Escolar Documentos
Profissional Documentos
Cultura Documentos
FOR
IMPLEMENTATION OF
4. Bid submission
Bids as per RFP terms to be submitted in 2 different
Sealed envelope marked:
a) ―TECHNICAL BID FOR IMPLEMENTATION OF FRAUD
RISK MANAGEMENT SOLUTION FOR CBS AND
DELIVERY CHANNELS‖
b) ―INDICATVE COMMERCIAL BID FOR IMPLEMENTATION
OF FRAUD RISK MANAGEMENT SOLUTION FOR CBS
AND DELIVERY CHANNELS‖.
5. Last date & time for bid
04-08-2017 at 16.00 hours
Submission
6. Bid security Bid security in the form of:
8. Methodology for
Reverse Auction
commercial selection
of bidder
Page 2 of 155
Table of Contents
SECTION I: REQUIREMENT DESCRIPTION ...................................................................................................5
1. INTRODUCTION ................................................................................................ 5
2. PROJECT OBJECTIVE .......................................................................................... 5
3. REQUEST FOR PROPOSAL ...................................................................................... 6
SECTION II: ELIGIBILITY CRITERIA ..............................................................................................................9
1. SCOPE OF WORK ............................................................................................. 11
2. PROJECT IMPLEMENTATION METHODOLOGY .................................................................. 42
2.1 BUSINESS REQUIREMENT DOCUMENT ......................................................................... 42
2.2 SYSTEM SPECIFICATION REQUIREMENT STUDY ................................................................ 43
2.3 DEVELOPMENT METHODOLOGY ............................................................................... 44
2.4 ACCEPTANCE TESTING........................................................................................ 45
2.5 PERFORMANCE TESTING AND BENCHMARKING ................................................................ 46
2.6 TRAINING .................................................................................................... 46
2.7 COMPLETENESS OF PROJECT ................................................................................. 47
2.8 PROJECT TIMELINE ........................................................................................... 47
2.9 CONTINUAL IMPROVEMENT ................................................................................... 53
Page 3 of 155
SECTION IV: TERMS AND CONDITIONS......................................................................................................71
1. TERMS OF EXECUTION OF WORK .............................................................................. 71
2. PERFORMANCE BANK GUARANTEE (PBG OR BG) ............................................................. 71
3. ADDITIONAL MONITORING REQUIREMENT FOR OTHER CHANNELS............................................... 71
4. INDEMNITY ................................................................................................... 71
5. PUBLICITY .................................................................................................... 73
6. FORCE MAJEURE ............................................................................................. 73
7. LIMITATION OF LIABILITY ..................................................................................... 73
8. COMPLIANCE WITH LAWS ..................................................................................... 74
9. END OF SALE & END OF SUPPORT ............................................................................ 74
10. CORRUPT AND FRAUDULENT PRACTICE ....................................................................... 74
11. INFORMATION OWNERSHIP .................................................................................... 75
Page 4 of 155
Section I: Requirement Description
1. Introduction
1.1 Union Bank of India (hereinafter referred to as THE BANK), is one of the
leading Nationalized banks in India having a network of over 4200+ branches /
offices with 35,000 employees and 7500+ ATMs spread across the country,
with its business mix of over Rs.6.5 lac Crores. Presently bank has foreign
branches in Hongkong, Dubai, Belgium, Sydney and London.
1.2 Bank has implemented a centralized Core Banking Solution (Finacle from
Infosys) covering all its branches and is extending Banking services to its
customers through a number of delivery channels like ATM, debit/credit card,
Internet banking, Mobile banking, POS, E-commerce etc. The primary data
centre of the Bank is located at Mumbai and DR Site at Bangalore.
1.3 Bank has deployed robust security set-up and process for securely providing
banking services to customer through e-channels. Further to develop the real
time/near real time fraud detection and prevention capabilities, bank intends
to procure real time Enterprise Fraud Risk Management Solution for Core
Banking Solution(CBS) and all e-channels such as Internet Banking Services,
ATM, Debit card, Credit card, Mobile Banking ,e-commerce , Point of Sale
etc.
2. Project Objective
2.1 The Bank intends to implement an enterprise fraud risk management solution
with the real time/near real time detection and prevention capability with the
following objectives:
Fraud Prevention
Early Fraud Detection
Anti-Fraud Strategy
Periodic Assessment of fraud risk
Fraud risk training and awareness
Fraud alerts
Internal Fraud Risk Management
Forensic Support
2.2 The Solution should cover the risks associated with the below mentioned
indicative list of channels and products under online mode. The solution should
cover detection and prevention of frauds at different process stages of the
below mentioned products and channels for all types of transactions such as
card present, card not present, financial and non-financial transaction etc.
Page 6 of 155
with existing System Integrator of the CBS and Internet Banking solution and
bidders of other applications. Also, the proposed solution should support new
versions of all the applications. The major systems deployed for various
channels are as under:
i. CBS - The Bank has implemented a Centralized Core Banking Solution
(Finacle from Infosys) covering all its branches and is extending Banking
services to its customers through a number of delivery channels like
ATM, Debit Card, Internet banking, Mobile banking, POS and e-
commerce etc.
ii. ATM Switch –The ATM switch of the Bank (managing 7500+ ATMs) is
Base24 Switch (OEM-M/s ACI) located at Bank‟s Data Centre (DC) in
Mumbai. The Disaster Recovery (DR) of ATM switch is installed at
Bangalore. At present, Bank is using above mentioned ATM switch
however the proposed solution should be covering any other ATM switch
implemented by the Bank during the contract period without any
additional cost.
iii. Credit card Switch and POS - The credit card authorization Switch and
POS driving of the Bank is located at Vendor Data Centre (DC) in vendor
premises in Mumbai. Both the switches are being managed by ATOS
world line India Pvt. Ltd. (AWL). The Disaster Recovery (DR) switches
are installed at Bangalore and are being managed by ATOS world line.
iv. Internet Banking - Bank has implemented Internet banking application
(Finacle eBanking from Infosys) located at Bank‟s Data center, Mumbai.
v. Mobile Banking- The Bank has implemented mobile banking, Digipurse
and UPI application which are located at the data center of Financial
Software Systems Pvt. Ltd. (FSS).
vi. E-Commerce- All card not present transactions, online payments
through debit cards/ATM cards/Credit cards through different payment
gateways
vii. Financial Inclusion solution/gateway solution provided and managed
by M/s Coromandel Infotech however bank is in the process of migrating
FI gateway from opex model to capex model to be implemented by M/s
Integra.
3.3. The selected bidder can provide either a single solution for both CBS and
delivery channels or two different solutions, one for CBS and other for
delivery channels. However in both the cases, the selected bidder has to
provide a single interface for full view of CBS as well as all the channels. The
solution/all proposed solutions should have proven integration capabilities
with the bank‟s CBS and bidder should ensure that the EFRM solution does not
have a performance impact on the CBS solution. The solution must have cross
pollination of data between CBS and all e-channels as a built in functionality.
3.4. The bidder is expected to detail out technical architecture, infrastructure
requirement, detection techniques employed including alert mechanism and
optimal strategy for detection of fraud and prevention of scenarios applicable
to indicative products and channels along with their combinations (in case of
Page 7 of 155
syndicated fraud). The bidder is also expected to validate the solution
outlines with case studies based on their experience.
3.5. Bidder should also ensure that the product OEM is involved in the
implementation of the project till its completion. A letter from the product
OEM confirming the same has to be submitted in the bid. The bidder will be
selected after completion of the evaluation process which is given under
Evaluation Criteria section of this document. The OEMs have to give the
certificate to the Bank post implementation, confirming the implementation
of their products with best industry practices and the standards.
Page 8 of 155
Section II: Eligibility Criteria
Only those Bidders who fulfill the following criteria are eligible to respond to the RFP.
Offers received from the bidders who do not fulfill any of the following eligibility
criteria are liable to be rejected.
For Bidder
The bidder shall submit the proofs of minimum eligibility criteria as given below-
1. The bidder & EFRMS OEM should be a registered company in India and should be in
existence for minimum of Five years as on the date of RFP.
2. The bidder & EFRM OEM should have minimum annual turnover of Rs.100 Crores in
the last three financial years (i.e. 2012-13 & 2013-2014 & 2014-15). Audited
Balance Sheet and Profit & Loss accounts are to be submitted as a proof. In case
last financial year i.e. 2016-17 annual reports are not audited, bidder must submit
previous three financial years audited annual reports i.e. 2013-2014, 2014-15 and
2015-16
2.3. The bidder and EFRMS OEM should have annual turnover of Rs.100 crores or more
and makingbe in net profit during two of the last three financial years (i.e. 2014-
15, 2015-16 and 2016-17) out of which profit in last financial year is mandatory.
Audited Balance Sheet and Profit & Loss accounts are to be submitted as a proof.
In case last financial year i.e. 2016-17 annual reports are not audited, bidder must
submit previous three financial years audited annual reports i.e. 2013-2014, 2014-
15 and 2015-16.
3.4. Bidder/OEM should have experience of having implemented EFRM Solution in:
a. At least one Commercial Bank (excluding RRBs & Co-operative Bank) in India
having business mix of minimum Rs. One lac crore or a Bank in abroad with
minimum business mix of USD 15 bn as of last financial year. (Business mix
is Total assets + Total Deposits)
Page 9 of 155
4.5. Bidder should be Original Equipment Manufacturer (OEM). In case the bidder is an
Authorized Representative of OEM, Bidder has to submit the authorization letter as
per Annexure-N from the OEM to bid on their behalf along with technical and
commercial bid.
5.6. The companies or firms, bidding for tender, should have not been black listed by
any of Government Authority or Public Sector Undertaking (PSUs). The bidder shall
give an undertaking (on their letter head) that they have not been black listed by
any of the Govt. Authority or PSUs. In case, in the past, the name of their Company
was black listed by any of the Govt. Authority or PSUs, the name of the company or
organization must have been removed from the black list as on date of submission
of the tender, otherwise the bid will not be considered. Please refer Annexure-G
Note2: The Bidder must comply with all the above mentioned criteria. Non-compliance of
any of the criteria will entail rejection of the offer summarily. The requirements
mentioned above are mandatory.
Bidder should fulfill all the Eligibility criteria. Only those who fulfill all the eligibility
criteria will qualify for further evaluation.
Documents required to be submitted along with those mentioned in eligibility criteria
above:
Page 10 of 155
Reference Site Customer Name and Contact information to be provided to the Bank
with whom discussion can be done.
Audited Balance sheet for last three years.
The list of skilled staff with their qualification and certification. (Copy of the
certificates of the staff should be submitted).
1. Scope of Work
The scope of work would include design, supply, configuration, customization,
integration, testing, user acceptance, documentation, training, warranty support and
post warranty maintenance support, it contracted for all the solution components
including software/hardware/database/licenses/tools required for the fulfillment of
the scope.
The EFRM product solution will cover enterprise wide fraud detection and prevention
covering core banking solution and different channels and banking products as
mentioned in point no. 2.2 at page 5. Bidder may be a System Integrator or Product
OEM. The proposed solution should be a single integrated EFRM solution for all banking
channels (including CBS) and all banking applications. The solution should have proven
integration capabilities with the CBS and bidder should ensure that the EFRM solution
does not have a performance impact on the CBS or any other channel. At each stage of
implementation, OEM has to submit a letter on their letter head mentioning that the
product has been implemented with industry best practices.
The bidder shall be responsible for carrying out all the required activities including day
to day operational activities to achieve the scope mentioned in RFP during the
contract period. The bidder will be responsible for involvement and commitment of
other partners for the successful execution of the project. The bidder in this regard is
required to enter into a back to back agreement (including NDA agreement) with
partners that it is conformity with deliverables and other service/uptime commitments
the bidder makes to the Bank under the contract to be entered into. Whenever
requested by the Bank, the bidder has to share the copy of such agreements.
The broad scope of work for the bidder under this RFP shall be –
1.1. The Solution should cover the risks associated with the below mentioned
indicative list of channels and applications under online mode. The solution
should cover prevention and detection of frauds at different process stages of the
below mentioned applications and channels for all types of transactions such as
card present, card not present, financial and non-financial transaction etc.
I. Online Mode: - The Fraud detection is to be done on real time basis. The
authorization/decline of the In-flight transaction should not affect
performance of the source systems. Real time monitoring and actioning on
transactions pertains following products:-
i. E-Channels
a. Internet Banking
b. Mobile Banking
c. ATM
d. All types of Card such as Credit card, Debit card, Prepaid cards,
wallets etc
Page 11 of 155
e.
POS (Point of Sale)
f.
Cash Deposit machines
g.
Payment Gateway and E-commerce Transactions
h.
FI (Financial Inclusion) Gateway
i.
Aadhar Enabled Payment systems
j.
IVR (Interactive voice response)
k.
Any other delivery channel introduced by the Bank during the
contract period
II. Near Real Time/Real Time monitoring:- The Fraud detection is to be done on
Near Real Time/ Real Time basis. The authorization/decline of the In-flight
transaction should not affect performance of the source systems. Near real
time/Real time monitoring and actioning on transactions pertains following
products. It is to be noted that proposed solution should also have capabilities
of real time detection and prevention of following frauds, however, bank may
at its discretion will deploy solution in real time/near real time monitoring
and prevention mode:-
1.2. The Bidder is expected to integrate the solution with the existing transactional
and other systems deployed by the Bank without impacting the performance of
the source systems. The major systems deployed for various channels are as
under:-
A. Infosys Finacle Core Banking Software (Branch Banking, Service Branch
Operations etc.). The delivery channel integrator is Connect 24 of Finacle.
B. Infosys Finacle Internet Banking Solution
C. ATM Switch
D. Mobile Banking Solution
Page 12 of 155
E. Lending Automation System
F. POS Switch
G. Cash Management and Channel Financing
H. Treasury Application
I. Financial Inclusion solution / gateway solution
J. Data Warehouse
K. Integrated Risk Management Solution
Page 13 of 155
1.3.10 The proposed solution should provide the capability to detect, discover,
prevent and investigate the frauds in real time not only restricted to
only one channel but across all the channels mentioned i.e. CBS, ATM,
Internet Banking ,Mobile banking , Credit Card and POS.
1.3.11 Solution should support automated interactive outbound call based
alerts on 24X7 basis to intimate and confirm with customer in case of
high risk transaction.
1.3.12 Solution should support automated interactive SMS based alert facility
on 24X7 basis to intimate and confirm with customer in case of high risk
transaction.
1.3.13 Solution should have an interactive mobile alerting and payment
platform that provides a flexible interface between mobile channels and
transaction systems. It should be used for transaction push as well as
pull services and use SMS, Email, mobile browser, voice, or applications
as delivery platform. The system should support the receipt of a request
via any mobile channel and connects with a range of host systems to
process. The result should be communicated back to the originator as
well as trigger a message to the proposed solution. Push data feeds
should be obtained from different channels which will be processed in a
business flow and should be resulted in alert messages to the users.
1.3.14 The bidder should take care of all aspects of Installation on existing set-
up, De-Installation, Configuration, Re-configuration, enhancements,
updates, upgrades, problem analysis, on–site, as well as off-site support
to ensure smooth operations during and post implementation till end of
contract period.
1.3.15 Bidder will have to ensure the troubleshooting in all forms like
technical, administrative and customer related issues etc.
1.3.16 The bidder has to ensure that any equipment (Hardware/Software/
Database) proposed as a part of RFP response will not have reached the
End of sale/End of support/End of life during the contract period.
1.3.17 The proposed solution should support the existing customer base
/transaction base on each of the channel including CBS and must
support scalability to add additional future growth without the need to
discard the earlier set-up. The present customer base /transaction base
with the channels are as below:-
Page 14 of 155
5 Credit Card 1,83,000 15,00,000 30% 20% 90,000
holders
6 POS terminals 51960 6,00,00,000 50% 50% 42,000
*The active Customers are those users who have done any financial or non-financial
transaction within 6 months using any of channels as CBS (Branch Banking)/Internet
banking/ATM/Credit card/Debit card/Mobile Banking/e-commerce etc.
1.3.16. The proposed solution should be able to monitor and detect frauds in
real-time for all channels and CBS.
1.3.17. The proposed solution should have the capability for cross-channel fraud
monitoring and prevention.
1.3.18. The proposed solution should be provided with High availability within
the primary site and replication of configuration, history data, polices
etc between primary site and DR site. There should be synchronization
between DC and DR under bank‟s specified Recovery Point Objective
(RPO) of 15 Mins and Recovery Time Objective (RTO) of 30 Mins. To
meet the RTO, the bandwidth requirement has to be mentioned in the
technical bid.
1.3.19. The bank wishes to have a dedicated infrastructure for
development/testing, and Production environment. The bidder should
accordingly design the solution.
1.3.20. Overall scope must ensure full coverage of 24*7 monitoring and fraud
detection for integrated channels and products.
1.3.21. The selected bidder should provide sizing of the hardware, Operating
Systems, standard middleware if any, RDBMS licenses if any required for
the implementation of the solution for both the locations Primary Site
(DC) and DR. Bidder will provide all the required hardware and OS. The
bidder has to keep into account the year on year anticipated growth in
the customer base while giving the sizing of the hardware and
software/application. The bidder will also be responsible for any
Upgradation/maintenance/patch management for delivered hardware
during contract period.
1.3.22. The proposed solution should provide robust fraud detection and risk
scoring capabilities using following approach but not limited to as
below:
Advanced rule/scenario based detection
Identity Resolution
Dynamic Behavior Profiling and anomaly detection
Machine Learning based Predictive Scoring models (including
Neural Networks and Support Vector machine)
1.3.23. The proposed solution should provide pre-packaged scenarios or have
the flexibility to create such scenario with minimal efforts as and when
required for multiple products and channels.
1.3.24. The proposed solution should provide web based scenario authoring tool
to configure new fraud schemes as and when required.
Page 15 of 155
1.3.25. The proposed solution should allow configuring various business policies
like approve/decline/challenge/hold transaction based on the fraud risk
score.
1.3.26. The proposed solution should provide advanced case management
system with rich client software for link analysis and visualization of
complex networks that can be integrated across source systems for case
investigation.
1.3.27. Proposed case management system should support configurable work
flow based on the case type and built-in auto case routing mechanism.
1.3.28. Proposed advanced case management tool should be integrated with the
case investigation, link analysis and visualization tool for the case
investigation.
1.3.29. Proposed case management solution should support case escalation
feature based on business policies configured.
1.3.30. The proposed solution should support watch list management for various
black lists and white lists.
1.3.31. The proposed solution should support entity link analysis tool to detect
organized fraud rings and collusions.
1.3.32. The proposed entity/network link analysis tool should support both
static link analysis based on customer/account demographics and
dynamic link analysis based on transaction parameters.
1.3.33. The proposed solution should provide complete evidences for why a
transaction was declined/hold by the fraud management system.
1.3.34. The proposed solution should provide complete audit trail.
1.3.35. The proposed solution should support built-in maker checker
functionality to ensure dual commit to critical system changes.
1.3.36. The proposed solution should provide MIS dashboard and reports for
tracking fraud cases, investigators‟ performance and system
performance.
1.3.37. Bidder will have to ensure the troubleshooting in all forms like
technical, administrative and customer related issues etc.
1.3.38. Bidder should provide SLA based services and the SLA tracking system as
well as for maintaining operational workflow.
1.3.39. The OEM/bidder should have thorough understanding of technicalities of
Finacle CBS and should have an arrangement with Finacle Software
provider for information sharing on an ongoing basis. The OEM or SI has
to establish such arrangement in vogue. This is required as any release
of Finacle Patches should not isolate the EFRM solution which is
envisaged for tight integration with Finacle deployed in the Bank.
1.3.40. The bidder should provide enterprise case management for viewing of
all the channels.
1.3.41. The selected bidder should provide suitable backup solution along with
the required hardware sizing for taking backups.
1.4. Risk Based Fraud Monitoring for Internet and Mobile Banking
Page 16 of 155
1.4.1 The proposed solution should be able to integrate with Finacle
CDCI/Connect 24 channel integrator to monitor Internet and mobile
banking transactions with minimal/no support from the actual CBS
bidder. Solution should also support new versions of Finacle CDCI.
1.4.2 The proposed solution should be able to prevent existing and emerging
frauds as result of phishing attacks, malware attacks, denial-of-service
attack (DoS), Man-in-the-Middle (MITM) and Man-in-the-browser (MITB)
attacks etc.
1.4.3 The proposed solution should monitor and detect frauds for all pre-
login, login and post login related transactions.
