RFI CMMS - Business Services

REQUEST FOR INFORNATION:
COMPUTERIZED MAINTENANCE MANAGEMENT SYSTEM
PROPOSAL INTENT and GENERAL DESCRIPTION
The Maricopa Community College District invites interested software vendors to submit a
proposal to provide a Computerized Maintenance Management System (CMMS) for a number of
the District’s colleges. The system will be web-based (SaaS- “software as a service”), hosted
and fully supported by the vendor.
This Request for Information (RFI) is specifically intended for software firms with an
established CMMS, along with the necessary experience and personnel to provide and
implement a complete system. The District is particularly interested in an affordable “off-theshelf” product that requires no or minimal customization by the Vendor. Desired features not
present in the basic CMMS system should be available by adding optional standard modules to
the basic system.
The services to be provided by the system vendor include software, licensing, implementation,
training and support services. The District’s goals for the implementation of a CMMS include:
• Accurately capture the condition and performance of existing assets, and the resources
required to maintain and renew them
• Streamline preventive maintenance and proactive asset renewal programs
• Improve life cycle cost tracking
• Implement an electronic work order management system to log labor, material, and
equipment costs related to maintenance as well as non-maintenance projects
• Ensure long-term reliability of asset data storage and retrieval, including associated
documentation such as standard operating procedures and O&M manuals
• Improve recording and assessment of failures and incidents
• Provide an information base related to maintenance and operations work, such as
recommended preventive maintenance processes, material SDS sheets for common
chemicals and substances used by facility maintenance trades, etc.
Base functionality to be provided by the new CMMS includes:
• generating work orders and both standard and customized reports
• tracking detailed maintenance, operations, and financial information for each asset
• attaching documentation such as photos, standard operating and maintenance procedures,
and O&M manuals to asset records
• tracking preventive maintenance work orders and remaining useful life and life cycle
costs based on operator-entered parameters
Eight of the District’s ten colleges currently use a system developed by Facilligence that now is
owned and hosted by MicroMain. The Facilligence system is being discontinued and users will
be transitioned to a MicroMain system. A number of the colleges have expressed an interest in
evaluating and potentially switching to another system.
1
While this is a single, information gathering Request for Information, EACH college
individually will review and evaluate the responses and EACH college may select its own
system from among the submitted systems. There is no predetermination that more than one
college may select the same system, so information should be submitted on the assumption that
each college selects a different system. The following colleges in the Maricopa Community
College District have expressed an interest in switching to another system (the numbers shown in
parenthesis are the college’s gross square feet of building area, current student headcount
enrollment for fall semester, and total number of faculty + staff):
•
•
•
•
•
•
•
Gateway Community College, including the Maricopa Skill Center
(532,700 GSF/ 5,950 students/ 325 employees)
Glendale Community College, including Glendale Community College North
(809,900 GSF/ 20,500 students/ 630 employees)
Mesa Community College, including Mesa Community Vendor at Red Mountain and
Mesa Community College Downtown Center
(1,019,300 GSF/ 22,700 students/ 712 employees)
Paradise Valley Community College, including Paradise Valley Community College at
Black Mountain
(440,200 GSF/ 8,900 students/ 240 employees)
Phoenix College, including multiple smaller sites
(753,600 GSF/ 12,100 students/ 389 employees)
Rio Salado College, including multiple smaller sites throughout the Phoenix area
(465,500 GSF/ 20,200 students, most in distance learning/ 486 employees)
South Mountain Community College, including the Guadalupe Center
(302,000 GSF/ 4,300 students/ 193 employees)
Once a system evaluation and preliminary vendor selection is made, the college will provide
additional information required for final pricing of the selected system to be negotiated with the
preferred vendor(s). For the system cost and seat licensing calculations requested below, assume
that any person with access to the college’s website can enter a work order request. Only college
facilities maintenance staff will be daily users of the system.
Unless otherwise stated, all contracts are for a period of three (3) years with an option to renew
annually for two additional one (1) year periods if mutually agreed to by the college and the
awarded vendor, for a total initial agreement period of five years.
The Maricopa County Community College District (MCCCD) consists of ten campuses, two
skills training centers, and multiple satellite education centers throughout the County. MCCCD
educates and trains more than 250,000 persons year around, which equates to about 76,000 full
time student equivalent (FTSE). Maricopa owned facilities exceed 5,500,000 square feet.
MCCCD ranks as the largest multi-location community college system in the nation, and is the
largest provider of post-secondary education in Arizona. Our students, faculty and staffs are
diverse and reflect the communities within Maricopa County, an area the size of Connecticut, and
which contains a population of 2.8 million residents.
2
Protection of Sensitive Information
The District takes important steps to protect Sensitive Information by treating Sensitive
Information as confidential and encouraging its personnel and consultants to take care in handling
Sensitive Information. Personally identifiable information, personally identifiable education
records, individually identifiable health information, personally identifiable financial information
and payment card information are examples of Sensitive Information covered under the Arizona
Revised Statutes (ARS), The District limits access to Sensitive Information to those who need it to
perform their jobs. Access may be achieved through direct physical connection into the Owner’s
technology infrastructure and/or equipment through cabling and/or other direct physical
connection, Personal Devices, and/or other Owner owned or operated networks. Indirect access to
the Owner’s technology infrastructure, equipment and/or data through remote electronic access,
such as the Internet, unsecured/public WIFI networks provided by the Owner, or networks not
owned and/or operated by the Owner. The District’s external service providers must also protect
Sensitive Information, and use it only to meet The District’s business needs. The District also
takes steps to protect its computer systems from unauthorized access and works diligently to
comply with applicable information security, data privacy and related laws, rules and regulations.
Consultants, vendors or individuals that will require access to The District’s technology systems,
either through direct physical connection or indirect access, and consequently may have access to
Sensitive Information, will be required to undergo significant screening and reviews to assure the
security and privacy of The District’s systems and information. Contact the project manager for
additional information regarding the security screening process and additional requirements.
Where vendors or contractors have access or need Sensitive Data or access or use of the District’s
information technology network, see the Exhibit located at the end of this Request for more
specific requirements.
Proposal Due Date
Proposal responses should be received by 3:00 p.m.(local tme), May 13, 2015 and be delivered
to the reception desk in the District Support Services Office lobby at 2411 W. 14th St., Tempe,
Arizona, 85281. Please be sure to acknowledge any addenda and be sure to include the NonCollusion Affidavit with your response. For Fed Ex, UPS and similar direct delivery services,
address the package to Keith Killourie, Buyer, at this address, contract phone 480-731-8518.
General Questions or Project Location Visits
No pre-proposal meeting is planned for this Request.
All questions about this Request must be submitted in writing and delivered to MCCD’s assigned
representative a minimum of five (5) work days before the required due date. Answers to the
questions will be provided by written addenda to all holders of the Request.
For questions regarding this RFI:
Keith Killourie, Buyer III
Purchasing, 480-731-8518
[email protected]
3
Proposing firms shall not make any direct contact with college or district staff except for the
Purchasing Department once this Request is issued, until the time that final selection is made.
Any deviation from this policy, or attempt to or actual direct contact or attempt to influence
any Maricopa Community College Board member, college administration, employee or
representatives, from the time of the issue of this Request until final award, may result in
disqualification of the Respondent. This includes any casual contact not directly related ongoing work, in which case all conversation and contact should be strictly limited to the current
work issue alone. Any oral communications with MCCD’s assigned representative will be
considered unofficial and non-binding on MCCD.
4
VENDOR CONTRACT AND SIGNATURE FORM
Signature Form
The undersigned hereby proposes and agrees to furnish goods and/or services in strict
compliance with the terms, specifications and conditions at the final negotiated prices proposed.
The undersigned further certifies that he/she is an officer of the company and has authority to
negotiate and bind the company named below and has not prepared this bid in collusion with any
other vendor and that the contents of this proposal as to prices, terms or conditions of said bid
have not been communicated by the undersigned nor by any employee or agent to any person
engaged in this type of business prior to the official opening of this proposal.
Company name:
Address:
City/State/Zip:
Contact printed name:
Position with company:
Telephone Number:
Fax Number:
Email address:
Authorized signature: __________________________________________
5
COMPANY PROFILE
Please provide the following information about your company. The “company” is the entity that
owns, supplies, supports and maintains the proposed CMMS software.
