No preview available
HomeMy WebLinkAboutC15-346 Civicore LLCAGREEMENT FOR LICENSE AND SERVICES BETWEEN EAGLE COUNTY, COLORADO AND CIVICORE LLC THIS AGREEMENT ( "Agreement ") is effective as of the day of 20 15 by and between -15 CiviCore, LLC a Colorado company with its principal place of business at 1580 ncoln Street, Suite 520, Denver, Colorado 80203 (hereinafter "Contractor" or "Consultant") and Eagle County, Colorado, a body corporate and politic (hereinafter "County"). RECITALS WHEREAS, County wishes to contract with a software developer for a license to use certain victim's services case management software and for hosting, maintenance and support services of the same; and WHEREAS, Contractor is authorized to do business in the State of Colorado and has the time, skill, expertise, and experience necessary to provide the Services as defined below in paragraph 1 hereof; and WHEREAS, this Agreement shall govern the relationship between Contractor and County in connection with the Services. AGREEMENT NOW, THEREFORE, in consideration of the foregoing and the following promises Contractor and County agree as follows: 1. Grant of License and Services to be Performed. Contractor hereby grants County a perpetual license to use the CiviCore software (the "Software ") described in Exhibit A, attached hereto and incorporated herein by this reference and agrees to make such modifications to such Software so that it is customized and conforms to the descriptions contained in Exhibit A, including the field mapping feature shown in Appendix 1 (the "Software Development Services "). Contractor agrees to diligently provide all services, labor, personnel and materials necessary to provide hosting, maintenance and support for the Software as set forth in Exhibit A ( "Hosting Services "). The Software Development Services and Hosting Services may be collectively referred to herein as the "Services "). The Services shall be performed in accordance with the provisions and conditions of this Agreement. a. Contractor agrees to furnish the Services in accordance with the schedules or timeframes established in Exhibit A. If no completion date is specified in Exhibit A, then Contractor agrees to furnish the Services in a timely and expeditious manner consistent with the applicable standard of care. By signing below Contractor represents that it has the expertise and personnel necessary to properly and timely perform the Services. b. In the event of any conflict or inconsistency between the terms and conditions set forth in Exhibit A and the terms and conditions set forth in this Agreement, the terms and conditions set forth in this Agreement shall prevail. 2. County's Representative. The Eagle County Innovation and Technology Department's designee shall be Contractor's contact with respect to this Agreement and performance of the Services. 3. Term of the Agreement. This Agreement shall commence upon the date first written above, and subject to the provisions of paragraph 15 hereof, Contractor's obligation to complete the Software Development Services described in Exhibit A shall continue in full force and effect until the Services described in Exhibit A are completed. For the ongoing Hosting Services, this Agreement shall extend for a period of one year from the date first above written (the "Initial Term ") and may be renewed for up to five additional one -year terms upon written approval of the County, in its sole discretion (each one year term after the Initial Term shall hereinafter be referred to as a "Renewal Term "). The Initial Term and all subsequent Renewal Terms shall collectively be referred to as the "Term." 4. Extension or Modification. This Agreement may be extended written agreement of the parties. Any amendments or modifications shall be in writing signed by both parties. No additional services or work performed by Contractor shall be the basis for additional compensation unless and until Contractor has obtained written authorization and acknowledgement by County for such additional services in accordance with County's internal policies. Accordingly, no course of conduct or dealings between the parties, nor verbal change orders, express or implied acceptance of alterations or additions to the Services, and no claim that County has been unjustly enriched by any additional services, whether or not there is in fact any such unjust enrichment, shall be the basis of any increase in the compensation payable hereunder. In the event that written authorization and acknowledgment by County for such additional services is not timely executed and issued in strict accordance with this Agreement, Contractor's rights with respect to such additional services shall be deemed waived and such failure shall result in non- payment for such additional services or work performed. 