1.4.4 The proposed solution should support advanced IP geo-location
capability to detect IP Country, IP City, Proxy IP and zone hopping.
1.4.5 The proposed solution should support site authentication capability with
personalized images and phrases.
1.4.6 The proposed solution should support wide range of 2FA techniques
including SMS/Email OTP, software tokens, hardware tokens,
transaction signing tokens, PKI certificates & Digital Signature
certificate.
1.4.7 The proposed solution should not require any download or installation
by the end user and should support all types of browser and operating
systems environments on all devices e.g. Personal Computers / Laptops
/ Smart phones/ other devices.
1.4.8 Solution should have capability to build and re-factor dynamic e-banking
user behavior profiles including but not limited to:-
i. Preferred Country
ii. Preferred City
iii. Preferred IP
iv. Preferred ISP
v. Preferred Device
vi. Preferred Payee
vii. Average Daily/Weekly/Monthly Funds Transfer amount /
frequency by payee / biller
viii. Preferred Transaction hour
1.4.9 The proposed solution should support IPV6 addressing.
1.5.1 The proposed solution should be able to integrate with Finacle CBS with
minimal/no support from the CBS vendor. Solution should also support
new versions of Finacle CBS.
1.5.2 The proposed solution should have the capability to detect and
block/hold suspicious fraudulent core banking transactions.
1.5.3 The proposed solution should not impact the performance of Finacle
core banking application and other applications.
1.5.4 The proposed solution should be able to monitor both financial and non-
financial transactions and detect frauds from core banking transactions.
Page 17 of 155
1.5.5 The proposed solution should support both transaction monitoring and
fraud prevention/transaction capability for core banking transactions.
1.5.6 The proposed solution should provide pre-packaged scenarios or have
the flexibility to create such scenario with minimal efforts as and when
required to detect various branch banking and employee frauds
including account take over, embezzlement, nepotism, suspicious
inquiries etc.
1.7.1 The OEM should be committed to the success of the project during
actual implementation by being involved in the implementation of the
project till its completion. The OEM should be involved in the overall
implementation, support, sustenance, etc. n each of the EFRM modules
proposed by the bidder as per the scope of work defined in RFP.
1.7.2 The following are the tentative expectations with respect to OEM
involvement during the contract period, however the bank reserves the
right to change the scope:
Review of Business Requirements Specification (BRS) document,
taking into account all quantitative and qualitative aspects related
to configuration of the solution from an industry leading practices
perspective and in tune with regulatory guidelines.
Page 18 of 155
Review of solution architecture to assess the extent to which same
will support business requirements and review gaps/ customizations,
if any
Review of information requirements and supporting processes with
respect to completeness and quality
Review of functional configuration by duly benchmarking against
defined scope and business requirements
Review of test strategy, scenarios and test cases developed for
supporting the configuration for conducting UAT of the solution
configured
Review of UAT environment, plans, mapping of test cases and
functional requirement specification and tracking mechanism for
resolution of issues
Review transition plan and approach
Bidder shall furnish teaming agreement with OEM for the above
scope of work and submit the same as part of the bid. This teaming
agreement should include but not limited to the ownership of the
activities, timelines and resources associated to the activities.
For above scope of work, OEM shall produce following deliverables in
the course of implementation:
BRS Review report with recommendations for resolution of gaps
across all modules of the EFRMS
Review Report on solution architecture and information
requirements with recommendations for resolution of gaps
Report on functional configuration check done containing the
observations on UAT test strategy, cases and scenarios, UAT
plan, etc
The Bidder should further provide the deliverables and sign off for
each of the deliverables at various stages of migration, Upgradation,
customization and implementation.
Further, the Bidder should arrange for sign-off by OEM for each of
the critical stages of migration, Upgradation, customization and
implementation
1.8.1 Software
The scope of work in the Request for Proposal (RFP) for the EFRM solution
would include supply, installation, implementation, maintenance and
Page 19 of 155
support for the tenure of the Contract at the DC and DRC. The solution
proposed by bidder should support high disk IOPS (Input Output Operations
per Second) to meet the banks requirement in terms of performance.
The Bidder‟s responsibility will also include designing, sizing, procuring
development, testing, implementation, training and maintenance of the
EFRM solution required as part of this RFP that includes all Software
Development Life Cycle activities (SDLC) including customization,
parameterization and implementation of application software, training, etc.
covering at minimum the below listed areas of the Bank‟s functions and
requirements.
Detection & Rule Engine
Case Management & Workflow
Scoring
Analytics
Data Management
BI (Business Intelligence) & Reporting
Integration & Interface
Integrated Fraud Management
Forensic Support
Additionally, the Bidder will be responsible for
The end to end Implementation of the solution (EFRMS) including
integration with various systems to meet the requirement of
Detection, Monitoring and Prevention of the Fraud
The end to end software development life cycle of the EFRM Solution
Customization, parameterization and implementation of application
software and solutions
Facilities management services at the DC and DR
Hand-over successfully either to the bank or any vendor appointed
by the bank at the end of the agreed upon contract period
Setting up a IT Service desk
The services offered as part of the warranty and post-warranty support
must be in conformance with the specifications supplied in the Technical
Specification. During this period, the Bidder will be responsible for the
patch application / bug fixing / replacement / support of all software
supplied under this tender.
Oracle Database is preferred by Bank as Bank already has ULA (unlimited
license agreement) for Oracle database along with golden gate and it is
hereby explicitly stated that, bidder proposing Solutions/component of
solutions supporting Oracle Database should not quote for database in their
bid. Only Solutions/Component of Solutions which do not support Oracle
Database should specifically mention the database and quote in database
tab of Bill of Materials. The bank will consider quoted value for the TCO
1.8.2 Hardware
Page 20 of 155
The Bidder is required to size for adequate hardware based on the volumes
for the EFRM Solution Application & Database and other Applications. The
bidder is expected to deploy hardware for DC and DR separately as per the
timelines mentioned in Project Timeline Section. The bidder is expected to
quote the hardware in the TCO as a single entity for all hardware
components as per the format asked in the Hardware tab of BOM. The bank
will consider quoted value for the TCO.
The hardware technology proposed for the EFRM Solution should be the
enterprise class, best of the breed, latest, tested and stable release of OEM
and based on the latest platform enabling technology supporting the
complete EFRM Solution.
The production hardware must be enterprise class with adequate vertical
and horizontal scalability. If an appliance is proposed as part of the EFRM
Solution, there must be adequate CPUs, memory and storage available to
accommodate the sizing and growth aspirations of the Bank during the
contract period. During the contract period the Bank will not consider any
plea by the bidder for horizontally scaling the appliance in case the sizing is
inadequate. Hence the Bidder must propose an appliance having adequate
vertical headroom. In case any horizontal scaling of the appliance is
required then the Bank would not bear any cost and the cost will have to be
borne by the Bidder.
The Bidder is responsible to arrive at the sizing independently. The Bank is
not responsible for any assumption made by the Bidder not meet the
performance/service levels as desired in the document, the Bidder will at
their cost carry out the necessary upgrades / replacements. The Bank will
not pay any additional amount during the period of the contract.
The recommended hardware should have high reliability, fault tolerance,
redundancy and high availability having no single point of failure in the
hardware (NSPoF).
Bidder is required to provide the detailed configuration of the proposed
Hardware (Training, Test & Development, Production and DR server)
environments in Annexure- M and the proposed hardware must meet the
SLA as detailed in the Section II.
The system should be configured in high available (HA) mode in Active-
Active mode. The entire system should be configured in such a way that
there should not be any single point of failure. Bidder has to propose all the
hardware peripherals and quote for software required accordingly.
The Bidder will have to set up the DR site which must be capable of
handling 100% of the storage load of DC production. The CPU, memory and
other components can be sized at 100% of the DC. The DR will be used
during periodic DR Drills and when primary is not available.
1.8.2.1. Storage
While proposing the actual storage specifications, the sizing and parameters
should be taken into consideration and specification must be provided by
Page 21 of 155
the Bidder based on the application, architecture & the storing volume
requirement.
The proposed storage solution should be scalable to meet the sizing and the
growth requirements. However, the bidders should right size the solution to
meet the requirements provided in this RFP for the contract period of 5
years.
Bank expects the bidder to propose the storage hardware as per the
proposed solution.
The Bidder is required to provide the configuration details of the storage
system. Each node should run separate instance of operating system. Each
node should be connected to a dedicated storage (providing fixed number
of disks, cache memory and fiber channel or better ports) via high speed
fiber channel adapters.
1.8.2.2. Servers
Separate adequately sized hardware should be quoted for test &
development and training and applicable servers.
There should be three separate Training, Test and Development
environments. A development, test and Training servers must be configured
in the EFRM solution, which should be a separate server/node/resource.
The additional configuration towards this usage should be clearly indicated.
The test & Development servers should be sized to 20% capacity of the
respective production servers while the Training servers should be sized to
10% capacity of the respective production servers. The performance testing
server configuration will be mutually arrived with the Bidder based on the
volumes of transactions shared in the RFP.
UAT Environment will be used as Pre-Production environment by the bank
and it should be sized as 40% of the production server. The test &
development environment should be identical to the production
environment with respect to hardware and software (not limited to
database, appliance & data model). This is to avoid any issues during the go
live stage of each phase.
All servers are required to have a minimum of dual 1000 Mbps Ethernet
network interface cards (NIC) or a better equivalent installed on the board
itself or on different slots. Each NIC will be cabled from a different module
on the switch using gigabit speed cabling.
Application, Database and Web servers should be both vertically and/or
horizontally scalable and must be capable of incremental expansion to meet
the growth requirements of the Bank as defined above. The key server
hardware proposed must be enterprise wide class in their respective
category.
The specified servers must be current/ recent in the OEM‟s product line and
must be fully supported by the OEM for the duration of the project and for
the warranty and post warranty. The Bidder is required to provide the
configuration details of the server system. Each node should run separate
Page 22 of 155
instance of operating system. Each node should have multiple network ports
to communicate all application servers.
1.8.2.3 Additional Servers
All servers should be minimum 64 bit technology and support fiber channel
or better provide gigabit ports. The proposal must offer as many numbers of
additional servers as may be required to run one or more of the associated
software tools and products forming part of the solution.
In case one or more (or all) offered tools run on the main server system
itself, the appropriate configuration for that part of the load must be
additionally provided for in the solution clearly mentioning this distinct load
and configuration requirements.
1.8.2.4 Data Recovery Center
The solution provided by Bidder for the EFRM solution must support Disaster
Recovery plans as follows:
Allow fail over as per the DR policy of the Bank
Provide architecture and design for Disaster Recovery
Bidder must detail out any licensing information related to Disaster
Recovery design
Provide Active-Active Disaster Recovery
Provide RTO of 30 minutes
Provide RPO of 15 minutes
Provision for data from DC to be automatically propagated online
through asynchronous replication to disaster recovery/failover sites.
Size the DR at 100% capacity of the DC
1.9. Security
Bidder should review the information security risks in line with RBI guidelines, IT
Act etc. and other best security practices for the scope mentioned in the RFP and
provide its mitigates. Bidder should submit a certificate indicating that the
solution being proposed in the RFP, is complying all regulatory guidelines viz. RBI
Guidelines/IT Act etc.
1.10. Environment
I. Pre-Production
II. Production
III. Development
IV. UAT Environment configuration (will be mutually arrived with the
Bidder.)
1.11. License Requirement and Capacity Planning
I. The licenses should be enterprise licenses covering all the channels (present
and future), Banking products, overseas operations including subsidiaries.
II. Any additional channel/product introduced by the bank within the contract
period should be covered in EFRMS. The bank will not be liable to pay
additional cost for any such scenarios. The bidder is expected to integrate
such channels/products to the EFRMS at no additional cost to the Bank.
Page 23 of 155
III. The Software Licensing cost would only be applicable for production servers
both DC and DR. However, other software installations for internal purposes
such as Testing, Development and Training should be at no additional cost to
the Bank.
IV. These licenses should be made available within a month of issuance of
Purchase Order.
V. The Bidder is required to provide detailed information as how their solution
addresses capacity issues. As the data volume grows and more data is added,
ability of the solution to handle the ongoing load must be monitored.
Capacity planning means continuously determining the capability of the
hardware and software to support additional users.
VI. The Bank will not be responsible or liable for any infringements or
unauthorized use of the licensed products. In the event of any claims against
the Bank for any license related issues, the Bidder will have to act upon the
same and all liabilities and claims whatsoever will have to be settled by the
Bidder.
VII. Further if the Bidder has missed out providing any licenses to the Bank, then
the Bank will not bear any additional amount for procurement of such
licenses at a later date.
VIII. Bidder is required to consider the ATS of the Solution and related application
software for the period of contract from day one. The Bidder is required to
provide perpetual license in nature for all modules of the EFRM solution.
IX. The Bidder should consider the statistics as mentioned in RFP else where and
consider a growth of 25% year on year during contract period.
Page 25 of 155
1.13. Facility Management and Service Requirement
The bidder will provide onsite operational and technical support for the solution
during the entire period of the project including warranty and post warranty
periods starting from go-live. The vendor should get the consent of the Bank for
the on-site engineers prior to their posting.
This section describes, but does not limit, the services required by the Bank. The
Bidder shall consider and envisage all services that will be required in the
maintenance of these facilities. The Bidder agrees that these services and the
management of these services will be provided for all the Head offices,
Zonal/Regional offices, etc of the Bank.
Considering the enormity of the assignment and the envisaged relationship with
the Bidder, any service, which forms a part of facility management that is not
explicitly mentioned in this RFP as excluded, would form part of this RFP. The
Bank will not accept any plea of the Bidder at a later date for omission of critical
services on the pretext that the same was not explicitly mentioned in the RFP.
1.13.1 Services to be provided
This section describes, but does not limit, the services required by the Bank
for the Solution proposed as part of this RFP at the Data Centre, Disaster
Recovery Site, Head Offices etc. The Bank intends that the contract which
is contemplated herein with the Bidder shall cover all deliverables and
services required to be procured or provided by the Bidder during such
period of contract. The Bidder needs to consider and envisage all services
that would be required in the maintenance of the facilities. FM for all
purposes means an Annual Maintenance Contract (AMC), warranties, ATS
(Annual Technical Support) for all applications and interfaces provided,
quoted and developed by the Bidder and all other costs necessary and
incidental for the maintenance and support of the infrastructure and
equipment provided by the bidder.
Page 26 of 155
Routing the transactions through the backup system in case
the primary system fails
Switching to the DR site in case of system failure
Handling of alerts and fraud cases.
Performance Monitoring /Fine Tuning
System/Application Administration
Fixing any vulnerability
Software Distribution
Software License Management
Software maintenance
Updates/Upgrades/New releases/New versions
Database Administration activities for Database
Hardware Configuration Management
Server Management , Planning and Operations
Backup & Restore
c) The Bidder will be solely responsible for providing and maintaining
all services as mentioned above for all third party support
applications quoted by the Bidder as a part of their proposal.
Page 28 of 155
The Bidder acknowledges that the rights mentioned herein
are without prejudice to the rights and the remedies
(under law or equity) that the Bank may have against the
Bidder.
The Bidder shall apply regular patches to the licensed software
including the operating system, databases and other applications as
released by the Original Equipment Manufacturers (“OEM‟s”), for
which the Bank will bear no additional costs. The Bidder agrees that
the functioning of the EFRM SOLUTION of the Bank will not be
affected adversely as a result of any new releases, enhancements,
patches, etc.
The Bidder agrees at all times to meet the service levels as
specified in this RFP document
The Bidder shall maintain the entire IT infrastructure for all the
components implemented under this tender and subsequent
agreement as well.
User support in case of technical difficulties in use of the software,
answering procedural questions, providing recovery and backup
information, and any other requirement that may be
incidental/ancillary to the above
Prompt receipt, analysis and reporting of reported deficiencies in
the operation of the software and supply of information and advice
on such deficiencies
Installing/commissioning the software at the designated
locations/changed designated location at no additional cost or fees
or expenses to the Bank.
Installing/commissioning the upgrades / new versions/ new releases
of software at the designated locations/changed designated
location at no additional cost or fees or expenses to the Bank.
The requirements that are finalized with the Bank post the gap
assessment phase and included in the business requirements
document, will need to be provided by the Bidder at no additional
cost to the Bank.
Providing remedial support in case the software media is virus-
infected at no additional cost or fees or expenses to the Bank;
Unscheduled, on call, corrective and remedial maintenance and
support services
Providing “enhancements”
Providing changes to the licensed software, which are of software
fine-tuning in nature
Program Errors Correction
The Bidder shall use its best efforts in remedying any program
error. All Program Errors shall be reported in accordance with the
procedure prescribed in respect thereof and shall be accompanied
by sufficient information including the input data that generated
the program error so as to enable the Bidder to reproduce and
verify the reported program error. On receipt of request together
with all such information and data the Bidder shall use all-out
efforts, consistent with the severity of the program error, to
Page 29 of 155
remedy such program error which is within the purview of the
system logic, that it has been able to reproduce and verify. Such
remedies may include providing instructions to the Bank to cure the
program error or delivering updates at no additional cost.
The Bidder warrants that any or all program errors that are
reported will be remedied.
In the event, the Bidder determines that the error reported/
problem notified in the support request in not a Program Error, it
shall advise the Bank whether it can correct or assist in resolving
such error/problem on a best effort basis.
1.13.2.3 Enhancement
All requests for Enhancements that may be required for any reason by
the Bank shall be made in accordance with the procedures to be
established by the Bank in this regard.
Any service provided by the Bidder, which is within the purview of the
Software Maintenance and Support Services contemplated herein shall
be at no additional cost or fees or expenses to the Bank.
The Bidder shall rectify any corruption in the application software or
media at no extra cost to the Bank.
The Bidder shall ensure „nil‟ downtime of licensed software, prompt
execution of customization and enhancement requirements, version
control mechanism and also to develop smooth upgrades and version
changes, ongoing training, user group meetings and feedback
mechanism.
The Bidder agrees that licensed software support will include update,
upgrade, technical guidance on usage of features and functionality,
problem solving, troubleshooting and operational errors/bug fixation,
rectification of bugs, enabling features of the licensed software already
provided exclusive of new software licenses, providing additional user
controlled reports, enabling parameterized features, future product
information, migration path details and consultancy.
Page 30 of 155
The Bidder agrees that the support will be rendered in person in the
normal course and in emergencies, support will be extended through
telephone, fax, and email and that such instances should be an
exception
Bidder is expected to provide relevant reports for the previous month in the
1st week of every month and same needs to be jointly reviewed by Bidder
and Bank in next 3 working days. The reports should be benchmarked
against the Service Levels defined in Service Level Agreement, and penalty
should be calculated based on the level of deviation from Service levels
defined. The Bidder is required to submit the list of reports to track
performance on service levels for all managed services under scope of this
tender.
Rollout planning.
Obtain Sign-off for Patch release implementation.
Communication, preparation and training to the team for Patch
implementation.
Storage of controlled software in both centralized and distributed
systems.
Patch Release, distribution and installation
Compliance & Adherence to Information Security Policy of the Bank.
Log history of patches applied is required to be maintained.
Firmware updates
1.13.2.7 Backup/Restore
The bidder has to provide backup solution including hardware/software/
license etc to take Backup of proposed application.
Page 32 of 155
The bidder will ensure that periodic backup as per bank‟s policy should
be taken on tape for application logs, configuration, etc.
Bidder also has to provide services for system administration services.
Examples of these services are:
Client account maintenance - Creating users, groups, creating
user accounts, deleting user accounts, modifying user accounts,
etc. on the system;
File/system/application access management - Maintaining file
and directory permissions on OS and application access
management like creating user accounts at application level,
assigning application access, setting application passwords, user
lockout, etc.;
Performance optimization and reporting - Process and Memory
Management, monitoring CPU performance, monitoring Memory
performance, monitoring Input/output performance, monitoring
Ethernet traffic, etc.;
Error detection and correction;
Troubleshooting and client support
1.13.3 Warranty
Page 33 of 155
All the hardware, software products supplied should carry a minimum
warranty of 1 years.
The products & services offered must include comprehensive on-site
warranty as provided by the OEM Vendor from the date of installation and
acceptance of the solution by the Bank including all software, hardware,
parts, media, patches, updates and licenses. The Warranty will commence
from the date of acceptance and use of hardware.
Bidder shall be fully responsible for the manufacturer's warranty in respect
of proper design, quality and workmanship of all hardware, equipment,
accessories etc. covered by the tender. Bidder must warrant all hardware,
equipment, accessories, spare parts etc. against any manufacturing defects
during the warranty period.