1. Company's official registered name:
2. Parent organization or other company ownership, if any, including headquarters location:
3. Brief history of your company, including the year it was established. Include predecessor
companies under a different name or other CMMS companies purchased by your company:
4. Company’s primary corporate office location:
5. Location of any local or regional office servicing Arizona, if any.
6. List the names of key contacts with title, address, phone and e-mail address for the proposed
system:
7. Who do you consider your competition in the CMMS marketplace?
8. What differentiates your company from those competitors?
9. Overall annual CMMS system sales and public sector sales (EXCLUDING the Federal
Government) for the previous three years:
Calendar
year
2012
2013
2014
Total number of new
customers/new
systems installed
Total annual dollar volume
of CMMS sales
$
$
$
Total annual dollar value
of public sector sales
$
$
$
10. Provide information regarding if your firm, either presently or in the past, has been involved
in any bankruptcy, or reorganization or litigation directly related to the proposed CMMS
product:
11. Provide information on your company's Customer Service and Support Department (Help
Desk), including hours of operation, number of service centers, etc.:
12. Provide a list of any open purchasing agreements or cooperative purchasing agreements held
with any national purchasing group, network or any awards made through an open, competitive
process by any public entity within Arizona. For each agreement, provide the name of the agency
or group that originated and manages/managed the procurement request, an agreement or other
identifying number, date of the original award and contact information:
13. Provide a list of any other public, institutional or governmental users that are located in
Arizona. Provide the name of the entity, current contact information and initial date of
implementation for the system:
6
14. List vendor sponsored/vendor hosted support groups for the system, including chat groups,
blogs, Q&A, discussion groups, blogs, meetings (in person or on line) that provide a venue for
users to increase their skills and awareness of the system, meet other similar users, pose and
answer questions, distill best practices, etc.
FUNCTIONAL REQUIREMENTS
General Requirements
The vendor will need to demonstrate its ability to meet the college's needs by a thorough
presentation of the product and its capability related to the characteristics and performance areas
listed below. The form responses shall NOT indicate functionality that is not in the release
version adopted by a majority of the vendor's customers. Vendor shall provide future upgrades
that will keep the Vendor's CMMS current with evolving technologies.
Software shall be usable by employees with widely varying computer skills. The vendor shall
provide a system that is modular for cost effective implementation, expansion and upgrades.
Vendor shall provide an “out-of-the-box” system with maximum flexibility and minimal or no
customization required by the Vendor, preferably with all changes done by the college’s system
administrator through built-in configuration of existing software.
Vendor user and IT staff will have appropriate permissions for administration and configuration
changes and updates, as required.
The vendor hosting service must include full backup, disaster recovery and come with a
complete service level agreement proposal that includes software upgrades, support and
maintenance contracts.
PROPOSED SYSTEM
List the base CMMS system that is being proposed, including manufacturer, version and
standard options or modules that would be proposed, upon which the matrix responses are
premised:
Base System: ___________________________________________________________
Optional standard modules to be included with the base system to meet functionality
requirements:
______________________________________________________________________
______________________________________________________________________
Additional third party software needed to be able to view and operate the system, develop
or print reports, etc. that is not an integral part of the vendor’s basic system:
______________________________________________________________________
7
All third party software needed must be fully tested and operate integrally with the proposed
basic system. Third party software must be supplied with the vendor’s basic system, including
all licenses, integration, and cost. Available updates necessary to continue using the third party
software with the vendor’s system shall be provided through the vendor during normal system
updates.
Products and Services Summary Matrix
Fill in the system capabilities matrix to allow the college to evaluate the proposed product and
services offering versus other responding vendors.
Definitions
1.
Administrative: Provides system administration functions such as security, system-wide
defaults and the content of functions and forms.
2.
Work Order Management: Controls work order processes for routine response and periodic
preventive maintenance.
3.
Preventative Maintenance: Provides the functionality for users to establish preventative
maintenance practices to meet their unique environments.
4.
Materials and Parts Inventory Management: Streamlines parts and materials management by
monitoring inventory.
5.
Reports Generation: Reports are a key to any facility management system. This information
may either be generated from the individual modules, from a single Reports Module or a
combination
6.
Portable Wireless/Mobile Technology Management: Allows maintenance and operations
professionals to receive and complete work in the field via a wireless/mobile device.
7.
Asset Management: Identifies, tracks, locates and analyzes physical assets.
8.
Data Import and Conversion: Allows historic work orders and asset records to be imported
from the prior system into the new system
9.
Fleet Management and Key Management Modules: Tracks and manages vehicle fleets,
including maintenance. Tracks and manages keys and the locks that they serve.
10. System Documentation, Training and Support: Provides initial user training, general system
documentation and training materials, and on-going user support for system difficulties.
8
Specification Matrix
Using the following tables, identify whether the system capabilities, functions or characteristics are available within the proposed
CMMS system. Check the columns as appropriate to indicate how the proposed system would meet the specifications of this Request,
as follows:
Meets: Feature is standard and available in the current release of the basic software package. No upgrade, optional module or
customization is required.
Meets with optional upgrade: The listed feature is available in an upgraded version of the basic software package or through the
addition of a standard optional feature(s) module. Features requiring custom programming by the vendor are NOT a
desirable solution.
Does Not Meet: The feature is not available in either the basic software package, an upgraded system or an optional module.
Future Release: The requirement will be available in the next update release. Indicate anticipated release month and year in the
Comments column.
Administrative System and General System Characteristics
User Interface
The system shall be intuitive and easily usable by all levels of staff in the college’s maintenance group, with data entry and access
through easy navigation, field tabbing, and pull down menus. Navigation within the system shall be intuitive (drop down boxes) to
field personnel and in a logical sequence. System security shall allow for logins to appropriate modules and data entry points by
system administrator defined user or role. Data entry for the system should be able to pre-populate fields already present in the
database.
Data entry shall support several methods of input (i.e. keyboard, scan, PDA's, laptops, GPS device, etc.). Reports shall be relatively
easy to generate with an intuitive interactive generator as part of the software or third party report generators. The reports shall have
the ability to present information in a graphical chart format.
The system should have the ability to work with Microsoft Office applications for document creation and attachments to requests. The
system should allow attaching, storing and viewing of Adobe .PDF documents, pictures (JPG, TIF, PNG, and GIF formats) and
CAD/D drawings (.DWG format) to be attached and viewed.
9
Description
Meets
Meets
with
optional
upgrade
System is usable on a variety of common internet web
browsers including Firefox, Internet Explorer, Google
Chrome, Firefox and Safari, without the addition of third
party conversion/intermediary software
System allows power users with full access from single
log-in
System provides full application interface for administrators
and streamlined application, Web, or mobile device
interfaces for vendors, staff, and requesters
System has multi-level security and passwords. Users can
access part of all of system features depending on the type
of password and rights that they have been issued.
System allows only a supervisor or System Administrator
may approve or edit a history or change schedules.
System shows a user’s functional permission level
displayed
System provides help text and error messages
System permits multimedia file attachments (word files,
graphic images, audio or video clips) to records as work
orders
System is compatible with Microsoft Office applications
System can attach, store or view Adobe .PDF documents
System can attach, store or view pictures (JPG, JPEG, TIF,
PNG, PCX, BMP, GIF and Windows Metafile formats)
System can attach, store or view videos
System can attach scanned documents directly into the
system
CAD/D Viewer and Information Linking
System can read CAD/D drawings in multiple formats,
minimally AutoCAD 2014
System can attach, store or view CAD/D drawings (.DWG,
.BAK and other common CAD/D file formats)
System can read, convert, mark-up, save, and print CAD
drawings without using an outside CAD program
System can hot-link asset and equipment lists to drawings
10
Does
not
meet
Will
meet
with
future
release
Comments
System can view equipment information by clicking on a
CAD building., floor, room, equipment for drawing-based
queries
System can highlight a portion of a drawing, zoom in, and
print the selected view
Additional comments:
Work Order Management and Tracking System (Required)
A complete, automated system that identifies, confirms, tracks, records and costs all work requests is required. Further, the system
shall be able to provide statistics on response time, cost and effort by activity. The system shall be able to schedule the work orders
and be able to retrieve work orders for a specific time interval or asset type to aid supervisors to group and assign work orders. Users
shall be able to change the routing, review and approval steps, along with the final shop or individual assignment without custom
programming.
The system shall have the ability to create multiple work orders (multi-tasking) linked to individual assets. Technologies for
distributing work orders, such as e-mail, personal data assistant, mobile computer, IPad and other tablet computers are required. The
College requires having multiple time frame scheduling capability on at least an annual, quarterly, monthly, bi-weekly and weekly
basis for routine preventative maintenance and non-routine work. Ability to document work accomplished in a paperless environment
is required.
The system shall be able to automatically generate a receipt email (or other electronic notification) back to the service requester upon
initial receipt of the work order, any changes in status, and upon completion of the requested work.
The software shall include a complete tracking system to compile daily work done by activity and specific locations and assets with all
labor, equipment, material and contractor resources. Work history information can then be related to the annual plan and comparisons
made on unit cost, accomplishment and productivity. The software shall also have the capabilities to identify, trend and document
work by location or asset. Queries and filtering for information shall occur at various levels and shall allow searches using multiple
criteria in order to simplify data gathering. The software application shall be capable of operating at the maintenance activity level or
the work order level with integration between the levels.
