Você está na página 1de 37

Security Solutions

- Confidential -

MTS Security Solutions Request for Proposal (RFP)

Opening Date: < 01 October 2013> Closing Date: < 18 October 2013 >

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

Disclosure and Response Confidentiality

This RFP is both confidential and proprietary to Sistema Shyam Teleservices Limited (SSTL) and is solely for your companys use in preparation of a proposal. This RFP, as well as any information disclosed by SSTL to your company, is subject to the terms and restrictions outlined in the RFP. In connection with this RFP, SSTL is providing you with various operational, personnel, and other information that is deemed to be proprietary and confidential in nature. Such information is being furnished to you on a confidential basis to be used by you only in connection with your preparation and submission of a proposal in response to this RFP. You agree that such information will be kept confidential and will not, without prior expressed written consent of SSTL, be disclosed by you in any manner whatsoever, in whole or in part. The information will not be used in any manner other than in connection with the preparation and submission of your proposal to SSTL. You further agree that you will not solicit or attempt to solicit any officer, employee, or representative for any business outside of the submission of your proposal in response to this RFP. BY OPENING THIS RFP, YOU REPRESENT AND AGREE THAT YOU ARE WILLING TO COMPLY WITH THE CONFIDENTIALITY PROVISIONS OF THIS RFP.

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

TABLE OF CONTENTS
1 2 3 4 5 6 INTRODUCTION AND SCOPE .......................................................................................................4 INVITATION .....................................................................................................................................8 INSTRUCTIONS AND CONDITIONS TO VENDORS .....................................................................8 CRITICAL DATES ..........................................................................................................................13 CONFIDENTIALITY .......................................................................................................................13 VENDOR INFORMATION REQUIREMENTS AND SOLUTION SPECIFIC INFORMATION .......14

APPENDICES 1 2 3 4 5 6 7 Vendor authority statement Population coverage projections Functional requirements Service levels Device features and actions List of SSTL assets Sales and service delivery related information

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

INTRODUCTION AND SCOPE 1.1 Introduction

Sistema Shyam TeleServices Ltd. (SSTL) is a venture, involving equity participation by Sistema Joint Stock Financial Corporation of Russia (SISTEMA JSFC), the Russian Federation and the Shyam Group of India and operating under the MTS brand. Sistema JSFC is the majority shareholder in the Company. Approximately 2.5% equity stake is held by public. The company has been awarded Unified Access Services License by the Department of Telecommunication, Government of India to provide telecom services across 9 telecom circles of India. SSTL is credited to have introduced a number of innovations in the Indian telecom industry. The Company is the pioneer of half paisa per second calling in the country. SSTL is also the first telecom operator in the country to launch prepaid high speed mobile broadband. The company has taken mobile broadband to another level with the launch of High Speed Data (HSD) services on National Highways. Today, it is the only telecom operator to provide HSD services on Delhi - Jaipur and Bangalore - Chennai National Highways.

The objective behind this RFP is to solicit partnerships with firms (hereinafter Vendor) that are in the business of or is capable of providing security related services through smartphone applications or over telecommunications network to create a solution which takes care of the security needs of women. Figure 1.0 gives an over view of the proposed solution. This solution is intended to be provided to both consumers and enterprises among others. SSTL intends to market and distribute this product while the vendor is expected to provide the mobile application and the supporting infrastructure covering computer systems, technical expertise and customer experience management without limitation. SSTL will own the customer and the vendor shall provide the requisite level of customer support as per this RFP. SSTL intends to launch this product in Telecom circles where it currently holds licenses followed by launches in other geographies and countries. SSTL will use its extensive enterprise sales infrastructure to sell this product to enterprises and small and medium enterprises (SME) as well. SSTL seeks partners who are open to a revenue share engagement.

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

Figure 1.0

1.2

Product Component Description

1. A Wearable Trigger which would wirelessly pair with a smartphone and can be used to initiate specific actions through a linked smartphone application. The main use case is to easily trigger an SOS alarm when under attack or threat. The Wearable Trigger would send a signal to the smartphone with which it has ben paired.

SSTL would be responsible for procuring the Wearable Trigger. The Vendor is expected to work closely with the Wearable Trigger manufacturer identified by SSTL at its own cost and provide the relevant technical inputs and expertise to ensure that the Wearable Trigger works seamlessly with the App as contemplated. The Vendor is expected to deliver the features set out in Appendix 3 after accommodating the technical limitations of the Wearable Trigger identified by MTS. Please refer to Appendix 3 E for an understanding of the device specifications and the level of customization required.

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

2. A Smartphone Application (hereinafter the App) which can trigger an SOS alert to predesignated guardians. This application should be able to trigger the SOS alert with the latest GPS coordinates on receiving a wireless signal from the Wearable Trigger and from the phone itself.

The Vendor is expected to provide SSTL with a white labeled application as per the specifications of this RFP.

3. An optional Portable Alarm that can be carried by the user on her person or in her handbag. This is expected to produce a very loud audio alarm which will alert people nearby on receiving a wireless signal from the phone.

SSTL would be responsible for procuring the Portable Alarm. The Vendor is expected to work closely with the Portable Alarm manufacturer identified by SSTL at its own cost and provide the relevant technical inputs and expertise to ensure that the Portable Alarm works seamlessly with the App as contemplated. In case SSTL decides to launch the Portable Alarm at a later date and not as part of the initial launch, the Vendor shall ensure that provision is made for the installed base of the App to work with the Portable Alarm.

4. A Computerized System (hereinafter the SOS Server) which would be utilized to render the services proposed which would include but is not limited to user onboarding, service activation, provisioning and receiving and processing the SOS alert from a user.