During the warranty period Bidder shall maintain the systems and repair /
replace at the installed site, at no charge to the Bank, all defective
components that are brought to the Vendor's notice.
Warranty should not become void, if Bank buys, any other supplemental
hardware from a third party and installs it within these machines under
intimation to the Bidder. However, the warranty will not apply to such
supplemental hardware items installed.
In the event of system breakdown or failures at any stage, protection
available shall be specified which would include the following:
Diagnostic for identification
Protection of data entered
Recovery / restart facilities o Backup facilities
The Bidder shall carry out Preventive Maintenance (PM), including
cleaning of interior and exterior, of all hardware and testing for virus, if
any, once in a calendar quarter and should maintain proper records at
each site for such PM. Failure to carry out such PM will be a breach of
warranty and the warranty period will be extended by the period of
delay in PM.
For implementing different versions of Application Software, if
adjustments / change in the configuration are to be made in base
memory the same should be carried out by the Vendor as a part of
warranty.
If the Operating System or additional copies of Operating System are
required to be installed / reinstalled / de-installed, the same should be
done at no additional cost during the period of contract. The Bidder
shall provide or develop with the assistance of Bank
Technical Standards;
Security Requirements;
Operating Procedures;
Recovery Procedures;
Perform an inventory of warranties and licenses in place as of the
Start Date.
The Bidder shall ensure that the warranty complies with the agreed
Technical Standards, Security Requirements, Operating Procedures, and
Recovery Procedures
The Bidder shall develop and maintain an inventory database to include
the registered hardware warranties and software licenses existing as of
Page 34 of 155
the Start Date, and the warranties and licenses for hardware and
software:
Procured through the Bidder, or
Procured by the Bank with notification to the Bidder for inclusion
in such data base
The Bidder shall perform warranty and license registration, if any, with
the appropriate manufacturer, for hardware and software:
Procured through the Bidder, or
Procured by the Bank with notification to the Bidder for inclusion
in such data base
Bidder shall monitor warranties to check adherence to preventive and
repair maintenance terms and conditions
Bidder shall provide the Bank with access to Asset control information
Bidder shall provide to the Bank, as reasonably requested, reports that
aid the Bank in performing asset management and financial
management functions of the Bank as these relate to hardware leases
and warranties and software licenses
Bidder shall maintain data regarding entitlement for software upgrades,
enhancements, refreshes, replacements and maintenance; and
Bidder shall provide technical information as reasonably requested by
the Bank for preparation and implementation of budgets and cost
benefit analysis.
As far as possible, the equipment should be repaired at site. Where the
equipment is taken for repairs outside the Bank, a substitute should be
provided and data, if any, should be transferred to the substitute
machine besides creating back-up in one of the system‟s at the Bank‟s
office and the data in the machine should be got deleted and hard disk
should be degaussed.
Bidders are bound by the following understanding of the Bank with
regards to Warranties, AMC and/or ATS pertaining to Software and
Hardware:
Hardware Warranty
- Warranty of hardware at DC will start post installation,
commissioning and after acceptance by the bank within a
period not exceeding 30 days from the date of commissioning.
- Warranty of hardware at DRC will start post installation,
commissioning and after acceptance by the bank within a
period not exceeding 30 days from the date of commissioning.
The period of warranty for hardware is one years for both DC
and DRC
- Consequently the AMC for Hardware has to be quoted after the
expiry of warranty period
Warranties pertaining to software/Applications
- Warranty for the Software/Applications should start post go
live of phase 3 of the EFRMS as per the implementation plan
- The period of warranty for software is one year
- Consequently the ATS for Software has to be quoted after the
expiry of warranty period
Page 35 of 155
The bidder is expected to maintain all the hardware and software which
will be deployed for EFRMS and will be held responsible for all the support
and implementation issues during the implementation period from the date
of sing-off to the satisfaction of the Bank Warranty
1.13.4 Annual Maintenance Cost (AMC) & Annual Technical Support (ATS)
The Bidder should provide Four years AMC & ATS support after the expiry of
warranty period of the solution and its components supplied as part of this
RFP. ATS for software, application, license or any other component should
be in range of 15%-20%. In similar manner AMC for hardware components
should be in range of 8%-12%.
The AMC shall cover the following:
On-site, comprehensive, back-to-back from OEM for all hardware
and software products as a part of RFP for a period of 4 years from
the date of expiry of warranty.
Software updates and upgrades at no additional cost to the Bank
L2 and above support from OEM
Replacement of failed hardware within 24hrs from the time call is
lodged. The penalties for any non-compliances defined under
Section SLA
Comprehensive on-site support from bidder for day to day
operational issues as and when arises.
Page 36 of 155
Bidder shall assign personnel of appropriate qualifications and experience to
perform the services in order to fulfill its obligations.
Bidder shall designate one of its personnel as the Project Manager, to
interact with the Designated Customer Support Contact from the Bank for
the purposes of getting approvals, progress report, discussing and resolving
issues, arranging meetings, etc.
Bidder shall exercise requisite control and supervision over its personnel in
the course of rendering the services and make best efforts to ensure that
the services are rendered in a continuous and uninterrupted manner.
Though Bidder has the right to withdraw its personnel, Bidder will replace
the persons with other personnel having appropriate experience and skills
at no extra cost to the Bank.
In the event that any person engaged/deputed/deployed for rendering
services, is, either-
No longer available by reason of resignation or termination or the
like; or,
Unable to render satisfactory services; or,
Not acceptable to the Bank by reason of any misconduct or non-
performance on the part of such person, then Bidder will use all
reasonable endeavors to replace such individual(s) promptly by other
sufficiently skilled, qualified, and experienced person(s) at no extra
cost to the Bank. Bidder will in the discharge of its obligations use
all reasonable endeavors to minimize changes in personnel.
Bidder will respect the confidentiality of all information given to it by the
Bank and will not divulge such information to any third party or other units
without the consent of the Bank.
Bidder shall impart to the authorized employees of the Bank, additional
technical and/or user training in respect of any corrected licensed software
provided, if required by the Bank.
The Bidder shall promptly install/implement the corrected licensed
software and/or maintenance releases provided at the Designated
Location(s) of the Bank at no additional cost or fees or expenses.
The Bidder shall undertake regular preventive maintenance of the licensed
software.
All bug fixations / modifications / enhancements relating to the licensed
software shall be done by the Bidder in a time bound manner as per the
SLA. The Bidder shall adopt a common, smooth, timely and effective and
satisfactory bug/enhancement handling mechanism. The Bidder agrees that
the errors resulting from the licensed software shall not be attributed to
alleged misuse, improper use, alteration or damage by users. The Bidder
shall compensate the Bank such financial loss suffered by the Bank if the
Bidder fails to fix bugs, provide the modifications / enhancements /
customization as required by the Bank as per the terms and conditions of
this tender and to meet the services level agreements as will be entered
into by the Bidder with the Bank.
Page 37 of 155
The bidder must note that the helpdesk services and managed services as a part of
facilities management should be available for all environments viz., production,
development and test, training. The bidders are required to account for onsite L1
Help Desk Agents and onsite L2 Help Desk Agents, starting from the acceptance of
first delivery of phase 1 of the project as per the implementation timeline, by the
bank.
Also, the Help Desk resources should be part of only the Help Desk team and not
shared resources between the Help Desk and Development teams. However, the
bidders should right size the number of Help Desk Agent licenses to meet the
requirements provided in this RFP. In case the RFP requirements are not met, then
the selected bidder has to provide additional Help Desk Agent licenses at no
additional cost to the bank.
It is hereby explicitly stated that Helpdesk & system Support services from the
Bidder will be mandatory for one year after go live of the phase 3. After one year,
the bank at its discretion will decide whether to continue helpdesk and system
support services. If the bank decides to continue for helpdesk & system support
services, same rate as quoted in the Bill of Materials will be considered.
The following table should serve as guidance as to the minimum expectation from
the Bank. If the Bidder has an opinion that is contrary, it should be explained.
L1 3 3 1
L2 2 1 -
L3 1 ( from 10:00AM to 06:00 PM)
The role based responsibilities of the IT Service Desk should include at a minimum:
Level One (L1) Support: L1 would typically address queries and all end user issues
pertaining to:
Business application related issues/queries, Enterprise applications (In-Scope),
Operating System (Windows, Linux & Unix), Printing, Generic IT Queries
Queries related to business process, reports generation, presentation layer
applications, etc
Other environmental software related to the EFRM Solution
The Bank reserves the right to increase or decrease the number of seats at L1
helpdesk depending on its requirements. The Bank also reserves the right to change
the locations of helpdesks at its discretion. The Bidder should also note that the
setup at the L1 helpdesk must provide for 1 supervisor and/or 1 support personnel
from the Bank. The Bank expects the Bidder to provide for L1 support for all
activities and services that are part of scope.
Page 38 of 155
The key activities that the bidder is expected to perform as part of Level 1
Helpdesk Support is:
User Management
Creation or modification of user profiles
Assessment in case of specific rights assignment
Provision for assigning user rights only for certain fixed period
Periodic user right monitoring (at known frequency) must be specified and
implemented
Categorization of requests into functional clarification, bug or change
request.
Functional clarification / work around to be provided by Level 1 support
itself.
Bug change requests to be logged and reported for further processing
Provide telephonic and / or electronic mechanisms for problem reporting
requests as well as for service and status updates.
Level Two (L2) Support: The Bank expects the Bidder to provide L2 support for all
activities and services that are part of the scope.
The L2 support provided by the Bidder should be comprehensive and cover entire
management and support of all the solutions provided by the Bidder (EFRM Solution
and all third party solutions). The services specified herein are not exhaustive and
only indicative.
Provide continuous onsite support for the all applications being
implemented and being procured through the bidder
Troubleshoot online processing or batch processing activity at various levels
in the EFRM Solution
Troubleshoot any query processing activity at various levels in the EFRM
Solution
Resolve the call within stipulated timeframe as defined in Service Level
Agreement
Coordinate with the L3 teams for resolution and provide necessary
information as may be required by the team to resolve the issues
Escalate the unresolved calls as per escalation matrix
Automatically log in calls during escalation
Provide the timeframe for providing a solution of resolution of the
escalated calls
Prepare a root cause analysis document with the resolutions provided for
major issues such as:
Production issues
Problems which have resulted in complete service disruptions or
downtime
Delayed response times
Data / table corruptions
System Performance issues (high utilization levels)
Liaise with the L1 support personnel for the call information and resolution.
Page 39 of 155
All other activities as would be required by the Bidder to manage and
maintain the solutions.
Perform the application audit on a quarterly basis or as mutually agreed
with the bank.
Rectify any corruption in the software.
Ensure patch releases are ported to the production environment with no
business disruption or business losses.
Support quarterly BCP/DR drills.
Provide application support from the Bank‟s data centre as mentioned
above for the Data centre and disaster recovery site.
Routing the transactions through the backup system in case the primary
system fails
Providing BANK with daily hardware utilization reports and alerting BANK in
case of any performance issues or hardware upgradation requirements
Support for integrating any applications that need to be interfaced with the
EFRM solution in the future.
Level 2 service desk agents would need to be deployed by the bidder at
DC/DR premise from where the Level 2 support is planned to be provided.
The bidder is expected to act upon the tickets routed from Level 1. The
bidder has to ensure that proficient and professional personnel are put to
handle the L2 support and resolutions are provided on a proactive basis
The L2 helpdesk resources proposed should have adequate and relevant
experience in the areas mentioned. The Bank has a right to review and
reject resources whose competency levels are below expectations.
Support and maintain all interfaces to the EFRMS and other solutions part of this
scope document modifications to existing scripts, reports presentation to Bank
management on the critical issues reported, resolved, solution provided and the
suggested recommendations or leading practices as and when asked by the Bank or
on a monthly basis whichever is earlier.
Perform performance tuning of the applications mentioned in the Scope of Work of
this document including Solution tuning. The Bank‟s appointed consultant will
provide advice and points to be considered to the Bidder for performing any
hardware/OS tuning required as part of the performance tuning.
Level Three (L3) Support
Level 3: Critical code level changes or hardware failure related issues. This support
is required for all components that are expected to be provided by the Bidder as
part of this RFP.
The Bidder has to provide the resolution / service as per the defined service levels
in this RFP. The Bidder has to make sure that the methodology proposed for
addressing and resolving problems is aligned to the required and defined service
levels.
The Bidder should staff the service desk with persons who are conversant with the
solutions deployed and are capable of resolving routine problems and queries
through the service desk application or over the phone. The staffing needs of the
service desk will be decided by bank based on calls/ticket volumes and patterns.
Page 40 of 155
Brief description of the envisaged activities to be performed by Bidder at L3 is
enumerated as under. The services specified herein are not exhaustive and are
only indicative
Resolve the call within the stipulated timeframe as defined under the
service level agreements
Communicate the status of the call to the Bank and accordingly
update the status, resolution or workaround and date of resolution
Prepare a root cause analysis document for issues referred to L3 support
and provide to the Bank along with the resolution
Liaise with the L2 support personnel for the call information and resolution.
Provide version upgrades.
All other activities as would be required by the SI to manage and maintain
the solutions.
Perform Version Migration - The services specified herein are not exhaustive
and only indicative.
Perform version migration as per the version release plan of OEM and
agreed by the Bank.
Version upgrades and migrations should also include porting of existing
customizations.
Provide training to the Bank‟s core functional and technical team members
on the new version functionalities and technical aspects as and when
version upgrades and migrations are performed.
For any version migration to be performed, the Bank and the bidder will mutually
draw up an implementation plan and schedule for the same.
Educational Qualification for Onsite Engineer:-
Page 41 of 155
Bug fixing, enhancement, modifications, customization, patches, upgrades due to
statutory, regulatory, industry, Bank specific changes ( including installation of
new upgrades.).
Providing tools for creating knowledge repository for the bugs identified,
resolution mechanism, version upgrade, future upgrade etc. of Application
software, OS, RDMS etc.
Providing appropriate antivirus software including prevention of denial of service
for DC & DR. The same should be managed with periodical updates.
Configuration changes, version up-gradations, performance monitoring, trouble
shooting, patch installation, running of batch processes, database tuning,
replacement / support, technical support for application and data maintenance,
taking backup of the database as required, recovery, query generation and
management etc. of all software supplied under this RFP.
Undertake immediate bug fix actions in the event of software failure causing an
interruption of operation of the EFRMS as per the response / resolution times
defined by Bank. During the event of any failure (software /hardware /network
/etc), the solution should continue to function seamlessly.
Notify all the detected software errors and correct them as per the agreed
Timelines.
Support the Bank in integrating any new applications to the EFRM and provide
support in extending the model and creating analytics / reports from the same.
The operational support staff should have onsite support experience for the EFRM
solution
Provide Bank with daily hardware utilization/performance monitoring reports and
alerting Bank in case of any performance issues by suggesting future capacity
planning by way of suitable solution or hardware/software upgradation
requirements.
Provide BCP/DR procedures and conduct DR drills in conjunction with the Bank‟s
policies/procedures.
Routing the transactions through the backup system in case the primary system
fails Switching to the DR site in case of system failure.
Service records must be maintained at the Helpdesk for software support. In
addition, calls to the Helpdesk must be tracked including the disposition and
subsequent resolution of problem. These records are to be reviewed monthly
with the Bank.
Page 42 of 155
III. The Bidder would be responsible for ensuring that the BPD (Business Process
Design)/Parameterization exercise is as per the plan.
Page 43 of 155
2.3 Development Methodology
The SCOPE OF WORK laid out in this RFP requires the Bidder to understand the
complex nature of the project and hence should use a strong methodology that
should be followed strictly
The Bidder should follow a suitable SDLC (Software Development Life Cycle)
methodology waterfall/ iterative/ Agile/ proprietary methodology, etc. as part
of Bidder‟s response.
Since the product is already available, the development in the SDLC
methodology means customization and integration.
The Bidder should carry out implementation of the EFRM Solution in a phased
manner as mentioned in Section related to Project Timelines
The methodology should clearly lay out the overall steps from Initiation to
Closure of this engagement. The methodology should address development,
customization, Managed services, Facilities‟ management services and
hardware/software installation/configuration services. Each of the steps should
detail the input, process and output in each step. The Bidder should further
detail how their tools/templates can be used to leverage them effectively. The
Bidder should further provide the deliverables and sign off process for each of
the deliverables at various stages.
The Bidder should submit the detailed timeline as part of the response in
alignment with the Section related to Project Timelines
Customization process
The Bidder shall ensure that the software provided as a part of the EFRM
solution meets all the requirements described in detail in this RFP and all such
customization or development work as may be required by the Bank is carried
out within the total cost proposed by the Bidder.
The Bidder shall provide all the functionalities as per the requirements of the
Bank. The precise scope of the customization and development work to be
undertaken by the Bidder shall be as per the requirements of the Bank as
described in the above mentioned Appendices or Annexure.
The Bidder shall carry out all the customization related work at the Project
Office of the Bank or offsite in case the customization cannot be carried out at
the Bank premises.
The Bank shall be a party to the Functional Specifications requirement sign-off,
Installation sign-off, User acceptance test and User acceptance test sign-off.,
Implementation sign-off.
The Bidder shall install and commission the software for customization and User
Acceptance Test as per Project Plan to be agreed with the Bank failing which
the Bidder shall be liable to pay the Bank penalty to be defined as per this RFP.
The Bidder shall provide all tools, testing instruments, drivers, test cases,
consumables, etc. required to install and customize and test the software free
of any fees or charges or any expenses.
The Bidder shall document and submit to the Bank all the testing activities,
procedures and results.
The Bidder shall provide the Bank weekly progress report on the bugs/problems
reported/points taken up with schedule of date of reporting, date of resolving,
Page 44 of 155
and status for all kind of bugs and problems whether reported by branch/Zonal
Office/Regional Office/ Head Office or Bidder staff. In case of disputes relating
to resolution of problem relating to any site, the Bidder is required to send the
copy of call report pertaining to each visit of each of the engineer to the said
site indicating the purpose of call, when called, when visited, when problem
was resolved, how resolved, etc.
Production Implementation
The bank and/or the external testing agency shall carry out verification and
validation in production.
30 days after successful conclusion of the deployment into production
Environment or after fixing the critical or major bugs whichever is later, the
EFRM Solution shall be accepted by the Bank.
In the event the solution provided by the Bidder does not meet the acceptance
test and criteria; Bidder would at the discretion of the Bank have to re-
Page 45 of 155
perform the services to the satisfaction of the Bank. Non adherence to the
acceptance criteria may result in termination.
Final selected bidder after the reverse auction will be required to perform a
benchmark/lab test for proposed EFRM solution with the proposed hardware
and database solution which will be arranged at the Bidder‟s cost and will
be conducted at the Vendor‟s/OEM‟s labs. Only after bidder meets the
stipulated benchmarks, will be given purchase order. The benchmark must
be performed for transaction volume, user base at present and projected in
the RFP for the contract period. The application should be able to handle
800 TPS (Transaction Per second) on the proposed hardware make and
model. The Bank reserves the right to disqualify any proposal that fails to
meet the expected TPS as mentioned in the RFP. The benchmark must be
performed in the presence of the Bank‟s officials/Bank‟s authorized third
party.
2.6 Training
The bidder will be responsible for training the Bank‟s employees in the areas of
implementation, operations, management, error handling, system administration
etc. The training should at least cover but not limited to the following Areas:
Page 46 of 155
The Bank will be responsible for identifying the appropriate personnel for all the
training requirements.
The Bidder will impart training to all the necessary users on the EFRM solution as
per schedule. The Bidder must ensure that proficient personnel conduct the
training at the respective training centers identified for the same.
The Bidder will be responsible to install the required applications / systems,
training server at DC and also ensure connectivity to the training server, for the
purpose of training at the training Centers. There will be no cost payable by the
Bank for the application, database and operating system software installation at
such training sites. The training hardware at the data Center should at a minimum
support 100 concurrent users.
The Bidder will be responsible for providing the users with the requisite training
material in both hard and soft copies for the core team/implementation training,
technical training, end user training and train the trainers. The onus of preparing
the training material will be on the Bidder.
The Bidder should provide training to personnel identified by Bank on functional
and technical of EFRM Solution. The Bidder needs to refer to Annexure E –Bill of
Materials for details. Training should include training aids such as online tutorials,
hard copies and soft copies of the manuals, etc.
Escalation Matrix
The bank as well as the system Integrator will decide an escalation matrix to
resolve any issues that may crop up during implementation of the project. Both the
bank and Bidder including the consortium members shall inform the names of the
persons and their telephone numbers for the escalation matrix to be effective.