5. Compensation. County shall compensate Contractor for the right to use and the Software Development =' Services in a sum computed and payable as set forth in Exhibit A. Compensation for the performance of the ` Software development Services described in Exhibit A shall not exceed $9,750 without a signed amendment to this Agreement. If County wishes to add a major new function to the Software developed under this Agreement, Contractor shall prepare a written proposal including an estimate of the development time necessary to create the ne`w function; the rate for such development work will be $150 per hour, but such additional development time shall not be billed without a signed amendment to this Agreement. For Hosing, Maintenance and Support Services identified in Exhibit A, County shall pay Contractor $250 /month during the Initial Term and, subject to annual budgeting and appropriation by County, for all subsequent Renewal Terms. The first monthly Hosting Fee will be 'assessed commencing with the first month after the month in which County approves the Software functionality. For any Renewal Term, Contractor may increase the monthly Hosting, Maintenance and Support Service fee by not more than 5% per year by providing written notice to County no later than June 1, which adjustment shall take effect no sooner than January 1 of the succeeding year. Contractor shall not be entitled to bill at overtime and /or double time rates for work done outside of normal business hours unless specifically authorized in writing by County. a. Payment will be made for Services satisfactorily performed within thirty (30) days of receipt of a proper and accurate invoice from Contractor. All invoices shall include detail regarding the hours spent, tasks performed, who performed each task and such other detail as County may request. b. If, at any time during the term or after termination or expiration of this Agreement, County reasonably determines that any payment made by County to Contractor was improper because the Services for which payment was made were not performed as set forth in this Agreement, then upon written notice of such determination and request for reimbursement from County, Contractor shall forthwith return such payment(s) to County. Upon termination or expiration of this Agreement, unexpended funds advanced by County, if any, shall forthwith be returned to County. C. County will not withhold any taxes from monies paid to the Contractor hereunder and Contractor agrees to be solely responsible for the accurate reporting and payment of any taxes related to payments made pursuant to the terms of this Agreement. 2 Eagle County Professional Services IT Final 5/14 d. Notwithstanding anything to the contrary contained in this Agreement, County shall have no obligations under this Agreement after, nor shall any payments be made to Contractor in respect of any period after December 31 of any year, without an appropriation therefor by County in accordance with a budget adopted by the Board of County Commissioners in compliance with Article 25, title 30 of the Colorado Revised Statutes, the Local Government Budget Law (C.R.S. 29 -1 -101 et. seq.) and the TABOR Amendment (Colorado Constitution, Article X, Sec. 20). 6. Subcontractors. Contractor acknowledges that County has entered into this Agreement in reliance upon the particular reputation and expertise of Contractor. Contractor shall not enter into any subcontractor agreements for the performance of any of the Services or additional services without County's prior written consent, which may be withheld in County's sole discretion. County shall have the right in its reasonable discretion to approve all personnel assigned to the subject Project during the performance of this Agreement and no personnel to whom County has an objection, in its reasonable discretion, shall be assigned to the Project. Contractor shall require each subcontractor, as approved by County and to the extent of the Services to be performed by the subcontractor, to be bound to Contractor by the terms of this Agreement, and to assume toward Contractor all the obligations and responsibilities which Contractor, by this Agreement, assumes toward County. County shall have the right (but not the obligation) to enforce the provisions of this Agreement against any subcontractor hired by Contractor and Contractor shall cooperate in such process. The Contractor shall be responsible for the acts and omissions of its agents, employees and subcontractors. 7. Insurance. Contractor agrees to provide and maintain at Contractor's sole cost and expense, the following insurance coverage with limits of liability not less than those stated below: a. Types of Insurance. Workers' Compensation insurance as required by law. ii. Auto coverage as necessary and in accordance with state law. iii. At all times during the term of this Agreement, including any renewal terms, Contractor shall carry Commercial General Liability coverage to include premises and operations, personal /advertising injury, products /completed operations, broad form property damage with limits of liability not less than $1,000,000 per occurrence and $1,000,000 aggregate limits. iv. No later than three months after the date first above written, or the date the CiviCore software goes "live" for use by County (whichever date comes first), Contractor shall have obtained and shall carry during the term of the Agreement, including any renewal terms, Professional Liability (Errors and Omissions) coverage including Cyber Liability with prior acts coverage for all deliverables, Services and additional services required hereunder, in a form and with insurer or insurers satisfactory to County, with limits of liability of not less than $3,000,000 per claim and $3,000,000 in the aggregate. The insurance shall provide coverage for (i) liability arising from theft, dissemination and/or use of confidential information stored or transmitted in electronic