From: Federal Government(Federal)
Basic Details | Start Date09 Jun, 2023 (10 months ago)Due Date24 Jun, 2023 (10 months ago) |
Customer / Agency | |
The contractor shall provide:TinyMCE 6.3.1 (or more current version) with all Premium PluginsTerm Annual Subscription Licensing for up to one hundred (100) active users.Enterprise Standard Support:Unlimited requests allowed per monthProfessional assistance delivered by Customer Care Team (all requests are served by core developers and orchestrated by Customer Care Leads); two (2) dedicated developers.Base communication channel via email to share / review screenshots, error messages and code. The contractor shall be prepared to setup a screen sharing call to address highest priority issues.Provide information in relation to the standard Software installation and configuration procedures.Provide information about using Software’s default features, functions, APIs, etc.Provide information about content and use of Software's standard documentation.Provide Bug reporting.Provide Best practices sharing.Software used by the Library is subject to routine security scanning whether hosted
internally or externally as part of the Library’s continuous security monitoring program. These security scans may result in the identification of software security vulnerabilities that need to be mitigated within the following timeframes:High Vulnerabilities 30 daysMedium Vulnerabilities 180 daysLow Vulnerabilities 360 daysUpon notification from the Contracting Officer Representative (COR) of a security vulnerability, the contractor shall take steps to correct the vulnerability within the above timeframes, including code modification, testing and installation on all Library instances of the software. The contractor shall provide documentation to the Library COR and Information Systems Security Officer, such as release notes, installation guides and user guides, documenting the changes made to the software to address the identified vulnerability. Costs associated with addressing software security vulnerabilities are not reimbursable separately and should be included as part of the contractors quote for providing the Library the software licenses or software maintenance.