Page 47 of 155
The implementation of this project is planned to be in the following phases. The
duration indicated is the time period required for the completion of the indicated
activity
Phase- I M1 M2 M3 M5 M5 M6 M7 M8 M9
Offline Monitoring
A1 e-Channel
A2 Branch Banking
A3 Other Banking Products
A4 Branch Banking (Overseas)
A5 Internal Frauds
Phase – II
Online Monitoring
B1 e-Channel
B2 Branch Banking
B3 Other Banking Products
B4 Branch Banking (Overseas)
B5 Internal Frauds
Phase – III
Online Prevention
C1 e-Channel
C2 Branch Banking
C3 Other Banking Products
C4 Branch Banking (Overseas)
C5 Internal Frauds
BRD, SRS, Design, Development and Testing
UAT & Training
GO Live
Page 48 of 155
BRD, Design, Mapping, implementation of Offline 5 Months 5 Months
Monitoring of Enterprise Wide Fraud Management
Solution which includes implementation of ETL
(extract transform load), integration with core
applications, Testing, UAT of the data.
Page 49 of 155
iv. Remittances (NEFT, RTGS, SWIFT
Domestic)
v. Forex Business
3. Other Banking products
i. Service Branch (Cheque Processing /
ECS processing ) Operations
ii. Treasury Operations
iii. Cash Management System and Channel
Financing
iv. Financial Inclusion Banking
4. Branch Banking (Overseas)
5. Internal Frauds (employee initiated
/involvement)
1 e-Channel
2 Branch Banking
3 Other Banking Products
4 Branch Banking (Overseas)
5 Internal Frauds
Pilot Go live of the Offline Solution for EFRM
SOLUTION which form a part of the requirement as
mentioned above
a. Model Tuning
b. Reduction of False Positive
c. Amendment of Rules
d. Develop and implement the following for
the Bank as per the requirements
defined in Annexure C
1. e- Channels
i. Internet Banking
ii. Mobile Banking
iii. ATM
iv. All types of Card such as Credit card,
Debit card, Prepaid cards, wallets etc
v. POS (Point of Sale)
vi. Cash Deposit machines
vii. Payment Gateway and E-commerce
Transactions
viii. FI (Financial Inclusion) Gateway
ix. IVR (Interactive voice response)
x. Any other delivery channel introduced
Page 50 of 155
by the Bank during the contract period
2. Branch Banking (Domestic)
i. Deposits (all types)
ii. Loans
Corporate Loans
Retail Loans
MSME Loans
Agriculture Finance
iii. Trade Finance / Non-Fund Credits
Guarantees
Letter Credits
Bill Finance (Bill discounting, Bill
purchase etc.)
iv. Remittances (NEFT, RTGS, SWIFT
Domestic)
v. Forex Business
3. Other Banking products
i. Service Branch (Cheque Processing /
ECS processing ) Operations
ii. Treasury Operations
iii. Cash Management System and Channel
Financing
iv. Financial Inclusion Banking
4. Branch Banking (Overseas)
5. Internal Frauds (employee initiated
/involvement)
1 e-Channel
2 Branch Banking
3 Other Banking Products
4 Branch Banking (Overseas)
5 Internal Frauds
a. Model Tuning
b. Reduction of False Positive
c. Amendment of Rules
Page 51 of 155
d. Real Time Response (Approve/Refer/
Decline)
e. Develop and implement the following for
the Bank as per the requirements defined in
Annexure C:
1. e-Delivery Channels
i. Internet Banking
ii. Mobile Banking
iii. ATM
iv. All types of Card such as Credit card,
Debit card, Prepaid cards, wallets etc
v. POS (Point of Sale)
vi. Cash Deposit machines
vii. Payment Gateway and E-commerce
Transactions
viii. FI (Financial Inclusion) Gateway
ix. IVR (Interactive voice response)
x. Any other delivery channel introduced
by the Bank during the contract period
2. Branch Banking (Domestic)
i. Deposits (all types)
ii. Loans
Corporate Loans
Retail Loans
MSME Loans
Agriculture Finance
iii. Trade Finance / Non-Fund Credits
Guarantees
Letter Credits
Bill Finance (Bill discounting, Bill
purchase etc.)
iv. Remittances (NEFT, RTGS, SWIFT
Domestic)
v. Forex Business
3. Other Banking products
i. Service Branch (Cheque Processing /
ECS processing ) Operations
ii. Treasury Operations
iii. Cash Management System and Channel
Financing
iv. Financial Inclusion Banking
4. Branch Banking (Overseas)
5. Internal Frauds (employee initiated
/involvement)
SIT, UAT of all the applications as part of phase I
including applicable signoffs & setting up of the
training applications and commencement of
training for Go live
1 e-Channel
2 Branch Banking
3 Other Banking Products
4 Branch Banking (Overseas)
Page 52 of 155
5 Internal Frauds
The Selected Bidder shall be responsible for delivery; implementation and rollout
of all the solutions required under this RFP and also must agree to the timeline as
specified above.
Page 53 of 155
Section III: Bid Guidelines
1. Bid Price
1.1 RFP document can be purchased against payment of Rs.10,000.00 (Rupees Ten
thousands only) in the form of a demand draft issued by a scheduled
commercial bank favoring Union Bank of India, payable at Mumbai.
1.2 Alternatively, the RFP document can be downloaded from the Bank's website
www.unionbankofindia.com. However, bidder will have to pay, before
submission of their offer, a non-refundable fee of Rs.10,000.00 in the form of a
demand draft issued by a scheduled commercial bank favoring Union Bank of
India, payable at Mumbai.
1.3 In the event of non-payment of the fee of Rs.10,000.00 towards the RFP
document form before the submission of the offer, the offer will not be
opened/considered.
2. Bid Security
2.1 Bid security of Rs.50.00 lakh in the form of a demand draft or Bank Guarantee
(BG) issued by a scheduled commercial Bank other than Union Bank of India
favoring Union Bank of India, payable at Mumbai to be submitted along with the
offer.
2.2 The bid security must be submitted along with technical offer. In the event of
non submission of the bid-security of Rs.50.00 lakh, the proposals will be
rejected.
2.3 The Bid Security will be refunded to the unsuccessful bidders only after
completion of the bid process. Bid security of successful bidder will be
submitted only after submission of Performance Bank Guarantee (PBG) and
signing of agreement.
2.4 No interest will be payable on the Bid Security amount.
2.5 The Bid security amount will be forfeited if the selected bidder refuses to
accept assignment or having accepted the assignment, fails to carry out his
obligations mentioned therein.
Within Ten (10) days of receipt of the format of Contract Form, which will
be sent along with the notification of award, the successful Bidder shall sign
and date the contract and return it to the Purchaser.
Within Thirty (30) days of the receipt of format of notification of award
from the Bank, the successful Bidder shall submit the performance Bank
guarantee for the value equivalent to 10% total payout of the first year and
should be valid for an year (plus an additional grace period of 3 months) in
the format prescribed. The same should be renewed during contract period
before expiry of the BG.
Failure of the successful Bidder to comply with the requirement of
executing Contract and submitting Performance Guarantee shall constitute
sufficient grounds for the annulment of the award and forfeiture of the bid
security, in which event the Bank may make the award to the next lowest
evaluated bidder or call for new bids.
Page 54 of 155
3. Technical Bid
3.1 The offer will be in two parts – Technical Bid and Indicative Commercial Bid.
3.2 Both parts must be submitted at the same time giving full particulars as per the
prescribed formats, in separate sealed covers duly super-scribed
6.1. The commercial offer shall be on a fixed price basis. No upward revision in the
price would be considered on account of subsequent increases in GST
(CGST/SGST/IGST), etc. during the offer validity period. However, if there is
any reduction on account of government levies, during the offer validity
period, the same shall be passed on to the Bank.
6.2. Since Bank is looking at a contract period of 5 years, and avail the services over
a period, if there is any upward or downward revision on GST during the FIVE
year period of the contract, the same shall be to the Bank's account. Baring
service tax, no changes in other tax will be to Bank's account.
7. Offer Validity Period
The offer should remain valid for a period of at least 180 days from the date of
opening of technical bids.
Opening of Offers
1. TECHNICAL BID – FOR ENTERPRISE FRAUD RISK MANAGEMENT SOLUTION will be
opened on 08/07/2017 16.15 Hrs.
2. One representative of the bidder can be present for the opening of the Technical
Offers.
3. No separate intimation will be given in this regard to the bidders, for deputing
their representatives.
Page 56 of 155
8. Erasures or Alterations
The original offer (Technical Offer and Indicative Commercial Offer); shall be prepared
in indelible ink. There should be no hand-written material, corrections or alterations
in the offer. Any such corrections must be initialed by the persons or person who
sign(s) the proposals Technical details must be completely filled up. Correct technical
information of the product being offered must be filled in. Filling up of the forms using
terms such as “OK”, “accepted”, “noted”, “as given in brochure/manual” are not
acceptable to the Bank. The Bank may treat non-adherence to these guidelines as
unacceptable.
An authorized representative of the bidding firm should initial all pages of the offer.
9. Right to Alter Quantities / Repeat orders
The Bank reserves the right to alter the number of locations specified in the tender,
and to delete/substitute items from the ones specified in tender. Bank may also place
order for various services which are only part of this RFP in addition to the quantities
mentioned in this tender at the same rate terms and conditions including the cost
agreed upon
Page 58 of 155
any reasons whatsoever. In case of such cancellation the payment will be made to the
extent of satisfactory delivery of products & services. The value of such payment shall
be governed by completion certificates report and decision of Bank shall be final and
binding on the bidder.
18. No Commitment to Accept Lowest or Any Tender
The Bank shall be under no obligation to accept the lowest or any other offer received
in response to this notice and shall be entitled to reject any or all offers without
assigning any reason whatsoever.
19. Evaluation Process
The evaluation will be a two stage process. The stages are:
Technical Bid Evaluation
Commercial Bid Evaluation
The total scores arrived will be scaled according to the total marks allotted for
Functional & Technical Evaluation Matrix
Page 59 of 155
B. Commercial Evaluation Process
The Bids which are qualified in Technical would be considered for next stage of
evaluation i.e. Indicative Commercial Bid evaluation and Reverse Auction. The
vendor should furnish their price for the project in their Indicative Commercial Bid to
facilitate the Reverse Auction process.
The contract will be awarded to the L1 bidder having lowest TCO (Total Cost of
Ownership) which is an outcome of Reverse Auction Process.
Bank reserves the right to select the next ranked Bidder if the selected Bidder
withdraws his proposal after selection or at the time of finalization of the contract
or disqualified on detection of wrong or misleading information in the proposal.
20. Scoring for approach methodology & Presentation
As part of technical bid, bidder will also submit their approach methodology covering
each of the activities and the proposed implementation schedule. The Bidders may
also be invited to the bank to deliver a presentation for about 60 minutes on the
solutions that are proposed. The presentations would be delivered to competent panel
chosen appropriately by the bank. The bidders are expected to submit the soft copy of
the presentation to the bank prior to the presentation.
Page 60 of 155
Payments as per the schedule given below will be released only on acceptance of the
order and on signing the agreement/contract by the selected bidder and also on
submission of performance guarantee through a DD or Bank Guarantee in lieu of DD
towards EMD.
General Conditions:
Page 61 of 155
No advance payment will be made prior to the start of the implementation.
All applicable taxes and duties will be deducted at source as per applicable laws.
Any penalties / liquidated damages imposed on the bidder for non-performance will be
deducted from the payment as deemed necessary
The Bidder‟s staff, personnel and labor will be liable to pay personal income taxes in
India in respect of such of their salaries and wages as are chargeable under the laws
and regulations for the time being in force, and the Bidder shall perform such duties
in regard to such deductions thereof as may be imposed on him by such laws and
regulations.
23. Arbitration
I. All disputes and differences of any kind whatever arising out of or in connection
with the purchase order shall be referred to arbitration. The arbitrator may be
appointed by both the parties or in case of disagreement each party may appoint
an arbitrator and such arbitrators shall appoint an Umpire before entering on the
reference. The decision of the Umpire shall be final. Such arbitration to be
governed by the provisions of Indian Arbitration and Conciliation Act 1996.
II. Notwithstanding anything contained herein above, in case of any dispute, claim
and legal action arising out of this RFP, the parties shall be subject to the
jurisdiction of courts at Mumbai, India only.
III. The bidder shall continue to work under the Contract during the arbitration
proceedings unless otherwise directed in writing by the Bank or unless the matter
is such that the work cannot possibly be continued until the decision of the
arbitrator or the umpire, as the case may be, is obtained.
Page 62 of 155
the reporting and compliance is as follows:
# Solution Module / Service Level Penalty
Service Area
1. Query Response Report on Query response 90th percentile query response time of
time provided on a weekly the solution proposed by the bidder has
basis to be within 30 seconds.
Page 63 of 155
25. Liquidated Damages and Service Level Agreement
A. Proposed SLA
Time is the essence of the contract and the bank expects the Bidder to complete the
project as per the implementation plan specified in the RFP. If the Bidder fails
The Bidder need to execute a Service Level Agreement/Contract with the Bank covering
all terms and conditions of this tender. Bidder need to strictly adhere to Service Level
Agreements (SLA). Services delivered by bidder should comply with the SLA mentioned
below. The Bank shall without prejudice to its other rights and remedies under and in
accordance with the terms of the RFP levy liquidated damages from payments due to the
Bidder. SLA will be reviewed on a quarterly basis. SLA violation will attract penalties.
Inability of the Bidder either to provide the requirements as per scope or to meet the
timelines as specified would attract liquidated damages. Service Levels will include
Availability measurements and Performance parameters.
The Vendor shall provide Availability Report on monthly basis and a review shall be
conducted based on this report. A monthly report shall be provided to the Bank at the end
of every month containing the summary of all incidents reported and associated Bidder
performance measurement for that period. Bidder shall use an appropriate tool for the
purpose of such reporting.
Performance measurements would be assessed through audits or reports, as appropriate to
be provided by the Bidder e.g. utilization reports, response time measurements reports,
etc. The tools to perform the audit will need to be provided by the Bidder. Audits will
normally be done on regular basis or as required by Company and will be performed by
Bank or Bank appointed third party agencies.
System availability is defined as:
Where:
I. “Scheduled operation time” means the scheduled operating hours of the System for
the month. All planned downtime on the system would be deducted from the total
operation time for the month to give the scheduled operation time.
II. “System downtime” subject to the SLA, means accumulated time during which the
System is not available to the Bank‟s users or customers due to in-scope system or
infrastructure failure, and measured from the time Bank and/or its customers log a
call with the Bidder help desk of the failure or the failure is known to the Bidder
from the availability measurement tools to the time when the System is returned
to proper operation.
III. Service Levels should be complied with irrespective of the customizations that the
applications would undergo during the tenure of the Contract.
Page 64 of 155
Bidder is required to maintain uptime of solutions as mentioned below
EFRMS Operations Charges/ Cost includes: AMC, ATS, Resource costs for EFRMS monitoring
and maintenance.
Event Definition
Events during Live operations due to Infrastructure/Functional issues of the EFRM Solution
should be reported to the Bank. Events are categorized as under
Event Description
a. Any problem due to which real-time detection or prevention is not working or;
b. Any problem due to which the components of EFRM Solution are not available to the
Bank‟s users or does not perform according to the defined performance and query
Critical processing parameters required as per the RFP or;
c. Showstoppers involving major functional failure in the application. There are no
usable workarounds available to troubleshoot the problem
d. In addition to this, categorization of application related events into Critical shall be
carried out in consultation with the selected bidder during the contracting phase
a. Any problem due to which near-real time detection or prevention is not working or
;
High b. Users face severe functional restrictions in the application irrespective of the
cause.
c. In addition to this, categorization of application related events into Highl shall be
carried out in consultation with the selected bidder during the contracting phase
a. Any problem due to which offline detection and prevention is not working or;
b. Moderate functional restrictions in the application irrespective of the cause. Has a
Medium convenient and readily available workaround.
c. In addition to this, categorization of application related events into Medium shall
be carried out in consultation with the selected bidder during the contracting phase
Page 65 of 155
The bidder is required to adhere to the service levels as mentioned below for the
operations phase.
Critical Events:
95-99%: 2% of the Operations Cost for
the Month
90-95%: 5% of the Operations Cost for
the Month
<90%: 10% of the Operations Cost for
the Month
Page 66 of 155
Medium Priority Events:
95-99%: 1% of the Operations Cost for
the Month
90-95%: 2% of the Operations Cost for
the Month
<90%: 3% of the Operations Cost for the
Month
The penalties as mentioned above during the operational phase be a maximum of 15%
of the Annual Payout value for the month.
I. If the deliverables are not submitted as per the implementation schedule and
project phasing or extensions in writing as may be given by Bank, the Bidder shall
be liable to pay 0.5% per week of the total price for the phase with a cap of 10% of
the Hardware price. Part of week will be treated as a week for this purpose.
II. If the deliverables are not acceptable to Bank, the Bidder shall rectify the defects
to the satisfaction of Bank. If the defects as stated in the Notice by Bank are not
rectified by the Bidder within two weeks of the receipt of the Notice, or such
extensions in writing as may be given by Bank, the Bidder shall be liable for
liquidated damages for an amount equal to 0.5% per week of the total price for the
phase, with a cap of 10% of the Hardware price.
In case bidder fails to implement any solution in given timeline, the Bidder shall be
liable to pay 0.5% per week of the implementation cost with a maximum cap of 5%.
Part of week will be treated as a week for this purpose.
This shall be in addition to the liquidated damages for not meeting SLA which is
defined separately.
Page 67 of 155
a. Penalties will be levied @ Rs.1,00,000/- per instance for any loss or equal to the
loss of amount due to breach, whichever is higher, bank has suffered due to frauds
taken place during the down time or non-availability of system. The penalty will be
restricted to the 10% of the yearly payout value (i.e. payment to be released for that
particular year). This penalty will be in addition to any other penalty levied due to non
adherence to SLA, uptime etc.
b. Penalties will be levied @ Rs 1,00,000/- per instance or equal to the loss of amount
due to breach, whichever is higher for violations of rules configured to prevent fraud
and/or generate alerts etc. The penalty will be restricted to the 10% of the yearly
payout value (i.e. payment to be released for that particular year). This penalty will
be in addition to any other penalty levied due to non adherence to SLA, uptime etc.
c. Penalties will be levied @ Rs 1,00,000/- per instance or equal to the loss of amount
due to breach, whichever is higher for alerts not sent on time to customers in case of
Frauds. The penalty will be restricted to the 10% of the yearly payout value (i.e.
payment to be released for that particular year). This penalty will be in addition to
any other penalty levied due to non adherence to SLA, uptime etc.
Note: The overall penalty due to for Losses/breaches as mentioned above will be
restricted to the 25% of the yearly payout value (i.e. payment to be released for that
particular year). This penalty will be in addition to any other penalty levied due to non
adherence to SLA, uptime etc.
Page 68 of 155
to contract separately with any of the consortium members. It should be mentioned
in the teaming agreement
Page 69 of 155
from the assignment in any form. The bidder must safe guard the confidentiality of
the banks business information, applications and data.
II. Disclosure of any part of the above mentioned information to parties not directly
involved in providing the services requested, unless required to do so by the Court
of Law or other Statutory Authorities, could result in pre mature termination of the
contract. The bank may initiate legal action against the bidder for breach of trust.
Page 70 of 155
Section IV: Terms and Conditions
Page 71 of 155
compensation along with all costs, damages and attorney's fees and other expenses
that a court may finally award, in the event of the matter being adjudicated by a
court or that be included in a Bidder approved settlement. The Bank will issue notice
to the Bidder of any such claim without delay and provide reasonable assistance to the
Bidder in disposal of such claim, and shall at no time admit to any liability for, or
express any intent, to settle the claim. The Bidder shall also reimburse all incidental
costs, which the Bank may incur in this regard.
If such a claim is made or appears likely to be made, the Bank agrees to permit Bidder
to enable the Bank to continue to use the Product, or to modify it, provided no order
otherwise has been passed by a court or replace it with one that is at least functionally
equivalent. If Bidder determines that none of these alternatives is reasonably
available, the Bank agrees to return the Product to Bidder on its written request, upon
which the Bidder will then give the Bank a credit equal to:
For equipment, its invoice value as paid by the Bank to the Bidder;
For Materials, the amount the Bank paid to Bidder for the creation of the Materials i.e.
application, related software etc.
This Section stipulates Bidder‟s entire obligation to the Bank regarding any claim of
infringement.