The SOS Server setup must be physically located in India and all data must be stored within the sovereign territory of the Republic of India. Vendors must be open to hosting the system in the SSTL data center.

1.3

Proposed Sales and Service delivery Process

The Wearable Trigger shall be sold through a variety of channels including but not limited to mass retail, online and institutional sales channels. The box shall include the Wearable Trigger and an activation key as well as instruction on how to download and install the App

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

from the relevant operating system linked application store such as iTunes or Google play in addition to other relevant material.

The user is expected to register himself/herself with the relevant details and input the correct activation key for the services to be provisioned. The subscription period for the services rendered by the proposed product shall be one (1) year from the time of activation of services. The services can be renewed by the user at the end of the subscription period on the payment of a fee and by inputting an authentication key at one of the account management interfaces.

In case of an emergency, the user can trigger an alarm by pressing the button. The guardians configured by the user will receive an automated call triggered by the SOS Server informing them about the details of the alert. The guardians can stay informed of the last known location of the user by returning a call to the number from which the automated call originated. This would be supplemented by SMS, e-mail and social media linked information.

An overview of the proposed processes involved can be found in Appendix 7. The Vendor is at liberty to propose amendments to the process or a new process entirely provided the rationale is provided as well.

The Vendor is expected to propose a solution which can enable the above.

1.4

Strategic Alignment

The security product is expected to be the first of a new service line under the MTS brand. This service line would include security and M2M based services covering family and asset tracking and security, but is not limited to the mentioned products. The App is expected to be one of the consolidated touch points through which these different services would be delivered to the customer. The vendor is expected to have the capabilities to enable 3rd party inputs to be received by the App. This capability is not expected to be present in the App for the current product but the Vendor must have the capability and willingness to enable it as per SSTLs request.

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

INVITATION

Proposals in the form of an electronic response (email) as well as physical copies are invited from the eligible vendors for supplying, integrating, commissioning, operating and maintaining the App and the SOS Server. Two (2) physical copies of the proposal addressed to Apu Martin Thomas shall be submitted in a sealed envelope at the offices of Sistema Shyam Teleservices Ltd. MTS India Towers, 334, Udyog Vihar, Phase IV, Gurgaon 122001 on or before 18:00 hrs. on 18- 10-2013. An electronic version of the proposal shall be submitted through an email at

apu.thomas@mtsindia.in on or before 18:00 hrs. on 18- 10-2013 as well. The Vendor is requested to make available the latest instance of any smartphone application that the Vendor may have that is similar to the App mentioned in the RFP for evaluation as well. 3 INSTRUCTIONS AND CONDITIONS TO VENDORS 3.1 General

Vendors shall analyze and respond to RFP, providing sufficient information to allow SSTL to evaluate the Proposal. Vendors shall ensure that the following requirements for submission of their responses to this RFP are met. Each section of the response must clearly identify the corresponding RFP item. All pages must be numbered. The RFP must be signed by the submitter or representative of the Vendor. Vendors may also attach supplementary material. Vendors must provide RFP "Submitted by" contact information including name, designation, phone and e-mail contacts and address. The RFP response should not exceed fifty (50) pages.

3.2

Response Evaluation and Proposal Selection

SSTL reserves the right, without qualification to: a. Select any proposal as a basis for written or oral discussion with any or all of the Vendors, when such action is considered to be in the best interest of SSTL; b. Reject all proposals; c. Exercise discretion and apply its judgment with respect to any proposals submitted. If after attempting to obtain competitive bids for material or services and only one (1) bid, proposal

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

or offer is received and that bid, proposal or offer does not exactly meet our specifications or budgetary limits, the Procurement and Contracts Management staff shall have the authority to negotiate with the Bidder to secure an acceptable bid, proposal or offer. SSTL may select proposals, based on initial proposals received without discussion or after limited discussions or negotiations. Vendors are therefore advised to submit their initial proposal on the most favourable terms possible.

3.3

Intellectual Property

In the event that know-how or intellectual property rights evolve or are generated or arise out of or in the performance of any work carried out by the Vendor in responding to this RFP, ownership of such rights shall vest in and remain with SSTL.

3.4

Response Format

The proposal shall be provided electronically by email and/or CD-ROM in Microsoft Word format / MS-Excel for the compliance sheet.

3.5

References and use cases

Vendor needs to provide at least one (1) reference and a case study for an implementation similar to the proposed solution.

3.6

Contacts

All correspondence in relation to this RFP will be send by e-mail to the below addresses. If phone contact is necessary, below mention contacts are available:

Business Contact: Apu Martin Thomas Commerce Function, Corporate Center Sistema Shyam Teleservices Limited MTS India Towers, 334, Udyog Vihar, Phase IV, Gurgaon 122001 MTS +91 913 600 1743 Direct +91 124 481 2741 Email: Apu.Thomas@mtsindia.in

Sistema Shyam Teleservices Ltd.

Security Solutions

- Confidential -

Technology Contact: Prashant Singh Head, VAS Applications Division IT Function, Corporate Center Sistema Shyam Teleservices Limited Building No. 387, Udyog Vihar, Phase II, Gurgaon 122001 MTS +91 913 600 1453 Email: Prashant.Singh2@mtsindia.in 3.7 Cost of RFP response

The Vendor shall bear all costs associated with the preparation and submission of the response up to the final award of the contract. SSTL will in no case be responsible or liable for those costs, regardless of the conduct or outcome of the procurement process.

