rfp mts security solution 1-10-2013.pdf
TRANSCRIPT
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 1
MTS Security Solutions
Request for Proposal (RFP)
Opening Date: < 01 October 2013>
Closing Date: < 18 October 2013 >
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 2
Disclosure and Response Confidentiality This RFP is both confidential and proprietary to Sistema Shyam Teleservices Limited (SSTL) and is solely for your companys use in preparation of a proposal. This RFP, as well as any information disclosed by SSTL to your company, is subject to the terms and restrictions outlined in the RFP. In connection with this RFP, SSTL is providing you with various operational, personnel, and other information that is deemed to be proprietary and confidential in nature. Such information is being furnished to you on a confidential basis to be used by you only in connection with your preparation and submission of a proposal in response to this RFP. You agree that such information will be kept confidential and will not, without prior expressed written consent of SSTL, be disclosed by you in any manner whatsoever, in whole or in part. The information will not be used in any manner other than in connection with the preparation and submission of your proposal to SSTL. You further agree that you will not solicit or attempt to solicit any officer, employee, or representative for any business outside of the submission of your proposal in response to this RFP. BY OPENING THIS RFP, YOU REPRESENT AND AGREE THAT YOU ARE WILLING TO COMPLY WITH THE CONFIDENTIALITY PROVISIONS OF THIS RFP.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 3
TABLE OF CONTENTS
1 INTRODUCTION AND SCOPE ....................................................................................................... 4
2 INVITATION ..................................................................................................................................... 8
3 INSTRUCTIONS AND CONDITIONS TO VENDORS ..................................................................... 8
4 CRITICAL DATES .......................................................................................................................... 13
5 CONFIDENTIALITY ....................................................................................................................... 13
6 VENDOR INFORMATION REQUIREMENTS AND SOLUTION SPECIFIC INFORMATION ....... 14
APPENDICES
1 Vendor authority statement
2 Population coverage projections
3 Functional requirements
4 Service levels
5 Device features and actions
6 List of SSTL assets
7 Sales and service delivery related information
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 4
1 INTRODUCTION AND SCOPE
1.1 Introduction
Sistema Shyam TeleServices Ltd. (SSTL) is a venture, involving equity participation by Sistema
Joint Stock Financial Corporation of Russia (SISTEMA JSFC), the Russian Federation and the
Shyam Group of India and operating under the MTS brand. Sistema JSFC is the majority
shareholder in the Company. Approximately 2.5% equity stake is held by public. The company
has been awarded Unified Access Services License by the Department of Telecommunication,
Government of India to provide telecom services across 9 telecom circles of India.
SSTL is credited to have introduced a number of innovations in the Indian telecom industry.
The Company is the pioneer of half paisa per second calling in the country. SSTL is also the
first telecom operator in the country to launch prepaid high speed mobile broadband. The
company has taken mobile broadband to another level with the launch of High Speed Data
(HSD) services on National Highways. Today, it is the only telecom operator to provide HSD
services on Delhi - Jaipur and Bangalore - Chennai National Highways.
The objective behind this RFP is to solicit partnerships with firms (hereinafter Vendor) that
are in the business of or is capable of providing security related services through smartphone
applications or over telecommunications network to create a solution which takes care of the
security needs of women. Figure 1.0 gives an over view of the proposed solution. This
solution is intended to be provided to both consumers and enterprises among others. SSTL
intends to market and distribute this product while the vendor is expected to provide the
mobile application and the supporting infrastructure covering computer systems, technical
expertise and customer experience management without limitation. SSTL will own the
customer and the vendor shall provide the requisite level of customer support as per this RFP.
SSTL intends to launch this product in Telecom circles where it currently holds licenses
followed by launches in other geographies and countries. SSTL will use its extensive
enterprise sales infrastructure to sell this product to enterprises and small and medium
enterprises (SME) as well.
SSTL seeks partners who are open to a revenue share engagement.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 5
Figure 1.0
1.2 Product Component Description
1. A Wearable Trigger which would wirelessly pair with a smartphone and can be used to
initiate specific actions through a linked smartphone application. The main use case is to
easily trigger an SOS alarm when under attack or threat. The Wearable Trigger would send a
signal to the smartphone with which it has ben paired.
SSTL would be responsible for procuring the Wearable Trigger. The Vendor is expected to
work closely with the Wearable Trigger manufacturer identified by SSTL at its own cost and
provide the relevant technical inputs and expertise to ensure that the Wearable Trigger
works seamlessly with the App as contemplated. The Vendor is expected to deliver the
features set out in Appendix 3 after accommodating the technical limitations of the Wearable
Trigger identified by MTS. Please refer to Appendix 3 E for an understanding of the device
specifications and the level of customization required.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 6
2. A Smartphone Application (hereinafter the App) which can trigger an SOS alert to pre-
designated guardians. This application should be able to trigger the SOS alert with the latest
GPS coordinates on receiving a wireless signal from the Wearable Trigger and from the phone
itself.
The Vendor is expected to provide SSTL with a white labeled application as per the
specifications of this RFP.
3. An optional Portable Alarm that can be carried by the user on her person or in her
handbag. This is expected to produce a very loud audio alarm which will alert people nearby
on receiving a wireless signal from the phone.
SSTL would be responsible for procuring the Portable Alarm. The Vendor is expected to work
closely with the Portable Alarm manufacturer identified by SSTL at its own cost and provide
the relevant technical inputs and expertise to ensure that the Portable Alarm works
seamlessly with the App as contemplated. In case SSTL decides to launch the Portable Alarm
at a later date and not as part of the initial launch, the Vendor shall ensure that provision is
made for the installed base of the App to work with the Portable Alarm.