form; (ii) liability arising from the introduction of a computer virus into, or otherwise causing damage to, County or a third person's computer, computer system, network or similar computer related property and the data, software and programs thereon. Intentionally omitted. b. Other Requirements. i. The automobile and commercial general liability coverage shall be endorsed to include Eagle County, its associated or affiliated entities, its successors and assigns, elected officials, employees, agents and 3 Eagle County Professional Services IT Final 5/14 volunteers as additional insureds. A certificate of insurance consistent with the foregoing requirements is attached hereto as Exhibit B. ii. Contractor's certificates of insurance shall include subcontractors, if any as additional insureds under its policies or Contractor shall furnish to County separate certificates and endorsements for each subcontractor. iii. The insurance provisions of this Agreement shall survive expiration or termination hereof. iv. The parties hereto understand and agree that the County is relying on, and does not waive or intend to waive by any provision of this Agreement, the monetary limitations or rights, immunities and protections provided by the Colorado Governmental Immunity Act, as from time to time amended, or otherwise available to County, its affiliated entities, successors or assigns, its elected officials, employees, agents and volunteers. V. Contractor is not entitled to workers' compensation benefits except as provided by the Contractor, nor to unemployment insurance benefits unless unemployment compensation coverage is provided by Contractor or some other entity. The Contractor is obligated to pay all federal and state income tax on any moneys paid pursuant to this Agreement. 8. Indemnification. The Contractor shall indemnify and hold harmless County, and any of its officers, agents and employees against any losses, claims, damages or liabilities for which County may become subject to insofar as any such losses, claims, damages or liabilities arise out of, directly or indirectly, this Agreement, or are based upon any performance or nonperformance by Contractor or any of its subcontractors hereunder; and Contractor shall reimburse County for reasonable attorney fees and costs, legal and other expenses incurred by County in connection with investigating or defending any such loss, claim, damage, liability or action. This indemnification shall not apply to claims by third parties against the County to the extent that County is liable to such third party for such claims without regard to the involvement of the Contractor. This paragraph shall survive expiration or termination hereof. 9. Ownership of Data and Intellectual Property. County retains the ownership of any data entered into the new website and database created by Contractor. Contractor shall retain all right, title and interest in the intellectual property utilized to create the Software, and rights not expressly granted herein are reserved to Contractor. Contractor grants to County a worldwide, perpetual (except where terminated for material breach of license), fully - paid (subject to payment of fees set forth herein), non - exclusive, non - transferable, limited license to use the Software as necessary for its internal use only. Notwithstanding the foregoing sentence and except as prohibited by applicable law, County may not: (a) make copies of the Software consisting of computer programming code, whether in source code or object code form, other than for archival purposes; or (b) modify, decompile, or reverse - engineer the Software except as necessary to maintain the Work for County's internal use as designed by Contractor. All data provided by County shall remain the property of County and shall be governed by the confidentiality obligations set forth herein. If Contractor dissolves as a corporate entity and ceases operations, the Contractor agrees to immediately transfer ownership of computer programming code that drives the database and associated website to an appropriate and capable entity that will continue operating the database and associated website. 10. Data Protection. Protection of County Data (which includes all data created or in any way originating with the County, and all data that is the output of computer processing of or other electronic manipulation of any data that was created by or in any way originated with the County or was shared with the County by another law enforcement agency, whether such data or output is stored on the County's hardware, the vendor's hardware or exists in any 4 Eagle County Professional Services IT Final 5/14 system owned, maintained or otherwise controlled by the County or by the Contractor) shall be an integral part of the business activities of the Contractor to ensure there is no inappropriate or unauthorized use of County Data at any time. To this end, the vendor shall safeguard the confidentiality, integrity and availability of County Data and comply with the following conditions: a. The Vendor shall implement and maintain commercially reasonable and appropriate administrative, technical and organizational security measures to safeguard against unauthorized access, disclosure or theft of County Data. b. Such security measures shall be in accordance with the standards set forth in the Civicore Application Security and Physical Infrastructure Overview attached hereto as Exhibit C and incorporated herein by this reference, C. Vendor shall maintain the standards established by the Civicore Backup and Recovery plan, which is attached hereto as Exhibit D and incorporated herein by this reference. 