3.8

Validity of response

The offer outlined in the proposal must be valid for a minimum period of 90 calendar days after the later of the closing date or the date of receipt of the RFP response by SSTL . A proposal valid for a shorter period may be rejected by SSTL. In exceptional circumstances, SSTL may solicit the bidders consent to an extension of the period of validity. The request and the responses thereto shall be made in writing. Any Vendor granting the request will not be required nor permitted to modify its proposal. The Vendor must submit the completely filled out form in Appendix 1. Any proposal made by the Vendor that is not submitted in the format and/or using the templates mandated by SSTL may be considered to be an invalid proposal at SSTLs sole discretion.

3.9

Receipt of Proposals from Non-invitees

SSTL may, at its own discretion, extend the RFP to Vendor that were not included in the individual invitation list if this is necessary and in the interest of SSTL.

3.10 Amendments of the RFP At any time prior to the closing date for submission of proposals, SSTL may, for any reason, whether on its own initiative or in response to a clarification requested by a Vendor, modify

Sistema Shyam Teleservices Ltd.

10

Security Solutions

- Confidential -

the RFP by amendment. Amendments could include modification of project scope or requirements, project timeline expectations or extension of the closing date for submission. All prospective bidders that have received the RFP will be notified in writing of all amendments to the RFP.

3.11 Clarification of Proposals SSTL may, at its discretion, ask any bidder for clarification of any part of its proposal to assist in the examination, evaluation and comparison of proposals. The request for clarification and the response shall be in writing. No change in price or substance of the proposal from the Vendor shall be sought, offered or permitted during this exchange.

3.12 Vendors' Presentations At the discretion of SSTL, selected Vendors may be invited to supply additional information on the contents of their proposal during the evaluation period. Such Vendors could be asked to give a presentation of their proposal followed by a question and answer session. If SSTL determines that there is such a need, the presentation will be held at SSTL corporate office in Gurgaon, or by videoconference/Internet. Vendors will be given reasonable time to prepare for the presentation.

3.13 Warranties The Vendor will warrant and represent to SSTL as follows: a. The deliverables shall meet the specifications and shall function in a manner which is fully adequate to meet its intended purpose. The Vendor furthermore warrants that the deliverables shall be error-free, in that the Vendor shall correct any errors in the deliverables, free of charge, within fifteen days after their notification to the Vendor, during a period of at least six months after completion of the work. It is agreed, however, that errors and other defects, which have been caused by modifications to the deliverables made by SSTL without agreement of the Vendor are not covered by this paragraph. b. The deliverables shall, to the extent it is not original, only be derived from, or incorporate, material over which the Vendor has the full legal right and authority to use it for the proper implementation of any contract resulting from this RFP. The Vendor shall obtain

Sistema Shyam Teleservices Ltd.

11

Security Solutions

- Confidential -

all the necessary licenses for all non-original material incorporated in the deliverables including, but not limited to, licenses for SSTL to use any underlying software, application, and operating deliverables included in the deliverables or on which it is based, so as to permit SSTL to fully exercise its rights in the deliverables and the software without any obligation on SSTLs part to make any additional payments whatsoever to any party. c. The deliverables shall not violate any copyright, patent right, or other proprietary right of any third party and be delivered to SSTL free and clear of any and all liens, claims, charges, security interest and any other encumbrances of any nature whatsoever. d. The Vendor, its employees and any other persons and entities used by the Vendor shall furthermore not copy and/or otherwise infringe on the copyright of any document or other material (whether machine readable or not) to which the Vendor, its employees and any other persons and entities used by the Vendor have access in the performance of this RFP or the resulting contract if any. e. Except as otherwise explicitly provided in this RFP or any contract resulting from this RFP if any, the Vendor shall at all times provide all the necessary on-site and off-site resources to meet its obligations hereunder. The Vendor shall only use highly qualified staff, acceptable to SSTL, to perform its obligations hereunder. f. The Vendor shall take full and sole responsibility for the payment of all wages, benefits and monies due to all persons and entities used by it in connection with the implementation and execution of this RFP or the resulting contract if any, including, but not limited to, the Vendors employees, permitted subcontractors and suppliers. 3.14 Relation between the parties This RFP does not constitute a partnership between the parties or constitute either party as the agent of the other. This RFP should not be construed as a commitment by SSTL to award a contract on the basis of the Vendors responses.

3.15 Officials not to Benefit The Vendor warrants that no official of SSTL has received or will be offered by the Vendor any direct or indirect benefit arising from this RFP or the award thereof. The Vendor agrees that breach of this provision is a breach of an essential term of this RFP or any contract that may result from it. The Vendor is required to report any matter which falls under the purview of

Sistema Shyam Teleservices Ltd.

12

Security Solutions

- Confidential -

this section including but not limited to incidents or solicitation for any undue benefits or unethical practices with all relevant details to hotline@mtsindia.in within one working day.

CRITICAL DATES

4.1

Acknowledgement of the Receipt of the RFP

Vendors shall acknowledge receipt of the RFP by 18:00 hours IST on 2-10-2013 by email to the Business as well as Technical Contacts. 4.2 Communication of Intent to participate

Vendors shall communicate it intention to respond or not respond to the RFP by 18:00 hours IST on 3-10-2013 by email to the Business as well as Technical Contacts. 4.3 Questions Regarding the RFP

Queries regarding the RFP must be submitted to the Business and Technical Contacts, via Email, by 18:00 hours IST on 7-10-2013. Every attempt will be made to promptly answer all enquiries from each Vendor. 4.4 Proposal Due Date

Formal, softcopy (MS Word/Excel for the compliance sheet) of responses must be received no later than 1800 Hrs IST on 18-10-2013. Extensions to the proposal due date will not be granted without the written authorization of SSTL. Vendors should be assured that a Non Bid decision for this RFP would not exclude the Vendor from future consideration.

