be disclosed. At minimum, current versions of Internet Explorer, Mozilla Firefox, Apple Safari and Google Chrome are to be supported, ideally without additional plugins or addons. Req. ID User Interface User Interface - General IT 58 The system should include a browser-based user interface. If the system requires the use of a Web browser, it must meet the OIT standards for Web Browser IT 59 The system should provide users with a highly integrated set of application modules offering a consistent user interface in order to minimize user training and system administration. IT 60 The system should be capable of working in a kiosk-based touch screen environment. IT 61 The system should provide standard GUI items, such as dropdown menus, to make selection easier for frequently used fields, such as form names, commands, and all code tables. The system should allow for adding/updating items in the dropdown menu. IT 62 The system should support “auto complete” functionality for code table lookups as the user begins to enter data in the code table lookup field. IT 63 The system should support automated updates to the user application, appropriate to the system. IT 64 The system should support pre-fill fields in appropriate preformatted screens, eliminating redundant data entry and without impacting the usability. IT 65 The system should provide help menus IT 66 The system should allow users to move forward and backward to complete data fields. IT 67 The system should allow users to correct spelling errors without having to retype the entire field. IT 68 The system should provide users with standard form navigation and allow easy movement from one work area to another via mouse or keyboard. IT 69 The system should provide default, configurable values for fields based on previous input, referential lookup, or other mechanisms. It should incorporate currently used defaults. IT 70 The system should provide lookup tables for valid values for fields. IT 71 The system should allow authorized users to configure tables. IT 72 The system should translate codes to U.S. English-language words or phrases on the output screen and reports for all codes used. User Interface – Customer Not Available Custom Dev. Future Rel. User Interface Current/Configur. Req. ID The system should provide the ability for customers to conduct and pay for transactions in a secure manner. Typical transactions to be covered by the Internet include, but are not limited to: IT 73 Vehicle Registration Renewals. Personalized/Sample License Plate orders. Reinstatement Fees. Driver License Records (DLRs) and Motor Vehicle Records (MVRs) requests, including driver history. Address Changes. Release of Liability. General Information Requests (e.g., policies and procedures). Request for Form(s). Establishment of new DMV Account (for information requests). Application for Permits (Overlegal Size & Weight/Hazardous Materials). Customer Surveys. Driver status. Payment of Penalty Assessments. IT 74 The system should include comprehensive online user tutorial capabilities. IT 75 A customer can request to enroll to use the DMV Web site. This enrollment process should be secured, encrypted, and automated. Standard secure Web-based enrollment process, similar to those with online merchants and banking, should be available for this process. IT 76 All internal & external Web pages should be compliant with federal Section 508 Disability Accessibility requirements outlined by the OIT policies and standards. Not Available Custom Dev. Future Rel. User Interface Current/Configur. Req. ID User Interface – DMV IT 78 The system should provide an interactive Web site that asks a series of questions and based on the inquirer’s responses, produces the appropriate driver or vehicle applications with the information populated. IT 78 The system should be able to provide all of the information required in a flexible and easy to navigate format. Should allow easy navigation from field to field and from one application to another. IT 79 The system should support robust editing and validation routines for all mandatory fields, including clearly indicating data that fails validation. IT 80 The system should be able to allow navigation from one field to another using “hot keys” for data entry (e.g., Control key shortcuts for save, copy, cut, paste, etc.). IT 81 The system should provide operators with a summary screen for vehicle and customer information. IT 82 The system should support, where applicable, the ability to execute multiple transactions in the same screen or session. IT 83 The system should allow an authorized user to find, enter and update customer record with additional customer types (e.g., lien holder, lessor, business,). A customer may have multiple customer types (e.g., business/lessor, lien holder/driver, lien holder/lessor). IT 84 The system should be able to mark the documents and record it as a duplicate, when a duplicate title, license, or registration is printed. Not Available Custom Dev. IT 77 A customer should have the option to request direct customer support at any time during his interaction with the Internet. The DMV staff should have the capability to view data that the customer has entered. Future Rel. User Interface Current/Configur. Req. ID IT 87 User interface components should comply with Section 508 of the Rehabilitation Act (§1194.22) wherever possible, including, but not limited to, identification of required fields. IT 88 Common user interface “best practices” should be used, particularly those as identified in “The Elements of User Experience: User-Centered Design for the Web and Beyond “ by Garrett and “Information Architecture for the World Wide Web: Designing Large-Scale Web Sites” by Morville and Rosenfeld. IT 89 All workflow process codes should be rendered in unabbreviated form on output screens and reports. For example, a code “SLVG” within the context of data entry should be instead printed as “Salvage” as a title class on a report. IT 90 The systems should, when practicable, comply with: HTML5, CSS, JavaScript (W3C); Section 508 of the U.S. Rehabilitation Act, or at minimum, be compatible with screen readers (both the site and any downloadable artifacts), capable of displaying large fonts, and content context that does not rely