11. Security Incident or Data Breach Notification: Contractor shall inform the County of any security incident or data breach. a. Incident Response: Contractor may need to communicate with outside parties regarding a security incident, which may include contacting law enforcement, fielding media inquiries and seeking external expertise as mutually agreed upon, defined by law or contained in the contract. Discussing security incidents with the County should be handled on an urgent as- needed basis, as part of service provider communication and mitigation processes as mutually agreed upon, defined by law or contained in the contract. b.v Security Incident Reporting Requirements: The Contractor shall report a security incident to the County identified contact immediately or as soon as reasonably practicable. , c. Breach Reporting Requirements: If the Contractor has actual knowledge of a confirmed data breach that affects the security of any County content that is subject to applicable data breach notification law, the Contractor shall (1) promptly notify the County identified contact within 24 hours or sooner, unless shorter time is required by applicable law, and (2) take commercially reasonable measures to address the data breach in a timely manner. 12 Breach Responsibilities: This section only applies when a data breach occurs with respect to personal data within the possession or control of the Contractor. a. The Contractor, unless stipulated otherwise, shall immediately notify the County identified contact by telephone in accordance with the agreed upon security plan or security procedures if it reasonably believes there has been a security incident. b. The Contractor, unless stipulated otherwise, shall promptly notify the County identified contact within 24 hours or sooner by telephone and email, unless shorter time is required by applicable law, if it confirms that there is, or reasonably believes that there has been a data breach. The Contractor shall (1) cooperate with the County as reasonably requested by the County to investigate and resolve the data breach, (2) promptly implement necessary remedial measures, if necessary, and (3) document responsive actions taken related to the data breach, including any post- incident review of events and actions taken to make changes in business practices in providing the services, if necessary. c. Unless otherwise stipulated, if a data breach is a direct result of the Contractor's breach of its contract obligation to encrypt personal data or otherwise prevent its release, the Contractor shall bear the costs 5 Eagle County Professional Services IT Final 5/14 associated with (1) the investigation and resolution of the data breach; (2) notifications to individuals, regulators or others required by state law; (3) a credit monitoring service required by state (or federal) law; (4) a website or a toll -free number and call center for affected individuals required by state law — all not to exceed the average per record per person cost calculated for data breaches in the United States (currently $201 per record /person) in the most recent Cost of Data Breach Study: Global Analysis published by the Ponemon Institute at the time of the data breach; and (5) complete all corrective actions as reasonably determined by service provider based on root cause; all [(1) through (5)] subject to this contract's limitation of liability. 13. Notification of Legal Requests: The Contractor shall contact the County upon receipt of any electronic discovery, litigation holds, discovery searches and expert testimonies related to the County's data under this contract, or which in any way might reasonably require access to the data of the public jurisdiction. The Contractor shall not respond to subpoenas, service of process and other legal requests related to the public jurisdiction without first notifying the County, unless prohibited by law from providing such notice. 14. Notice. Any notice required by this Agreement shall be deemed properly delivered when (i) personally delivered, or (ii) when mailed in the United States mail, first class postage prepaid, or (iii) when delivered by FedEx or other comparable courier service, charges prepaid, to the parties -at their respective addresses listed below, or (iv) when sent via facsimile so long as the sending party can provide facsimile machine or other confirmation showing the date, time and receiving facsimile number for the transmission, or (v) when transmitted via e -mail with confirmation of receipt. Either party may change its address for purposes of this paragraph by giving five (5) days prior written notice of such change to the other party. COUNTY: Eagle County, Colorado Attention: Amanda Bay 500 Broadway Post Office Box 850 Eagle, CO 81631 Telephone: 970-328-3585 Facsimile: 970 - 328 -3599 E -Mail: Amanda.bay @eaglecounty.us With a copy to: Eagle County Attorney 500 Broadway Post Office Box 850 Eagle, Co 81631 Telephone: 970-328-8685 Facsimile: 970-328-8699 E -Mail: atty @eaglecounty.us CONTRACTOR: 15. Termination. County may terminate this Agreement, in whole or in part, at any time and for any reason, with or without cause, and without penalty therefor with seven (7) calendar days' prior written notice to the Contractor. Contractor may terminate this Agreement, in whole or in part, with one hundred eighty (180) days written notice to County. Upon termination of this Agreement, County shall pay Contractor for Services 6 Eagle County Professional Services IT Final 5/14 satisfactorily performed to the date of termination. Either party may terminate this Agreement upon written notice for material breach, provided, however, that the terminating party shall give the other party at least fourteen (14) days written notice and the opportunity to cure such breach. 