11
Software shall be capable of the following:
1. The handling of service requests, planned maintenance, predicted maintenance and efforts generated by work orders.
2. The tracking of a service request from inception to completion with continual status (open, closed, pending, backlogged) indication
is necessary.
3. Work and cost can be tracked to the location, asset, job number and/or account/fund number.
4. Tracking and reporting force accounts and contractor furnished labor, equipment, material, and operating costs.
5. User-definable fields to record such information as special work projects and programs.
6. Ability to separate data planned and tracked by management/department units or by activity (sign maintenance, sewer line cleaning,
etc.).
Description
Meets
Meets
with
optional
upgrade
GENERAL SYSTEM CONTENT and ABILITY
Basic Work Order system is fully integrated with related
modules including preventative maintenance, asset,
inventory and reporting
System allows the System Administrator to easily
customize who may request a work order (for example, to
any student or staff with web access, down to limiting work
order initiation from college staff/faculty only, down to
maintenance staff only
System allows the System Administrator or department
supervisor to easily customize the internal routing and
internal approval of work orders
System allows the System Administrator or department
supervisor to easily customize approval levels or approving
parties that allow the work to continue
Provides a number of open user-definable tracking fields
without additional programming or customization
Provides simple interface to check work order status with
selection masks
Provides search capacity on work order number or
description key
12
Does
not
meet
Will
meet
with
future
release
Comments
Automatically generates notification back to the service
requester to acknowledge the initial request, for changes in
the request status, and upon completion of the work order
request
System allows the work requester data (name, email, phone
number, etc.) to be stored after the requester enters their
contact information on a work order. The requester
information then is stored on the vendor’s system and can
be auto-filled for any subsequent work orders requested by
the same requester.
System does not maintain work order requester contact data
(name, email, phone number, etc.) from work order to work
order
System allows work requester contact data either to be
stored or not be stored. The System Administrator can
determine and easily select which option that the system
will use without custom programming.
System allows employees or students to request work
orders from their Web browser
System allows administrators and maintenance staff to
receive, close, enter orders via the Web, email, or mobile
device anywhere that an internet connection is available
WORK ORDER MANAGEMENT AND WORK
ORDERING
Ability to show standard work order tracking fields such as
trade, purpose, budget and other codes
Ability to request dates and completion dates
Ability to estimate work by time and materials
Ability to automatically compute work costs using
manually entered labor rates in employee system
Ability to show initially estimated labor and material
transactions for each work order
Ability to capture actually used labor hours, contract costs
and material costs for each work order
Ability to track labor hours worked for a defined period of
time for individual employees to an aggregate total for a
group of employees
Ability to automatically generate cost estimate of work
13
order
Ability to add/update/delete estimated costs by crew
Ability to allow requesting departments to approve work
orders based on estimated costs
Ability to link multiple pieces of equipment to a work order
Ability to initiate a new work order by duplicating an
existing work order
Ability to assign work priority
Ability to define type of work
Ability to add/modify/delete basic data about a work order
after issuing the work order, such as the lead shop, job
location, full job description, completion information,
description of work done, requester, contact info, date work
is to be done, source of work, etc.
Ability to disallow entry of time and material costs against
a closed work order
Ability to reopen a closed work order
Ability to assign progress status code
Ability to support repetitive work order time slots
Ability to print work order to any printer on the network
Ability to print bar coded work order number on work order
ticket
Ability to assign tasks to multiple shops and employees
within a shop
Ability to set internal thresholds/benchmarks for
maintenance activities and issue notifications via e-mail
and/or reports when benchmarks exceeded, e.g. due dates
and work request response time
WORK ORDER MANAGEMENT AND TRACKING
Ability to support work order status reporting
Ability to show estimated and actual hours
Ability to support work order scheduling via priority and
first-in-first-out
Ability to track job status and resource coordination
Ability to schedule labor, material and other resource
allocations
Ability to provide lists by outstanding jobs by equipment,
asset class, location
14
Ability to report work order backlog
Ability to plan and schedule tasks within work orders
Ability to query by status and assigned crew
Ability to view or report on individual employee utilization
Ability to maintain equipment specifications and parts lists
Ability to track warranty date for claims tracking
Ability to support a maintenance procedure library
Ability to track work order/job history, with ability to query
in numerous ways for work orders (i.e., by number, date,
requestor, building, crew, craft)
Ability to track status of each shop assignment (in progress,
done, etc.)
Ability to view work order by shop and employee assigned
Ability to allow outside departments to enter work requests
on-line via web interface
Ability to automatically or manually archive work orders
based on aging after completion
Ability to recover data from archive
Ability to automatically send work completion notification
to requester
Ability for facilities personnel and requesting department to
interact on line, e.g. the requesting department to approve
an estimate or facilities personnel to request more
information
Ability to charge work to any cost center
Ability to handle standing work orders differently, e.g. not
requiring an estimate
Ability to track changes to the scope of the work order.
Provides electronic document management (e.g.
attachments such as PDF documents, Word documents, and
pictures)
Ability to trigger notification if actual costs exceed
estimated
Ability to retrieve work order costs by shop, crew, function,
sub function, sub-sub function, building, equipment, work
order, and change orders, et cetera.
WORK ORDER MANAGEMENT AND
ACCOUNTING
15
Ability to add/update work order actual labor and material
costs
Ability to create productivity reporting for all resources
(e.g. labor, equipment, materials)
Ability to link employees or crews to work orders for online time recording
Ability to capture, manage, accumulate, and report costs for
all material, labor, and other transactions
Ability to capture, manage, accumulate, and report costs by
labor type for each job
Ability to capture, manage, accumulate, and report costs by
campus zone, shop, crew, building, and equipment
Ability to report on job cycle time (i.e., time from initiation
to final bill)
Ability to provide actual vs. estimated cost comparison
Ability to report on job completion rate (open vs final billed
jobs for a time period)
Ability to report on actual vs. estimated costs
Ability to run historical reports on cost data
Ability to create historical cost and analysis and reporting
BUILDING AND EQUIPMENT INFORMATION
BASES
Ability to assign unique alphanumeric identifiers to
buildings, rooms, equipment, etc. and enter accompanying
data. Building identifiers include annex, wing, floor, and
room. Accompanying data for equipment includes
manufacturers notes, recommended.
Ability to support flexible naming and numbering of
buildings, floors, and rooms
Ability to provide for a building coordinator list with name,
phone, mailbox number and e-mail address
Ability to categorize buildings by a campus geographical
code
Ability to create/update inventory records for buildings,
rooms, systems, equipment, etc.
Ability to record equipment purchase data
Ability to record equipment maintenance materials cost and
usage history
16
Ability to generate equipment lists
Ability to maintain and use equipment status codes, e.g. in
service, lost, stolen, vandalized, etc.
Ability to maintain equipment repair cause history
Ability to track and record equipment downtime and cause.
Ability to maintain equipment drawings
Ability to maintain equipment specifications data.
Ability to maintain equipment repair procedure history
Ability to maintain equipment maintenance labor history.
Ability to track warranties on-line to vendor/manufacturer
Ability to activate/deactivate an existing inventory record
and all related data
Ability to store and manage meter types, including
description and unit of measure (e.g. water/cu. ft).
PERSONNEL TRACKING
Ability to enter and store a database of employees along
with position/title and labor rate information
Ability to restrict who can read and change employee data
Ability to add/modify/delete basic employment information
such as job class, budget number, shop and crew
designations plus spare future fields
Ability to use Personnel ID numbers other than SSN as the
primary employee identifier
Ability to maintain different classes of employees, e.g.
salaried, hourly, professional, and classified, etc.
Ability to charge multiple wage rates
Ability to designate employee as active or inactive
Ability to store and report on employee hours and overtime
Additional comments:
17
Preventative Maintenance for Facilities (Required, with some additional Desired and Optional features)
Preventive Management and Scheduling must be able to issue work orders through the system. The system shall allow for the
development of routine cyclical planning of maintenance work and shall give staff a guide to use in the scheduling and establishment
of routine programs to proactively perform maintenance.
Software shall have an automated scheduling process inclusive of all work to be accomplished in each time period. The ability to
review anticipated activities by any time period is desirable. The system shall be bar code enabled, allowing field personnel to access
preventive maintenance records by scanning a bar code or other unique identifier on the equipment.
Desired: The system will contain recommended preventive maintenance procedures for standard equipment types, including the
recommended schedule (by time frame or metered data), the estimated manpower hours and materials, and generate a step by step
preventive maintenance work order including the required parts (generic description, with the ability to modify the information to
provide specific part information) for the work order.
Optional: Users can enter information that identifies specific hours, alters the steps, and lists the required parts by manufacturer,
model, size, etc. for the specific piece of equipment.