on color alone. Not Available IT 86 The system shall implement a consistent look-and-feel, including cognitive ergonomics, workflow progression and complexity in order to minimize training and maximize intuitive user interaction. Custom Dev. IT 85 The system shall provide a visual distinction between mandatory and optional fields during data entry, where both field and page/screen/window validation occur prior to posting/submission for processing. Data entry validation errors should be presented to the user in a form and method appropriate to identify and correct each specific error. Future Rel. User Interface Current/Configur. Req. ID Security The system must follow all OIT policies, OIT Gating Process, enforce security controls based on data classification, secure login, provide security events handling, ongoing patching (applications, databases, & systems), utilize secure protocols and services, and support an OIT host-based endpoint security solution. IT 91 The system must comply with the following security standards: NIST 800-122 - Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) NIST 800-95 - Guide to Secure Web Services NIST 800-53 - Recommended Security Controls for Federal Information Systems and Organizations The Open Web Application Security Project (OWASP) Development Guide Microsoft Security Development Life-cycle (SDL) CIS Security Benchmarks IT 92 Internal Users are DMV employees and other authorized personnel. For these users, the system shall comply with the OIT identification and authentication standards and policies. IT 93 External Users are DMV customers. These users will access the DMV system through the Internet. The system shall comply with all OIT standards and policies pertaining to external access to any DRIVES application. IT 94 The system shall comply with the Social Security Administration’s requirements to maintain access to AAMVA’s Social Security Online Verification (SSOLV). IT 95 Incident reporting/response procedures shall be identified and documented. Not Available Custom Dev. Future Rel. Security and User Access Current/Configur. Req. ID If the system specifies physical infrastructure, a provision must be for physical security of all component devices. IT 98 The Offeror should provide a response plan for a security breach in either application code or hosted environment, and shall integrate with applicable State-operated facilities, datacenter or security policies. IT 99 The system should include detection and mitigation strategies for security mechanism failure (such as an SSL certification expiration, account lockout during session, etc.). IT 100 The system should be capable of both code and data quarantine. IT 101 The Offeror should perform regular auditing of security control, including any third-party components or vendor services. Independently verified security controls are preferred. IT 102 The system should allow for 2,000 concurrent users, uniquely auditable and traceable for all transactions regardless of interface (web or desktop client, remote user, etc.) IT 103 The system should include system health tools, to verify and troubleshoot performance. IT 104 The system should include file/data integrity evaluation and recovery capabilities beyond backup and selective recovery. IT 105 The processes surrounding promotion of application through development, test, staging and production environments should include authorization procedures. Not Available IT 97 Custom Dev. IT 96 The system should provide for the secure remote (connecting to the system via a network not within the State of Colorado’s control or influence) access of 2,000 concurrent employees, with the appropriate permissions and privileges associated with their account role. Future Rel. Security and User Access Current/Configur. Req. ID IT 106 The Offeror should include a warranty from the point of delivery until 12 months against known viruses, malicious software and backdoor access. There should be no ability for the offeror or the offeror’s agents to access data without authorization from the State of Colorado subsequent to the delivery of system. IT 107 The Offeror should perform or verify the performance of background checks on all workers, including third-parties, subcontractors and vendor service providers. IT 108 The system shall make the use of encryption for all transmissions between servers, and servers and clients. The encryption and decryption mechanism shall be as close to the content producer and consumer as possible within the design. IT 109 The system and offeror shall comply with all OIT standards enclosed or identified herein, recommendations contained within National Security Agency (NSA) / Information Assurance Directorate (IAD) and/or SANS Institute publications, in that order of precedence. IT 110 The system should support user roles or classifications that can be dynamically assigned at sign-on to permit users with the proper security level to authenticate at any system workstation, local or remote. Role classification should be defined by user capabilities. IT 111 The system should lock user accounts that have been inactive (no sign-on activity) for a specified period of time. IT 112 The system should automatically log off users that have been inactive for a specified period of time. IT 113 The system should use the single-sign on security paradigm, utilizing standard mechanisms such as ADFS/SAML, LDAP or identity management. Not Available Custom Dev. Future Rel. Security and User Access Current/Configur. Req. ID IT 114 The Offeror shall provide a process/methodology for asset classification to ensure that sensitive or confidential data is encrypted during storage and encryption. IT 115 The system must follow all of the following security policies/provisions/standards: OIT Security Policies (detailed elsewhere in this document and available online) NIST 800-53, “Recommended Security Controls for Federal Information Systems and Organizations” NIST 800-95, “Guide to Secure Web Services” NIST 800-122, “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)” ISO/IEC 17799:2000 CIS Security Benchmarks IT 116 The system access control granularity should be as follows: by function: specific application functions, or groups of functions that may be performed by data