CONFIDENTIALITY

Vendors must recognize and acknowledge that SSTL operates in a highly competitive business environment and for that reason expects that Vendors will treat all materials and data provided by SSTL as confidential. Vendors who currently do not have a Non-Disclosure Agreement (NDA) with SSTL must complete and return a NDA as soon as possible.

The Business Contact must approve in writing the distribution or sharing of this RFP by Vendors with any other parties. Vendors may disclose relevant parts of this RFP to its relevant business partners

Sistema Shyam Teleservices Ltd.

13

Security Solutions

- Confidential -

and/or subcontractors provided that the partners and/or subcontractors first have executed a NonDisclosure Agreement (NDA) with SSTL.

For the avoidance of doubt, this RFP, SSTLs methods for evaluating responses, and the timing and content of any meetings, discussions and negotiations between SSTL and the Vendor shall be deemed Confidential Information for the purposes of the NDA. SSTL will not share any information from the Vendors response with any other Vendors without the prior written agreement of the Vendor. In addition, SSTL and Vendor agree that all Proprietary and/or Confidential Information shall be handled in accordance with the Non-Disclosure Agreement.

VENDOR INFORMATION REQUIREMENTS AND SOLUTION SPECIFIC INFORMATION

The Vendor shall provide information about its organization and its understanding of the proposed security solution as well as timelines and commercials of the proposed execution. The required information is described below; the Vendor is to submit the response in the order and manner described below. SSTL reserves a right to reject responses that are submitted not in the specified format.

In order to better control operational costs and user experience, SSTL requires that the Vendor integrate SSTL owned or controlled assets and/or systems with the Vendors proposed solution. A detailed list of the mandatory SSTL assets can be found in Appendix 6 of this RFP. If a Vendor is of the opinion that a better alternative is available, the Vendor may inform SSTL of the same including the justification in the format given in Appendix 6.

6.1

Brief Overview of the Vendors Organization

This shall include office locations, staff numbers and information of the primary location that will carry out work if the Vendor is selected no more than one (1) MS Word page/two (2) PPT slides. 6.2 IT related Products and Professional Services Overview

A summary of other related products and services offered/created by the Vendor shall be provided no more than 3 MS Word pages/6 PPT slides.

Sistema Shyam Teleservices Ltd.

14

Security Solutions

- Confidential -

6.3

Outline of the Technical Solution

The Vendor shall describe his/her vision for the execution of the solution. Any differences between the proposed system, features, processes etc. for individual users and enterprise or SME users must be highlighted in the information that the Vendor is providing under this section. The outline should include a) Detailed architecture diagrams (physical, logical and network diagrams) i. Describe how you are dimensioning any internet connections in the case of a remote hosted solution. ii. Describe how such a system would scale using the dimensioning assumptions and projected growth rate. iii. Describe redundancy and failover configurations

b) Details of technology on which platform has been built (hardware and software) c) Solution design and technical workflow d) Integration points with nodes in the SSTL/mobile telecom service provider eco-system, if any (please provide all details such as nodes to be integrated, purpose of integration, protocols supported for integration, out-of-box API available or customized integration mechanism to be developed, typical timelines for creating new integration API, etc.) e) Data Center Requirements i. If you propose some systems to be physically hosted within a SSTL data centre, indicate the space, power, security (logical and physical) and network connectivity requirements. ii. f) Describe access requirements for personnel

Technical assumptions

g) Detailed deployment project plan h) Implementation and operations support governance structure with responsibility matrix i) j) Operations support model proposed Change request process

k) Risk Matrix with risk mitigation plan l) Solution for enabling customer care / Helpdesk

m) Solution for monitoring / enhancing Customer Experience & System performance n) Handset support Roadmap o) Quality Assurance process and management systems

Sistema Shyam Teleservices Ltd.

15

Security Solutions

- Confidential -

p) Overview of security for the solution proposed (please provide details of security certificates obtained for solution, ability to support penetration testing conducted by SSTL, etc.) q) Subscription management and solution for providing a subscription based service r) User account management from App and a web portal s) Business continuity and recovery plans t) Description of services and features available to enterprise and SME customer u) Technical expertise and project plan including responsibility matrix for Wearable Trigger customization and integration including but not limited to testing of the Wearable Trigger and the integration between the App and the Wearable Trigger. Please refer to Appendix 5 for a description of the proposed Wearable Triggers features and information on some technical specifications including the expected level of customization and customization support required from the Vendor. 6.4 Bill of materials

Please describe all materials required for implementation no more than four (4) MS Word pages/four (4) PPT slides. This should include: a) Hardware specifications if applicable b) Pricing c) Support pricing for five (5) years.

6.5

Business Models

SSTL invites Vendors to propose a Revenue Share model. 6.6 Compliance sheet

Please refer Appendix 3 for both Functional and Technical requirements. The requirements are in a compliance sheet format. The vendor will need to respond against each line item mentioned. The response will be C compliant, PC partially compliant, NC Not compliant. For PC / NC, please provide additional explanations in the remarks column. For any entries marked as partially compliant, please state the number of working days the Vendor would require to be fully compliant in an additional column where applicable. Kindly submit the compliance sheet either in MS Word or MS Excel format as well. Description of service levels that will be provided are expected to be furnished in the format attached. Incident severity and priority will be as defined in Appendix 4.
Sistema Shyam Teleservices Ltd.

16

Security Solutions

- Confidential -

Please state total projected scheduled down time for the year keeping in mind feature releases.