Bidder has no obligation regarding any such claim based on:
I. Anything the Bank provides which is incorporated into a Product or Bidder‟s
compliance with any designs, specifications, or instructions provided by the
Bank or by a third party on the Bank‟s behalf;
II. Bank‟s modification of a Product‟s use in other than its Specified Operating
Environment;
III. The combination, operation, or use of a Product with other products not
provided by Bidder as a system, or the combination, operation or use of a
Product with any product, data, apparatus, or business method that Bidder did
not provide, or the distribution, operation or use of a Product for the benefit of
a third party outside the Bank;
The Bidder shall also indemnify the Bank against all losses, damages, claims, counter
claims, suits, penalties and costs which the Bank may face on account of –
I. Bodily injury (including death) and damage to real property and tangible
personal property caused by Bidder‟s negligence on the part of the Bidder‟s
employees, agents or representatives.
II. Any claim or proceeding brought by a third party against the Bank as a
consequence of the above.
III. Any claim made upon and any action taken against the Bank by any statutory
authority or Court on account of the Bidder‟s failure to comply with any laws,
orders and regulations applicable to the performance by Bidder of its obligations
under this Agreement.
In the event of the Bidder not fulfilling its obligations under this Section within the
period specified in the notice issued by the Bank, Bank has the right to recover the
amounts due to it under this provision from any amount payable to the Bidder under
this Agreement for AMC/Facility Management/ Support Services etc.
Page 72 of 155
Bidder shall be liable for any breach or any non-performance by the Bidder of any of
its undertakings, warranties, covenants, representations or obligations under this
Agreement, subject to the provisions of Limitation of Liability.
5. Publicity
Any publicity by the Service Provider in which the name of the Bank is to be used, will
be done only with the explicit written permission of the Bank.
6. Force Majeure
I. For the purpose of this clause, “Force Majeure” shall mean an event beyond the
control of the parties, due to or as a result of or caused by acts of God, wars,
insurrections, riots, earthquake and fire, events not foreseeable but does not
include any fault or negligence or carelessness on the part of the parties,
resulting in such a situation.
II. The Bidder or the Bank is not responsible for delays or non-performance of any
contractual obligations arising out of blockade caused by war, revolutions,
insurrection, civil commotion, riots, mobilizations, strikes, acts of God, plague
or other epidemics, fire, flood, obstructions of navigation by ice of port of
dispatch, acts of Govt. or public enemy or any other event beyond the control of
either party which directly, materially and adversely affect the performance of
any contractual obligation.
III. If a force majeure situation arises, the bidder shall promptly notify the Bank in
writing of such conditions and the change thereof immediately within five
calendar days. Unless otherwise directed by the Bank, in writing, the bidder
shall continue to perform his obligations under the contract and shall seek all
reasonable alternative means for performance not prevented by the force
majeure event.
IV. The bidder or the bank shall not be liable for default or non-performance of the
obligations under the contract, if such default or non-performance of the
obligations under this contract is caused by any reason or circumstances or
occurrences beyond the control of the Service Provider or the bank, i.e. Force
Majeure.
V. In such a case, the time for performance shall be extended by a period(s) not
less than the duration of such delay. If the duration of delay continues beyond a
period of one month, the Bank and the Service Provider shall hold consultations
with each other in an endeavor to find a solution to the problem.
Notwithstanding above, the decision of the Bank shall be final and binding on
the Service Provider.
7. Limitation of Liability
Bidder‟s aggregate liability for actual direct damages shall be limited to maximum of
the Contract value provided that this limit shall not apply to 1) IP infringement
indemnity 2) Bodily injury (including death) and damage to real property and tangible
personal property caused by bidder‟s negligence. bidder shall not in any event be
liable for any indirect, or consequential damages or for loss of profit, business,
revenue, goodwill, anticipated saving or data, or third party claims except with
respect to bodily injury (including death) and damage to real and tangible personal
property for which bidder is legally liable or 3) All third party claims for infringement
Page 73 of 155
of patent, trade mark, design or copy right arising from use of proposed
product/products or any part thereof.
For the purpose of this section "contract value" at any given point in time means
aggregate value of purchase order placed by bank under this project.
8. Compliance with Laws
Compliance with all applicable laws: The Bidder shall observe, adhere to, abide by,
comply with and notify the Bank about all laws in force or as are or as made applicable
in future, pertaining to or applicable to them, their business, their employees or their
obligations towards them and all purposes of this RFP and shall indemnify, keep
indemnified, hold harmless, defend and protect the Bank and its
employees/officers/staff/ personnel/representatives/agents from any failure or
omission on its part to do so and against all claims or demands of liability and all
consequences that may occur or arise for any default or failure on its part to conform
or comply with the above and all other statutory obligations arising there from.
Compliance in obtaining approvals/permissions/licenses: The Bidder shall promptly
and timely obtain all such consents, permissions, approvals, licenses, etc., as may be
necessary or required for any of the purposes of this project or for the conduct of their
own business under any applicable Law, Government Regulation/Guidelines and shall
keep the same valid and in force during the term of the project, and in the event of
any failure or omission to do so, shall indemnify, keep indemnified, hold harmless,
defend, protect and fully compensate the Bank and its employees/ officers/ staff/
personnel/ representatives/agents from and against all claims or demands of liability
and all consequences that may occur or arise for any default or failure on its part to
conform or comply with the above and all other statutory obligations arising there
from and the Bank will give notice of any such claim or demand of liability within
reasonable time to the Bidder.
This indemnification is only a remedy for the Bank. The Bidder is not absolved from its
responsibility of complying with the statutory obligations as specified above. Indemnity
would exclude indirect, consequential and incidental damages. However indemnity
would cover damages, loss or liabilities suffered by the Bank arising out of claims made
by its customers and/or regulatory authorities.
9. End of Sale & End of Support
The Bidder will ensure that the stipulated Support and Maintenance facilities on the
hardware/software will be available for a minimum period of 6 years. The vendor will
constantly update the Bank on new technologies that could prove cost effective.
Page 75 of 155
Section IV: Evaluation Matrix
The Technical offers submitted by the bidder will be evaluated only if they fulfill the
eligibility criteria as per Section-I. Only those bidders, who fulfill Eligibility Criteria, will
be considered for functional and Technical evaluation. In case during functional and
Technical evaluation, all the bidders fails to score more than 75% marks, or less than three
bidders obtain more than 75% marks, then in that case top three bidder will be considered
for opening commercial bids provided marks obtained by them are more than 50%. The
decision of the Bank in this regard shall be final.
The evaluation process for short listing of bidder will be based on the evaluation matrix
given below.
The functional & technical requirements are in the form of a table which is given as
Annexure C – Fraud Functional & Technical Requirements. The bidders should fill
its response itself in the column “Bidder‟s Response (BR)” and provide qualitative
remarks in the column “Bidder Comments (BC)”. The summary of technical
requirements indicatively covered in the Annexure C- Fraud Functional Technical
Requirements is as follows:
S.
Functional & Technical Areas No. of req. line item Maximum Score
No.
1 Fraud Topologies 150 1420
2 Analytical Capabilities 116 755
5 Scoring 44 440
6 Data Management 92 780
7 BI & Reporting 127 910
Additional Functional
11. 23 230
Requirements
Total 829 6730
The response of the bidder for each of the line item should be as per the table
below:
Page 76 of 155
Bidder’s Description
Response
Standard feature. Required features readily available and to be
S
provided by the bidder
Customization required. Bidder will provide the customization with
C
the stipulated date as informed by Bank
A Alternative available in proposed Solution
N Not Available
The line items are divided into mandatory and non-mandatory category as per
Bank‟s requirement for proposed solution. Marks will be allotted to bidder against
the responses to each of the point mentioned as per the following marking pattern:
C - Customization C - Customization
4 1
required. required.
Page 77 of 155
Section V: Annexure
Annexure – A (covering Letter)
(To be submitted by all bidders on their letter head)
To:
The Dy. General Manager
Union Bank of India
Department of Information Technology,
Technology Center,
Adi Shankaracharya Marg, (JVLR),
Opp. Powai Lake, Andheri – East,
Mumbai- 400072
DECLARATION
1. We ______________________ (name of the company) hereby confirm having
submitted our bid for participating in Bank‟s RFP dated _________ for procurement
of ____________.
2. We also confirm having read all terms and conditions of RFP.
3. We hereby undertake and agree to abide by all the terms and conditions stipulated
by Union Bank of India in the RFP document including all annexure.
4. We, hereby confirm that we will honor the prices placed by in Commercial Bid,
failing which Bank shall forfeit the EMD. We also understand that the Bank may
debar us from participating in future tenders.
Date ________________
Date ________________
Page 78 of 155
Annexure – B (Technical Proposal)
Bidder’s Profile:
S. Particulars Response
No.
1 Name of the Firm/company/Individual
2 Address
3 Brief description of the nature of the business and profile of
the company with particular reference to Data Loss/Leakage
Prevention System
4 Year of commencement of the kind of services (copy of
commencement certificate may be enclosed) and number of
years in this service industry.
5 Turnover, Annual Income, Profit/Loss for the Year 1 T.O AI Profit
last three years in crores (enclose relevant Year 2
copies of audited financial statements) Year 3
6 Total number of certified professional permanent staff
(please submit the curriculum vitae (CV) for the professional
staff like Name, Key qualification, designation, experience,
their domain etc. separately)
7 Team composition and task assignment for the proposed
assignment.
8 Description of the methodology and activity (work) schedule
for performing the assignment
9 Number of banks / Financial Institutions to which this kind of
services are being given. *
10 *Name and address of the banks / financial institutions to
whom this kind of services was given with brief description,
Location, etc.
11 Number of other institution to which this kind of services
were given. *
12 *Name and address of other institutions to whom this kind of
services was given with brief description.
13 PAN Number
14 VAT Number
15 Sales tax number
*Note: The relevant support documents should be attached without which the
offer is liable for rejection.
** In Case of Consortium Bids, all the members of consortium will have to fill the
sheet separately.
SIGNATURE
Page 79 of 155
Annexure – C (Technical Compliance Sheet)
Please specify S/A/C/N in the table below to indicate how the solution meets the Bank‟s
requirement -
Bidder’s Description
Response
Standard feature. Required features readily available and to be
S
provided by the bidder
Customization required. Bidder will provide the customization with
C
the stipulated date as informed by Bank
A Alternative available in proposed Solution
N Not Available
Page 80 of 155
Does the solution support risk score model (or equivalent) where many
13 No
minor cues can add up to a risk score which in turn can trigger an action?
Does the solution support the risk score be added up over time (e.g.
14 No
during the span of a session)?
Does the solution support visualization support do you have for assisting
15 No
analyzing (like e.g. visual link analysis)?
Does the solution cover other behavioral aspects than per user, e.g. per
16 account behavior, per beneficiary/receiver behavior, per IP-address No
behavior, per device-id behavior?
Does the solution support balancing the ratio false positive/negative ratio
17 to reach manageable thresholds in line with case management personnel No
capacity?
How could we with your behavioral analysis typically identify frauds
18 where a fraudulent user mimics the financial behavior of the authorized No
user?
Do you provide detection input for customer behaviometrics, such as
19 No
timing of clicks and typing? How is it utilized?
Do you provide detection input for endpoint characteristics, endpoint
20 No
identity, or endpoint reputation? How is it utilized?
Does the solution support detection input for malware presence? How is it
21 No
utilized?
Detect online banking sessions conducted from out-of-footprint
22 No
geographies;
Identify transactions that are originated from high-risk internet service
23 No
providers
Domains, and flag sessions conducted from multiple locations in a short
24 No
period of time.
1.2 Internal Frauds
Does the solution support the scoring & detection mechanisms to identify
1 Yes
fraudulent transactions?
Can rules be defined to exclude specific employees from analysis
2 Yes
(whitelists & blacklists)?
3 General ledger account debit used to credit an employee account Yes
Recently debited suspense account for the same amount in the same
4 Yes
branch
5 Unusually high volume of transactions in a suspense account Yes
6 Associate conducts general ledger transactions during time off Yes
7 Abnormal volume or amount of offsets to cash in a suspense account Yes
Employee or related accounts with high credit limits receiving high
8 Yes
number of transactions
The proposed solution should support monitoring of the following
activities not limited to
9 Accounts with high balances are closed by an employee Yes
10 Internal transactions having false or invalid transaction codes Yes
11 High propensity of delinquencies for a branch or associate Yes
12 Address, PIN, or beneficiary in a dormant account Yes
13 Request for change of PIN in a recently opened or dormant account Yes
Request for a change of beneficiary in a recently opened or dormant
14 Yes
account
Page 81 of 155
15 Frequent balance inquiries Yes
Do you offer a product/solution that addresses internal fraud? How are
16 No
these type of internal fraud addressed?
What data & logs are needed to perform the scoring for internal fraud
17 No
detection analysis?
18 What types of employee behavior does the solution support No
1.3 Application Fraud
The proposed solution should support monitoring of the following
activities not limited to
1 Previous Fraudulent Application - ID Match Yes
2 Previous Fraudulent Application - Name and DOB Match Yes
Previous Fraudulent Application - Similar Last Name and Full First Name
3 Yes
and DOB Match
4 Previous Fraudulent Application - Address Match Yes
5 Previous Fraudulent Application - Phone Match Yes
6 Previous Fraudulent Application - Email Match Yes
7 Previous Fraudulent Application - Company Name Match Yes
8 Previous Fraudulent Application - Company Address Match Yes
9 Previous Fraudulent Application - Guarantor Match Yes
10 Previous Fraudulent Application - Referee Match Yes
11 Previous Fraudulent Application - Introducer Match Yes
12 Inconsistent Check - Previous Application ID Match but not Name Yes
13 Inconsistent Check - Previous Application ID Match but not DOB Yes
14 Inconsistent Check - Previous Application ID Match but not Sex Yes
15 Inconsistent Check - Previous Application ID Match but not Mobile Yes
16 Inconsistent Check - Previous Mobile Match but not ID Yes
17 Inconsistent Check - Previous Company Match but Company Phone Yes
Inconsistent Check - Same Address but Different Surname and Home
18 Yes
Phone
19 Inconsistent Check - Same Home Phone but Different Address Yes
20 Inconsistent Check - Same Home Phone but Different Name Yes
21 Inconsistent Check - Same Home Phone but Different DOB Yes
22 Inconsistent Check - Same Mobile but Different Name Yes
23 Inconsistent Check - Same Mobile but Different DOB Yes
Inconsistent Check - Same Office and Home Phone but Different Name and
24 Yes
DOB
25 Inconsistent Check - Same Office Address but Different Company Name Yes
Inconsistent Check - Home Phone and Company Phone Match but Different
26 Yes
ID
Inconsistent Check - Home Address and Company Address Match but
27 Yes
Different ID
28 Inconsistent Check - Other Card Number Match but Different Name/ID Yes
29 Inconsistent Check - Unusual Salary Increase within X days Yes
The proposed solution should have the capability to detect anamolies in
30 applications submitted across multiple channels of access (Browser, App, Yes
USSD etc)
1.4 Mortgage Fraud
1 Recurring Identity information, etc. of non-related applicants Yes
Page 82 of 155
2 Stated income exceeds aggregate assets on hand Yes
Transaction involving a property involved in a bankruptcy or prior fraud
3 Yes
investigation
Transaction involving an intermediary with high percentage of charge-offs
4 Yes
or losses
1.5 Debit Card Fraud
High transaction volume of activity at a specific terminal location relative
1 Yes
to normal activity
High dollar volume of transactions at a specific terminal location relative
2 Yes
to expected behavior
ATM location is deemed to be a common point of compromise for fraud
3 Yes
events
ATM transactions in multiple locations for an account or party in a short
4 Yes
period of time
1.6 Credit Card Fraud
1 System recommendations per priority like White list/Hot List/Black List Yes
Ability to create and update customer profiling based on historical
demographic data, transaction patterns, payment history, etc.
2 Yes
(Near Real time would also do in case real time is not possible). Please
provide indicative ways of profiling available in comments.
Ability to predict the fraudulent patterns & do a real time behavioral
3 Yes
analysis to decide the transaction as approved/decline
To facilitate real time alerts to customers on transactions (Fin & Non
4 Yes
Financial)
Ability to send transactional alerts (successful/decline/attempted)
5 Yes
through multiple channels – Branches
Ability to send transactional alerts (successful/decline/attempted)
6 Yes
through multiple channels – Telephone-IVR
Ability to send transactional alerts (successful/decline/attempted)
7 Yes
through multiple channels – SMS
Ability to send transactional alerts (successful/decline/attempted)
8 Yes
through multiple channels – Mobile
Ability to send transactional alerts (successful/decline/attempted)
9 Yes
through multiple channels – Internet
Ability to send transactional alerts (successful/decline/attempted)
10 Yes
through multiple channels – Email
Ability to send transactional alerts (successful/decline/attempted)
11 Yes
through multiple channels – ATMs)
12 Should have option of bulk blocking of cards, if possible Yes
1.7 Trade Finance Fraud
1 Ability to Match Suspicious entities Yes
2 Ability to score commodities for dual use Yes
3 Ability to resolve entities in Bill of lading documents Yes
4 Ability to provide fuzzy search on the various entities Yes
Ability to display Genuine trade back ground of the customer or level of
5 deviation in business projections from actual, which may be accepted as a Yes
trigger
Page 83 of 155
Ability to create a alert in Advance remittances for imports especially
where the remittance are kept just below USD 100,000 and where the
6 Yes
remittances are by proprietorship concerns and the remittances are being
sent to high risk jurisdictions like Hong Kong or Dubai.
Ability to create Cases where consignees and importers are different i.e.
7 Yes
third party transactions
Ability to create alert in case High Seas sales cases of import for
8 Yes
authenticity of documents and transactions.
9 Ability to perform Postal Parcel Wrapper verification Yes
Ability to create alert in case where the importer frequently changes the
10 overseas exporter though the goods and country of import remains the Yes
same.
Ability to create alert when High value goods such as diamonds are being
11 Yes
imported/exported from Hong Kong and Dubai
Ability to create alert when Consignments of computer parts being
12 Yes
imported from Hong Kong and Dubai
Ability to maintain a list of defaulters of past remittances sent but
13 Yes
documents not submitted and use it as a watch list
14 Ability to create alert for remittances for the import of capital goods Yes
1.8 Cyber Frauds
The proposed solution should be scalable to prevent and detect Cyber
1
frauds Yes
1.9 Retail Liabilities
Transactional Check :
1 Ability to check drainage of funds immediately on new account opening Yes
Ability to check unusual trend/ pattern in account operations as compare Yes
2
past listings
Ability to do behavioral check in terms of – account operations, deposit Yes
3
and withdrawal patterns etc.?
The system should have a de-dupe functionality to identify all accounts Yes
4
opened by same person at multiple branches
System should provide check for withdrawal of FDR funds through loan Yes
5 transactions in other than FDR Holder accounts
Ability to check the scenario where fixed deposits closed without credit of Yes
6
funds in the account of Fixed deposit holder
1.101 Corporate Banking
1 Inconsistency Check – NPA /SMA tagging of Corporate Accounts Yes
Page 84 of 155
The system should be able to generate an alert if there are multiple
7
applications from the same person within the last x days/months. Yes
The system should be able to generate alert if there are multiple
8 Applications from the same person for the same product that got their
application declined in the last x days/months. Yes
The system should be able to generate alert Multiple Applications from
9 the same person for different product that got their application declined
in the last x days/months. Yes
The system should have the capability of rejecting fraudulent multiple
10 Applications (across Products) coming up from the same IP Address against
one name or multiple names within the last x days/months. Yes
Page 85 of 155
The system should be able to monitor overall trading limits across the
5
entire portfolio of assets for a specific employee. Yes
The system should be able to monitor the group‟s trading limit in a
6
particular asset class for a set of employees. Yes
The system should be able to monitor the group‟s trading limits across the
7
entire portfolio of assets for a set of employees. Yes
The system should be able to monitor all the Employees with
8
Concentrated positions in a Single Security of their entire portfolio Yes
2. Analytics Capabilities
2.1 Multivariate analysis
Dimension reduction with the Principal components:
- Calculate Eigen values and Eigenvectors from correlation and No
1
covariance matrices.
- Plots include: scaled variation, Screed, Log Eigen value, No
2 Cumulative Proportional Eigen value.
- Mine the selected principal components using predictive modeling No
3
techniques.
Dimension reduction with the Variable Selection:
- Remove variables unrelated to target based on a chi-square or R2 Yes
4
selection criterion.