content: specific records, or groups of records, upon which a function may perform (including View, Add, Delete, Edit and Refresh) by location: restricted access by IP address or MAC address IT 117 The system should allow for data mining and analysis for information security forensics in the cases of fraud or criminal investigation and to evaluate potential vulnerabilities. Encryption IT 118 Standard Internet encryption techniques, including the use of Secure Socket Layer (SSL), 128-bit encryption or better, TLS – Transport Layer Security, digital certificates through recognized Certificate Authorities, shall be used. Not Available Custom Dev. Future Rel. Security and User Access Current/Configur. Req. ID IT 119 Designated confidential data (e.g., Social Security Number) shall be encrypted at rest and in transit throughout public or private networks. IT 120 Develop a process/methodology for asset classification to ensure that sensitive or confidential information is encrypted during storage and transmission. IT 121 Sensitive data shall be stored in databases in encrypted form. User Management and Access Control IT 122 The system shall utilize user authorizations or profiles to determine application access to, but not limited to the following roles: “Read” access to any data. “Add” access to any data. “Modify” access to any data. “Delete” access to any data. Each function key for which access is granted. Each command for which access is granted. User classification or role. Production (live) or training mode. IT 123 The system shall comply with all OIT password policies. IT 124 For internal users – IDs shall be established through security administrators. Security administration functions can be deleted by function and/or user groups. IT 125 For external users – Customers should be able to perform selfenrollment via the Internet. IT 126 Security administration functions can be delegated from the security administrator to an authorized user role. IT 127 For both internal and external user groups, access control should be role-based. This means access to resources will be granted based on a user’s function: Not Available Custom Dev. Future Rel. Security and User Access Current/Configur. Req. ID IT 128 Users can be aggregated by roles into user groups and subgroup capabilities. IT 129 Once user groups are defined, access can be assigned at the group level. IT 130 A user can belong to multiple groups. The system shall provide for session expiration after a user logs on to a new session. IT 131 For each role, access control should be performed at the following levels: By function – this refers to specific application functions, or groups of functions, that the user can or cannot perform. By data content – the user can be restricted to access individual records, or groups of records, within an application function. By location – access control can be granted only at specified locations (e.g., through static IP addresses or MAC address). Remote Access IT 132 There will be internal users who need to access the system remotely (e.g., auditors, investigators, police). For these users: All accesses should be from authorized workstations that can be properly identified. All DMV data downloaded to workstations should be logged and encrypted. A process should be identified as part of the asset classification to determine if/when it may be appropriate to allow the actual download of information to a may be appropriate to allow the actual download of information to a workstation/mobile device. IT 133 There will be system users who need to access the system remotely for administration, operation and application support functions. Remote access will need to follow the OIT standards and policies outlined in this document. Not Available Custom Dev. Future Rel. Security and User Access Current/Configur. Req. ID Management and Administration IT 134 The system should support communication link self-monitoring capabilities such that it identifies when a connection is unavailable and notifies the designated system administrator of the outage by predefined notification means (e.g., pager, telephone, e-mail). IT 135 The system should provide for software upgrades/maintenance that do not affect the production system (no downtime) in a load-balanced environment IT 136 The system should enable modification of a majority of the components of the DMV system by system administrators to meet changing federal and State standards without the need to contract with a vendor to make changes. This should typically be accomplished via the use of configuration tables. IT 137 The Offeror should provide an explanation of their service and support philosophy, how it is carried out, and how success is measured. IT 139 To maintain configuration integrity, the system should support configuration control for all configurable elements, including auditing, rollback, roll-forward, and configuration change transactions with the ability to both import and export configurations. IT 140 The system should allow for DMV to modify business rules and tables based upon appropriate role-based access. IT 141 The system should be able to maintain transactional, customer and vehicle comments from the operator to explain a variety of issues (i.e., stops, tax exemptions and tax fraud flags). IT 142 The system should provide a method to issue unique account numbers for customers. Not Available Custom Dev. Future Rel. System Management and Configuration Current/Configur. Req. ID IT 145 The system should allow operator to enter a comment relating to a given customer and/or transaction which can be available for viewing by all system users or can be restricted to only certain users. IT 146 The system should provide for authorized system access based on role for undercover vehicles and personnel data. IT 147 The system should be in compliance with Local, State and Federal Laws, Codes and Mandates. IT 148 The system should be designed to utilize National Crime Information Center (NCIC) codes for vehicle and vessel descriptions. IT 149 There should be a prioritized application change request list. All change requests should be accompanied by detailed requirements. Application enhancements and updates will be based on this list. IT 150 There should be a rigorous