4. A Computerized System (hereinafter the SOS Server) which would be utilized to render
the services proposed which would include but is not limited to user onboarding, service
activation, provisioning and receiving and processing the SOS alert from a user.
The SOS Server setup must be physically located in India and all data must be stored within
the sovereign territory of the Republic of India. Vendors must be open to hosting the system
in the SSTL data center.
1.3 Proposed Sales and Service delivery Process
The Wearable Trigger shall be sold through a variety of channels including but not limited to
mass retail, online and institutional sales channels. The box shall include the Wearable
Trigger and an activation key as well as instruction on how to download and install the App
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 7
from the relevant operating system linked application store such as iTunes or Google play in
addition to other relevant material.
The user is expected to register himself/herself with the relevant details and input the
correct activation key for the services to be provisioned. The subscription period for the
services rendered by the proposed product shall be one (1) year from the time of activation
of services. The services can be renewed by the user at the end of the subscription period on
the payment of a fee and by inputting an authentication key at one of the account
management interfaces.
In case of an emergency, the user can trigger an alarm by pressing the button. The guardians
configured by the user will receive an automated call triggered by the SOS Server informing
them about the details of the alert. The guardians can stay informed of the last known
location of the user by returning a call to the number from which the automated call
originated. This would be supplemented by SMS, e-mail and social media linked information.
An overview of the proposed processes involved can be found in Appendix 7. The Vendor is
at liberty to propose amendments to the process or a new process entirely provided the
rationale is provided as well.
The Vendor is expected to propose a solution which can enable the above.
1.4 Strategic Alignment
The security product is expected to be the first of a new service line under the MTS brand.
This service line would include security and M2M based services covering family and asset
tracking and security, but is not limited to the mentioned products. The App is expected to be
one of the consolidated touch points through which these different services would be
delivered to the customer. The vendor is expected to have the capabilities to enable 3rd
party inputs to be received by the App. This capability is not expected to be present in the
App for the current product but the Vendor must have the capability and willingness to
enable it as per SSTLs request.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 8
2 INVITATION
Proposals in the form of an electronic response (email) as well as physical copies are invited from the
eligible vendors for supplying, integrating, commissioning, operating and maintaining the App and
the SOS Server.
Two (2) physical copies of the proposal addressed to Apu Martin Thomas shall be submitted in a
sealed envelope at the offices of Sistema Shyam Teleservices Ltd. MTS India Towers, 334, Udyog
Vihar, Phase IV, Gurgaon 122001 on or before 18:00 hrs. on 18- 10-2013.
An electronic version of the proposal shall be submitted through an email at
[email protected] on or before 18:00 hrs. on 18- 10-2013 as well.
The Vendor is requested to make available the latest instance of any smartphone application that the
Vendor may have that is similar to the App mentioned in the RFP for evaluation as well.
3 INSTRUCTIONS AND CONDITIONS TO VENDORS
3.1 General
Vendors shall analyze and respond to RFP, providing sufficient information to allow SSTL to
evaluate the Proposal. Vendors shall ensure that the following requirements for submission
of their responses to this RFP are met.
Each section of the response must clearly identify the corresponding RFP item.
All pages must be numbered.
The RFP must be signed by the submitter or representative of the Vendor.
Vendors may also attach supplementary material.
Vendors must provide RFP "Submitted by" contact information including name, designation,
phone and e-mail contacts and address.
The RFP response should not exceed fifty (50) pages.
3.2 Response Evaluation and Proposal Selection
SSTL reserves the right, without qualification to:
a. Select any proposal as a basis for written or oral discussion with any or all of the Vendors,
when such action is considered to be in the best interest of SSTL;
b. Reject all proposals;
c. Exercise discretion and apply its judgment with respect to any proposals submitted. If after
attempting to obtain competitive bids for material or services and only one (1) bid, proposal
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 9
or offer is received and that bid, proposal or offer does not exactly meet our specifications or
budgetary limits, the Procurement and Contracts Management staff shall have the authority
to negotiate with the Bidder to secure an acceptable bid, proposal or offer. SSTL may select
proposals, based on initial proposals received without discussion or after limited discussions
or negotiations. Vendors are therefore advised to submit their initial proposal on the most
favourable terms possible.
3.3 Intellectual Property
In the event that know-how or intellectual property rights evolve or are generated or arise
out of or in the performance of any work carried out by the Vendor in responding to this RFP,
ownership of such rights shall vest in and remain with SSTL.
3.4 Response Format
The proposal shall be provided electronically by email and/or CD-ROM in Microsoft Word
format / MS-Excel for the compliance sheet.
3.5 References and use cases
Vendor needs to provide at least one (1) reference and a case study for an implementation similar to the proposed solution.
3.6 Contacts
All correspondence in relation to this RFP will be send by e-mail to the below addresses. If
phone contact is necessary, below mention contacts are available:
Business Contact:
Apu Martin Thomas
Commerce Function, Corporate Center
Sistema Shyam Teleservices Limited
MTS India Towers, 334, Udyog Vihar, Phase IV, Gurgaon 122001
MTS +91 913 600 1743
Direct +91 124 481 2741
Email: [email protected]
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 10
Technology Contact:
Prashant Singh
Head, VAS Applications Division
IT Function, Corporate Center
Sistema Shyam Teleservices Limited
Building No. 387, Udyog Vihar, Phase II, Gurgaon 122001
MTS +91 913 600 1453
Email: [email protected]
3.7 Cost of RFP response
The Vendor shall bear all costs associated with the preparation and submission of the
response up to the final award of the contract. SSTL will in no case be responsible or liable for
those costs, regardless of the conduct or outcome of the procurement process.