5 - Remove variables in hierarchies. Yes
6 - Remove variables with many missing values. Yes
7 - Reduce class variables with large number of levels. Yes
8 - Bin continuous inputs to identify non-linear relationships. Yes
9 - Detect interactions. Yes
2.2 Cluster Analysis
1 Hierarchical clustering of multivariate data or distance data. Yes
2 Disjoint clustering of large data sets. Yes
3 Nonparametric clustering with hypothesis tests for the number of clusters. Yes
Variable segment profile plots showing the distribution of the inputs and Yes
4
other factors within each cluster.
5 Decision tree profile using the inputs to predict cluster membership. Yes
6 PMML (Predictive Model Markup Language) score code. No
Page 86 of 155
2.3 Data Preparation
Desktop Client should be able to provide a single interface for data Yes
integration & manipulation such as tabulation, forecasting, statistical
1
analysis, econometric modeling and multi-dimensional analysis with the
following features:
Ability to visually access any supported database and support for native Yes
2 Windows data types via ODBC, OLEDB, OLE DB for OLAP, and from mail
servers.
Heat maps displaying the correlation or chi-square association of the Yes
3
inputs with the target across segments.
Provide self-sufficient and easy access to enterprise data sources on No
4 multiple platforms,
operating systems and databases.
The Business Intelligence Interfaces of Reporting and Portal should have No
5 seamless integration (common technical metadata) with Analytics
(Statistical Analysis and Forecasting components).
2.4 Link Analysis
Converts data into a set of interconnected linked objects (or entities) that Yes
1
can be visualized as a network of effects.
Provides a visual model of how two variables‟ levels in relational data or Yes
2
between two items‟ concurrence in transactional data are linked
Provides weighted confidence statistics to provide next-best offer Yes
3
information.
Provides centrality measures and community information to understand No
4
linkage graphs.
5 Generates cluster scores for data reduction and segmentation No
2.5 Data mining
1 The procedure should run in multithread environments No
Code node with the below specifications:
- Write code for easy to complex data preparation and No
2
transformation tasks.
3 - Import external models. No
4 - Develop custom models. No
- Includes macro variables to easily reference data sources, No
5
variables, etc.
6 - Augment score code logic. No
Select models based on either the training, validation (default) or test No
7 data using several criterion using such as: profit or loss, AIC, SBC, average
square error, misclassification rate, ROC, Gini, KS (Kolmogorov-Smirnov).
8 Supports binary, nominal, ordinal and interval inputs and targets. No
9 Easy access to score code and all partitioned data sources. No
Display multiple results in one window to help better evaluate model No
10
performance.
Decision Tree selection based on profit or lifts objectives and prune No
11
accordingly.
Decision trees with Splitting criterion: Prob Chi-square test, Prob F-test, No
12
Gini, Entropy, variance reduction.
Decision trees with ability to define customized split points including No
13
binary or multi-way splits.
Page 87 of 155
14 Print the tree diagram on a single page or across multiple pages. No
Neural networks with the below specifications for Neural Network node:
- Flexible network architectures with extensive combination and No
15
activation functions.
16 - 10 training techniques. No
17 - Preliminary optimization. No
18 - Automatic standardization of inputs. No
19 - Supports direction connections. No
Neural networks with the below specifications for Auto Neural node:
- Automated multilayer perception building to search for the optimal No
20
configuration.
- Type and activation function selected from four different types of No
21
architectures.
Flexibility in defining parameters to influence the topology of neural net No
22
and support Lavenberg-Marquardt method in neural networks
23 Rule induction models No
24 Two-stage modeling No
25 Creation of “confusion” matrix for binary output No
Memory-based reasoning with k-nearest neighbor technique to categorize No
26
or predict observations.
Model comparison with Compare multiple models in a single framework No
27
for all hold out data sources.
Model comparison with Automatically selects the best model based on the No
28
user defined model criterion. It should also have :
29 Score node for interactive scoring in the GUI No
Scoring with automated score code generation, (also in C, Java and No
30
PMML).
31 Supports distributed in-memory processing architecture No
Develop statistical models using big data and thousands of variables - not No
32
just a subset
2.6 Time Series and Data Mining
Automatically transpose the time series to support similarity analysis, Yes
1
clustering and predictive modeling.
2 Process data with or without Time ID variables. Yes
3 Similarity matrix for all combinations of the series. Yes
4 Control weights decay using one or more smoothing parameters. Yes
Best-fitting smoothing method (simple, double, linear, damped trend, Yes
5
seasonal or Winters‟ method) is selected automatically.
6 Mine the reduced time series using descriptive techniques. Yes
Similarity analysis:
Useful for new product forecasting, pattern recognition and short No
7
lifecycle forecasting.
Computes similarity measures between the target and input series, or No
8
among input time series.
9 Hierarchical clustering using the similarity matrix with dendogram results. No
10 Constellation plot for evaluating the clusters. No
11 Exponential smoothing: No
2.7 Forecasting
Page 88 of 155
1 Point-and-click interface for exploring and forecasting time series data. Yes
Ability to automatically diagnose the time series data for seasonality, Yes
2
trend etc.
Automatically selects the best-fitting forecasting model for each time Yes
3
series.
4 Provides mathematically optimized model parameters. Yes
5 Interactive model development facility for more experience forecasters Yes
6 Graphically displays time series diagnostics tests Yes
Inclusion of regression variables and unusual events in the forecasting Yes
7
model.
8 Option to statistically combine multiple forecasts No
Forecasting and time series methods: No
A) Hierarchical Forecasting
B) Structural time series models or unobserved components models
C) Dynamic regression or transfer function models
D) Joint forecasting of multiple time series using vector time series
9 analysis and general
E) State space models
F) Automatic outlier and event detection
G) Time series decomposition and seasonal adjustment
H) Spectral and cross-spectral analysis for finding periodicities or cyclical
patterns in your data
2.8 Mathematical optimization
1 Flexible algebraic syntax for intuitive model formulation. No
2 Transparent use of standard functions. No
Direct invocation of linear, nonlinear, quadratic and mixed integer No
3
solvers.
Support for the rapid prototyping of customized optimization algorithms, No
4
including named problems and sub problems.
5 Ability to run other standard code. No
6 Ability to execute solver invocations in parallel with the COFOR loop. No
7 Aggressive pre solvers to reduce effective problem size. No
Multithreading in underlying technologies for improved optimization No
8
performance.
Linear programming solvers, including primal simplex, dual simplex and No
9 network simplex; and interior-point with crossover.
Parallel branch-and-bound mixed integer programming solver with cutting No
10
planes and heuristics.
11 Option tuning for mixed integer programming. No
12 Decomposition algorithm for linear and mixed integer programming. No
General nonlinear programming solvers, including interior-point trust No
13 region method with line search, active-set trust region method with line
search, and multistart capability.
Quadratic programming with state-of-the-art solver tailored for large- No
14
scale optimization.
Multiple network diagnostic and optimization algorithms. Parallel hybrid No
15
global/local search optimization, including multi-objective optimization.
16 Grid enablement. No
Constraint programming capabilities with scheduling and resource No
17
features.
Page 89 of 155
2.9 Text Analytics
The proposed software must be able to accept text and should accept No
1 commonly used text sources such as ASCII text, document files, PDF files,
spreadsheet files etc
Should be capable of performing sentiment analysis of unstructured data, No
2 in form of texts mainly (and other forms), and coming up with insights on
customer attitude and response.
The solution should include a document convertor to convert data not in No
3
ready text format (such as webpage and pdf files etc.) to a textual format
4 Solution should also include easy abilities to read from XML files No
No
Should contain crawling capabilities which should be able to retrieve Web
5 pages that go many layers deep originating from a specific URL. It should
also be able to retrieve not only Social media content, but also related
social media metadata (followers, friends, demographics, comments etc.)
Documents such as KYC docs, Resumes, CVs, experience certificates etc. No
should be capable of getting certificates etc. should be capable of getting
6 categorized and tagged with entities through a configurable near real
time process that swings into action right as soon as the document is
received / retrieved by the system.
No
Should have pre-configured features to identify and extract entities such
7 as names, persons, organizations / companies and locations from text
data. It should also be able to use a customized list of entity pattern
(such as PAN card , UID numbers etc.) based on rules
No
Should make use of natural language processing (NLP) techniques to
8 enable parsing and stemming of text data, identify of main topics of
discussion and identify the correlated topics. It should also directly
support the use of regular expressions (REGEX) for matching purposes.
Should support both statistical and rule based classification mechanisms No
9
for categorization of text data
Should be possible to run multiple taxonomy structures and classification No
10
structures on the same document.
Should support text clustering - it should identify the similar topics and No
11 elements (such as job descriptions etc.) from a large corpus of documents
and graphically show the degree of association.
Should integrate within a Service Oriented Architecture (SOA) to achieve No
12
a loose coupling among interacting systems.
Should be capable of automated parsing which breaks up entities into No
13
their parent forms and individual elements such as words elements etc.
Should have ability to derive a links dataset from rule associating entities No
in unstructured data, not just in terms of document occurrence, but also
14
in terms of syntax and relationship among entities contained in the
textual data
Should have strong classification functionality. It should support different No
15 weighting methods, numerous modeling techniques for classification, and
binary, nominal, and ordinal targets.
Should contain GUI based highly interactive plots for exploring the No
16 connections among concepts/terms. It should allow users to dynamic link
plot that shows the connections among terms/concepts.
Page 90 of 155
Should be capable of capturing feeds from multiple sources (like social No
media), analyze them and come up with insights. The analysis should be
17
real time so as to ensure continuous tracking and detecting shifts in
sentiment
2.1 Across All Models
The solution should be capable of deploying the models in offline mode to Yes
1
enable risk analytics based on historical capabilities
The solution should evaluate the channel risk by analyzing the contextual Yes
data from variety of sources including user profiles, device fingerprinting
2
, transaction data , IP , Geo Location , other network data and third party
data field
The solution should adapt to changing behavior of users against their own Yes
3
history and the history of other individual
The proposed EFRMS should be capable of analyzing / monitoring/ Yes
4 alerting the financial Event of Default (EOD) prescribed at the time of
sanction of corporate advances.
The proposed EFRMS should be capable of analyzing / monitoring/ Yes
5 generating alerts based on pattern of „Financial/ Non-Financial Waivers‟
allowed by an employee and the due reporting of the same, as required.
3. Detection and Rule Engine
1 Solution should have inbuilt business rules engine to implement scenarios Yes
2 Solution should have ability to add new scenarios Yes
3 Solution should be able to make scenarios active Yes
4 Solution should be able to execute scenarios in specific order Yes
Rules engine should have capability to change scenario parameters by Yes
5
business users
6 Solution should have ability to group scenarios together for performance Yes
7 Solution should have the ability for unlimited rules capacity Yes
Rules engine should have the functionality to retrieve historical activity Yes
8
and capture for rule creation / maintenance.
Rules engine should be able to create a case based on externally and Yes
9
internally created scores as a decision element.
Rules engine should have the ability for allowing criteria to be defined / Yes
10
modified (add, delete, create, update).
Rules engine should have the ability to prioritize work based on portfolio Yes
11 and / or relationship specific scores and /or UCIC(Unique Customer
Identification Code)
Rules engine should have the ability to track changes to rules (i.e. who, Yes
12 when, what, why) (audit changes) and support maintaining different
versions of the same rule definition
Rules engine should have the ability for each transaction to be evaluated Yes
13
by every rule.
Rules engine should be able to identify the rules triggered by a Yes
14
transaction
15 Solution should be able to define systemic actions at the rule level. Yes
Rules engine should be able to assign a unique case number to each item Yes
16
scored and actioned by the rules engine or out sorted for analyst review.
Rules engine should support defining of new variables based on existing Yes
17
variables
Page 91 of 155
Rules engine to support decision tree/decision tables for identifying the Yes
18
fraud patterns
Rules engine should support defining the rules at multiple levels like Yes
19
transaction, account, customer and group of customers
Rules engine should be able to integrate with analytical component to Yes
20
assign weightages to the rules
Rules engine should enable the users to simulate the various levels of Yes
21 thresholds for the variables identified to indicate the number of alerts
that will get generated
22 Rules engine should support copying of existing rule to create a new rule Yes
Rules engine should provide ability to create a case from non-monetary Yes
events (with or without a monetary transaction occurring) Non-monetary
23
events include items such as: Address change, Phone number change,
Check request, Balance Enquiry, PIN Change,
Solution should support maintaining different versions of the same rule Yes
24
definition.
25 Solution should support running rules in real time and batch mode. Yes
Solution should support use of standard logical operators (eg: AND, OR, Yes
26
NOT etc) in all Real time Authorization Rule conditions.
Solution should support use standard arithmetic operators (e.g.: >, <=, = Yes
27
etc) in all Real time Authorization Rule conditions.
There must be a visible result of rule evaluation to determine the success Yes
28
rate of the rule
Solution should support rule creation for Maker and Checker user Yes
29
authorization.
30 Solution should have capability to detect complex frauds No
Solution should be capable to execute scenarios at scheduled times such No
31 as days, weeks or months
Solution should have the ability for the rules engine to allow criteria to be No
32
defined / modified (add, delete, create, update).
Solution should have the ability for the rules engine to allow decisions No
33
based on criteria (what to do with the item / record).
Rules engine should be able to create scores that are portfolio specific No
34
and/ or relationship specific.
Rules engine should use updatable user defined tables as decision No
35
elements such as: Negative and / or positive files
Rules engine should be able to list, by priority, of all rules triggered by a No
36
transaction.
Rules engine should be able to create / modify exclusion criteria, within a No
37
rule, to route activity to an „exclusion” queue‟.
Rules engine should be able to create / modify reactivation criteria, No
38 within the rule, for accounts that have previously been reviewed and
excluded
Rules engine should be capable of import of data to perform data No
39 aggregation tasks, with the option to aggregate and apply date-based
lookback periods to your data to facilitate rule development
Rules engine should be able draw contents from multiple data sources, No
40
including one or more tables or excel file
Page 92 of 155
Rules engine should facilitate visual identification of patterns of interest No
41 in your data to facilitate the process of rule development. Rules engine
should support drag and drop of selection of variables for rule creation
Rules engine to support data exploration and direct investigation of No
42
identified transactions before finalization of the rules
Solution should enable the detection at multiple levels like transaction, No
43
account, customer, group of accounts / customers
Rules engine should enable the users to interact with recent data to No
44
identify the transaction patterns during the day
Rules engine should enable the users to deploy the rules in production No
45
system based on the finalization of rules in real time / near real time
Rules engine should facilitate comparison of impact by changing No
46
thresholds
Rules engine should support various arithmetical techniques to create No
47
summary variables on user interface
Solution should support blocking a fraudulent transaction in real time, if No
48
required.
Solution should have capability to detect the Fraud for the channels and No
49
products mentioned in the scope
Solution should support ability to execute rules in test mode against No
50 production data and analyze the impact of such a rule based on the
output of the alert.
Solution should support enrichment of transactions posted in real time No
51
mode to execute real time monitoring scenarios.
Solution should specify Filter Rules based on data available in the No
52
transaction.
Solution should specify an Outcome Action for each Real time No
53
Authorization Rule.
54 Solution should support use Demographic Data in Rules creation No
55 Each rule must have a unique identifier No
The proposed EFRMS should be capable of generating an alert in case No
56 receipt of multiple requests from the same customer originating from
different locations/ branches of the Bank.
The proposed EFRMS should be capable of generating an alert when the No
account of a customer assisted by the Bank is reported as SMA to RBI.
57 Note that this information is available at RBI‟s end and presently RBI is
notifying this to all the member banks through e-mails routinely on daily
basis
The proposed EFRMS should be capable of generating an alert based on x No
58 number instances of an employee overriding a particular system
generated exception/s
The proposed EFRMS should be capable of generating an alert based on No
59 Loan Accounts bearing „ZERO‟ rate of interest or ROI varying within a
band of x% from the reference rate viz. Bank Base Rate.
The proposed EFRMS should be capable of generating an alert based on No
the instances where the progress of the underlying contract has not been
60
reviewed/ monitored for x number of months and Performance Bank
Guarantees is issued by the Bank.
4. Case management and Workflow
Page 93 of 155
4.1 Case Management Requirement
Solution should be able to customize activities and automation of Yes
1 workflow (different workflows may be developed for different types of
cases)
Solution should have the ability to assign activities in the workflow to a Yes
2
group of users
Solution should have the ability to create, edit and view a case based on Yes
3
user permissions
Solution should have the ability to classify cases by type, category, and Yes
4
subcategory
Solution should have the ability to attach documents and video files (any Yes
5 digital media may be stored)
Solution should have the ability to set default fields and values on screens Yes
6
based on case type
Solution should create an audit record containing the identification of the Yes
7 user, a timestamp, and date when actions are performed to a case that
may be provided to management, an examiner, or regulating agency
Solution should have the ability to generate a batch file for regulatory Yes
8
reporting via E-Filing
Solution should have the ability to align cases by priority, high to low to Yes
9 the analyst role in the queue. New cases will populate the queue
according to the priority.
The user should be able to manually change a case, The user should be Yes
able to change / modify the „due date (SLA) add comments, and
10 designate future review time to re-review the case (i.e. Automated
reminder). If “pending” due to unavailability of analyst, then work should
move to “general” queue for work.
11 The user should be able to manually modify a pended case. Yes
The user, based on role, should be able to take specific actions on pended Yes
12
records
The user should be able to take ownership of a task (with notification Yes
13
going back to original pending analyst)
The user should be able to release pended record back into queue/auto Yes
14
escalation of pending cases in review / investigation queue
The number / label / length / arrangement of such fields should be Yes
15
configurable
16 The user should be able to add or remove a document to a case Yes
17 The user should be able to add or remove a reminder to a case Yes
18 The user should have ability to link cases under investigation Yes
19 The solution have ability to elevate an alert into a case Yes
20 The solution has ability to add several alerts to one case. Yes
The solution has flexibility of case management screens: ability to change Yes
21 field layout, field names, field types, contents of dropdown lists, without
vendor involvement.
The solution has ability to configure case management workflows in a Yes
22 flexible way by the user.
The solution should have full audit trail / logging of all changes in the Yes
23
database (who, when, which table, which field, old value, new value).
24 The solution should support the ability to email Case details to other users Yes
Page 94 of 155
in the bank.
The solution should have ability to be able to instantly update existing Yes
25
cases with fresh transaction detail.
The solution should have ability to specify an Automatic Outcome Action Yes
26
for each Case Creation Rule.
27 The solution should use queue priorities to present next case to profiler Yes
The solution should have ability to change the length of time an anti- Yes
28 referral marker has been applied to an account e.g. Parameter not hard
coded
The solution should have ability to set sticky referral on a card based on Yes
29
status of case and block type
The solution should have ability to change the length of time a sticky Yes
30 referral marker has been applied to an account e.g. Parameter not hard
coded
The solution should have ability to find a case in Case Manager based on Yes
31
Card PAN, Account #, Sort Code, Customer Address, Surname, DOB
Solution should provide an Incident Triage Queue to allow the user to No
32
review incoming items prior to creating or linking an incident to a case
Solution should have the ability to receive alerts from multiple monitoring No
33
systems that have been designated as incidents that require investigation
Solution should have the ability for additional review(s) of case disposition No
34
based on several factors (role, tier, delegated authority, etc…)
Solution should provide a free form text comments box on working case No
35
screens.
36 The user should be able to comment without taking ownership No
37 The user should be able to reassign record No
The solution should allow the user (detection, inbound, etc…) to manually No
38
enter a case
The solution should be able to differentiate between cases which were No
39
created from alerts versus those which were created manually
40 The user should be able to add free text notes to cases No
The user should have ability to apply a mass action to case - close, No
41
append etc
42 Solution should have automated case processing No
System should offer integration and links to tools that perform automated No
43
case processing
Case management should have input/output functionality (API) in order to No
44
be able to link to other platforms
The solution should have retrospective analysis, looking for other like No
events after updating additional informational about a case or alert which
45 may affect further instances of fraud. Once a case is closed, the solution
should re-score rules or models for future analysis.
Page 95 of 155
Case management fields should be populated automatically with No
48
application details if case is generaled from an alert
The solution should be able to enter investigation steps taken and their No
results in the system. There should be configurable templates (e.g. Drop-
49
down list) for both of these, in order to speed up data entry for typical
actions and results.
Investigators should be able to sort and filter all case records by entering No
search criteria into any data field. Possibilities should include logical
50 searches like "Equals A or contains B", etc. Query results should be
displayed as a list, possibility to open a record on the list to view all
fields, then close and return to result list.