16. Venue, Jurisdiction and Applicable Law. Any and all claims, disputes or controversies related to this Agreement, or breach thereof, shall be litigated in the District Court for Eagle County, Colorado, which shall be the sole and exclusive forum for such litigation. This Agreement shall be construed and interpreted under and shall be governed by the laws of the State of Colorado. 17. Execution by Counterparts; Electronic Signatures. This Agreement may be executed in two or more counterparts, each of which shall be deemed an original, but all of which shall constitute one and the same instrument. The parties approve the use of electronic signatures for execution of this Agreement. Only the following two forms of electronic signatures shall be permitted to bind the parties to this Agreement: (i) Electronic or facsimile delivery of a fully executed copy of the signature page; (ii) the image of the signature of an authorized signer inserted onto PDF format documents. All documents must be properly notarized, if applicable. All use of electronic signatures shall be governed by the Uniform Electronic Transactions Act, C.R.S. 24- 71.3 -101 to 121. 18. Confidential Information a. All information relating to County or entered into the Software by County is confidential, and will be held in confidence by Contractor and will not be disclosed or used by Contractor except to the extent that such disclosure or use is reasonably necessary to the performance of Contractor's duties and obligations under this Agreement. b. To the extent allowed under the Colorado Open Records Act, all information relating to Contractor that is known to be confidential or proprietary, or which is clearly marked as such, will be held in confidence by County and will not be disclosed or used by County except to the extent that such disclosure or use is reasonably necessary to the performance of County's duties and obligations under this Agreement. C. These obligations of confidentiality will extend indefinitely after the termination of this Agreement, but will not apply with respect to information that is independently developed by the parties, lawfully becomes a part of the public domain, or of which the parties gained knowledge or possession free of any confidentiality obligation. 19. Other Contract Requirements and Contractor Representations. a. Contractor has familiarized itself with the nature and extent of the Services to be provided hereunder and the Property, and with all local conditions, federal, state and local laws, ordinances, rules and regulations that in any manner affect cost, progress, or performance of the Services. b. Contractor will make, or cause to be made, examinations, investigations, and tests as he deems necessary for the performance of the Services. C. To the extent possible, Contractor has correlated the results of such observations, examinations, investigations, tests, reports, and data with the terms and conditions of this Agreement. d. To the extent possible, Contractor has given County written notice of all conflicts, errors, or discrepancies. 7 Eagle County Professional Services IT Final 5114 e. Contractor shall be responsible for the completeness and accuracy of the Services and shall correct, at its sole expense, all significant errors and omissions in performance of the Services. The fact that the County has accepted or approved the Services shall not relieve Contractor of any of its responsibilities. Contractor shall perform the Services in a skillful, professional and competent manner and in accordance with the standard of care, skill and diligence applicable to contractors performing similar services. Contractor represents and warrants that it has the expertise and personnel necessary to properly perform the Services and shall comply with the highest standards of customer service to the public. Contractor shall provide appropriate supervision to its employees to ensure the Services are performed in accordance with this Agreement. This paragraph shall survive termination of this Agreement. f. Contractor agrees to work in an expeditious manner, within the sound exercise of its judgment and professional standards, in the performance of this Agreement. Time is of the essence with respect to this Agreement. g. This Agreement constitutes an agreement for performance of the Services by Contractor as an independent contractor and not as an employee of County. Nothing contained in this Agreement shall be deemed to create a relationship of employer- employee, master - servant, partnership, joint venture or any other relationship between County and Contractor except that of independent contractor. Contractor shall have no authority to bind County. h. Contractor