3.8 Validity of response
The offer outlined in the proposal must be valid for a minimum period of 90 calendar days
after the later of the closing date or the date of receipt of the RFP response by SSTL . A
proposal valid for a shorter period may be rejected by SSTL. In exceptional circumstances,
SSTL may solicit the bidders consent to an extension of the period of validity. The request
and the responses thereto shall be made in writing. Any Vendor granting the request will not
be required nor permitted to modify its proposal. The Vendor must submit the completely
filled out form in Appendix 1.
Any proposal made by the Vendor that is not submitted in the format and/or using the
templates mandated by SSTL may be considered to be an invalid proposal at SSTLs sole
discretion.
3.9 Receipt of Proposals from Non-invitees
SSTL may, at its own discretion, extend the RFP to Vendor that were not included in the
individual invitation list if this is necessary and in the interest of SSTL.
3.10 Amendments of the RFP
At any time prior to the closing date for submission of proposals, SSTL may, for any reason,
whether on its own initiative or in response to a clarification requested by a Vendor, modify
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 11
the RFP by amendment. Amendments could include modification of project scope or
requirements, project timeline expectations or extension of the closing date for submission.
All prospective bidders that have received the RFP will be notified in writing of all
amendments to the RFP.
3.11 Clarification of Proposals
SSTL may, at its discretion, ask any bidder for clarification of any part of its proposal to assist
in the examination, evaluation and comparison of proposals. The request for clarification and
the response shall be in writing. No change in price or substance of the proposal from the
Vendor shall be sought, offered or permitted during this exchange.
3.12 Vendors' Presentations
At the discretion of SSTL, selected Vendors may be invited to supply additional information
on the contents of their proposal during the evaluation period. Such Vendors could be asked
to give a presentation of their proposal followed by a question and answer session. If SSTL
determines that there is such a need, the presentation will be held at SSTL corporate office in
Gurgaon, or by videoconference/Internet. Vendors will be given reasonable time to prepare
for the presentation.
3.13 Warranties
The Vendor will warrant and represent to SSTL as follows:
a. The deliverables shall meet the specifications and shall function in a manner which is fully
adequate to meet its intended purpose. The Vendor furthermore warrants that the
deliverables shall be error-free, in that the Vendor shall correct any errors in the
deliverables, free of charge, within fifteen days after their notification to the Vendor,
during a period of at least six months after completion of the work. It is agreed, however,
that errors and other defects, which have been caused by modifications to the
deliverables made by SSTL without agreement of the Vendor are not covered by this
paragraph.
b. The deliverables shall, to the extent it is not original, only be derived from, or incorporate,
material over which the Vendor has the full legal right and authority to use it for the
proper implementation of any contract resulting from this RFP. The Vendor shall obtain
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 12
all the necessary licenses for all non-original material incorporated in the deliverables
including, but not limited to, licenses for SSTL to use any underlying software, application,
and operating deliverables included in the deliverables or on which it is based, so as to
permit SSTL to fully exercise its rights in the deliverables and the software without any
obligation on SSTLs part to make any additional payments whatsoever to any party.
c. The deliverables shall not violate any copyright, patent right, or other proprietary right of
any third party and be delivered to SSTL free and clear of any and all liens, claims,
charges, security interest and any other encumbrances of any nature whatsoever.
d. The Vendor, its employees and any other persons and entities used by the Vendor shall
furthermore not copy and/or otherwise infringe on the copyright of any document or
other material (whether machine readable or not) to which the Vendor, its employees
and any other persons and entities used by the Vendor have access in the performance
of this RFP or the resulting contract if any.
e. Except as otherwise explicitly provided in this RFP or any contract resulting from this RFP
if any, the Vendor shall at all times provide all the necessary on-site and off-site
resources to meet its obligations hereunder. The Vendor shall only use highly qualified
staff, acceptable to SSTL, to perform its obligations hereunder.
f. The Vendor shall take full and sole responsibility for the payment of all wages, benefits
and monies due to all persons and entities used by it in connection with the
implementation and execution of this RFP or the resulting contract if any, including, but
not limited to, the Vendors employees, permitted subcontractors and suppliers.
3.14 Relation between the parties
This RFP does not constitute a partnership between the parties or constitute either party as
the agent of the other. This RFP should not be construed as a commitment by SSTL to award
a contract on the basis of the Vendors responses.
3.15 Officials not to Benefit
The Vendor warrants that no official of SSTL has received or will be offered by the Vendor any
direct or indirect benefit arising from this RFP or the award thereof. The Vendor agrees that
breach of this provision is a breach of an essential term of this RFP or any contract that may
result from it. The Vendor is required to report any matter which falls under the purview of
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 13
this section including but not limited to incidents or solicitation for any undue benefits or
unethical practices with all relevant details to [email protected] within one working day.
4 CRITICAL DATES
4.1 Acknowledgement of the Receipt of the RFP
Vendors shall acknowledge receipt of the RFP by 18:00 hours IST on 2-10-2013 by email to
the Business as well as Technical Contacts.
4.2 Communication of Intent to participate
Vendors shall communicate it intention to respond or not respond to the RFP by 18:00 hours
IST on 3-10-2013 by email to the Business as well as Technical Contacts.