Description
Meets
Meets
with
optional
upgrade
GENERAL SYSTEM RESOURCE CONTENT
The system contains standard recommended PMs for
different types of equipment and systems commonly
found in facilities
Built-in preventive maintenance Task library to
aid in defining preventive maintenance tasks and
procedures
System contains Material Safety Data Sheets (SDS) for
materials, substances and chemicals commonly found in
facility management and operations
System oversees and contains OSHA Safety Standards
such as lock out/tag out (for example, the system issues a
18
Does
not
meet
Will
meet
with
future
release
Comments
notification to do an annual review), extension cord
inspections: (for example, the system issues a monthly
reminder), fire pumps (for example, the system keeps
track of fire pump testing schedules and history), machine
guards (for example, the system issues reminders to check
safety switches), blood borne pathogens (for example, the
system provides exposure control and clean up
procedures)
CREATING
Ability to automatically generate preventive
maintenance work orders through an integration with
work order system
Ability to initiate PM work orders manually and
automatically
Ability to manually or automatically
generate preventive maintenance work orders
Ability to manually schedule PM work orders
Ability to create recurring maintenance schedules on a
daily, weekly, monthly or annual basis
Ability to store schedule templates for quick creation of
frequently used schedules
Ability for users to define inspection tasks, populate a
preventive maintenance calendar and set up automatic
reminders to technicians assigned to complete the tasks
Ability to support scheduling for intervals greater than
one year, e.g. 2, 5, 10 years, etc.
Ability to create a PM work order for an entire system of
equipment, etc. (for example, for multiple pieces of
equipment that work together as a single system)
Ability to manually associate a repair work order with a
PM
Ability to combine multiple maintenance items into one
PM work order
Ability to allow multiple work orders to be created by a
PM based upon user entered criteria
Ability to perform predictive maintenance analysis
Ability to assign an unlimited number of PM procedures
19
to a system or piece of equipment
Ability to document complex PM task descriptions
Ability to duplicate a PM
Ability to obtain maintenance procedures, required
materials and tools from an equipment module
Ability to maintain user-defined PM types
Ability to maintain shutdown information and coordinate
shutdowns using multiple work orders if necessary
Ability to list consumables needed for a PM
Ability to assign multiple crew to a PM work order
SCHEDULING
Ability to schedule preventive maintenance by
elapsed days
Ability to schedule preventive maintenance by
specific calendar date
Ability to schedule preventive maintenance by usage
data sources such as time based or meter/usage based
Ability to schedule preventive maintenance tasks for
downtime/outage
Ability to automatically assess PM schedule adherence
Ability to suppress automatic generation for a particular
PM for a time period
Ability to suppress automatic generation of all PMs
scheduled over a specific time period
Ability to suppress automatic generation of PM scheduled
for a specific piece of equipment or location over a
specific time period
Ability to perform maintenance requirement forecasting
Ability to manually sequence PMs
Ability to add, delete, update and duplicate a PM
schedule
Ability to create leveling of PM requests
Ability to provide reporting on equipment/location
confidence testing
NOTIFYING
Ability to notify a shop/crew via e-mail of a pending PM
Ability to provide shop/crew query screens of pending
20
PM
LINKING
Ability to link operating and maintenance manuals, and
OSHA guidelines to equipment records
Ability to maintain required procedure certification
information
CUSTOMIZING
Ability to customize a standard PM for different steps, for
particular pieces of equipment, for linking specific
materials or replacement parts for the recommended PM,
etc.
VIEWING
The system provides a maintenance calendar for viewing
current and future preventive maintenance activities
Ability to view labor, material and tool cost for
anticipated tasks
Ability to display upcoming scheduled work in a calendar
format for resource scheduling
TRACKING
Ability to track all scheduled maintenance
Ability to track equipment information including
manufacturer, model and serial numbers, in and out
service dates and warranty
Ability to automatically track preventive maintenance
cost accumulation
PRINTING OR ISSUING
Ability to automatically and manually print preventive
maintenance work orders
Ability to print multiple PM tasks on a single sheet
Additional comments:
21
Fleet Management and Key Management Modules (Optional)
Fleet Management System
In the future, the college may desire to add a standard software module to be capable of managing fleet operations including repair
work orders, preventative maintenance work orders, scheduling and tracking of all maintenance costs, repair costs and fuel costs.
Key Management System
In the future, the college may desire to add a standard software module to be capable of managing key issuing and management,
including the ability to track, monitor and manage keys including the ability to document key inventory, distribute keys, track key
distribution and key holders, and report on key information
Description
Meets
Meets
with
optional
upgrade
The system offers a standard module for fleet vehicle
management that includes features such as:
Ability to schedule maintenance by creating regular and
recurring preventive maintenance, and non-routine
(emergency) maintenance work orders
Ability to track vehicles and equipment by class,
category, and individual equipment serial number or
identifier
Ability to allow users to list all parts and materials needed
for individual preventive maintenance procedures
Ability to provide maintenance calendaring alerts to
protect against missing or falling behind on maintenance
schedule
Ability to provide a separate set of standard reports
related to vehicles
Ability to provide asset listing and performance metrics
such as costs per vehicle, location and type
Ability to automatically create scheduled preventive
maintenance work orders and work order timelines for
vehicles based upon vehicle or asset classes, etc.
22
Does
not
meet
Will
meet
with
future
release
Comments
Ability to list vendor services that contain information
about fleet repair standards, agreed-to pricing, discount
structures, warranties, work orders and invoicing.
Includes computerized fuel management system
Includes vehicle warranty and recall management
Includes vehicle parts inventory control and tracking
The system offers a standard module for key management
that includes features such as:
Ability to identify which keys each key holder has and
the doors they can open
Ability to track issuing keys to people
Ability to create key records or reports, and tracking lost
or damaged keys and related responsibility
Ability to track keys by department, function or other
user determined groupings
Ability to managing master keys, sub-master keys and
change keys
Ability to maintain key inventories and numbers of copies
Ability to log quantities of keys created, issued, lost, and
destroyed
Ability to record information about each key and its
specific bittings
Ability to track, sort and report bittings by manufacturer
and keyway
Ability to view bittings in a separate window or bitting
report
Ability to categorize keys by level, including master keys,
listing which assets are keyed alike (multiple locks
opened by same key) and which assets are cross-keyed
(single locks opened by multiple keys
Additional comments:
23
Asset Tracking System
The system shall be capable of defining all features maintained by a college in an asset inventory as collected or periodically modified
including site location, feature description, manufacturer and model, condition assessment, etc. The college would prefer to transfer its
current asset base to the new system (through separate per hour data transfer cost).
Description
Meets
Meets
with
optional
upgrade
Ability to provide built-in drop-down list of values for asset
classification
Ability for the System Administrator or authorized user to
set up pre-defined asset hierarchies
Ability to provide display of all assets, locations,
classifications
Ability to provide standard equipment asset information
templates
Ability to provide warranty tracking related to specific
assets
Ability to create graphical asset trees for simple
organization and tracking of assets
Ability to provide lifetime labor and material costs per
equipment, asset classification and location
Ability to track historic total of maintenance costs per asset
Ability to produce bar code labels and tie to the asset data
base
The system VENDOR has the ability to provide on-site
asset cataloging using vendor personnel to collect and
catalogue asset information through field surveys, with
direct input into a new system, including developing
naming conventions, ID systems, bar coding, etc.
ALSO SEE Buildings and Equipment Information
Databases in the Work Order section
Additional comments:
24
Does
not
meet
Will
meet
with
future
release
Comments
Material and Parts Inventory Management and Control (Desired)
The use of materials and parts in the work effort for both work orders and preplanned work shall be able to be tracked and accounted
for. The college desires that the inventory quantity be reduced as utilized from the current inventory with the capability to establish
reorder points as the inventory values are depleted. This shall allow for accountability for the use of materials and a more complete
costing of work done. The college requires the ability to not only track material and part usage, but a method to reduce or add to the
inventory based upon usage reported in the work order system.
Description
Meets
Meets
with
optional
upgrade
Ability to integrate with the work order and preventative
maintenance system
Ability to manage inventory items by category types such
mechanical, custodial and tools
Ability to track inventory transactions, including issues,
receipts, returns, adjustments, orders and transfers
Ability to issue inventory to a location, pick list, project,
work order or employee
Ability to allow a requestor to select items from inventory
catalogs and submit inventory requests online
Ability to enables users to request quotes for inventory
items from multiple suppliers while reordering
Ability to track detailed information on inventory items,
including characteristics such as unit of issue, whether on
contract, supplier, average or fixed cost, tag number for
tools, mark up, backorder quantity, etc.