represents and warrants that at all times in the performance of the Services, Contractor shall comply with any and all applicable laws, codes, rules and regulations. i. This Agreement contains the entire agreement between the parties with respect to the subject matter hereof and supersedes all other agreements or understanding between the parties with respect thereto. j. Contractor shall not assign any portion of this Agreement without the prior written consent of the County. Any attempt to assign this Agreement without such consent shall be void. k. This Agreement shall be binding upon and shall inure to the benefit of the parties hereto and their respective permitted assigns and successors in interest. Enforcement of this Agreement and all rights and obligations hereunder are reserved solely for the parties, and not to any third party. 1. No failure or delay by either party in the exercise of any right hereunder shall constitute a waiver thereof. No waiver of any breach shall be deemed a waiver of any preceding or succeeding breach. m. The invalidity, illegality or unenforceability of any provision of this Agreement shall not affect the validity or enforceability of any other provision hereof. n. The signatories to this Agreement aver to their knowledge no employee of the County has any personal or beneficial interest whatsoever in the Services or Property described in this Agreement. The Contractor has no beneficial interest, direct or indirect, that would conflict in any manner or degree with the performance of the Services and Contractor shall not employ any person having such known interests. o. The Contractor, if a natural person eighteen (18) years of age or older, hereby swears and affirms under penalty of perjury that he or she (i) is a citizen or otherwise lawfully present in the United States pursuant to federal law, (ii) to the extent applicable shall comply with C.R.S. 24- 76.5 -103 prior to the effective date of this Agreement. 8 Eagle County Professional Services IT Final 5/14 [REST OF PAGE INTENTIONALL Y LEFT BLANK] Eagle County Professional Services IT Final 5114 IN WITNESS WHEREOF, the parties have executed this Agreement the day and year first set forth above. COUNTY OF EAGLE, STATE OF COLORADO, By and Through Its COUNTY MANAGER By: Brent McFall, unty Manager CONTRACTOR: : CIV RE C By: /wO f Print Name: Title% 10 Eagle County Professional Services IT Final 5/14 EXHIBIT A SCOPE OF SERVICES, SCHEDULE, FEES I Eagle County Professional Services IT Final 5/14 INTRODUCTION ABOUTCIVICORE .............................................................................. ............................... 3 SEMI- CUSTOM APPROACH ................................................................. ............................... 3 VICTIM SERVICES CASE MANAGEMENT SYSTEM .................................. ............................... 4 CASEMANAGEMENT ......................................................................... ............................... 4 CaseInformation ..................................................................................................... ..............................4 Victimizations......................................................................................................... ............................... 5 VictimServices ........................................................................................................ ..............................5 Search..................................................................................................................... ............................... 6 PERSONS............................................................................................ ............................... 7 Persons— Overview Tab ......................................................................................... ............................... 7 REPORTING........................................................................................ ............................... 8 Customreports ...................................................................................................... ............................... 8 Templates............................................................................................................... ............................... 8 PROPOSED PROJECT TIMELINE FOR PLATFORM IMPLEMENTATION ........ ............................... 9 TIMELINE.......................................................................................... ............................... 9 PROPOSEDPROJECT BUDGET ...................................................<.......,.. ......:.........,.,,.....,..,.. 10 APPENDIX 1: FIELD MAPPING ......................................................<.,,... ....................,.......... 1 1 APPENDIX 2: IMPORT SPECIFICATIONS ................................................ ............................... 12 IMPORTUTILITY .............................................................................. ............................... 12 APPENDIX3: CHECKLIST ..................................................................... ............................... 13 APPENDIX 4. HOSTING SERVICES PROVIDED., ... ......... ....... 