As the product is expected to be launched under the MTS brand name of which SSTL is a licensee, and given the sensitive nature of the need this product addresses, the possibility exists that any deficiency in service on the part of the Vendor will lead to impairment of the brand including but not limited to loss of reputation, negative publicity and adverse perceptions and may make SSTL liable for damages. As a safeguard SSTL proposes the measures outlined in Appendix 4 to ensure that service levels are adhered to. 6.7 Timelines

The Vendor will provide the envisioned timeline of the execution with the phase-wise breakdown no more than one (1) MS Word pages/two (2) PPT slides.

6.8

Commercials

The Vendor is to provide commercials in the format given in Appendix 2. Any submissions in any other format or in violation of the instructions given in Appendix 2 or the relevant excel sheet format will not be considered by SSTL. The Vendor is required to consider SSTL infrastructure that has to be mandatorily used while creating the commercial proposal. The list can be found in Appendix 6.

6.9

Strategic Alignment

The Vendor shall provide detailed information on its capability to enable SSTLs vision as spelt out in Section 1.4 of this RFP.

Sistema Shyam Teleservices Ltd.

17

Security Solutions

- Confidential -

APPENDIX 1

Vendor Authority Statement

The proposer represents and certifies as part of the Proposal that he/she is authorized to act as an agent for the corporation responsible for this Proposal.

The costs stated in the Proposal were arrived at independently, without consultation, communication or agreement with any other proposer or with any competitor, for the purpose of restricting competition.

_____________________________________ Signature of Approving Authority (with Company Stamp)

Title _____________________________________

Date _____________________________________

Sistema Shyam Teleservices Ltd.

18

Security Solutions

- Confidential -

APPENDIX 2 SSTL intends to launch this product in urban areas in circles for which it currently possesses telecom licenses. Instructions for proposing commercials: 1. All rates have to be inclusive of all taxes, cess, duties etc. 2. All rates have to be in Indian rupees 3. Vendors have to fill the matrix given as is. 4. Cells with a completely black background should not be filled. 5. Activation refers to the point in time when a user's valid activation key inputted into the application is authenticated and services are provisioned 6. Renewal refers to the point in time when an existing user's valid renewal activation key inputted into the application or any other relevant user touch-point is authenticated and services are provisioned 7. Vendors must give their inputs in the attached excel file and submit the same to SSTL in electronic format as well.

Sistema Shyam Teleservices Ltd.

19

Security Solutions

- Confidential -

Commercial terms for security solution


Band Capex Lower limit Upper limit 1 5,000 5,001 10,000 10,001 15,000 15,001 20,000 20,001 25,000 25,001 30,000 30,001 35,000 35,001 40,000 40,001 45,000 45,001 50,000 50,001 55,000 55,001 60,000 60,001 65,000 65,001 70,000 70,001 75,000 75,001 80,000 80,001 85,000 85,001 90,000 90,001 95,000 95,001 100,000+ 100,000 Year 1 Cost per Activation Cost per Activation Year 2 Cost per Renewal Cost per Activation Year 3 Cost per Renewal Cost per Activation Year 4 Cost per Renewal Cost per Activation Year 5 Cost per Renewal

Sistema Shyam Teleservices Ltd.

20

Security Solutions

- Confidential -

APPENDIX 3

This appendix discusses features of the platform with inbuilt analytics as well as mobile applications.

Legend: C = Fully compliant, NC= Not-compliant, PC= Partial compliant Note: For clauses that are marked as C or PC, its mandatory to provide explanatory remarks that will assist in evaluating the response.

A. Functional and Technical requirements - Overall

Feature/Capability

Description 1. Device agnostic rich client experience 2. In absence of Data connectivity, critical information transmission via SMS 3. Enterprise module supporting multitenancy Data is primary Channel with SMS as backup

Compliance (C, Remarks NC, PC)

Application Capability

Channels

Exposes standard APIs where by developer Application Developer community can use those APIs and create framework enterprise applications Partner shall have experience in integrating Partner Capability the solution with other applications such as OSS/BSS systems, etc. All smart devices running the following Devices Operating systems: Android, iOS, Blackberry OS, Windows Mobile OS Provide the users with features like single-sign on, authentication, personalization and User Sign and customization within all parts of the MTSAuthentication owned piece including but not limited to the App and the website. Self Care, service The system shall be able to automatically provision and deprovision or de-provision services depending provisioning on business rules. 1. Manages subscription including scenarios where the device, phone number etc. without Subscription limitation are changed Management 2. Enterprise level licensing and subscription management

Sistema Shyam Teleservices Ltd.

21

Security Solutions

- Confidential -

Charging/Billing

1. Yearly charging 2. Subscription renewal management Open Standards to facilitate interoperability and data exchange among different products or services and are intended for widespread adoption Applications are designed to virtually partition its data and configuration so that each client organization works with a customized instance User data information is not available to others unless authorized. The vendor should comply with the security policies set as per SSTL. All critical information/data stored within the system should be encrypted. Application should be able to authenticate users based on MDN, UserID, Password. It should have encryption policies on data w.r.t. storage and transit processing. The platform shall be IPV6 compliant For testing of applications by developer community or MTS before moving to production The platform shall provide reports as per business and technical requirements (Not limited to) 1. Usage report 2. Subscription report 3. SLA report The platform shall be capable of integrating with Telco grade systems including but not limited to 1. Billing 2. Online Provisioning 3. ITSM/NOC tools 4. CRM 5. SMSC 6. IVR

Open Standards

Multitenant architecture

Security Policy

IPV 6

Test Bed

MIS/ Reports

Integration

Sistema Shyam Teleservices Ltd.