transfer to production process. All application software changes should be reviewed and approved by authorized personnel before placing into production libraries. Not Available IT 144 The system should cross-reference the new customer data entry with the existing customers in the system and include edit checks to avoid duplicate customers being entered into the system comparing customer and vehicle data element (e.g., name, USDOT, EIN, SSN, street and city address). Custom Dev. IT 143 The system should enable DMV and other authorized staff to change the information on the pending records, when information on applications does not coincide with information on the supporting documentation. Changes and override approval should be logged. Future Rel. System Management and Configuration Current/Configur. Req. ID Application – Rules IT 152 The system should be able to associate customer records with vehicles and record the ownership. Multiple owners should be accommodated. IT 153 The system should allow for override capabilities to create a new customer record and/or change information on existing record on duplicates. Overrides should require supervisor approval and be logged. IT 154 The system should link unique transactions records to the customer and/or vehicle record that they are associated with. IT 155 The system should allow an authorized user with appropriate access to update the status of a customer account after a defined period of time if no activity has occurred except account creation. The record would be available for archiving if desired. The update would include date, time, and authorized user (e.g. network information such as IP address, host name). IT 156 The system should be customer centric and should provide the ability to support entities as well as individuals. IT 157 The system should maintain current customer ID or issue customer a unique customer ID. IT 158 The system should capture customer data based on a business rules associated to customer types (e.g., lessor, individual, business). Not Available Custom Dev. IT 151 There should be a software configuration management process. All artifacts related to a software release should be organized and stored into a configuration management tool. There should be a simple process to back-out any application updates if required. Future Rel. System Management and Configuration Current/Configur. Req. ID IT 159 The system should provide the ability input and maintain investigation information, court orders, and other agency data (e.g., parks and recreation, tax commission, air quality board) and associate this information to a customer record. IT 160 The system should be able to allow corrections of the error in the record and reporting of a corrected document, when an error is found on a title, license, or registration. Version changes should be retained and not written over. IT 161 The system should provide accurate and timely information. The operational databases should be updated in real-time when business transactions occur. IT 162 The system should be able to “undo” updates so a record can be “restored” to its previous state. IT 163 The system should be able to provide certification of authenticity services and transactional records for DLR, MVR, registration, title, and title history (to include supporting documentation). IT 164 The system should provide a comprehensive inquiry facility. Business Rules Management IT 165 There should be one single rules repository where DMV business rules will be defined, updated and maintained while maintaining role based access. Once defined, the business rules can be deployed at multiple locations, if needed. IT 166 Rules should be defined using a set of simple user interfaces. A DMV business analyst will be able to maintain the rules, without extensive training requirements. IT 167 There should be version control capabilities. A set of business rules can have multiple versions, some of which can be concurrently deployed. This is important because, in some instances, past business rules will need to be retroactively applied. Not Available Custom Dev. Future Rel. System Management and Configuration Current/Configur. Req. ID IT 169 There should be extensive reporting capabilities, including rules update history, where used, and cross references. IT 170 There should be capabilities to extensively test the business rules to ensure correctness. Business Intelligence IT 171 Data should be extracted from the following sources to support business intelligence tools: Customer-centric database, containing driver and vehicle information for all types of customers. Work flow information, including staff assignments and work queue volumes. Customer requests and usage information for the electronic channels, including Internet. IT 172 There should be extensive analysis capabilities available. These include, but are not restricted to the following: Query, calculating, and summarizing capabilities. Ability to scan large amount of data to review trends, patterns and correlations. Ability to display data in a visual and pictorial manner. Tabular and/or detail data prefixed by column definition. IT 173 The system should provide access to online system help files that describe fields, forms, and data requirements, as well as procedures from system documentation. IT 174 The system should provide access to an online DMV user-guide manual that describes fields, forms, and data requirements, as well as procedures and automatic updates of the manual by DMV administrators. Not Available There should be granular security authorization capabilities. Different users can be authorized to manage different rule sets. Custom Dev. IT 168 Future Rel. System Management and Configuration Current/Configur. Req. ID IT 179 The system should be capable of supplying the DMV help desk with an FAQ set for user problem resolution. IT 180 Knowledge transfer & technical documentation is required of the vendor to State staff. Req. ID Database Database and Data Management IT 181 The system should store all enterprise data in relational database management system (RDBMS), which conforms to OIT standards and policies for database platforms. Not Available IT 178 There should be a complete set of documentation describing all application