Solution should be able to export the results of a query, or the entire No
51
table to xls and/or csv
Solution should support batch update: Ability to update many records at No
52 the same time, e.g. Overwrite recovered amount for several hundred
records at the same time.
The solution should have ability to specify an Manual Outcome Action for No
53
each Case Creation Rule.
The solution should have ability to manually assign a new fraud case to a No
54
work queue based on case attributes
The solution should have ability to locate a record following an Inbound No
55
Call.
56 The solution should use cardholder details to present case to profiler No
The solution should have ability to locate a case in order to make an No
57
outbound call.
58 The solution should have ability to view Fraud Cases on a work queue No
The solution should have ability to set anti-referral on a card based on No
59
status of case
The solution should have ability to determine the transaction that created No
60
the case
4.2 Workflow Requirement
Solution should provide the ability to perform systematic actions based Yes
1
upon an analyst‟s work action.
2 Screen flow and system process must represent the task workflow. Yes
Power users should have the ability to configure standard workflows to Yes
3
route case activities to appropriate teams
Cases should be managed by more than one appointed person using Yes
4
workflow functionality.
5 Workflow actions should not be deleted or altered after submission Yes
Solution should have the ability to delete or remove workflows if they Yes
6
become redundant
Solution should have the ability to control or change (edit/delete) certain Yes
7
workflow functions
Solution should be able to manage and capture audit trails for workflow Yes
8
configuration
The system should have the ability to automatically execute immediate Yes
9 card stops / temporary blocks on all cards on an account across all
channels
Solution should be able to define the systematic actions to be taken, No
10
based upon an analyst‟s work action.
Page 96 of 155
Detection rules creation/modification and deletion could be subject of No
11
approval by more than one appointed person using workflow functionality.
Alerts should be managed by more than one appointed person using No
12
workflow functionality.
Reports review and appropriate reaction could be managed by more than No
13
one appointed person using workflow functionality.
Internal employee should not be able to delete/modify/recreate workflow No
14
steps.
15 Solution should provide different access rights for different users No
Solution should have the ability to create and modify workflow without No
16
assistance of software vendor
Solution should have the ability to transition from one activity to other on No
17
the basis of defined turnaround times
System should provide the flexibility to send notifications to the intended No
18
users on assignment of any activity
5. Scoring
5.1 SCORING MODEL REQUIREMENTS
The solution should have ability to assign risk / fraud scores to Yes
1
transactions.
2 Solution should have ability to score individual transactions Yes
3 Solution should be able to apply fraud score at entity level Yes
Solution should be able to build anomaly detection models to find Yes
4
previously unknown activities that are indicative of fraud
Solution should be able to build pre-defined anomaly univariate and Yes
5
multivariate models
6 Solution should have ability to build and deploy new models Yes
Solution should have ability to define clusters using several different Yes
7
techniques and relations
Solution should have ability to include different sets of limits and Yes
8
thresholds for different event types
Solution should have ability to build predictive fraud models designed to Yes
9 learn from past fraud and better predict future attempts ( Self Learning
Capability)
5.2 ALERT MANAGEMENT REQUIREMENT
1 Solution should have ability to suppress unwanted alerts Yes
2 Solution should route alerts to the appropriate person/group Yes
3 Solution should have advanced routing rules to route along any data event Yes
4 Solution should have capability to reduce redundant alerts Yes
Solution should have capability to group alerts into single entity Yes
5
actionable events
6 Solution should provide reports on alerts Yes
Solution should have capability to visualize the network related to alerts Yes
7
or risk networks
Analyst should be able to action alerts by routing, emailing, closing or Yes
8
other events
9 Analyst should be able to make notes in alerts Yes
10 Solution should be Integrated with case management Yes
Page 97 of 155
The Solution should support detailed Threshold Analysis, in order to fine Yes
11
tune alerts and reduce false positives.
The Solution should support ability to import Alerts from external Yes
12
detection systems in batch and real time.
The Solution should support the ability to correlate Alerts in batch and Yes
13
real time in order to detect linkages between the Alerts.
The Solution should support the ability to score alerts in order to Yes
14
prioritize the alert analysis task.
The Solution should systemically identify linkages between different Yes
15 alerts, even though the alerts are generated from different batches and
runs.
The Solution should support ability to score Alert Correlations and Yes
16
automatically promote them to Cases.
5.3 NETWORK ANALYSIS REQUIREMENT
Network Analysis should define risk based on relationships with entities, Yes
1
financial and non financial transactions, etc
Solution should have ability to build networks on data specific Yes
2
relationships such as address, phone etc
3 Solution should have ability to score networks based on risk rules Yes
4 Solution should have ability to score networks based on predictive models Yes
Solution should have ability to score networks based on deviation from Yes
5
normal
Solution should provide visualization for navigating and drilling into Yes
6
networks
Solution should have time based slider for chronological visualization of Yes
7
network
8 Solution should have detail drill down to information inside a network Yes
Solution should have node collapsing expanding ability to hide or show Yes
9
inter network relationships
Solution should have ability to compress extremely large networks using Yes
10
analytics
Solution should have ability to share network changes with other Yes
11
investigators
12 The Solution should enable to add links and nodes to the network Yes
13 The solution should enable searching for a particular node in the network Yes
14 The solution should enable to view the details of nodes and links Yes
The solution should enable linking the node based on demographic and Yes
15
transaction details
16 The demographic linkages should be supported by fuzzy matches Yes
17 The solution should enable the user to makes notes on the network Yes
The solution should enable viewing the network on geographic map Yes
18
background based on the location nodes in the network
The solution should support expanding the nodes based on the linkages to Yes
19
the node
Page 98 of 155
The solution should provide specialized table loaders to provide optimized
1 Yes
bulk loading of databases such as Oracle, Teradata and DB2.
The solution should provide integrated workflow scheduling, automatic
2 Yes
load balancing and grid computing support
The solution should be able to seamlessly call Data Quality functionalities
3 such as data standardization (standardizing city, state etc.) as part of the Yes
ETL process flow
The solution should be able to seamlessly call Data Quality processes as a
4 Yes
web service for de-duplication, as part of the ETL process flow
The solution should provide an out-of-the-box transformation to support
5 conditional processing within jobs, allowing distinct portions of a job to Yes
be defined to run conditionally
The solution should provide in-built analytical transformations for
6 statistical functions such as correlations, distribution analysis, one-way Yes
frequencies, summary statistics etc. as part of the ETL process flow
The solution should provide an in-built analytical transformation to
7 perform forecasting on time-series or transactional data as part of the Yes
ETL process flow
The solution should have the ability to import and export relational
8 metadata in external formats to exchange metadata with third-party Yes
applications
The ETL tool should provide native access Industry leading RDBMS like No
9 ORACLE, DB2, SQL Server, Sybase, MYSQL and appliances like Netezza,
Teradata, etc.
The solution should provide a pre-built transformation to use SOAP No
10 (Simple Object Access Protocol) and REST (Representational State
Transfer) to access a web service as a source for the ETL process
The solution should provide support for Message-Oriented Middleware, No
11 including Web Sphere MQ from IBM, MSMQ from Microsoft and Tibco‟s
Rendezvous
The solution should provide file reader/writer for Hadoop file system No
12
(HDFS).
The solution should provide a graphical development environment for No
13 authoring Hadoop-related code including Pig, Hive, MapReduce and HDFS
commands
The ETL tool should provide for Multiple-user design environment with a No
governance mechanism to prevent corruption of data integration related
14
objects, and also supports collaboration on large, enterprise wide
projects.
The solution should generate code for ETL process flows created through No
15
the GUI which can be viewed / edited by the developers if required
The ETL tool should be rich in the set of in-built transformations and No
functions that should include predefined table and column-level
16
transformations including slowly changing dimensions (SCD type1 and
type2)
The solution should provide the ability to create User Written Code No
17 transformations, which allows leveraging custom code as part of the ETL
process flow
The solution should provide the capability to create customized No
18
transformations which can be reused across ETL process flows
Page 99 of 155
The solution should provide the capability to import native user-defined No
19 functions from databases such as Oracle, DB2, and Teradata and have
them available for use in expressions in the ETL process flow
The solution should have the capability for ELT processing which No
20 facilitates execution of the process flow inside a database, providing
enhanced execution and performance
The solution should provide a utility to check if a particular No
21
transformation can be executed inside the database
The solution should have the ability to perform the complete process of No
22 extracting and transforming the data and loading it into a datamart and
generate reports as part of the same ETL process
The solution should have the ability for Command-line job deployment No
23
options for deploying single and multiple jobs
The solution should provide the ability to execute external OS level No
24
commands such as call shell scripts as part of the ETL process
The solution should provide a single metadata repository which provides No
25 the ability to track data lineage by performing impact and reverse impact
analysis visually, through a graphical user interface
The solution should have the ability to perform complex search (based on No
26 object name, type, date range etc.) of the metadata repository and
should also be able to save search criteria for reuse.
The solution should provide the ability to export metadata as a package No
27 for backup and archival and import the same through a wizard driven
interface
The solution should have the ability to compare the metadata being No
28 imported with the existing metadata to better facilitate change
management
The solution should provide a wizard driven interface to perform column No
29 standardization on table metadata on column lengths, formats, and other
attributes that you would like to match between the tables.
The solution should provide metadata reports that provide an easy-to- No
30
understand view of the metadata for users to view the content.
The solution should provide the capability to generate metadata reports No
31 which can provide the requisite information related to tables, process
flows etc. used as part of the ETL process
The solution should have the ability to easily capture and display No
32 performance information such as real time, CPU time, memory use,
input/output, and record count data as a table / graph
The solution should provide enhanced visual de-bugging capabilities: No
- To run a particular transformation
33
- To run an ETL flow from / up to a particular transformation
- To run an ETL flow step-wise
The solution should provide the capability to assign checkpoints in the ETL No
34 process flow to ensure recovery and de-bugging in case of failure,
interruptions or errors
The solution should provide enhanced logging capabilities accessible from No
35 a log tab which can help determine the point of failure of the ETL process
and the corresponding error highlighted in the code
7. BI & Reporting
The solution should have the ability to use In-Memory Analytics to enable Yes
1 users to conduct Fast, Thorough Explorations and Analysis on your data
from different data sources across the Enterprise
The solution should be able to analyze Data and generate visualizations on Yes
2
the fly, without any performance degradation
The offering should have integrated modules for in-memory analytics Yes
3
comprising data preparation, exploration, visualization and administration
The solution should allow data to be accessed from any industry standard Yes
4
data source using native connectors and load the same in Memory
The solution should provide the capability to search for data tables Yes
5
available in Memory
The solution should provide the capability to upload data from a Yes
6
spreadsheet in to memory for analysis
The solution should provide self service analytics on data in-memory Yes
7 without the need to create a semantic metadata layer prior to
exploration, thus reducing dependency for end users
The solution should enable different types of users on all available data No
8 without the need to Subset / sample / create multiple views of data by
use of in-memory technology
The solution should provide Self-Service platform without the need to No
9 build a semantic metadata layer for End users, thus reducing dependency
on IT
The solution should provide a user friendly, web based , drag and drop
10
interface for data preparation No
The solution should visually prepare data for analysis, including joining
11 tables, defining custom calculated columns and creating custom
expressions for data tables available in-memory No
The solution should provide capability to leverage and build star schema
12
data models in Memory No
The solution should allow data load jobs to be scheduled to automate the No
13
process of loading data into memory
The solution should be compatible with both Windows and Linux operating
14
systems No
The solution should provide the following capabilities for Analytics
using In-Memory technology:
The solution should have the capability to explore and seek correlations Yes
15
on data sets using in-memory server sources for any size data analysis
The solution should provide interactive analytical capabilities such as Yes
16
Correlations & Regression
The solution should provide interactive analytical capabilities such as Yes
17
Network plot
The solution should provide interactive analytical capabilities such as Yes
18
Decision Tree
The solution should allow the analysis / explorations / reports based on Yes
45
in-memory data to be pushed for offline viewing to mobile devices
Reports and Dashboards access on iPad and Android devices should be Yes
using a native application which helps leverage most popular gestures and
46
capabilities, including zoom, swipe, etc, to optimize ease of use and user
engagement
The solution should allow users to securely view reports on mobile devices Yes
47
while online or offline
48 The solutions should have the ability to cancel query in process Yes
49 Self-service capability to import data from databases Yes
50 The solution should be capable of applying filters on aggregated variables Yes
The solution should be capable to schedule & distribute Yes
51
reports/dashboards
The solution should provide Autocharting Based on data selected for No
52 analysis, solution should automatically choose best visualization suited to
display the type of data selected
The solution should provide Geographical map views (Chloropeths, custom No
53 conditional highlighting) to provide a quick understanding of geospatial
data
The solution should allow users to change queries by selecting items to be No
54
displayed from a sidebar or dynamically filtering and grouping
The solution should provide viewable descriptive statistics, such as min, No
55 max and mean, enabling users to gain an overall sense of a particular
measure
The solution should provide the capability to link to an external url from a No
56
visual object with relevent context
The solution should be capable of read and write of comments on reports No
57
to aid in collaboration
58 The solution is capable of emailing a report link with comments to others No
The solution should provide progressive filters. This refers to cascading No
relation between filter controls in the report body with bi-directional
59
filter support ie, each linked filter control acts as a source as well as
target for other prompts
The solution should provide collaboration support with Annotation on No
60
Tablet
61 The solution should allow users to Receive Alerts No
Contact1
Name:
Designation:
Landline No.:
Mobile No.:
E-mail id:
Contact2
Name:
Designation:
Landline No.:
Mobile No.:
E-mail id:
** Sheet should be filled both for bidder and professional consulting organization
Signature
Company Seal
Place:
Date:
To:
Bill of Materials
(Final Selected
Bidder has to provide
bifurcation for all
hardware
components
separately in BOM
including applicable
taxes as per this RFP)
(Final Selected
Bidder has to provide
bifurcation for all
Software
components
separately in BOM
including applicable
taxes as per this RFP)
4. One time Implementation Cost of EFRM Solution
XX
I. Man-Day Effort of
OEM for minimum
40% of total
NA NA NA NA NA
implementation
effort of EFRM
solution
II. Man –Day Effort
NA NA NA NA NA
of Bidder
5. Training Cost
XX
I. End User Training
(batch of 30 NA NA NA NA NA
officials)
II. Top Management/
Executive Training
NA NA NA NA NA
(batch of 15
executives)
III. Core Technical
Training(batch of NA NA NA NA NA
15 executives)
6. Facility Management
Type Qty NA
L1 resources cost at 7
NA
bank‟s premises
L2 resources cost at 3 NA
Page 119 of 155
bank‟s premises
L3 resources cost at 1
NA
bank‟s premises
7. Change Request cost per quartertr
Type Qty NA
Change Request 4
Carried out by Bidder NA
for 5 man-Days
Change Request /any 4
other activity Carried
NA
out by EFRM OEM for
5 man-Days
Total Cost (A)
Total Cost of Ownership (TCO)
____________________________
Total Cost of Ownership (TCO) (Amount in INR)
_________________________________
(Amount in Words)
AMC and ATS price quoted in TCO will be consolidated amount for all the solution
components proposed by the Bidder for EFRM solution. Selected Bidder has to provide
bifurcation for AMC and ATS cost for each component separately.
S. No
No. of Total Cost
Per Quarter Cost
Description Quarter
(a)
(b) (c)=a*b
Note:
i. The TCO is for 5 years.
ii. Cost across 5 years should be quoted equally for AMC/ATS.
To
Dear Sir,
We undertake to provide the Bank with a suitable Bank Guarantee in the format
prescribed by the Bank for maintaining the systems supplied, installed and
maintained under the RFP dated 13/06/2017 for Request for Proposal (RFP) For
ENTERPRISE FRAUD RISK MANAGEMENT SOLUTION
Yours faithfully,
Authorized Signatories
(Name, Designation and Seal of the Company)
Date:
Place:
Date:
To:
The Dy. General Manager
Union Bank of India
Department of Information Technology,
Technology Center,
Adi Shankaracharya Marg, (JVLR),
Opp. Powai Lake, Andheri – East,
Mumbai- 400072
We also undertake that, we were never involved in any legal case that may affect
the solvency / existence of our firm or in any other way that may affect capability
to provide / continue the services to bank.
Yours faithfully,
Authorized Signatories
(Name, Designation and Seal of the Company)
Date:
Dear Sirs,
In response to your invitation to respond to your RFP for Enterprise Fraud Risk
Management Solution for your office, M/s __________________ having their registered
office at _____________ (hereinafter called the „Bidder‟) wish to respond to the said
Request for Proposal (RFP) for self and other associated bidders and submit the proposal
for the supply, installation, commissioning hardware equipment, software/ licenses and to
provide related services as listed in the RFP document.
Whereas the „Bidder‟ has submitted the proposal in response to RFP, we, the
____________ Bank having our head office ________________ hereby irrevocably
guarantee an amount of Rs._________________ as bid security as required to be submitted
by the „Bidder‟ as a condition for participation in the said process of RFP.
The Bid security for which this guarantee is given is liable to be enforced/ invoked:
1) If the Bidder withdraws his proposal during the period of the proposal validity; or
2) If the Bidder, having been notified of the acceptance of its proposal by the Bank
during the period of the validity of the proposal fails or refuses to enter into the
contract in accordance with the Terms and Conditions of the RFP or the terms and
conditions mutually agreed subsequently.
We undertake to pay immediately on demand to Union Bank of India, the said amount of
Rupees _______________ without any reservation, protest, demur, or recourse. The said
guarantee is liable to be invoked/ enforced on the happening of the contingencies as
mentioned above and also in the RFP document and we shall pay the amount on any
Demand made by Union Bank of India which shall be conclusive and binding on us
irrespective of any dispute or difference raised by the bidder.
Notwithstanding anything contained herein:
1) Our liability under this Bank guarantee shall not exceed Rs.________________.
2) This Bank guarantee will be valid up to __________________; and
3) We are liable to pay the guarantee amount or any part thereof under this Bank
guarantee only upon service of a written claim or demand by you on or before
________________.
In witness whereof the Bank, through the authorized officer has sets its hand and stamp
on this _______________ day of __________________ at _________________.
Bidder's
compliance
S.No Clause Details ( Yes / No)
1 Summarized scope of work
Bidder's acceptance to all the points
mentioned under the summarized scope of
work.
2 Two Part Tender
Bidder's acceptance to the procedure and
all terms and conditions mentioned under
this clause
3 Bid validity
Bidder's acceptance to keep the bid
validity for 180 days from the last date of
submission of bid documents
4 Right to alter RFP
These are the mandatory conditions. Each bidder has to provide the compliance for the
above.
TCO refers to the aggregate amounts payable by the Bank for transfer of ownership.
The TCO shall be arrived at after deducting „buy back‟ costs involved and if/as defined in
the RFP.
TCO, however, shall not include variables of octroi and entry tax. These shall be paid as
per actual and on production of receipts. However, no penalties respecting octroi or entry
tax shall be paid by the Bank and the vendor shall bear such expenses.
The Venue, Date, Time etc. for training in Reverse Auction shall be advised at the
appropriate time.
The Bank shall Endeavour to fix such Date/Time at mutual convenience to the
vendor/s, service provider and the Bank.
The Date and Time of commencement of Reverse Auction as also Duration of „Reverse
Auction Time‟ shall be communicated at least 7 working Days prior to such auction Date.
Any force majeure or other condition leading to postponement of auction shall entitle the
Bank to postponement of auction even after communication, but, the Bank shall be
obliged to communicate to all participating vendors the „postponement‟ prior to
commencement of such „Reverse Auction‟.
The Reverse Auction shall be conducted on a specific web portal meant for this purpose.
The Reverse Auction may be conducted by the Bank itself or through a service provider
specifically identified/appointed/empanelled by the Bank.
In all Reverse Auctions conducted by the Bank through a Service Provider, the Bank shall
enter into a separate agreement clearly detailing the role and responsibilities of the
service provider hosting the web portal for the Reverse Auction.
For creating necessary obligations and rights, the service provider will also enter into an
agreement with each vendor as per a format designed by him for this purpose. The Bank
shall resolve any points/issues concerning such agreement of vendor and service provider.
While a Service Level Agreement (SLA) by the bank with the service provider is an
arrangement for smooth and fair conduct of the Reverse Auction, the Bank shall be
directly responsible to vendors for fair and transparent conduct of Reverse Auction.
The service provider at the end of each Reverse Auction shall provide the bank with all
details of the bids and reports of reverse auction.