4.3 Questions Regarding the RFP
Queries regarding the RFP must be submitted to the Business and Technical Contacts, via E-
mail, by 18:00 hours IST on 7-10-2013. Every attempt will be made to promptly answer all
enquiries from each Vendor.
4.4 Proposal Due Date
Formal, softcopy (MS Word/Excel for the compliance sheet) of responses must be received
no later than 1800 Hrs IST on 18-10-2013. Extensions to the proposal due date will not be
granted without the written authorization of SSTL.
Vendors should be assured that a Non Bid decision for this RFP would not exclude the
Vendor from future consideration.
5 CONFIDENTIALITY
Vendors must recognize and acknowledge that SSTL operates in a highly competitive business
environment and for that reason expects that Vendors will treat all materials and data provided by
SSTL as confidential. Vendors who currently do not have a Non-Disclosure Agreement (NDA) with
SSTL must complete and return a NDA as soon as possible.
The Business Contact must approve in writing the distribution or sharing of this RFP by Vendors with
any other parties. Vendors may disclose relevant parts of this RFP to its relevant business partners
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 14
and/or subcontractors provided that the partners and/or subcontractors first have executed a Non-
Disclosure Agreement (NDA) with SSTL.
For the avoidance of doubt, this RFP, SSTLs methods for evaluating responses, and the timing and
content of any meetings, discussions and negotiations between SSTL and the Vendor shall be deemed
Confidential Information for the purposes of the NDA.
SSTL will not share any information from the Vendors response with any other Vendors without the
prior written agreement of the Vendor.
In addition, SSTL and Vendor agree that all Proprietary and/or Confidential Information shall be
handled in accordance with the Non-Disclosure Agreement.
6 VENDOR INFORMATION REQUIREMENTS AND SOLUTION SPECIFIC INFORMATION
The Vendor shall provide information about its organization and its understanding of the proposed
security solution as well as timelines and commercials of the proposed execution. The required
information is described below; the Vendor is to submit the response in the order and manner
described below. SSTL reserves a right to reject responses that are submitted not in the specified
format.
In order to better control operational costs and user experience, SSTL requires that the Vendor
integrate SSTL owned or controlled assets and/or systems with the Vendors proposed solution. A
detailed list of the mandatory SSTL assets can be found in Appendix 6 of this RFP. If a Vendor is of the
opinion that a better alternative is available, the Vendor may inform SSTL of the same including the
justification in the format given in Appendix 6.
6.1 Brief Overview of the Vendors Organization
This shall include office locations, staff numbers and information of the primary location that will carry
out work if the Vendor is selected no more than one (1) MS Word page/two (2) PPT slides.
6.2 IT related Products and Professional Services Overview
A summary of other related products and services offered/created by the Vendor shall be provided
no more than 3 MS Word pages/6 PPT slides.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 15
6.3 Outline of the Technical Solution
The Vendor shall describe his/her vision for the execution of the solution. Any differences between
the proposed system, features, processes etc. for individual users and enterprise or SME users must be
highlighted in the information that the Vendor is providing under this section. The outline should
include
a) Detailed architecture diagrams (physical, logical and network diagrams)
i. Describe how you are dimensioning any internet connections in the case of a remote hosted
solution.
ii. Describe how such a system would scale using the dimensioning assumptions and projected
growth rate.
iii. Describe redundancy and failover configurations
b) Details of technology on which platform has been built (hardware and software)
c) Solution design and technical workflow
d) Integration points with nodes in the SSTL/mobile telecom service provider eco-system, if any
(please provide all details such as nodes to be integrated, purpose of integration, protocols
supported for integration, out-of-box API available or customized integration mechanism to be
developed, typical timelines for creating new integration API, etc.)
e) Data Center Requirements
i. If you propose some systems to be physically hosted within a SSTL data centre, indicate the
space, power, security (logical and physical) and network connectivity requirements.
ii. Describe access requirements for personnel
f) Technical assumptions
g) Detailed deployment project plan
h) Implementation and operations support governance structure with responsibility matrix
i) Operations support model proposed
j) Change request process
k) Risk Matrix with risk mitigation plan
l) Solution for enabling customer care / Helpdesk
m) Solution for monitoring / enhancing Customer Experience & System performance
n) Handset support Roadmap
o) Quality Assurance process and management systems
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 16
p) Overview of security for the solution proposed (please provide details of security certificates
obtained for solution, ability to support penetration testing conducted by SSTL, etc.)
q) Subscription management and solution for providing a subscription based service
r) User account management from App and a web portal
s) Business continuity and recovery plans
t) Description of services and features available to enterprise and SME customer
u) Technical expertise and project plan including responsibility matrix for Wearable Trigger
customization and integration including but not limited to testing of the Wearable Trigger and the
integration between the App and the Wearable Trigger.
Please refer to Appendix 5 for a description of the proposed Wearable Triggers features and
information on some technical specifications including the expected level of customization and
customization support required from the Vendor.
6.4 Bill of materials
Please describe all materials required for implementation no more than four (4) MS Word pages/four
(4) PPT slides. This should include:
a) Hardware specifications if applicable
b) Pricing
c) Support pricing for five (5) years.
6.5 Business Models
SSTL invites Vendors to propose a Revenue Share model.
6.6 Compliance sheet
Please refer Appendix 3 for both Functional and Technical requirements. The requirements are in a
compliance sheet format. The vendor will need to respond against each line item mentioned. The
response will be C compliant, PC partially compliant, NC Not compliant. For PC / NC, please
provide additional explanations in the remarks column. For any entries marked as partially compliant,
please state the number of working days the Vendor would require to be fully compliant in an
additional column where applicable. Kindly submit the compliance sheet either in MS Word or MS
Excel format as well.