22

Security Solutions

- Confidential -

The complete application life cycle management process shall be provided by the partner 1. Discovery 2. Delivery Application Life Cycle 3. Install 4. Configure Management 5. Upgrade 6. Replace 7. Management 8. Uninstall Describe the typical version upgrade process when a new commercial release is available Partner shall be responsible for day to day operations or would introduce partners capable to do the same End to End operations management (not limited to) 1. Fault monitoring and alarms 2. Policy Management 3. Network Interfaces 4. Backup 5. Scalability 6. Availability

Version Management

Operation Support (24*7 )

Operations Management

Help Desk

Help desk services for servicing consumer and enterprise customers

Self-monitoring

Ability to check the entire app to guardian link for any impairment in quality of service and for system up-time

Web interface for B2B Customizable web interface deployable at an clients enterprises security control room All customer touch points must be customizable from a branding perspective and SSTL usability guidelines

Touch point Customizability

Sistema Shyam Teleservices Ltd.

23

Security Solutions

- Confidential -

VXML 2.0 based Integrated Voice Response (IVR) Application

Application to be developed and hosted at SSTL Data Center for integrating with SSTL IVR for providing location update to Guardians once SOS is initiated by customer. Text-toSpeech (TTS) functionality for streaming voice packets to application hosted on SSTL IVR, and server for hosting VXML application to be provided by vendor

Sistema Shyam Teleservices Ltd.

24

Security Solutions

- Confidential -

B. Functional and Technical requirements App Feature/Capability SMS Alerts from App Description Compliance (C, NC, PC) Remarks

SMS sent to pre designated numbers with a SOS message A button on the primary app screen One-touch SOS alert which will trigger the services SOS alarm with live Location tracking once the alert is GPS tracking online triggered Last know location included as part of Location info in SOS the SMS as an internet link or nearest SMS identifiable address App to send location data as part of SMS back-up in case of SMS to back-end server in areas no data connectivity without data connectivity Stop location tracking option Option to stop tracking location Non-GPS location Network triangulation based location Tracking identification Ability to activate alarm by vigorously Shake to activate shaking the phone Customizable shake Ability to adjust the intensity of the Feature shaking needed to trigger the app Ability to cancel a false alarm. This should include an alert being sent to activate the bands vibration feature Cancel alert feature whenever an alarm is triggered. Can trigger audio alarm through phone Siren using phone speakers to alert speakers passers-by to come to the user's aid Alert cancellations must be done at the Cancel alert at SOS SOS Server and not at the application Server level Geo-tag unsafe Ability to tag an area as unsafe on a locations/incidents map through the app e-mail Alert E-mail alert to designated e-mail ids Alert posted on users social media sites Social Media with location and SOS message Route map as part of SOS alert "Check on me alert" incase the phone Alert in case of forced is shut off when battery is not low and shut down of phone deviates from regular usage patterns Alert sent asking people to check on "Track me" feature user regularly SMS location update Sends location update through for every 10 mt change SMS/USSD in areas without data post alarm if no data coverage if the phone moves 10 mts
Sistema Shyam Teleservices Ltd.

25

Security Solutions

- Confidential -

link

from the last know location Alerts a guardian to call user to provide Call me and bail me an escape from an uncomfortable out feature social or other situation Ability to send content related to TG through the app. Eg. - Safety tips, Content through app health tips etc. Informs users if entering an area which Safety alerts and tips has designated as unsafe by other Location based users Number of phone numbers to which app triggers SOS calls Five (5) Number of phone numbers to which app triggers SMS Five (5) Number of e-mails to which app triggers SMS Five (5) App automatically starts and runs in Run at start-up the background Syncs with wearable trigger only at Syncs with Device at pre-set times scheduled - battery pre-set time(s) conservation Syncs with wearable trigger only for Syncs with Device for pre-set durations battery pre-set duration Conservation Set areas where the app will not be Set safe zones triggered Prioritize Bluetooth pairing with device in case of Bluetooth Over rides other Bluetooth devices in conflict pairing priority Alert user in case Unsafe zones would be decided basis entering unsafe zone user tagging Deviation from safe Alerts user/guardian if any deviations route alert from pre-set route SoS button should be available through SOS button available a locked screen without having to on lock screen unlock phone Block specific numbers from calling Block calls feature user's phone Allow only specified numbers to call White listed calls only user's phone when this feature is when active feature active Block specific numbers from texting Block SMS feature user's phone SMS Alerts from App SMS sent to pre designated numbers
Sistema Shyam Teleservices Ltd.

26

Security Solutions

- Confidential -

with a SOS message Android IPhone Blackberry Devices supported (please specify all the Windows versions supported) Others (please specify) Indoor positioning Ability to locate a device inside a capability building, especially which storey A user must be able to record his/her spoken name in the application which Audio recording of must then be stored on the SOS customers name Server for retrieval during an SOS alert during registration outbound call Im Here notification Sends a "I'm safe" message on reaching to pre-loaded number a pre-designated location Alert on pro-longed If alert is triggered in no-network zone, signal loss in no app will send the SOS whenever a coverage areas network is detected User must be able to modify all User account customizable aspects of the product management from the app itself

Sistema Shyam Teleservices Ltd.