Ability to allow inventory items to be stored and tracked by
location such as by aisle, bin number and reorder points
Ability to automatically email requestors with inventory
requests receipts and updates of order status changes
Ability to create pick lists
Ability to track stock as assets (spares)
Ability to automatically generate a stores work order "pick
list"
Ability to check on availability of parts in inventory
Ability to maintain a "where-used" parts inventory
25
Does
not
meet
Will
meet
with
future
release
Comments
Ability to trigger reorder on minimum quantity
Ability to track goods delivered and accounted for
Ability to add/modify/delete material reservations
Ability to allocate service contract and blanket purchase
costs to specific accounts
Ability to support a minimum of 17 character commodity
code
Ability to track blanket purchase expenditures
Ability to produce pick lists for scheduled maintenance
work orders
Ability to record usage against equipment and work order
in history
Ability to track hazardous/environmental materials
Ability to print inventory count sheets for conducting
physical counts
Ability to adjust on-demand, including assigned and
available quantities at time of issue
Ability to renumber stock and transfer history
Ability to add/modify/delete multiple stockrooms including
location, stockroom number and type
Ability to allow bar code entry of physical counts, issues,
receipts, returns and adjustments
Ability to allow inquiry into stock transaction history back
at least two years
Ability to allow multiple stockrooms to use the same item
stock number
Ability to automatically update inventory by materials
issues and receipts
Ability to transfer stock between stockrooms
Ability to track critical spares
Ability to generate variance reports after physical counts
Ability to maintain vendor history, including data on past
purchases
Ability to schedule physical counts/enter count corrections.
Ability to return unused material from jobs
Ability to provide monthly totals for quantity and value of
issues and receipts by stockroom
Ability to produce report of stock and regularly used onstock items for each stockroom, sorted by various means,
26
such as description, location, or class
Ability to maintain list of shops that use each stock item
Ability to allow vendors of the same stock item to have
different purchase quantities
Ability to maintain conversion factor for pricing stock from
purchased quantities to unit of issue
Ability to support physical counts using bar code
technology
Ability to manually enter, list and track often used suppliers
and vendors (internally to the CMMS, not requiring a tie-in
to another institutional data base)
Additional comments:
Report Generation (Required)
The software, or through a third party report generator provided with the vendor’s software, shall have the capability of using standard
reports or creating custom reports by the user without the need for additional vendor support. Report generation shall be
straightforward and easy to request. The reporting module shall provide the user with the ability to query options from multiple
database tables without the user needing to have scripting knowledge. Reports shall be able to be saved for future use/re-use.
The reporting module shall allow the user to specify selection criteria through either a conditional menu approach or a “drag and drop”
approach. A condition window shall allow for selection conditions such as equal to, greater than, less than, greater than or equal to,
less than or equal to, not equal to, is null, is not null, is like (pattern matched or wild card searches) and is not like.
The reporting generator shall offer the ability to provide column options including the ability to change column title, width or
attribute.
27
The system should allow for users to customize the look and feel including adding a college logo. Reports must allow for a preview
prior to printing, so the user has an opportunity to verify the data and format expected. Report data should be able to be downloaded to
an MS Excel worksheet and xml file. Management Reports must be secured to privileged users only.
If report writing software external to the vendor's software is furnished, the name and version of the report writer software shall be
stated and a licensed copy of the report writer software shall be furnished with the software, along with all future updates to either the
report writer software or CMMS software to ensure compatibility.
Description
Meets
Meets
with
optional
upgrade
System includes standard, commonly used preloaded reports (PLEASE INDICATE IN THE
COMMENT COLUMN THE NUMBER OF PRELOADED REPORTS THAT COME WITH THE
SYSTEM’S REPORT WRITER)
System report generator includes a report builder
allows users to easily create custom reports and
modify standard reports. (New or existing reports
can be modified through simple “drag and drop” or
other intuitive processes)
System requires third party add on report writer and
generator software. This software has been thoroughly
tested for compatibility and function with the vendor’s
system.
Report output options include dashboards, graphs and
tabular reports in HTML, PDF, .CSV, Excel format, in
either text or graphical format
Ability to provide searches for reports by defining the
criteria in a specified field or fields and the system returning
the resulting information.
Ability for reports to be auto-generated and
emailed on a pre-set schedule
Ability to provide "Read Only" and "Private" report
security options
System reporting includes both standard
and customizable key performance indicators
Does
not
meet
Will
meet
with
future
release
Comments
Number of pre-loaded reports provided:
28
(KPIs)
Ability to provide dashboard type reporting
Ability for dashboards to be customized for
individual users
Ability for custom report formats or data selections
to be saved for future reports
Ability to create summary or detailed reports by:
Craft
Location
Budget
Employee
Craft cost analysis
Transactions
Outstanding work
Workloads and assignments
Status of work
Ability to create summary or detailed Standard Inventory
reports by:
Issued inventory
Returned inventory
Transferred inventory
Supplier reports
Pick list reports
Ability to create summary or detailed Standard Preventative
Maintenance reports by:
Projected parts and supplies reports
Estimated PM labor reports
Forecasting labor report
Corrective vs. preventative maintenance report
Ability to create summary or detailed Standard Facility
Scheduling reports by:
Location
Organization
Schedules
Budget
Invoices
Reminders
29
Additional comments:
System Use Via Portable Wireless/Mobile Technology (Required)
The system shall allow the effective use of data recording and retrieval by portable/handheld devices used in the field such as PDAs,
cellphones, laptop computers and/or Tablet PCs, including the use of bar coding, web interfacing, e-mail capabilities, electronic data
collection and/or pager. Direct data transfer to the application (sync) is desired for system information gathering and updates.
Description
Meets
Meets
with
optional
upgrade
System is fully functioning, viewable and usable on an IOS
or Android based tablet PC, IPad, etc.
System is fully functioning, viewable and usable on an IOS
or Android based wireless/mobile device (IPhone, Android,
Blackberry and Windows based phones or smart phones)
Ability for mobile administrators to enter new work orders
via the web using a mobile device
Ability for mobile workers to receive, process and complete
a work order via an IOS, Android, Blackberry or Windows
based wireless/mobile device
Ability for mobile workers to search and sort through their
work orders
Ability for mobile workers to record transactions for labor
hours at the location of their work
Ability for mobile workers to retrieve, view, receive and
manipulate the views of .pdf, jpeg, .gif, .dwg, etc.
documents that may be related to an assigned work order
Ability for system to read bar codes located at assets when
a mobile device is bar code reader enabled
Additional comments:
30
Does
not
meet
Will
meet
with
future
release
Comments
Data Import and Conversion
The vendor selecting your system will be transitioning from another vendor’s system and would <>>><<Proposer shall be responsible
for the following setup and data import tasks:
Description
Meets
Meets
with
optional
upgrade
Does
not
meet
Will
meet
with
future
release
Comments
Ability to convert and transfer the college’s existing work
order history and data base into the new system. (In
Additional comments, state the format required for the
existing work order history database output in order to
convert and transfer the information into the new system.)
Ability to convert and transfer the college’s existing asset
data base into the new system, including attaching precollected photos and documents to asset records. (In
Additional comments, state the format required for the
existing asset data base output in order to convert and
transfer the information into the new system.)
Additional comments:
System Documentation, Training and Support (REQUIRED)
Training will be a very important element in the system implementation and long-term success of the system. As part of this initial
Request for Information, the vendor must provide a generalized training plan for the proposed system- the final plan will be developed
as part of final contract negotiation. The plan should include user group levels, course duration, description of course, and any course
prerequisites. Depending upon the number of colleges selecting the same system, the number of people to be trained and the user’s
preference, training may be done in person or by on-line live web conference training at the college’s sole option. Please provide an
outline of both in-person and on-line training options.
31
At the time of the initial system installation, vendor shall include a DVD/CD or printed materials that are furnished with the system
including a user’s guide, Administrator's guide, help documentation, and other system documentation that will allow college staff to
use, support and administer the system.
Two rounds of direct training by the vendor will be requested: one initial training session to allow personnel to use and manage the
system, and a second training session 6 to 12 months completion of initial training. Additional separate training will be required for
the designated college system administrator to provide more detail regarding administration functions required for system security, set
up, modifications, etc.
Levels of training and system understanding include:
•
•
•
•
•
•
Casual User: Staff who will have the ability to initiate or check the status of a work request.
Routine User: Staff who will have the ability to complete a work order after the crew has completed their work.
Heavy User: Maintenance and Operations staff who will create work orders, schedule work orders, create PMs, maintain the
parts, create reports and generally will have the ability to use the whole system based on their security clearance.
Ad Hoc Report Creator: Staff with the ability to create reports for other user of the system or themselves.
Management: Staff with the ability to view the system components directly affecting their department.
System Administrator: Staff will have full system access and be responsible for the daily operation of the CMMS. They will
have special tasks such as setting the staff security levels and in some cases entering new information into the user defined
drop down windows.
Description
Meets
Meets
with
optional
upgrade
Ability to provide in-person training in Phoenix
Ability to provide live web conference/web based training
Ability to provide pre-recorded/on-line/on demand help
topics, training and retraining
Ability to provide dedicated phone, live chat and e-mail
support for training questions
Ability to provide hard copy and electronic training
material and user manuals for new users.