Description of service levels that will be provided are expected to be furnished in the format attached.
Incident severity and priority will be as defined in Appendix 4.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 17
Please state total projected scheduled down time for the year keeping in mind feature releases.
As the product is expected to be launched under the MTS brand name of which SSTL is a licensee, and
given the sensitive nature of the need this product addresses, the possibility exists that any deficiency
in service on the part of the Vendor will lead to impairment of the brand including but not limited to
loss of reputation, negative publicity and adverse perceptions and may make SSTL liable for damages.
As a safeguard SSTL proposes the measures outlined in Appendix 4 to ensure that service levels are
adhered to.
6.7 Timelines
The Vendor will provide the envisioned timeline of the execution with the phase-wise breakdown no
more than one (1) MS Word pages/two (2) PPT slides.
6.8 Commercials
The Vendor is to provide commercials in the format given in Appendix 2. Any submissions in any other
format or in violation of the instructions given in Appendix 2 or the relevant excel sheet format will not
be considered by SSTL.
The Vendor is required to consider SSTL infrastructure that has to be mandatorily used while creating
the commercial proposal. The list can be found in Appendix 6.
6.9 Strategic Alignment
The Vendor shall provide detailed information on its capability to enable SSTLs vision as spelt out in
Section 1.4 of this RFP.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 18
APPENDIX 1
Vendor Authority Statement
The proposer represents and certifies as part of the Proposal that he/she is authorized to act as an agent
for the corporation responsible for this Proposal.
The costs stated in the Proposal were arrived at independently, without consultation, communication or
agreement with any other proposer or with any competitor, for the purpose of restricting competition.
_____________________________________
Signature of Approving Authority (with Company Stamp)
Title _____________________________________
Date _____________________________________
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 19
APPENDIX 2
SSTL intends to launch this product in urban areas in circles for which it currently possesses telecom licenses. Instructions for proposing commercials:
1. All rates have to be inclusive of all taxes, cess, duties etc.
2. All rates have to be in Indian rupees
3. Vendors have to fill the matrix given as is.
4. Cells with a completely black background should not be filled.
5. Activation refers to the point in time when a user's valid activation key inputted into the application is authenticated and services are provisioned
6. Renewal refers to the point in time when an existing user's valid renewal activation key inputted into the application or any other relevant user touch-point is authenticated and services are provisioned
7. Vendors must give their inputs in the attached excel file and submit the same to SSTL in
electronic format as well.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 20
Lower limit Upper limit
Capex Cost per
Activation
Cost per
Activation
Cost per Renewal Cost per
Activation
Cost per Renewal Cost per
Activation
Cost per Renewal Cost per
Activation
Cost per Renewal
1 5,000
5,001 10,000
10,001 15,000
15,001 20,000
20,001 25,000
25,001 30,000
30,001 35,000
35,001 40,000
40,001 45,000
45,001 50,000
50,001 55,000
55,001 60,000
60,001 65,000
65,001 70,000
70,001 75,000
75,001 80,000
80,001 85,000
85,001 90,000
90,001 95,000
95,001 100,000
Year 1
100,000+
Commercial terms for security solutionBand Year 2 Year 3 Year 4 Year 5
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 21
APPENDIX 3
This appendix discusses features of the platform with inbuilt analytics as well as mobile applications.
Legend: C = Fully compliant, NC= Not-compliant, PC= Partial compliant
Note: For clauses that are marked as C or PC, its mandatory to provide explanatory remarks that will
assist in evaluating the response.
A. Functional and Technical requirements - Overall
Feature/Capability Description Compliance (C, NC, PC)
Remarks
Application Capability
1. Device agnostic rich client experience 2. In absence of Data connectivity, critical information transmission via SMS 3. Enterprise module supporting multi-tenancy
Channels Data is primary Channel with SMS as backup
Application Developer framework
Exposes standard APIs where by developer community can use those APIs and create enterprise applications
Partner Capability Partner shall have experience in integrating the solution with other applications such as OSS/BSS systems, etc.
Devices All smart devices running the following Operating systems: Android, iOS, Blackberry OS, Windows Mobile OS
User Sign and Authentication
Provide the users with features like single-sign on, authentication, personalization and customization within all parts of the MTS-owned piece including but not limited to the App and the website.
Self Care, service provision and de- provisioning
The system shall be able to automatically provision or de-provision services depending on business rules.
Subscription Management
1. Manages subscription including scenarios where the device, phone number etc. without limitation are changed 2. Enterprise level licensing and subscription management
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 22
Charging/Billing 1. Yearly charging 2. Subscription renewal management
Open Standards
Open Standards to facilitate interoperability and data exchange among different products or services and are intended for widespread adoption
Multitenant architecture
Applications are designed to virtually partition its data and configuration so that each client organization works with a customized instance
Security Policy
User data information is not available to others unless authorized. The vendor should comply with the security policies set as per SSTL. All critical information/data stored within the system should be encrypted. Application should be able to authenticate users based on MDN, UserID, Password. It should have encryption policies on data w.r.t. storage and transit processing.