27

Security Solutions

- Confidential -

C. Functional and Technical requirements SOS Server

Feature/Capability Communications from back-end Outbound call alert

Description Back-end server which will initiate and control all communications Outbound dialer to pre designated numbers with a SOS message and last known location Last know location to be easily accessible through an online map services Route to be mapped once alert has been raised, till alert has been resolved / switched off by user

Compliance (C, NC, Remarks PC)

Online map provider integration for unsafe location alert Tracking subscriber route for duration of alert raised Alert to nearest subscribers with App enabled One-time emergency tracking code for others

Alerts other app users in the vicinity incase alarm is triggered Ability for guardian to track the user location for a single time and for a fixed duration even if an alarm is not raised by user. This feature has to be enabled by user. Outbound call in Outbound dialer in the language Vernacular selected by user with the address in an Indian accent Provisioning with Service should start only upon activation key receiving a one- time activation key or subscription renewal key as the case may be User behavior based Ability to analyze user behavior and auto alerts propose/raise alerts in case of deviations Web based interface Web based interfaces that can provide critical information to first responders 30 % buffer capacity Buffer capacity at each node from peak utilization 99.9% Uptime System availability Status update over IVR Guardians should be able to obtain the latest information on a user who has raised an alert by calling the number from which the outbound dialer originated Secure status update Guardians must be able to share the for non-guardians location of a user who has raised an alarm. This should be accessible to a non-guardian over e-mail, SMS and
Sistema Shyam Teleservices Ltd.

28

Security Solutions

- Confidential -

Opt out for guardians

Historical data Availability

Guardian number screening

Location in India

Reporting capabilities

phone calls A guardian must be able to opt out of receiving calls related to this service for a unique user alone the first time he/she receives a call from a system pertaining to that user alone. User must be activated if a guardian opts out. Alarm details (including routes) to be available even beyond alert being closed / addressed for a specified duration System should to ensure that guardian numbers are private personal numbers of individuals and not that of the police or any public or govt. entity or any private concern or entity. All numbers have to be local numbers as well. The server hardware must be physically located in India and all personal information of the customer must be stored within the sovereign territory of India. Extensive report (summary / detail) producing capabilities. Example: 1. MDN wise list of subscribers 2. Expiration date wise 3. subscriber list 4. Report based on frequency of alerts raised 5. Report based on geography / circle from where alerts are raised 6. Multiple alerts from same location over a fixed time period (input for marking that area as unsafe) 7. Due for renewal list

Indoor positioning Capability Misuse tracking and Control

Ability to translate relevant inputs from the App to usable location information Mechanism to monitor and control the usage of the service based on business rules

Sistema Shyam Teleservices Ltd.

29

Security Solutions

- Confidential -

User account Management

User must be able to modify all customizable aspects of the product from the app itself

D. Functional and Technical requirements Customer Experience Compliance (C, NC, Remarks PC)

Feature/Capability CRM

Description Vendor to provide and enable SSTL to interface with Vendor CRM systems. This CRM systems can be cloud based and should be accessible over the internet by SSTL customer care representatives and should be configurable to handle both software and hardware related issues All aspects of the product except hardware issues with the Bluetooth bracelet on a 24/7 basis over phone, chat or e-mail. Relevant product documentation must be provided including but not limited to: 1. Training manuals for sales 2. Training manual for customer service 3. Product manuals for users Capability to integrate with SSTL CRM so that complaint / query raised by subscriber (of service) can be routed to vendor issue resolution team automatically Capability to integrate with SSTL ITSM tool for responding & resolving tickets raised within stipulated SLAs

L2 response

Product documentation

Helpdesk support

Incident Management

Sistema Shyam Teleservices Ltd.

30

Security Solutions

- Confidential -

E. Customization and integration requirements Wearable Trigger Please refer to Appendix 5 for a detailed description of the existing features, proposed modifications and additional features that have to be created. The Vendor is expected to provide the technical expertise and project management expertise in coordination with SSTL to ensure that the hardware vendor chosen to provide the Wearable Trigger supplies a device that is compatible with the App and which is optimized for the purpose contemplated in the RFP. For filling up the table given below, please follow the instructions hereunder C The Vendor has the complete set of skill sets and expertise required in-house to enable the function described in the table and can provide the support required PC The Vendor may have only partial levels of the set of skill sets and expertise required in-house to enable the function described in the table but can acquire or obtain the skill sets and expertise required to render support required by the time any commercial agreement that may result out of this RFP is executed NC - The Vendor has neither the complete or partial set of skill sets and expertise required in-house to enable the function described in the table nor can the Vendor acquire or obtain the skill sets and expertise required to render support required by the time any commercial agreement that may result out of this RFP is executed

Event

Action description
Press & hold for 12 seconds Quick press 1 time Vibrate 1 time for 1 second in every 3 seconds Press & hold between seconds and 4 seconds

Compliance (C, NC, PC)

Remarks

Modifications New features

Switching device off Silence vibration alarm Phone proximity alarm Custom signal to application (A)

Application response to custom Signal signal (B) Application activation alert (C) Pairing lost or disconnected Continuous vibration without break on receiving signal (B) till vibration cancelled Vibrate 1 time for 1 second in every 6 seconds

Sistema Shyam Teleservices Ltd.

31

Security Solutions

- Confidential -

APPENDIX 4 Service Levels Service Level Agreements Severity Level-1 (Critical) issues will be attended to and service restored as per the SLA Severity Level-2 (High) issues will be attended to and service restored as per the SLA Severity Level-3 (Average) issues will be attended to resolved as per the SLA Severity Level-4 (Low) issues will be attended to resolved as per the SLA Application / System uptime Response time of application for providing current location update of customer to guardian should be less than 5 secs Illustration of Severity Categorization As per the attached Severity definition P1 to P4 document Timelines for Operations support (on 24x7 schedule) Severity Sev 1 Critical Sev 2 High Sev 3 Average Sev 4 Low Response 30 minutes 1 hour 1 hour 2 hours Workaround/ Restoration/Re solution 2 hours 4 hours 8 hours 24 hours Permanent Fix 2 working days 4 working days 6 working days 8 working days SLA 95% 90% 90% 90% 99.99% 99.80%

Please see addendum below for definitions on severity. Penalty clause Application/system uptime Rs. 1,00,000 per hour of downtime

Severity Sev 1 Critical

Sev 2 High

Response SLA breach penalty Rs. 50,000 per hour pro-rated for peak hours Rs. 30,000 per hour pro-rated for off-peak hours Rs. 20,000 per hour pro-rated for peak hours Rs. 10,000 per hour pro-rated for off-peak hours

Resolution SLA breach penalty Rs. 50,000 per hour pro-rated for peak hours Rs. 30,000 per hour pro-rated for off-peak hours Rs. 20,000 per hour pro-rated for peak hours Rs. 10,000 per hour pro-rated for off-peak hours

Peak hours till determined by empirical data can be considered to be the hours during which the probability of the services being used is very high.

Sistema Shyam Teleservices Ltd.

32

Security Solutions

- Confidential -

Incident Management process addendum* Guidelines for categorizing incident: Incident priority Priority-1: Critical Description - Impacting Services in one or more circles and no workaround in place. - Anything which prevents users from raising an SOS alarm and/or Guardians from receiving an SOS alert with time stamp and location/address - Critical System, network or key application outage (or imminent outage) with critical impact on service delivery. - Business users or partners of one or more circles are unable to use IT Systems for business transaction. - Any incident that is directly impacting the revenue of MTS impacts one or more service level commitments. - Any regulatory requirement. - Any Critical Service degradation (slowness) impacting one or more circles. - Impacting services in one or more circles with work around solution available till the problem is corrected. - Service degradation of non-critical services impacting one or more circles. - More than 10 % of subscriber base is affected in a particular circle. - Any event/customer activity that may lead to security related incident. - Critical data mismatch in MIS report. Priority-4: Low Impacting the critical services for individual customer that may lead to customer dissatisfaction. Any service disruption that will affect the productivity of individual business user. Data query on MIS report. Any other incident that affects directly or indirectly the quality of IT services to the end user. Individual user complaint with work around possible.

Priority-2: High

Priority-3: Average

* These definitions are subject to revision

Sistema Shyam Teleservices Ltd.

33

Security Solutions

- Confidential -

APPENDIX 5

Device features and actions:


Event # 1 Event Switching device on Action description Press & hold for 3 seconds Press & hold for 6 seconds Info not available Quick press 2 times Vibrate 4 times over 30 seconds Vibrate 2 times in 1 second till call answered, rejected or dropped Vibrate 1 time after pairing sequence Press & hold for 12 seconds Quick press 1 time Vibrate 1 time for 1 second in every 3 seconds Press & hold between 2 seconds and 4 seconds Signal Continuous vibration without break on receiving signal (B) till vibration cancelled Vibrate 1 time for 1 second in every 6 seconds LED Status Blue - Flicker 3 times Blue Continuously glow for 6 seconds Info not available NA NA NA NA Blue - Flicker 12 times NA Device state Off Pairing state Not paired

1st time pairing Pairing after device is on Reject incoming call Low battery Incoming call Successful pairing Switching device off Silence vibration alarm Phone proximity alarm Custom signal to application (A) Application response to custom signal (B) Application activation alert (C) Pairing lost or disconnected

Off

Not paired

3 4 5 Existing features 6 7 1 2

On On On On On On On

Not paired Paired Paired Paired Paired Paired Paired

Modifications

NA

On

Paired

1 2

NA NA

On On

Paired Paired

New feature

NA

On

Paired

NA

On

Not paired

Sistema Shyam Teleservices Ltd.

34

Security Solutions

- Confidential -

Technical specifications: Bluetooth version Carrier frequency Through-put power Effective range Continuous operational time Operating temperature range Storage temperature range Charging voltage Charging period LED colour V 2.0 2401 MHz-2480MHz 0dBm 10m 90 hours -10C to ~+50C -20C to ~ +80C 5 to ~ 5.3V 2 hours Blue

Sistema Shyam Teleservices Ltd.

35

Security Solutions

- Confidential -

APPENDIX 6

List of SSTL assets that have to integrate with the Vendors proposed solution. Asset Name Converged voice platform Description Vendor comments HP Internet Usage Manager (IUM) based platform which handles outbound calls and inbound IVR calls IT Service Management Tool HP Openview is used by SSTL (ITSM) to measure SLAs and to track operational incidents to closure. This tool is expected to used to monitor SLA adherence. Smart Sys tool Internal device service request management tool based on an ASP .NET platform.

Sistema Shyam Teleservices Ltd.

36

Security Solutions

- Confidential -

Appendix 7

1. High level process map for onboarding a new user


User buys device User downloads application User provides validation details User tests device functionality User inputs activation key

User registers

User Onboarded

User Validated

User tests service

Guardian onboarding

User furnishes guardian details

2. Proposed high level outbound SOS alert call process


User Triggers alert Device provides vibration alarm Triggered by mistake No App triggers after cancel alarm window time out App sends location alert to server App sends SMS to Guardians Server initiates outbound IVR alert to Guardians

yes User cancels alarm

Server terminates call

Server provides last known location

yes

Did user trigger alarm

Server screens for user alarm in last 12 hours

Server identifies user mapped to guardians number

Guardian calls IVR number

Server terminates call to Guardian

No Server informs guardian that location cannot be provided for more than 12 hours from alert

3. Components of the retail package a. b. c. d. e. f. g. Bluetooth module Swappable bands in multiple colours Activation key User manual Charger and cable Customer care details Warranty card ------------ End of Document -----------Sistema Shyam Teleservices Ltd.

37

Você também pode gostar