components. All documents should be reviewed and approved before acceptance. Not Available The system should provide functionality so that all data entry fields should have “help” with explanations of the field requirements. Custom Dev. IT 177 Custom Dev. IT 176 The system should provide interface to tax policies, DMV manuals, Code of Colorado Regulations (CCR), Administrative rules, memos, forms, state or field office address lists and other useful reference information as provided by the department. The Admin role should have the ability to add, change or delete the content. Future Rel. The system should provide the ability to query the DMV manual and to allow automated updates by DMV administration. Future Rel. IT 175 Current/Configur. System Management and Configuration Current/Configur. Req. ID IT 182 The solution should have the capability to execute scheduled, unattended online system database backups without affecting system performance. IT 183 The system should provide or support the ability to restore from system database backups. IT 184 The system should provide or support a robust system backup/archiving tools and strategies. IT 185 The system should provide a logging feature that logs entries, changes, and/or deletions to any data (data transaction recovery log). IT 186 The system should process selected data in real time. This means that any data changes should be done while the system is online. The change should take effect immediately. IT 187 The system should include staging, production, training, UAT, reporting and development systems. The user’s access level needs to allow the user to be able to select the system that corresponds with the desired system. IT 188 The system should support ODBC-compliant relational database technology. IT 189 The system should provide for access to and manipulation of the data in the database through a standard management system. IT 190 The system should provide tools for database design and development, including documentation, data dictionary, diagramming, normalization, database generation, screen design and generation, report design and generation, and procedure maintenance tools. IT 191 The system should provide a database accessible for data mining without impact to the production environment. IT 192 The system should provide for the development and maintenance of relational database structures for the support of DMV. Not Available Custom Dev. Future Rel. Database Current/Configur. Req. ID IT 193 There should be tools, methods and processes to perform data modeling functions, resulting in the creation of conceptual, logical and physical data models. IT 194 There should be a Metadata Directory. The directory will contain but is not limited to the following information for each data element: Description of the data element. Location where the data element is stored. The application programs that access the data element. The system of record for the data element. The entity relationship diagrams for the system database. The type of actions that can occur on each data element. IT 195 The system should support the storing of Images as a separate file in the file system with pointers to the db. IT 196 The system should utilize a recognized and commercially available phonetic algorithm product, such as Soundex or similar product. IT 197 In order to accurately disseminate historical data, the system should provide for storage of the code value at the time of record data entry for code-driven fields. IT 198 The system should facilitate full Boolean searching, including phonetic indices where appropriate. IT 199 If the system depends on a relational storage engine, it should comply with the ANSI 1989 standards for SQL. (i.e. support transaction logging with commit, rollback, and roll forward facilities for restores, referential integrity, table driven coding structures, etc) IT 200 The system should permit Business Intelligence and Auditing systems access to the transactional data, with the minimum latency possible. Not Available Custom Dev. Future Rel. Database Current/Configur. Req. ID Current/Configur. Future Rel. Custom Dev. Not Available Future Rel. Custom Dev. Not Available IT 201 Database Current/Configur. Req. ID The Offeror should make provision a procedure that at no additional cost all data can be exported upon termination of contract with full referential integrity. Data Backup and Recovery IT 202 All database systems should have audit log files that capture before and after images. IT 203 All databases should have point-in-time recovery capabilities. This means that upon any failure, the database can be recovered to the last point of consistent state. Req. ID Auditing and Reporting Audits and Logging IT 204 All access activities – including user, date, time, resources (Web pages, services, etc.) accessed – should be logged. IT 205 The administrator should have ability to specify levels of logging. IT 206 All user activities should be logged and reportable. Activities include but not limited to the creation, modification, deletion, void, and viewing of records in the database. The log should include but not limited to user identification, date, time, resources (Web pages, services, etc.) accessed, fields modified, and supervisor approval. IT 207 The system should support canned and ad hoc reporting capabilities against the security logs. IT 208 The system should support data mining reports providing trend/threat analysis to identity information security vulnerabilities. IT 209 The system should allow for system-generated alerts, on security violations IT 210 The system should enable, where needed, segregation of duties for any transaction requiring manager approval, to ensure an individual cannot initiate and approve a transaction or change. IT 211 Together with configuration management, there should be a complete audit trail tracing all application changes. The audit trail should include date/time, developer, and descriptions. IT 212 The system should provide the ability to generate an activity log report for a given customer that identifies the customer transactions per the inquiry parameters. IT 213 The system should track each transaction using a unique number. IT 214 The system should be able to change the application status to “in