The service provider shall also archive the data pertaining to the Reverse Auction for a
minimum period of 3 years.
TRAINING AND AUCTION:
A proxy bid is one where vendor can submit the lowest bid amount by him in strict
confidence to the system directly. This obviates the need for him participating in
the bidding process until the proxy bid amount is decrement ally reached by other
bidders.
When proxy bid amount is reached, the vendor has an option to revise the proxy
bid amount or he can prefer to start participating in bidding process.
Since it is an English auction with no ties, two vendors submitting identical proxy
bid amount and succeeding in auction simultaneously does not arise.
During training, the issue of proxy bidding will be clarified in detail by the service
provider.
TRANSPARENCY IN BIDS:
All bidders will be able to view during the auction time the current lowest price in portal.
Bidder shall be able to view not only the lowest bid but also the last bid made by him at
any point of time during the auction time.
MASKING OF NAMES:
Names of bidders/ vendors shall be anonymously masked in the Reverse Auction process
and vendors will be given suitable dummy names.
START PRICE:
Bank shall determine the start price either on its own or through asking for information of
price band on TCO from each vendor at appropriate time during or at the conclusion of
technical evaluation. Based on the price band so informed by vendors, Bank would
determine the start price for reverse auction.
The vendors shall be able to bid only at a specified decrement value and not at any
other fractions. The Bid decrement value shall be Rs 7500/- or 0.25% of the Start price of
the Reverse Auction, whichever is higher.
The bid decrement value shall be rounded off to the nearest thousands of rupees.
For the sake of convenience of vendors, the web portal shall display the next possible
decremented value of bid. It is not, however, obligatory on the part of vendors to bid at
the next immediate lower level only. (That is, bids can be even at 2 or 3 lower levels than
the immediate lower level.)
The Bank shall supply copy of the Business rules to any vendors / bidders, wishing to
participate in the reverse auction. Such request shall be made in writing to the Bank by
an authorized representative of the vendor.
The Bank shall also handover a copy of the Business Rules with a covering
letter duly signed by an authorized signatory of the Bank.
For any dispute concerning the Business Rules, the hard copy of Business
Rules supplied by the Bank for the reference of reverse auction process will
alone be considered final and binding.
SPLITTING OF ORDERS:
If any RFP specifically authorizes splitting of orders for the sake of reducing
dependency on single source of supply or provision of service, Bank is entitled to
split the order in the order and as provided in RFP.
While splitting the order, Bank shall specify the maximum quantum for L1, L2 etc.
in RFP.
In case L2 vendor is not willing to supply at L1 price, Bank shall call L3, L4 etc. in
order to arrive at the split quantum to be awarded.
The Bank shall also be entitled to award the contract to L2, L3 or L4 etc. bidders in
the event of L1 bidder backing out to honor the commitment, or for that matter
not in a position to supply the offering as per RFP.
All expenses of reverse auction shall be borne by the Bank. Vendors, however, shall attend
the training or mock auction at their own cost.
CHANGES IN BUSINESS RULES:
Any change in Business Rules as may become emergent and based on the experience
gained shall be made only by a Committee of senior / top executives of the Bank.
Any / all changes made in Business Rules shall be uploaded in the Website
immediately.
If any reverse auction process has commenced and a change is made in
Business Rules, it shall be informed immediately to each vendor/ bidder and
his concurrence to / acceptance of the change shall be obtained in writing
by the Bank.
DON’TS APPLICABLE TO THE BIDDER/VENDOR:
No vendor shall involve himself / itself or any of his / its representatives in any
price manipulation directly or indirectly with other bidders. If any such practice
comes to the notice, Bank shall disqualify the vendor / bidders concerned from the
reverse auction process.
Any aggrieved vendor / bidder through Reverse Auction process can make
complaint in writing within 48 hours of the Reverse Auction to the Chief
Compliance Officer of the Bank.
The Chief Compliance Officer along with the Chief Law Officer of the bank and
Chief of Audit Dept. shall give personal hearing to the aggrieved bidder / vendor
and decide upon the complaint / grievance.
Decision of the Grievance Redressal Committee shall be binding on the Bank as well
as on all vendors participating in the Reverse Auction.
ERRORS AND OMISSIONS:
On any issue or area of material concern respecting Reverse Auction not specifically dealt
with in these Business Rules, the decision of the bank shall be final and binding on all
concerned.
To,
Union Bank of India
Technology Centre,
Adi Shankaracharya Marg,
Jogeswari Vikhroli Link Road,
Powai, Mumbai – 400 072
DECLARATION
We ______________________(name of the company) hereby confirm having submitted our
bid for participating in Bank‟s RFP dated _________ for procurement of ____________.
We also confirm having read the terms of RFP as well as the Business Rules relating to the
Reverse Auction for this RFP process.
We hereby undertake and agree to abide by all the terms and conditions stipulated by
Union Bank of India in the RFP document including all annexures and the Business Rules for
Reverse Auction.
We shall participate in the on-line auction conducted by _______________ Ltd. (Auction
Company) and submit our commercial bid. We shall also abide by the procedures
prescribed for online auction by the auction company.
We, hereby confirm that we will honor the Bids placed by us during the auction process,
failing which we shall forfeit the EMD. We also understand that the bank may debar us
from participating in future tenders.
We confirm having nominated Mr ________________, designated as ______________ of our
company to participate in the Reverse Auction on behalf of the company. We undertake
that the company shall be bound by the bids made by him in Reverse Auction.
We undertake to submit the confirmation of last bid price by us to the auction
company/Bank within 48 working hours of the completion of event. We also undertake to
submit the Bill of Materials for the TCO (Total Cost of Ownership) in terms of RFP.
Name –
Company / Organization –
Designation within Company / Organization –
Address of Company / Organization –
Date:
Name of Authorized Representative: _______________________
Signature of Authorized Representative: ____________________
Verified above signature
Competent Authority Signature: ___________________________
Date: _________________
To,
Union Bank of India
Technology Centre,
Adi Shankaracharya Marg,
Jogeswari Vikhroli Link Road,
Powai, Mumbai – 400 072
Date :
To, Date__________
Dear Sir,
Yours Faithfully
Name of Company______________________
Name of Contact Person_________________
Designation____________________________
Email ID______________________________
Contact no_____________________________
Role of Hardware/
Make Placement
Sr. No. Solution Component Quantity Configuration
model (DC/DR)
to be hosted
1
2
3
Software/ No. of
Sr. No. Description
Database licenses
To:
The Dy. General Manager
Union Bank of India
Department of Information Technology,
Technology Center,
Adi Shankaracharya Marg, (JVLR),
Opp. Powai Lake, Andheri – East,
Mumbai- 400072
Sir,
We ………………………… (Name of the OEM) who are established and reputable manufacturers
/ developers of ………………………… having Registered office at ………, ……… do hereby
authorize M/s ……………………… to submit Bid and negotiate and conclude a contract with
you for Implementation of Enterprise Fraud Risk Management Solution for the product/s
manufactured / developed by us.
We also undertake to perform the obligations as set out in the RFP in respect of such
services and hereby extend our warranty / support and services through M/s.………………
during the 5 years contract period as per terms and conditions of the RFP.
We also undertake that we have not been blacklisted by the Government Authority or
Public Sector Undertaking (PSUs) in India or any Financial Institution in India as on date of
submission of response.
We assure you that in the event of M/s ……………………… not being able to fulfill its
obligation as M/s ……………………… Bidder in respect of the terms defined in the RFP,
…………………………………… (OEM Name) would continue to meet these either directly or
through alternate arrangements without any additional cost to the Bank.
To:
The Dy. General Manager
Union Bank of India
Department of Information Technology,
Technology Center,
Adi Shankaracharya Marg, (JVLR),
Opp. Powai Lake, Andheri – East,
Mumbai- 400072
UNDERTAKING
We further undertake and agree to save defend and keep harmless and indemnified the
Bank against all loss, cost, damages , claim, penalties, expenses, legal liability because of
non compliance of KYE and of misconduct of the employee deployed by us to the Bank.
Date ________________
Date ________________
20__, and shall be deemed to have become in full force and effect from
(the “Effective Date”).
AND
Union Bank of India, a corresponding new bank constituted under section 3 of Banking
Companies (Acuisition & Transfer of Undertakings) Act 1970 having its Head office at Union
Bank Bhavan, Vidhan Bhavan Marg, Nariman Point, Mumbai – 400026 (hereinafter referred
to as “Union Bank” or “Bank” which expression shall, unless it be repugnant to the context
or meaning thereof, mean and include its successors and permitted assigns), of the OTHER
PART:
________ and the Bank shall hereinafter jointly be referred to as “Parties” and
individually as a “Party”.
In this Agreement, “Affiliate” means any entity which from time to time Controls, is
Controlled by or is under common Control with the relevant party or entity, where
“Control” means having the ability (including, without limitation, by means of a majority
of voting rights or the right to appoint or remove a majority of the board of directors) to
control the management and policies of an entity.
W H E R E A S:-
i) immediately return all written Confidential Information and all copies thereof
provided to, or produced by, it or its advisers, as the case may be, which is in such
party‟s possession or under its custody and control;
ii) to the extent practicable, but without prejudice to the obligations of confidentiality
herein, immediately destroy all analyses, compilations, notes, studies, memoranda or
other documents prepared by it or its advisers to the extent that the same contain,
reflect or derive from Confidential Information relating to the other party;
iii) so far as it is practicable to do so (but, in any event, without prejudice to the
obligations of confidentiality contained in this Agreement), immediately expunge any
Confidential Information relating to the Disclosing Party or its clients or any member of
their group or their projects from any computer, word processor or other device in its
possession or under its custody and control.
4. Permitted disclosure:
The provisions of paragraph 2 shall not restrict any disclosure required by law or by any
court of competent jurisdiction, the rules and regulations of any recognized stock
exchange or any enquiry or investigation by any governmental, official or regulatory body
which is lawfully entitled to require any such disclosure provided that, so far as it is lawful
and practical to do so prior to such disclosure, the Receiving Party shall promptly notify
the other party of such requirement with a view to providing the opportunity for the
Provider to contest such disclosure or otherwise to agree the timing and content of such
disclosure.
5. Ownership of Information:
Except to the extent as agreed herein, the Confidential Information and copies thereof, in
whatsoever form shall at all times remain the property of the Disclosing Party or its clients
and its disclosure shall not confer on the Receiving Party any rights (including any
intellectual property rights) over the Confidential Information whatsoever beyond those
contained in this Agreement.
6. No Representation:
Neither the disclosure, transmission receipt or exchange of Confidential Information nor
anything else in this Agreement will constitute an offer by or on behalf of the Disclosing
Party or be construed as soliciting any business or organization changes or any assurance
of any business commitment or an inducement to incur / undertake any obligations not
specified herein and neither party will be under any obligation to accept any offer or
proposal which may be made by the other or on behalf of such other party.
8. No Assignment:
This Agreement shall not be assigned by either party, by operation of law or otherwise,
without the prior written consent of the other party. This Agreement shall inure to the
benefit of and will be binding upon the parties‟ respective successors and permitted
assigns.
9. Severability:
In the event that any of the provisions contained in this Agreement is found to be invalid,
illegal or unenforceable in any respect by a Court of competent jurisdiction, the validity,
legality, or enforceability of the remaining provisions contained in this agreement will not
be in any way affected or impaired by such a finding.
11. Notices:
Notices as required by this Agreement shall be sent to the Parties at the addresses
mentioned first herein above or such other addresses as the Parties may designate from
time to time, and shall be sent by certified or registered mail with acknowledgement due
on receipt.
12. Term
This Agreement shall commence from the Effective Date of this Agreement and shall be
valid for a period of five years there from. Confidentiality obligations under this
Agreement shall continue to be binding and applicable without limit in point in time
14. Indemnity:
The receiving Party agrees to indemnify and hold harmless the Disclosures against all
costs, liability, losses and claims incurred by the Disclosures as a result of a breach of this
Agreement.
15. Modification:
Modification to any of the provisions of this Agreement shall be void unless it is writing
and duly executed by Parties.
16. Headings:
The headings given herein above are for ease of reference only and shall not attach or
have any effect/ meaning whatsoever contrary to what is stated in the agreement.
17. Counterparts:
This Agreement has been signed in duplicate, each of which shall be deemed to be an
original. The exchange of a fully executed Agreement (in counterparts or otherwise) by
fax shall be sufficient to bind the parties to the terms and conditions of this Agreement.
This pre-bid contract agreement (hereinafter called the Integrity Pact) is made on
____________day of the month of _____________ 2015,
Union Bank of India, a body Corporate constituted under Banking Companies (Acquisition
and Transfer of Undertaking) Act, 1970 having its Head Office at 239 ,Vidhan Bhavan Marg
, Mumbai -400021(hereinafter referred to as “The Bank or the BUYER” which expression
shall include its successors and assigns)AND
Both parties undertake to avoid all forms of corruption by following a system that is fair,
transparent, and free from any influence of prejudiced dealings prior to, during, and
subsequent to the currency of the contract to be entered into with a view to:
Enabling BIDDERS to abstain from bribing or indulging in any corrupt practice in order to
secure the contract by providing assurance to them that their competitors will also abstain
from bribing and other corrupt practices and the BUYER will commit to prevent
corruption, in any form, by its officials, by following transparent procedures.
The parties hereto hereby agree to enter into this Integrity Pact and agree as follows:
1.1 The BUYER undertakes that no official of the BUYER, connected directly, or
indirectly to the contract, will demand, take a promise for or accept, directly, or
through intermediaries, any bribe, consideration, gift, reward, favour or any
material or immaterial benefit or advantage form the BIDDER, either for
themselves, or for any person, organisation or third party related to the contract in
exchange for an advantage in the bidding process, bid evaluation, contracting or
implementation process related to the contract.
1.2 The BUYER will, during the pre-contract stage, treat all BIDDERS alike, and will
provide to all BIDDERS the same information and will not provide any such
Commitments of BIDDERS
The BIDDER commits itself to take all measures necessary to prevent corrupt practices,
unfair means and illegal activities during any stage of its bid or during any pre-contract or
post-contract stage in order to secure the contract or in furtherance to secure it and in
particular commit itself to the following:-
2.1. The BIDDER will not offer directly, or through intermediaries, any bribe, gift,
consideration, reward, favour, any material or immaterial benefit or other
advantage, commission, fees, brokerage or inducement to any official of the BUYER
connected directly or indirectly with the bidding process, or to any person,
organization or third party related to the contract in exchange for any advantage in
the bidding, evaluation, contracting and implementation of the contract.
2.2. The BIDDER further undertakes that it has not given, offered or promised to give
directly or indirectly, any bribe, gift, consideration, reward, favour, any material or
immaterial benefit or other advantage, commission, fees, brokerage or inducement
to any official of the BUYER or otherwise in procuring the contract or forbearing to
do or having done any act in relation to the obtaining or execution of the contract
or any other contract with the Bank for showing or forbearing to show favour or
disfavor to any person in relation to the contract or any other contract with the
Bank.
2.3. BIDDERs shall disclose the name and address of agents and representatives and
Indian BIDDERS shall disclose their foreign principals or associates.
2.4. BIDDERs shall disclose the payments to be made by them to agents/brokers, or any
other intermediary, in connection with this bid/contract.
2.5. The BIDDER further confirms and declares to the BUYER that the BIDDER is the
original manufacturer/integrator/ authorized government sponsored export entity
of the defense stores and has not engaged any individual or firm or company,
whether Indian or foreign, to intercede of facilitate or in any way to recommend to
the BUYER or any of its functionaries, whether officially or unofficially to the award
of the contract to the BIDDER, nor has any amount been paid to any such individual,
firm or company in respect of any such intercession, facilitation or
recommendation.
PREVIOUS TRANSGRESSION
3.1. The BIDDER declares that no previous transgression occurred in the last three years
immediately before signing of this Integrity Pact with any other company in any
country in respect of any corrupt practices envisaged hereunder or with any Public
Sector Enterprise in India or any Government department in India that could justify
BIDDER‟s exclusion from the tender process.
3.2. The BIDDER agrees that if it makes incorrect statement on this subject, BIDDER shall
be disqualified from the tender process or the contract, if already awarded, can be
terminated for such reason.
4.1. While submitting commercial bid, the BIDDER shall deposit an amount (to be
specified in the RFP) as Earnest money/Security deposit, with BUYER through any of
the following instruments:
III. Any other mode through any other instrument (to be specified in the RFP)
4.2. The Earnest money/Security deposit shall be valid unto a period of five years or the
complete conclusion of the contractual obligations to the complete satisfaction of
both the BIDDER and the BUYER, including warranty period, whichever is later.
4.3. In case of the successful BIDDER a clause would also be incorporated in the Article
pertaining to Performance Bond in the Purchase Contract that the provisions for
Sanctions for Violation shall lie applicable for forfeiture of Performance Bond in
case of a decision by the BUYER to forfeit the same without assigning any reason for
imposing sanction for violation of this Pact.
4.4. No interest shall be payable by the BUYER to the BIDDER on Earnest money/Security
deposit for the period of its currency.
5.1. Any breach of the aforesaid provisions by the BIDDER or any one employed by it or
acting on its behalf (whether with or without the knowledge of the BIDDER) shall
entitle the BUYER to take all or any one of the following actions, wherever
required:
ii) The Earnest Money Deposit, (in pre-contract stage) and/or Security Deposit
Performance Bond (after the contract is signed) shall stand forfeited, either
fully or partially, as decided by the BUYER and the BUYER shall not be required
to assign any reason therefore.
iii) To immediately cancel the contract, if already signed, without giving any
compensation to the BIDDER.
iv) To recover all sums already paid by the BUYER and in case of an Indian BIDDER
with interest thereon at 2% higher than the prevailing Prime Lending rate of
If any outstanding payment is due to the BIDDER from the BUYER in connection with any
other contract of any other stores, such outstanding payment could also be utilized to
recover the aforesaid sum and interest.
v) To encash the advance bank guarantee and performance bond warranty bond,
if furnished by the BIDDER, in order to recover the payments, already made by
the BUYER, along with interest.
vi) To cancel all or any other contracts with the BIDDER. The BIDDER shall be liable
to pay compensation for any loss or damage to the BUYER resulting from such
cancellation/ rescessation and the buyer shall be entitled to deduct the amount
so payable from the money(s) due to the BIDDER.
vii) To debar the BIDDER form participating in future bidding processes of the Bank
for a minimum period of five years, which may be further extended at the
discretion of the BUYER.
viii) To recover all sums paid in violation of this Pact by BIDDER(s) to any middle
men or agent or broker with a view to securing the contract.
ix) In cases where irrevocable Letters of Credit have been received with respect o
5.2. The BUYER will be entitled to take all or any of the actions mentioned at Para 6.1
(i) to (x) of this Pact also on the commission by the BIDDER or anyone employed by
it or acting on its behalf (whether with or without the knowledge of the BIDDER), of
an offense as defined in Chapter IX of the Indian Penal code 1860 or Prevention of
Corruption Act 1988 or any other statute enacted for prevention of corruption.
5.3. The decision of the BUYER to the effect that a breach of the provisions of this act
has been committed by the BIDDER shall be final and conclusive on the BIDDER.
However the BIDDER can approach the Independent Monitor(s) appointed for the
purpose of this Act.
FAIL CLAUSE
6. The BIDDER undertakes that it has not supplied/is not supplying similar product/system
or sub-systems at a price lower than that offered in the present bid in respect of any
other Ministry/Department of the Government of India or PSU and if it is found at any
stage that similar products/systems or sub-systems was supplied by the BIDDER to any
other Ministry/Department of the Government of India or PSU at a lower price then that
very price, with due allowance for elapsed time, will be applicable to the present case
7. INDEPENDENT MONITORS
FACILITATION OF INVESTIGATION
This Pact is subject to Indian law. The place of performance and jurisdiction is the seat of
the BUYER.
Legal Actions- The actions stipulated in this Integrity Pact are without any prejudice to
any other legal action that may follow in accordance with the provisions of the extant law
in force relating to any civil or criminal proceedings.
11. VALIDITY
11.1. The validity of this Integrity Pact shall be from the date of its signing and extend up
to five years or the complete execution of the contract to the satisfaction of both
the BUYER and the BIDDER/Seller, including warranty period, whichever is later. In
case BIDDER is unsuccessful, this Integrity Pact shall expire six months from the
date of the signing of the contract.
11.2. Should one or several provisions of this Pact turn out to be invalid, the reminder of
this Pact shall remain valid. In this case the parties will strive to come to an
agreement to their original intentions.
By: