Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
3Activity
×

Table Of Contents

Abbreviations Used
Data Sheet
SECTION 1: INTRODUCTION
1.1 Preface
1.2 Organization of the RFP
1.3 Objectives of the project:
1.4 IT scenarios relevant to the project – Past, Present
SECTION 2: QUALIFICATIONS OF THE BIDDER
2.1 Eligibility and Pre-qualification criteria
2.2 Earnest Money Deposit
2.3 Original Equipment Manufacturer’s Authorization
SECTION 3: INSTRUCTIONS TO BIDDERS
3.7 Authentication of Bid
3.8 Last date and time for receiving sealed offers
3.9 Pre-bid Meeting (PBM)
3.10 Amendment of RFP Document
3.11 Technical Qualification
3.12 Evaluation of Proposals
3.13 Evaluation Framework
3.14 Indicative Quantities
3.15 Site Visit
SECTION 4: TERMS AND CONDITIONS OF THE TENDER
4.1 Bid Security
4.2 Rejection of Bid
4.3 Discharge of Bid Security of Successful Bidder
4.4 Conditional offers by the Vendors
4.5 Late Tender offers
4.6 Offer validity
4.7 Address of Communication
4.8 Modification and Withdrawal of Offers
4.9 Hand written documents, Erasures or Alterations
4.10 Commitment and Liability of Partner Companies
4.11 Bid Currency
4.12 Intellectual Property Rights
4.13 Indemnity
4.14 Publicity
4.15 Guarantees
4.16 Force Majeure
4.17 Resolution of Disputes and Arbitration
4.18 Right to Accept Any Offer and to Reject Any or
4.19 Risk Purchase Clause
4.20 Termination for convenience
4.22 Operation and Maintenance Period
4.23 Transfer of Solution
4.24 Ownership of resources supplied
4.25 Work Completion Requirements
4.26 Payment Terms
4.27 Statistics of the number of transactions
4.28 Conditions on Payment Terms
SECTION 5: SCOPE OF WORK
5.2 Getting Certification for Security for State Data
5.5 Training
5.7 Operation and Maintenance Period
SECTION 6: TECHNICAL REQUIREMENTS
6.1 Platform
6.2 Technical Requirements for Integrated Biometry
6.3 User Capacity Requirements
6.4 Target Architecture
6.5 Conceptual Design
6.6 System Security Design Requirements
SECTION 7: SERVICE LEVEL AGREEMENTS
7.1 General Information on SLA
7.2 SLA for Application Components
7.3 SLA for switch over to Disaster Recovery Site
7.4 SLA for Uptime of the solution
7.5 Penalty for delay in project execution
7.6 Response Time Performance Criteria
7.7 Privacy & Confidentiality
7.8 Recovery mode of Penalties from the bidder
7.9 Upward cap for penalties
ANNEXURE I: FORMAT FOR TECHNICAL BID
ANNEXURE II: FORMAT FOR COMMERCIAL BID
ANNEXURE III: COMPLIANCE MATRIX FOR ENTERPRISE WEB BASED APPLICATION
ANNEXURE IV: COMPLIANCE MATRIX FOR INFRASTRUCTURE
ANNEXURE V: COMPLIANCE MATRIX FOR PROPOSED TEAM
ANNEXURE VI: INDICATIVE QUANTITIES FOR IT INFRASTRUCTURE
ANNEXURE VII: FORMAT FOR BANK GUARANTEE
0 of .
Results for:
No results containing your search query
P. 1
Tender GISSoln

Tender GISSoln

Ratings: (0)|Views: 4,191|Likes:
Published by Saurabh Srivastava

More info:

Published by: Saurabh Srivastava on Jul 11, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

11/02/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 6 are not shown in this preview.
You're Reading a Free Preview
Pages 10 to 73 are not shown in this preview.
You're Reading a Free Preview
Pages 77 to 127 are not shown in this preview.
You're Reading a Free Preview
Pages 131 to 180 are not shown in this preview.
You're Reading a Free Preview
Pages 184 to 191 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Kulgaurav Kaler liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->