progress” when a title examiner begins to work on the transaction. IT 215 The system should be able to put a hold status on an application (title, registration, credential) when an applicant is not able to supply all of the required documentation and the operator retains the documentation supplied. IT 216 The system should allow an operator to stop any customer transaction without completing it and save the information for a “user” maintained configuration table period. IT 217 The system should archive non-complete transactions after the “user” maintained configuration table period has elapsed. Not Available Custom Dev. Future Rel. Auditing and Reporting Current/Configur. Req. ID IT 221 The system must be capable of interfacing with National Criminal Information Center (NCIC). IT 222 The system must be capable of interfacing with the International Justice & Public Safety Network (Nlets) IT 223 The system should meet all requirements set forth in the (Commercial Driver’s License Information System (CDLIS) and Problem Driver Pointer System (PDPS) State Procedures Manual. IT 224 The system should be able to interface with CDLIS, and PDPS and Drivers (when available) to facilitate the exchange of information with other states and countries. Not Available IT 220 The system should support and implement interfaces with the systems listed in Table 3 – Current DLS and CSTARS Interfaces, located at the end of this appendix. Not Available A data map should be created, identifying “from” and “to” data elements, with corresponding descriptions and data types. Custom Dev. IT 219 Custom Dev. General Future Rel. Req. ID Future Rel. IT 218 The system shall have email capability to support workflowtriggered correspondence to individuals and/or groups, with both content and attachments derived from system data. For example, an email addressing a customer with a salutation that includes the user’s full legal name and including an attachment that includes vehicle registration information for a vehicle the recipient owns should be possible. Current/Configur. Messaging Current/Configur. Req. ID IT 226 The system should support the NIEM XML data model and AAMVA XML data model. IT 227 The system should be able to query/exchange data in the NIEM reference model format. IT 228 The system should support electronic data access to third-party systems for query/exchange (e.g., Web services, ODBC, data warehouse/flat file, API, FTP, SFTP). IT 229 The system should explain the approach to service oriented architecture. IT 230 The system should support authentication of an electronic report/interface data source. IT 231 The system should have the ability to search multiple external systems and/or databases via a single query. IT 232 The system should have the ability to receive and respond to queries from authorized external systems and/or databases. IT 233 The system should provide the ability to apply edits and reject incomplete or inaccurate records from the data sources providing compliance data. IT 234 Archived images should be able to be retrieved within five seconds. IT 235 Archived data should be verified before being purged from online storage. IT 236 There should be automated procedures in place to perform archival activities. Archival procedures should be based upon predetermined rules specified by the State or Department. IT 237 The archived information and document should be organized so that they can be accessed and retrieved efficiently & effectively. Not Available The system should be capable of interfacing with the CO DOR storage solution [e.g., storage area network (SAN) and/or network-attached storage (NAS)]. Custom Dev. IT 225 Future Rel. General Current/Configur. Req. ID IT 238 The system should allow authorized users to override DMV’s archival schedule. When an override is put in place the user will be required to identify a reason for it and the system will create an override notification. IT 239 The system should prioritize image availability based on a retention policy to be provided, at a minimum resolution to be similarly specified for each case. All images are to be stored in an industry-standard format (TIFF, PNG, JPEG, PDF, etc.) IT 240 The system should work effectively with form templates, spreadsheets and word processor documents. IT 241 The system should be capable of capturing data from an image all components of an ID/Driver’s License Card and/or DMV form, including AAMVA-compliant machine readable barcodes, QR codes and related content. Barcodes should be stored as decoded and imaged. IT 242 The offeror should provide remote customer support through telephone, email, and the web (including 3rd party components). Details of the support should be provided with the proposal. IT 243 The offeror should develop the system utilizing IT best practices, be tested, and free of bugs at time of delivery. Any bugs detected after delivery should be fixed at vendor cost up to 90 days from delivery and should meet security best practices. Any vulnerability identified after delivery will be fixed at the vendor cost. IT 244 The offeror should clearly identify responsibilities, costs and entitlements related to minor and major upgrades, hotfixes and patches. Not Available Custom Dev. Future Rel. General Current/Configur. Req. ID Current/Configur. Future Rel. Custom Dev. Not Available Future Rel. Custom Dev. Not Available Standards Current/Configur. Req. ID Standards IT 245 The system shall comply with current CO DOR and State of Colorado technology standards and policies throughout the term of the contract. IT 246 The system should be compliant with all AAMVA standards and policies. IT 247 The system should meet delivery and transmittal requirements for NCIC and Nlets current standards. IT 248 The system should use standard NCIC codes and descriptors. IT 249 The system should comply with current NIEM standards. Req. ID System Implementation Application Development IT 250 All DMV requirements should be documented and captured using a common requirements development tool. IT 251 Use Cases should be developed as part of the requirements process. IT 252 There should be a standard process for change tracking, defect management, and issue monitoring. IT 253 There should be a standard process for configuration