IPV 6 The platform shall be IPV6 compliant
Test Bed For testing of applications by developer community or MTS before moving to production
MIS/ Reports
The platform shall provide reports as per business and technical requirements (Not limited to) 1. Usage report
2. Subscription report
3. SLA report
Integration
The platform shall be capable of integrating with Telco grade systems including but not limited to 1. Billing
2. Online Provisioning
3. ITSM/NOC tools
4. CRM
5. SMSC
6. IVR
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 23
Application Life Cycle Management
The complete application life cycle management process shall be provided by the partner 1. Discovery
2. Delivery
3. Install
4. Configure
5. Upgrade
6. Replace
7. Management
8. Uninstall
Version Management Describe the typical version upgrade process when a new commercial release is available
Operation Support (24*7 )
Partner shall be responsible for day to day operations or would introduce partners capable to do the same
Operations Management
End to End operations management (not limited to) 1. Fault monitoring and alarms
2. Policy Management
3. Network Interfaces
4. Backup
5. Scalability
6. Availability
Help Desk Help desk services for servicing consumer and enterprise customers
Self-monitoring Ability to check the entire app to guardian link for any impairment in quality of service and for system up-time
Web interface for B2B clients
Customizable web interface deployable at an enterprises security control room
Touch point Customizability
All customer touch points must be customizable from a branding perspective and SSTL usability guidelines
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 24
VXML 2.0 based Integrated Voice Response (IVR) Application
Application to be developed and hosted at SSTL Data Center for integrating with SSTL IVR for providing location update to Guardians once SOS is initiated by customer. Text-to-Speech (TTS) functionality for streaming voice packets to application hosted on SSTL IVR, and server for hosting VXML application to be provided by vendor
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 25
B. Functional and Technical requirements App
Feature/Capability Description Compliance (C, NC, PC)
Remarks
SMS Alerts from App SMS sent to pre designated numbers with a SOS message
One-touch SOS alert A button on the primary app screen which will trigger the services
SOS alarm with live GPS tracking online
Location tracking once the alert is triggered
Location info in SOS SMS
Last know location included as part of the SMS as an internet link or nearest identifiable address
SMS back-up in case of no data connectivity
App to send location data as part of SMS to back-end server in areas without data connectivity
Stop location tracking option Option to stop tracking location
Non-GPS location Tracking
Network triangulation based location identification
Shake to activate Ability to activate alarm by vigorously shaking the phone
Customizable shake Feature
Ability to adjust the intensity of the shaking needed to trigger the app
Cancel alert feature
Ability to cancel a false alarm. This should include an alert being sent to activate the bands vibration feature whenever an alarm is triggered.
Can trigger audio alarm through phone speakers
Siren using phone speakers to alert passers-by to come to the user's aid
Cancel alert at SOS Server
Alert cancellations must be done at the SOS Server and not at the application level
Geo-tag unsafe locations/incidents
Ability to tag an area as unsafe on a map through the app
e-mail Alert E-mail alert to designated e-mail ids
Social Media Alert posted on users social media sites with location and SOS message
Route map as part of SOS alert
Alert in case of forced shut down of phone
"Check on me alert" incase the phone is shut off when battery is not low and deviates from regular usage patterns
"Track me" feature Alert sent asking people to check on user regularly
SMS location update for every 10 mt change post alarm if no data
Sends location update through SMS/USSD in areas without data coverage if the phone moves 10 mts
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 26
link from the last know location
Call me and bail me out feature
Alerts a guardian to call user to provide an escape from an uncomfortable social or other situation
Content through app
Ability to send content related to TG through the app. Eg. - Safety tips, health tips etc.
Safety alerts and tips Location based
Informs users if entering an area which has designated as unsafe by other users
Number of phone numbers to which app triggers SOS calls Five (5)
Number of phone numbers to which app triggers SMS Five (5)
Number of e-mails to which app triggers SMS Five (5)
Run at start-up App automatically starts and runs in the background
Syncs with Device at pre-set time(s)
Syncs with wearable trigger only at pre-set times scheduled - battery conservation
Syncs with Device for pre-set duration
Syncs with wearable trigger only for pre-set durations battery Conservation
Set safe zones Set areas where the app will not be triggered
Prioritize Bluetooth pairing with device in case of Bluetooth conflict
Over rides other Bluetooth devices in pairing priority
Alert user in case entering unsafe zone
Unsafe zones would be decided basis user tagging
Deviation from safe route alert
Alerts user/guardian if any deviations from pre-set route
SOS button available on lock screen
SoS button should be available through a locked screen without having to unlock phone
Block calls feature Block specific numbers from calling user's phone
White listed calls only when active feature
Allow only specified numbers to call user's phone when this feature is active
Block SMS feature Block specific numbers from texting user's phone
SMS Alerts from App SMS sent to pre designated numbers
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 27
with a SOS message
Devices supported (please specify all the versions supported)
Android
IPhone
Blackberry
Windows
Others (please specify)
Indoor positioning capability
Ability to locate a device inside a building, especially which storey
Audio recording of customers name during registration
A user must be able to record his/her spoken name in the application which must then be stored on the SOS Server for retrieval during an SOS alert outbound call
Im Here notification to pre-loaded number
Sends a "I'm safe" message on reaching a pre-designated location
Alert on pro-longed signal loss in no coverage areas
If alert is triggered in no-network zone, app will send the SOS whenever a network is detected
User account management
User must be able to modify all customizable aspects of the product from the app itself
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 28
C. Functional and Technical requirements SOS Server
Feature/Capability Description Compliance (C, NC, PC)
Remarks
Communications from back-end
Back-end server which will initiate and control all communications
Outbound call alert Outbound dialer to pre designated numbers with a SOS message and last known location
Online map provider integration for unsafe location alert
Last know location to be easily accessible through an online map services
Tracking subscriber route for duration of alert raised
Route to be mapped once alert has been raised, till alert has been resolved / switched off by user
Alert to nearest subscribers with App enabled
Alerts other app users in the vicinity incase alarm is triggered
One-time emergency tracking code for others
Ability for guardian to track the user location for a single time and for a fixed duration even if an alarm is not raised by user. This feature has to be enabled by user.