Ability to structure new user training such that employees
can learn system functionality in two days or less of
32
Does
not
meet
Will
meet
with
future
release
Comments
training
Ability to provide an online help feature
Ability to provides dedicated phone, live chat and e-mail
support for help desk and user difficulties
Ability to provide phone, live chat or other live support for
help desk and user difficulties is available from 6:30 am to
6:30 pm Mountain Standard Time, Monday through Friday
Ability to provide vendor hosted active, on-line, open or
moderated user discussion groups for the proposed product
Additional comments:
33
SYSTEM IMPLEMENTATION INFORMATION
The vendor will identify a project manager and other key individuals in the vendor’s
organization who will be working with the college’s Maintenance and Operations staff during
implementation and training. Brief resumes of all identified key project personnel will be
submitted with the vendor’s final Proposal.
For this initial proposal response, provide an outlined typical project implementation schedule
including milestones, meetings, major tasks, and durations for a typical installation, starting with
the issue of a purchase order to the vendor. Include typical tasks that the vendor expects the
college to perform. A final project implementation plan will be mutually agreed between the
successful vendor and the college prior to issuing the purchase order for the system.
The vendor will certify in writing to the college when the system is fully functional and fully set
up to meet the college’s specific needs and is ready for testing. Unless the college sends the
vendor written notification within 90 days of completion of system testing that the product(s) do
not operate in accordance with the functionality documented in the vendor’s final proposal and
presentation by the vendor, the system will be deemed to be accepted.
If the college determines that the system does not perform substantially in accordance with the
criteria as set forth in this document, additional documentation and final offer, the college will
notify the vendor in writing of the specific discrepancies. If these discrepancies are not resolved
in 45 days to the college’s satisfaction, the college has the option of terminating the purchase
order and receiving a total refund for all monies spent with the vendor.
LICENSES, MAINTENANCE and TECHNICAL SUPPORT INFORMATION
Licensing
Attach a copy of your Software Licensing Agreement with the submittal.
1. Describe the licensing scheme and cost structure. How is the number of licenses
determined? Are licenses structured by number of individuals that may be able to
make a work request (for example, through a publicly open front end available to
every user of the facility), the number of individual login accounts, the number of
concurrent users or number of maintenance and operations personnel using the
system, or another metric?
2. Describe what is included and excluded in the annual basic license cost:
Maintenance
Costs for software releases and upgrades should be reflected in the annual Support and
Maintenance Agreement Contract. Version upgrades should not be separated from Maintenance
Releases. If separate from the primary licensing, provide a copy of the Support and Maintenance
contract within your submittal.
34
Support
Provide a recent example of a Service Level Agreement (SLA) for support. Describe support
incident prioritization, support tiers, guaranteed turnaround times and support hours for Pacific
and Mountain Standard Time zones. List your support staff size, experience and level of
expertise.
Describe how system support is available- phone call, email, on-line contact form, live chat, etc.
For written help requests, what is the guaranteed response time?
INITIAL PRICING INFORMATION
Following review and preliminary ranking and/or recommended selection of a system by a
college, the college will provided additional information required by the vendor and the vendor
will be asked to provide a final pricing proposal. The general pricing and terms provided in the
initial response will be considered in the system evaluation. Pricing excludes applicable taxes
and excludes travel expenses required for training and implementation that will be negotiated for
final pricing.
Pricing/Negotiation
In the event that information or pricing submitted by the vendor is unclear, the District may
request additional explanation and/or pricing breakdowns from the vendor for the purpose of
evaluation and decision making. Requests for additional information or clarification shall be in
writing and will become part of the vendor's final proposal. Vendors failing to provide adequate
information on any issue in a timely manner to allow a comprehensive evaluation may be
considered unresponsive, and their proposal subject to rejection.
The District may negotiate with vendors responding to the Request for Information to serve the
best interests of the District and college. In the event the District is unsuccessful in negotiating a
contract with the apparent best vendor(s) within a reasonable time frame, the District may
terminate negotiations and begin negotiations with another vendor(s). Vendors are cautioned to
submit proposals initially on a most favorable basis, since an award decision may be made
without significant best and final negotiation, based on price and terms of the original proposal.
Final Price Proposal Requirements
Please list the types of user and college information that will be required by the vendor in order
to create a more accurate, final pricing offer. The actual list of vendor requirements will be
developed prior to the request for a best and final offer:
35
Initial pricing requested
A. Annual Licenses and Technical Support
Provide the annual licensing fee schedule for the vendor’s server-hosted, web-based
system. Include a separate cost for optional modules that will be recommended for the
installation in order to meet the required functions of the system. The license to use the
CMMS software will be issued to the vendor upon final implementation and acceptance
of the CMMS system by the vendor.
If there are limitations of any significance within the basic license for support/help desk
(hours with afterhours support provided at an additional cost, added costs for certain
types of support, limit of total hours per year for support, etc.), training (web conference,
pre-recorded lessons on line, etc.), etc., please list the item and cost for additional time,
upgrade options, etc. and explain what those options entitle the user to, in addition to
their basic license:
<Item/Service Description:
$______________________ per <unit
Additional third party software needed to be able to view and operate the system, develop
or print reports, etc. that is not an integral part of the vendor’s basic system:
<Software name and version:
$______________________ per <unit, including purchase cost if any, licenses,
customized programming to assure compatibility, etc.
B. Warranty and Software Upgrade Costs
Provide the cost for an initial one year warranty, if not included in the basic license fees.
The warranty period begins only after final acceptance of the system by the college.
$______________________
Annual Warranty and Maintenance Cost after Year One
Provide and identify annual maintenance costs that are not included in the base license
fees after twelve (12) months following system acceptance if the cost is not included in
the annual licensing fee.
$______________________
36
Provide any software upgrade costs if not covered in annual maintenance.
Provide the cost for any system upgrades to future versions of the software if the cost is
not included in the annual licensing fee.
$______________________
C. Implementation and Acceptance Costs
Provide typical additional costs for installation, data interfaces, system testing,
implementation, post-implementation and any other services required to complete a
typical installation.
$______________________ / <unit
D. Technical and User Documentation
Provide the initial cost for system documentation if not included in the annual license fee.
$______________________
Provide the cost for additional documentation reproduction rights for users (current and
future).
$______________________
E. Training
Provide typical costs for the initial training, including training materials, if not included
in basic license fee.
$______________________/ <unit
Provide the typical estimated hours/days required for initial training. College users may
range from experiences CMMS users to no prior experience using a CMMS system:
Describe how this training typically would be provided (in person, on-line, pre-recorded
on line, accessible on demand lessons, etc.):
Provide typical costs for the refresher training (for example, at the six month and one
year installation anniversaries) and how this training generally would be provided:
$______________________
37
F. Data Transfer, Input and Conversion, and Miscellaneous Customizing Support
Provide the cost for data conversion from existing work order data bases
$______________________ per <unit: day, hour, etc.>
What format of existing work order history needs to be provided in order for that history
to be transferred into the new system?
What format of existing asset base needs to be provided in order for that information to
be transferred into the new system?
Provide the cost of other miscellaneous technical support for requested customization or
other items not listed above.
$______________________ / <unit
G. Other Costs Identify and describe any other relevant and significant costs not stated
above and indicate whether it is a non-recurring or a recurring cost.
On-site asset inventory and tagging:
$______________________ per <day <hour
(not including travel, housing, meals, and other reimbursable costs for out of town
personnel traveling to Phoenix to provide field surveys and asset tagging)
Item: <
$______________________
Item: <
$______________________
SYSTEM AND DATA SECURITY INFORMATION
The college intends to use the CMMS system in a vendor hosted, web-based “SaaS”
arrangement. Please describe your system’s security including:
•
•
•
firewall security
precautions to prevent hacker attacks to the vendor’s system
precautions to prevent file corruption and data loss
38
•
•
server and data backup
disaster planning and disaster recovery
Describe the measures in place to assure that outside data attacks cannot use your system to enter
and attack the District’s information technology system through the web-based use. (for
example, the Target Stores and similar data breeches that allowed use of third party sign in and
other processes to enter the primary firm’s network).
OTHER INFORMATION (10 pages maximum)
A. Provide additional supporting information that vendor believes are relevant to understanding
its software. Provide actual images and not just web links. The information may include:
• Screen shots of the system’s primary operating screens including such as the main menus,
screens for asset initial entry and editing, screens to create work orders and PMs, work
order detail screens, calendaring or scheduling screens, roll base and roll definition
screen, approval or dispatch screen, output work order screen showing assignment and
transmission of the work order, the list of standard reports that can be generated, guided
set up or instructional screens to assist users with operations and inputs, etc.
• Examples of system inputs and outputs - demonstrate what inputs and their formats are
required.
• Samples of key outputs (standard reports and screens), report dashboards, etc. that the
system generates.
• Other standard system features not specified herein
B. Provide a website link that provides more information about the product, product line and
optional modules:
C. Provide a web address where users can view on-line product demonstrations during this
evaluation. This also can be arranged through a web meeting or live, on-line demonstration
upon request. Provide a contact name and contact information to arrange a live on-line
demonstration if desired by the college:
REFERENCES
Provide a minimum of ten (10) customer references that currently are using the same system as
proposed in this Request. Of the minimum ten references:
•
•
•
Provide at least five references that are using the system as a web-based, vendor hosted
and supported system (SaaS).
Provide at least five references that are K-12, higher education or other public,
governmental or institutional entities.
Provide at least three references that are current users located in Arizona.
39
More than ten total references may be required in order to provide the minimum number of
references for the three specific reference groups.
Provide the following information for each reference. Please verify that all information is current
and correct:
•
•
•
•
•
•
•
•
•
•
Organization name
Contact name and title
Address
Contact email address
Contact phone number
Basic system software and optional modules that are licensed and their initial implementation
date (month/year) used by the organization
Indicate whether the system is web-based/vendor hosted or installed on the customer’s own IT
system
Approximate number of work orders of all types that are generated annually
If the reference is a school/vendor/university, provide their current student enrollment
If the reference has multiple geographical locations using a common system, provide the number
of locations served through the single CMMS system
VENDOR OR SYSTEM VALUE ADDED (1 page maximum)
Please include any additional products and/or services not included in the scope of the
solicitation you think will enhance and add value to this request.
40
EXHIBIT
PROJECT SUPPLEMENTAL CONDITIONS for VENDORS WITH ACCESS TO OR USING THE
DISTRICT’S INFORMATION TECHNOLOGY NETWORKS OR SENSITIVE DATA TREATMENT
General
The District takes important steps to protect Sensitive Information, by treating Sensitive Information as confidential
and encouraging the Owner’s employees and agents to take care in handling Sensitive Information. The District
limits access 1 to Sensitive Information to those who need it to perform their jobs. The District’s external service
providers must also protect Sensitive Information, and use it to meet only the District’s business needs. The District
also takes steps to protect its computer systems from unauthorized access 2 and works diligently to comply with
applicable information security, data privacy and related laws, rules and regulations.
POIs and/or their agents who will require access to the Owner’s technology systems, either through direct physical
connection or indirect access, and consequently may have access to Sensitive Information, will be required to
undergo significant screening, reviews and training to assure the security and privacy of the Owner’s systems and
information. See the Supplemental Specifications Sections of this Agreement for more information about these
requirements.
1.0 Definitions
1.1 Confidential Information (including Owner data)
Any and all information and data whose collection, disclosure, protection, and disposition is governed by federal,
state, local or international law or regulation, but does not include (i) information and data that are already known by
the receiving party, (ii) information and data that becomes generally available to the public except as a result of
disclosure by the receiving party in violation of this Agreement, and (iii) information and data that become known to
the receiving party from a source other than the disclosing party on a non-confidential basis. This information and
data include, but are not limited to, Social Security Numbers, student records, financial records regarding students
(or their parents or sponsors), financial and personal information regarding college employees, personal health
information (as defined by the Healthcare Information Protection Accountability Act) and other personally
identifiable information protected by law or regulation.
1.2 Personnel
All full-time, part-time and temporary employees and faculty who work for the Maricopa County Community
College District (“MCCCD”, “District” or “Owner”) organization.
1.3 POI
Person(s) of Interest: individuals such as the following who are not considered part of the MCCCD workforce but
who are still of interest to the organization:
a.
b.
Consultants, Contractors, Subcontractors, Individuals and Person of Interest (“PIO’s”):
Firms or organizations, or members of firms or organizations, that provide services to the Owner’s
employees and students
Individuals who are hired to do specialized work for the Owner and are paid by outside sources
1.4 Portable Devices
1. Authorized access to Owner’s information technology systems and/or Sensitive Information may include:
a.
Direct physical connection into the Owner’s technology infrastructure and/or equipment through cabling and/or other direct physical connection, Personal
Devices, and/or other Owner owned or operated networks;
b.
Indirect access to the Owner’s technology infrastructure, equipment and/or data through remote electronic access, such as the Internet, unsecured/public WIFI
networks provided by the Owner, or networks not owned and/or operated by the Owner.
2. Unauthorized access to Owner’s information technology systems and/or Sensitive Information includes incidental and/or unintended exposure and/or possession of, Sensitive Information,
to and/or by an individual, due to their presence at an Owner location. Personnel and POIs, for example, may be inadvertently exposed to hardcopy and electronically formatted Sensitive
Information that suffered improper disposal or was left unprotected in plain view in offices or other areas where the individual is visiting and/or working.
41
Include, but are not limited to, CDs, DVDs, eReaders, external hard drives, Google Glasses, laptops, memory sticks,
smart phones, tablets, thumb drives, and USB drives
1.5 Sensitive Information
Information that is so deemed under applicable law. Personally identifiable information, personally identifiable
education records, individually identifiable health information, personally identifiable financial information and
payment card information are examples of MCCCD Sensitive Information covered under the Arizona Revised
Statutes (ARS), Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and
Accountability Act of 1996 (HIPAA), Gramm–Leach–Bliley Act (GLBA aka Financial Services Modernization Act
of 1999) and Payment Card Industry Data Security Standard (PCI DSS), respectively.
2.0
Inadvertent exposure to or possession of confidential data
Incidental or unintended exposure to, or possession of, Sensitive Information by a vendor, consultant or contractor
strictly due to their presence at an Owner location. Vendors, consultants and contractors may be exposed
inadvertently to Sensitive Information through improperly disposed information, or materials (paper or electronic) in
offices or areas where the consultant or contractor is visiting or working. PIO’s in this category do not require nor
would be allowed access to Sensitive Information, Owner information technology equipment or networks in order to
perform and complete the scope of their work.
3. 0
Applicable Owner Administrative Regulations and Contact Information
3.1 4.4 Technology Resource Standards
https://chancellor.maricopa.edu/public-stewardship/governance/administrative-regulations/4-auxiliary-services/4.4-technology-resourcestandards
3.2 4.22 Statement on Privacy
https://chancellor.maricopa.edu/public-stewardship/governance/administrative-regulations/4-auxiliary-services/4.22-statement-on-privacy
3.3 4.23 Written Information Security Program
https://chancellor.maricopa.edu/public-stewardship/governance/administrative-regulations/4-auxiliary-services/4.23-written-information-security-program
3.4 4.24 Information Security Incident Response Plan
https://chancellor.maricopa.edu/public-stewardship/governance/administrative-regulations/4-auxiliary-services/4.24-information-securityincident-response-plan
3.5 Checklist for Vendor/Consultant/Contractor Security and Hosting Standards and Practices
https://dst.sp.maricopa.edu/DWG/SPCR/Security%20and%20Privacy%20Documents/MCCCD%20Combined%20Security%20Checklist%
20and%20Standards%20-%20BlankCopy%2012032014.docx
3.6 Contact for POI review and related questions
Willa F. Morgan, Esq.
Chief Privacy Officer and Assistant General Counsel
Maricopa County Community College District
2411 W. 14th Street
Tempe, Arizona 85014
(480) 731-8418
[email protected]
4.0
Requirements for POIs that will have authorized access to Owner’s information technology systems
and/or Sensitive Information:
A. All POIs that require direct access to the Owner’s technology networks, equipment or Sensitive Information
shall be evaluated by the Owner’s Chief Privacy Office or [email protected] to ensure proper screening,
training and security precautions are observed. This review shall take place prior to award of any contract,
subcontract or issuing of a purchase order.
42
B. All POIs with access to Owner’s Sensitive Information, whether through use of online technology resources or
otherwise, are covered by the Owner’s Administrative Regulation 4.23 Written Information Security Program.
All POIs must:
1.
Complete training on the information security administrative regulations and information security
awareness training annually, certify their attendance at each training session, and certify their familiarity
with the Owner’s requirements for protecting Sensitive Information in compliance with the Written
Information Security Program (“WISP”).
2. Maintain the confidentiality, integrity, security and availability of Owner Sensitive Information in
compliance with the WISP.
3. Comply with Owner Administrative Regulation 4.4 Technology Resource Standards, including, but not
limited to, the acceptable computer use provisions described therein.
4. Prohibit removal of Sensitive Information from the Owner premises (whether owned, leased, rented or
otherwise utilized by the Owner) in electronic or written form absent (i) an approved, legitimate business
need and (ii) use of reasonable security measures, as described in the WISP.
5. Encrypt or deliver by an alternative, more secure method all records and files containing Sensitive
Information that are transmitted wirelessly or across public networks.