management, version control, and release management. PM 1 The project shall be managed in compliance with HB12-1288 and CO DOR Project Management Policy. PM 2 The Offeror shall propose a project team composed of the bestqualified staff for this project. Key Personnel are those responsible for the management, planning, design, testing, implementation, installation, system integration, security, and ongoing maintenance of the System and processes PM 3 At a minimum, five (5) Key Personnel positions shall be fulfilled by the Offeror: Project Manager, Business Operations Manager, Technical Lead, Implementation Manager, Project Management Assistant. PM 4 The Offeror shall specify the name of each person designated as Key Personnel PM 5 The Offeror shall demonstrate through resumes and references that each proposed Key Personnel possesses experience in the general areas of responsibility listed for that position PM 6 Key Personnel shall work onsite in CO as determined by CO DOR & OIT from the start of the project and continuing through the implementation of the System PM 7 Any work that is to be performed offsite (not at a CO DOR location) is subject to prior written approval by CO DOR & OIT PMOs PM 8 Offeror’s personnel will be assigned to work during standard business hours. PM 9 Travel costs for Offeror employees shall be paid for by the Offeror for the term of the contract, including any extensions or renewals. These costs are not billable to the State. Not Available Custom Dev. Future Rel. Project Management Current/Configur. Req. ID PM 12 The Offeror Project Manager must be available for regular onsite meetings in Lakewood, CO from the start of the project until the State officially accepts the Offeror’s System Not Available PM 11 The Offeror Project Manager is responsible for managing and coordinating all Offeror resources, including any subcontractor resources assigned to the contract, and ensuring that all tasks are executed in compliance with the agreed upon schedules and State requirements. Custom Dev. PM 10 The Offeror shall designate and provide a Project Management Institute (PMI) certified Project Manager Professional (PMP). The Offeror’s PM shall have responsibility for all aspects of the project. The Offeror’s Project Manager is responsible for the day-to-day management of the project, including overall performance and contract compliance, and is the Offeror’s onsite representative making decisions on behalf of the Offeror. Future Rel. Project Management Current/Configur. Req. ID Not Available Custom Dev. PM 13 The duties of the Offeror Project Manager must include, but are not limited to the following: Works closely with CO DOR and OIT Project managers on a daily basis. Directs the Offeror’s deliverables of the project with responsibility for project performance from initiation to closure, including planning, organizing, managing, and controlling all aspects of the project, and that project tasks are performed according to the approved project schedule and project plan. Initiates and maintains project documentation to ensure that project documentation is up-to-date, organized and readily accessible by appropriate Offeror, OIT, and CO DOR staff through secure electronic means. Communicates with CO DOR and OIT project managers regularly regarding project progress and activities and ensures adequate communication between members of the Offeror, OIT and CO DOR implementation team. Promptly consults with CO DOR and OIT project managers if project plan deviations occur, and documents all such plan deviations in accordance with mutually agreed upon change control procedures. Identifies potential problem areas, recommends solutions, and works closely and cooperatively with CO DOR and OIT project managers to resolve issues timely and fairly. Identifies and provides CO DOR and OIT project managers with timely written notice of all issues that may threaten the implementation, operation or performance of the System. Maintains a log of all defects, incomplete requirements or unresolved issues that may occur over the course of the project, including date and manner of resolution. − A current soft copy of such log shall be made available to CO DOR and OIT project managers at all times Provides consultation and advice to CO DOR and OIT project managers on matters related to project implementation strategies, key decisions and approaches, and project operational concerns/issues. Facilitates review meetings and conferences between CO DOR, OIT, and the Offeror’s team when requested by CO DOR and OIT. Future Rel. Project Management Current/Configur. Req. ID PM 14 Offeror is responsible for performance and deliverables of all subcontractors to the Offeror. PM 15 The Offeror Technical Lead is responsible for developing and documenting the System Architecture, Security, and Integration Plan for all the components relating to the proposed system PM 16 The Offeror Technical Lead shall be available for regular onsite meetings in Lakewood from the start of the project until CO DOR officially accepts the Offeror’s System PM 17 The Offeror shall provide an Implementation Manager with experience managing similar large-scale software/hardware implementations PM 18 The Offeror Implementation Manager shall be available to work on-site in Lakewood, CO during System implementation PM 19 Key Personnel assigned to the contract shall not be reassigned unless agreed to by CO DOR. The Offeror shall notify CO DOR of the identity of a departing Key Personnel as soon as the Offeror receives notice of the departure, and of the identity of the individual the Offeror intends to occupy the position. CO DOR shall have the final approval or disapproval of any key individual(s) the Offeror intends to perform services pursuant to the Contract. Such approval shall not be unreasonably withheld or delayed. In the event that the State denies access to, or requests removal of specific Offeror personnel, the Offeror shall provide acceptable replacement with no impact to the Contract PM 20 The Offeror shall commit to the level of service outlined in its proposal. The Offeror shall ensure that the same level of service (number and experience of people and hours) committed to in its proposal be maintained throughout the term of this Contract, including