Outbound call in Vernacular
Outbound dialer in the language selected by user with the address in an Indian accent
Provisioning with activation key
Service should start only upon receiving a one- time activation key or subscription renewal key as the case may be
User behavior based auto alerts
Ability to analyze user behavior and propose/raise alerts in case of deviations
Web based interface Web based interfaces that can provide critical information to first responders
30 % buffer capacity
Buffer capacity at each node from peak utilization
99.9% Uptime System availability
Status update over IVR
Guardians should be able to obtain the latest information on a user who has raised an alert by calling the number from which the outbound dialer originated
Secure status update for non-guardians
Guardians must be able to share the location of a user who has raised an alarm. This should be accessible to a non-guardian over e-mail, SMS and
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 29
phone calls
Opt out for guardians A guardian must be able to opt out of receiving calls related to this service for a unique user alone the first time he/she receives a call from a system pertaining to that user alone. User must be activated if a guardian opts out.
Historical data Availability
Alarm details (including routes) to be available even beyond alert being closed / addressed for a specified duration
Guardian number screening
System should to ensure that guardian numbers are private personal numbers of individuals and not that of the police or any public or govt. entity or any private concern or entity. All numbers have to be local numbers as well.
Location in India The server hardware must be physically located in India and all personal information of the customer must be stored within the sovereign territory of India.
Reporting capabilities Extensive report (summary / detail) producing capabilities. Example: 1. MDN wise list of subscribers
2. Expiration date wise
3. subscriber list
4. Report based on frequency of
alerts raised
5. Report based on geography /
circle from where alerts are
raised
6. Multiple alerts from same
location over a fixed time period
(input for marking that area as
unsafe)
7. Due for renewal list
Indoor positioning Capability
Ability to translate relevant inputs from the App to usable location information
Misuse tracking and Control
Mechanism to monitor and control the usage of the service based on business rules
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 30
User account Management
User must be able to modify all customizable aspects of the product from the app itself
D. Functional and Technical requirements Customer Experience
Feature/Capability Description Compliance (C, NC, PC)
Remarks
CRM Vendor to provide and enable SSTL to interface with Vendor CRM systems. This CRM systems can be cloud based and should be accessible over the internet by SSTL customer care representatives and should be configurable to handle both software and hardware related issues
L2 response All aspects of the product except hardware issues with the Bluetooth bracelet on a 24/7 basis over phone, chat or e-mail.
Product documentation Relevant product documentation must be provided including but not limited to: 1. Training manuals for sales
2. Training manual for customer
service
3. Product manuals for users
Helpdesk support Capability to integrate with SSTL CRM so that complaint / query raised by subscriber (of service) can be routed to vendor issue resolution team automatically
Incident Management Capability to integrate with SSTL ITSM tool for responding & resolving tickets raised within stipulated SLAs
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 31
E. Customization and integration requirements Wearable Trigger Please refer to Appendix 5 for a detailed description of the existing features, proposed modifications and additional features that have to be created. The Vendor is expected to provide the technical expertise and project management expertise in coordination with SSTL to ensure that the hardware vendor chosen to provide the Wearable Trigger supplies a device that is compatible with the App and which is optimized for the purpose contemplated in the RFP. For filling up the table given below, please follow the instructions hereunder C The Vendor has the complete set of skill sets and expertise required in-house to enable the function described in the table and can provide the support required PC The Vendor may have only partial levels of the set of skill sets and expertise required in-house to enable the function described in the table but can acquire or obtain the skill sets and expertise required to render support required by the time any commercial agreement that may result out of this RFP is executed NC - The Vendor has neither the complete or partial set of skill sets and expertise required in-house to enable the function described in the table nor can the Vendor acquire or obtain the skill sets and expertise required to render support required by the time any commercial agreement that may result out of this RFP is executed
Event Action description Compliance (C, NC, PC)
Remarks
Mo
dif
icat
ion
s Switching device off Press & hold for 12 seconds
Silence vibration alarm Quick press 1 time
Phone proximity alarm Vibrate 1 time for 1 second in every 3 seconds
Ne
w f
eat
ure
s
Custom signal to application (A) Press & hold between seconds and 4 seconds
Application response to custom signal (B)
Signal
Application activation alert (C) Continuous vibration without break on receiving signal (B) till vibration cancelled
Pairing lost or disconnected Vibrate 1 time for 1 second in every 6 seconds
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 32
APPENDIX 4
Service Levels
Service Level Agreements SLA
Severity Level-1 (Critical) issues will be attended to and service restored as per the SLA 95%
Severity Level-2 (High) issues will be attended to and service restored as per the SLA 90%
Severity Level-3 (Average) issues will be attended to resolved as per the SLA 90%
Severity Level-4 (Low) issues will be attended to resolved as per the SLA 90%
Application / System uptime 99.99%
Response time of application for providing current location update of customer to guardian should be less than 5 secs 99.80%
Illustration of Severity Categorization
As per the attached Severity definition document
P1 to P4
Timelines for Operations support (on 24x7 schedule)
Severity Response Workaround/ Restoration/Resolution
Permanent Fix
Sev 1 Critical 30 minutes 2 hours 2 working days
Sev 2 High 1 hour 4 hours 4 working days
Sev 3 Average 1 hour 8 hours 6 working days
Sev 4 Low 2 hours 24 hours 8 working days
Please see addendum below for definitions on severity. Penalty clause
Application/system uptime Rs. 1,00,000 per hour of downtime
Severity Response SLA breach penalty Resolution SLA breach penalty
Sev 1 Critical
Rs. 50,000 per hour pro-rated for peak hours Rs. 30,000 per hour pro-rated for off-peak hours
Rs. 50,000 per hour pro-rated for peak hours Rs. 30,000 per hour pro-rated for off-peak hours
Sev 2 High
Rs. 20,000 per hour pro-rated for peak hours Rs. 10,000 per hour pro-rated for off-peak hours
Rs. 20,000 per hour pro-rated for peak hours Rs. 10,000 per hour pro-rated for off-peak hours
Peak hours till determined by empirical data can be considered to be the hours during which the probability of the services being used is very high.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 33
Incident Management process addendum* Guidelines for categorizing incident:
Incident priority Description
Priority-1: Critical - Impacting Services in one or more circles and no workaround in place. - Anything which prevents users from raising an SOS alarm and/or
Guardians from receiving an SOS alert with time stamp and location/address
- Critical System, network or key application outage (or imminent outage) with critical impact on service delivery.