6. Protect all passwords, keeping passwords in a location and format that are secure.
7. Contact the Chief Privacy Office or [email protected] to ensure evaluation of all vendors,
subcontractors and third-party products in advance of any work or purchase.
8. Require that all vendors, subcontractors and third-party products be evaluated in advance of any work or
purchase.
9. Upon completing or ceasing contractor or subcontractor services with the Owner, (1) return all records,
data applications and/or systems, in any form, including, but not limited to, information stored on laptops
or other Portable Devices or media, and in files, records, and work papers, and (2) surrender all keys,
identification cards, and all other means of using and/or accessing the Owner’s premises and/or
information.
10. Immediately report any suspicious or unauthorized use of Sensitive Information to the Owner’s Chief
Privacy Officer who coordinates the appropriate response.
C. POIs shall:
1.
2.
3.
4.
5.
6.
7.
8.
Cooperate with efforts to limit the amount of Sensitive Information collected or stored to that amount
reasonably necessary to accomplish the Owner’s legitimate business purposes or as required by law.
Limit use of and/or access to records, data applications, and/or systems containing Sensitive Information to
those persons who have a legitimate business purpose for such use and/or access.
Permit use of and/or access to the Owner’s Sensitive Information by only authorized individual(s) for
legitimate business reasons.
Do not store Sensitive Information on personally owned Portable Devices or media.
Periodically change passwords and conform to the Owner’s password standards.
Do not manipulate or disregard security measures that have been put in place to protect Sensitive
Information, including, but not limited to, access controls, cameras and secure storage for card and device
inventory, as well as tracking and monitoring of individuals' use of and/or access to Sensitive Information.
Secure Sensitive Information in a manner that is consistent with the WISP’s rules for protecting
information security of any files and other records containing Sensitive Information.
Securely dispose of physical and electronic records containing Sensitive Information at the earliest
opportunity consistent with business needs and records retention requirements in the following manner:
o Physical documents containing Sensitive Information are redacted, burned, pulverized, cross-cut
shredded, or otherwise securely erased so that Sensitive Information cannot practicably be read or
reconstructed; and
o Electronic media and other non-physical media containing Sensitive Information are destroyed or
otherwise securely erased so that such information cannot practicably be read or reconstructed.
D. Failure to Comply: Failure to comply with these requirements may result in disciplinary actions up to and
including immediate termination of services, purchase orders or contracts related to this action and all others
currently held. In addition, the vendor or contractor may be banned from any new Owner contracts or being a
43
subcontractor for a minimum of five years. Legal actions, including, but not limited to the application of civil and
criminal penalties, may also be taken for violations of applicable regulations and/or laws. POIs who violate the
WISP may be disciplined according to the severity of the violation, regardless of whether Sensitive Information was
accessed or used without authorization.
5.0 Confidential Information
A. Each and any POI agrees that Confidential Information provided to it, or to which it has access, during the
provision of service shall be used only and exclusively to support the service and service execution and not for any
other purpose. Such use shall not include examining data for targeted marketing either within the confines of the
service or external to the service (e.g., keyword indexing). The receiving party will limit access to Confidential
Information to its employees with a need to know the Confidential Information and will instruct those employees to
keep the information confidential. It is understood, however, that the Owner may disclose the Owner Confidential
Information on a need to know basis to its subcontractors who are performing Services, provided those
subcontractors have executed confidentiality agreements and have agreed to materially the same or greater security
obligations as Owner provides with respect to Owner Confidential Information hereunder, and further provided that
Owner shall remain legally and financially liable for any unauthorized disclosure of the Owner Confidential
Information by those subcontractors. At no time will an Owner staff person or an Owner subcontractor perform any
work involving Owner’s Confidential Information until the staff person has received Owner’s privacy and security
training, and accepted and agreed to adhere to Owner’s privacy and security policies and procedures for protection
of Confidential Information. If exigent circumstances are presented, all or part of this requirement may be waived in
writing by Owner’s Chief Privacy Officer or General Counsel.
B. POI and its subcontractors who may potentially have access to Confidential Information will be required to
undergo criminal background checking. POI shall inform Owner’s Chief Privacy Officer by sending an e-mail to
[email protected] immediately, and in no event later than within one (1) business day if the POI and/or
its subcontractors/agents have reason to believe that an actual or suspected security incident or any other
circumstance has occurred in which Owner may be required to provide a notification under applicable law, at which
point Owner will determine any additional information needed or steps to be taken, and will make a legal
determination regarding its course of action. Any such notice and all communications concerning a situation for
which notice is provided are part of the confidential joint defense of Owner and the POI, as investigation and
notification of such a situation may lead to regulatory investigation and/or litigation, depending on the specific
factual situation that is presented.
C. For purposes of the Agreement, “security incident” means the unauthorized access and/or misappropriation of
Confidential Information, including but not limited to personally identifiable information or protected health
information. In the event that a suspected security incident occurs, POI will be completely accountable and
responsible, financially and otherwise, for the cost of retaining vendors to perform services such as forensics. Also,
in the event that applicable law requires notification to individuals or others of such a security incident, the POI will
(i) be completely accountable and responsible, financially and otherwise, at no cost to Owner, retain a mutually
agreed upon vendor to (ii) provide notification and call centering services, and (iii) offer to provide two years of
industry standard credit monitoring, identity theft restoration services and identity theft insurance to each affected
individual at no cost to Owner or such affected individual. Additionally, the POI shall indemnify, defend and hold
Owner harmless from claims of any kind relating to the disclosure of personally identifiable information or
protected health information, regardless of whether notification is required under federal, state, local or international
law, caused by the negligence of the POI.
D. POI agrees to comply with all international and domestic data security and privacy laws that apply to crossborder and domestic transmission of Confidential Information.
6.0 Record and Data Retention, Ownership and Decommissioning
As a political subdivision of the state of Arizona, Owner is subject to applicable laws related to the inspection and
production of public records. A public record entails any record, either paper or electronic, made by a public officer
(including members of the Governing Board, faculty, staff and administrators) and kept as a memorial of an official
transaction. Pursuant to Arizona Revised Statutes §41-151.12, Owner must retain records according to established
44
retention periods. Records required for ongoing or foreseeable official proceedings such as audits, lawsuits or
investigations must be retained until released from such official proceedings. Thus, the POI shall not disclose, use,
destroy, transfer or otherwise manage those records and data except as provided herein or, if no other direction is
provided, without the express written approval of an authorized Owner representative. The POI shall work with
Owner to transfer all of Owner’s records and data to the Owner on the completion, termination or expiration of the
Agreement. Confidential Information of the disclosing party will be returned to the disclosing party or destroyed
promptly upon request of the disclosing party without retaining any copies thereof, with any destruction confirmed
in writing by receiving party.
7.0 Additional Insurance
A. PIOs who have access to or use the District’s Sensitive Information shall maintain during the term of the
Agreement insurance policies described below issued by companies licensed in Arizona with a current A.M. Best
rating of A:VIII or better. Before beginning work under the Agreement, the POI shall furnish the Owner Risk
Manager with certificates of insurance evidencing the required coverages, conditions, and limits required by this
Amendment at the following address:
MCCCD Risk Manager
2411 West 14th Street
Tempe, Arizona 85281
480-731-8879
480-731-8890(fax)
B. The insurance policies shall be endorsed to name the Owner and its agents, officers, officials, employees, and
volunteers as additional insureds with the following language or its equivalent:
“The Maricopa County Community College District and its agents, officers, officials, employees, and
volunteers are hereby named as additional insureds.”
C. In the event any insurance policies required by the Agreement are written on a “claims made” basis, coverage
shall extend for two years past the completion or expiration of the Agreement and must be evidenced by annual
certificates of insurance. The insurance policies shall be endorsed stating that they shall not expire, be cancelled,
suspended, voided or materially changed without 30 days written notice by certified mail to the Owner Risk
Manager. Owner’s insurance must be primary, and any insurance or self-insurance maintained by Owner shall not
contribute to it. If any part of the Work is subcontracted, these insurance requirements also apply to all
subcontractors. The Additional insurance coverage required under the Agreement for POIs that require access to the
Owner’s technology networks, equipment or Confidential data includes:
1.
8.0
Cyber Security insurance for data security and privacy coverage including costs of investigating a
potential or actual breach of sensitive information and responding as recommended by counsel (e.g.,
computer forensic investigation, outside counsel, notification mailing and call centering including
voluntary notification, credit monitoring and identity restoration costs, costs incurred in connection with
any regulatory investigation, fines or penalties assessed by a regulator, and litigation defense costs and
indemnification) with limits of not less than $1,000,000 per occurrence.
Security and Privacy Protections
The POIs changes to any of its internal security or privacy policies or information protection practices will retain the
level of protection provided for Owner’s data at a level that is materially the same or greater than the level of
protection provided at the outset of the Services term.
45