extensions Not Available Custom Dev. Future Rel. Project Management Current/Configur. Req. ID PM 23 The Offeror Project Manager will be expected to be involved in every detail of the project from start to finish. High level oversight will not be acceptable PM 24 The Offeror Project Manager should expect to follow project phases from project initiation through acceptance, including requirements gathering and analysis. The Offeror Project Manager should be prepared and capable of facilitating requirements gathering meetings with CO DOR and OIT staff PM 25 The Offeror Project Manager needs to be involved in the technical details of the design, development, and testing phases of the project, and should not expect the Offeror Technical Lead to fully manage those activities PM 26 This project will have Independent Verification and Validation (IV&V) oversight. OIT will bring in an IV&V Offeror at different times during the project. The Offeror shall cooperate with the IV&V Offeror. If the IV&V Offeror discovers a project risk during inspection that could impede project success, the detail of these findings shall be documented and the Offeror and/or OIT and/or CO DOR shall submit a mitigation plan within five (5) business days upon receipt of the IV&V findings document. The mitigation plan shall include the steps that will be taken and the time needed to mitigate the problem Not Available PM 22 Inadequate staffing and performance may be reflected in liquidated damages and other remedies available to the State. The State will provide formal notice of inadequacy and will determine whether a cure period is reasonable prior to initiating any actions against the Offeror Custom Dev. PM 21 The State will conduct periodic reviews with the Offeror regarding the adequacy of Offeror staff skills, service practices, and headcount. The Offeror is obliged to provide quality service and failure to do so shall be reflected in additions and improvements Future Rel. Project Management Current/Configur. Req. ID PM 28 The WBS shall be a living document that shall be kept up to date with tasks completed, modified, or added through the life of the project PM 29 The WBS will be used as a measurement of progress PM 30 Project milestones shall be established and documented in the WBS and mutually agreed upon by the Offeror, CO DOR, and OIT at the beginning of the project so progress can be tracked and managed PM 31 The Offeror Project Manager shall manage their work by establishing and maintaining communications with all groups related to the project. The activities of the Offeror’s project team shall be directed, coordinated and communicated with CO DOR and OIT project managers to ensure that the project progresses per the project schedule and is completed on time PM 32 The Offeror Project Manager shall develop a communications plan that outlines how project communications will be disseminated amongst key project team members with CO DOR and OIT project managers on a daily basis for resolution of issues, decisions, and of project status PM 33 Offeror’s Project Manager shall facilitate weekly Offeror’s project status meeting to ensure measurable progress is being achieved and the Offeror’s project team is following the agreed upon work plan PM 34 Additional meetings may be scheduled as required by CO DOR and OIT project managers or the Offeror. The Offeror Project Manager and Offeror personnel shall be available to provide information, reports, or audits as required by CO DOR and OIT project managers Not Available The WBS shall be as detailed as possible with the understanding that it will be revised during the planning and initiation phase of the project Custom Dev. PM 27 Future Rel. Project Management Current/Configur. Req. ID PM 35 The following deliverables from the Offeror Project Manager are required prior to the weekly status meetings PM 36 Updated WBS indicating progress for each task PM 37 Identify and report the status of all tasks that have fallen behind schedule, the reason for the delay, the projected completion date and project impact PM 38 Identify and summarize all risks and issues identified by the Offeror, which may affect the project PM 39 For each risk and issue, identify the action and person(s) responsible for mitigating the risk and resolving the issue, and the time required to implement avoidance and/or mitigation actions. PM 40 For each risk and issue identified, state the impact to the project schedule Change Control PM 41 The Offeror shall develop, implement, and maintain a project change management plan, subject to CO DOR and OIT approval, in accordance with industry standards that sets forth the procedures for controlling changes to project scope, cost, schedule, and quality requirements PM 42 The change management plan shall include the procedures and entities involved with requesting, evaluating and approving changes to the project deliverables and shall be coordinated through CO DOR’s change management process. PM 43 During implementation, OIT’s change management process shall be used to notify CO DOR users of changes to the production environment PM 44 All changes shall be documented. Approval shall be obtained prior to any work on changes. Documented changes shall have official sign-off by both CO DOR, OIT and Offeror project managers, and shall include the reason for the change Not Available Custom Dev. Future Rel. Project Management Current/Configur. Req. ID PM 45 All change orders that require additional funds shall be memorialized through a mechanism available in the contract prior to any work being performed PM 46 Change orders that do not require additional funds may still require a modification to the contract as determined by the State PM 47 At any point during the term of the contract, including any extensions or renewals, the Offeror may choose to bring in third party resources, which could mean subofferors, contractual employees, consultants, or any other person who is not a full time employee of the Offeror (hereinafter referred to as Subofferor). The Offeror shall notify DOR for pre-approval of the use of a Subofferor. The Subofferor shall be required to meet all contractual requirements Not Available Custom Dev. Future Rel. Project Management Current/Configur. Req. ID