- Business users or partners of one or more circles are unable to use IT Systems for business transaction.
- Any incident that is directly impacting the revenue of MTS impacts one or more service level commitments.
- Any regulatory requirement. - Any Critical Service degradation (slowness) impacting one or more
circles.
Priority-2: High - Impacting services in one or more circles with work around solution available till the problem is corrected.
- Service degradation of non-critical services impacting one or more circles. - More than 10 % of subscriber base is affected in a particular circle. - Any event/customer activity that may lead to security related incident. - Critical data mismatch in MIS report.
Priority-3: Average - Impacting the critical services for individual customer that may lead to customer dissatisfaction.
- Any service disruption that will affect the productivity of individual business user.
- Data query on MIS report.
Priority-4: Low - Any other incident that affects directly or indirectly the quality of IT services to the end user.
- Individual user complaint with work around possible.
* These definitions are subject to revision
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 34
APPENDIX 5
Device features and actions:
Event # Event Action description LED Status Device state Pairing state
Exis
tin
g fe
atu
res
1 Switching device on Press & hold for 3 seconds
Blue - Flicker 3 times
Off Not paired
2 1st time pairing Press & hold for 6 seconds
Blue - Continuously glow for 6 seconds
Off Not paired
3 Pairing after device is on
Info not available Info not available
On Not paired
4 Reject incoming call Quick press 2 times NA On Paired
5 Low battery Vibrate 4 times over 30 seconds
NA On Paired
6 Incoming call Vibrate 2 times in 1 second till call answered, rejected or dropped
NA On Paired
7 Successful pairing Vibrate 1 time after pairing sequence
NA On Paired
Mo
dif
icat
ion
s
1 Switching device off Press & hold for 12 seconds
Blue - Flicker 12 times
On Paired
2 Silence vibration alarm
Quick press 1 time NA On Paired
3 Phone proximity alarm Vibrate 1 time for 1 second in every 3 seconds
NA On Paired
Ne
w f
eat
ure
1 Custom signal to application (A)
Press & hold between 2 seconds and 4 seconds
NA On Paired
2 Application response to custom signal (B)
Signal NA On Paired
3 Application activation alert (C)
Continuous vibration without break on receiving signal (B) till vibration cancelled
NA On Paired
4 Pairing lost or disconnected
Vibrate 1 time for 1 second in every 6 seconds
NA On Not paired
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 35
Technical specifications:
Bluetooth version V 2.0
Carrier frequency 2401 MHz-2480MHz
Through-put power 0dBm
Effective range 10m
Continuous operational time 90 hours
Operating temperature range -10C to ~+50C
Storage temperature range -20C to ~ +80C
Charging voltage 5 to ~ 5.3V
Charging period 2 hours
LED colour Blue
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 36
APPENDIX 6
List of SSTL assets that have to integrate with the Vendors proposed solution.
Asset Name Description Vendor comments
Converged voice platform HP Internet Usage Manager (IUM) based platform which handles outbound calls and inbound IVR calls
IT Service Management Tool (ITSM)
HP Openview is used by SSTL to measure SLAs and to track operational incidents to closure. This tool is expected to used to monitor SLA adherence.
Smart Sys tool Internal device service request management tool based on an ASP .NET platform.
-
Security Solutions - Confidential -
Sistema Shyam Teleservices Ltd. 37
Appendix 7
1. High level process map for onboarding a new user
User buys device
User downloads application
User registers
User furnishes guardian details
Guardian onboarding
User tests device
functionality
User tests service
User Onboarded
User inputs activation key
User Validated
User provides validation
details
2. Proposed high level outbound SOS alert call process
User Triggers alert
Device provides vibration
alarm
Triggered by mistake
App sends SMS to
GuardiansNo
App triggers after cancel
alarm window time
out
App sends location alert
to server
Server initiates
outbound IVR alert to
Guardians
Guardian calls IVR number
Server screens for
user alarm in last 12 hours
Did user trigger alarm
Server provides last
known location
yesServer
terminates call
No
User cancels alarm
yes
Server informs guardian that location cannot be
provided for more than 12 hours from alert
Server identifies
user mapped to guardians
number
Server terminates
call to Guardian
3. Components of the retail package
a. Bluetooth module
b. Swappable bands in multiple colours
c. Activation key
d. User manual
e. Charger and cable
f. Customer care details
g. Warranty card
------------ End of Document ------------