14 i! 1 CiviCore is a company dedicated to providing affordable, high - quality technology solutions to non- profits, public agencies and foundations. CiviCore combines both expert software development experience with a deep understanding of those working in non - profit and public sector agencies. More importantly, CiviCore has successfully completed software development projects similar in scope and design to the effort described in this proposal. About CiviCore CiviCore was founded in 2000 by Charles Naumer and Rich Rainaldi with the objective of utilizing the web to provide organizations in the social sector with cost effective, capacity building information technology solutions. Charles and Rich both had backgrounds deep in the social sector and have lifelong passions to improve social conditions locally, nationally and internationally. The combination of their skills and efforts to build CiviCore as an organization to serve the social sector has been a natural fit. As a result CiviCore has built one of the most comprehensive suites of information technology solutions in the market and has one of the highest implementation success rates of any technology firm across all sectors. CiviCore serves over 350 clients throughout the United States, Canada, Asia and Australia. Semi-Custom approach As discussed, the proposal is for a semi - custom development of the application management system. CiviCore systems are not developed from scratch but are developed on top of a multi- tenant application architecture. This architecture allows a single code base to be reused by multiple clients saving significant cost and effort in the development process. However, applications built on top of this architecture may be tailored to the unique needs of the organization. The benefits of this approach are highly tailored software that facilitates the work of your organization and provides opportunity for continued upgrades and improvements overtime. 31 Page t' The following functionality will be included as part of the proposed application (The proposed system will include the functionality described as follows but will be implemented on CiviCore's latest platform. Therefore, the interface may look different than the following screenshots.) Case Management The following is a list of tabs and fields associated with the Case management functionality. Case Information The following image represents the case information tab that is a part of the case management functionality. S "Y f5. �,Yn {.,- a{...NY2s5r.Y.n's.!tit#� KtSs r 41 Page Victiiii Services The following image represents the victim services tab that is a part of the case management functionality. Search The following image represents the ad -hoc search capability that is a part of the case management functionality. ' on step Basic hft PwPetre- Docurnerds staff Tacks tut- ' Persons The following is a list of tabs and fields associated with the Case management functionality. Persons - Overview Tab The following image represents the persons overview tab that is a part of the case management functionality. 71 Page SHMEM, Custom reports The following image represents the custom reporting area of the application 1. Statistical Report VlEttrinuation count, Victim senitCsS Count. MR member de4,wrhg the services count 2 Case Overview Q 3, Case Overview Templates The following image represents the custom letter templates. Shooring 16 record(s) I No Charges Flied Letter (English) 2 Cold Case Letter (English) 3 Satisfaction Survey (English) 4 Cold Case Letter (Spanish) 5 Court Follow Up Letter (Spanish) 6 Death Letter (Spanish) 7 Investigation Letter (Spanish) 8 Juvenile Court Follow Up Letter (Spanish) 9 No Charges Filed Letter (Spanish) 10 Summons-Release Letter (Spanish) 11 Court Follow Up Letter (English) 12 Investigation Letter (English) 13 Juvenile Court Follow Up Letter (English) 14 Summons-Release Lefler (English) 15 Death Letter (English) 16 Satisfaction Survey (Spanish) + Upload a new row M�4� FifitReprid RunRetind Edit Report Run Report Edit Report Run Report M�- � en M�- � Proposed Project Timeline for Platform Implementation Timeline Development will start approximately 4 weeks after contract signing. '71T 777777,- } Step 1— Project planning TBD TBD ; 2 weeks (one meeting) i i 3 � I Step 2 — Development TBD i TBD 12 weeks Step 3 — Testing /Review /Training j TBD £ TBD 2 weeks i Step 4 — Go Live TBD i � I M Proposed Project Budget BasicCustomization and Training .................................... ..............................$ 8,500 This fee includes the database design, programming, review and revisions as outlined in the plan. It also includes testing of the database and training. One -way synch from Intergraph (Field mapping Appendix ........................ $ 1,000 OngoingMaintenance and Hosting ................................... ............................... $ 250 This is a monthly fee for hosting, maintenance and support. It includes daily data backup, system monitoring and customer service support. The proposed system will be hosted on a secure server located behind a firewall and all communication between client and server will use SSL to ensure a secure connection. Please see appendix 4 for further detail. a M�� Civicore Intergraph )Code ILWNAMES.NC SEQ Ilnci ID tLWMAIN.INCI ID Report date LWMAIN.DATE_REPT Occ from date 1,LWMAIN.DATE OCCU EAt found date qoLWMAIN.DATE _FND numerical IARR_CHRG, Statute ID = STATUTEID literal description LWCHARG CHRDESC Name code LWNAMES.NAME_CODE, PICKLIST mes LWNAMES.NAME_ID ,t name " :INMMAIL.LAST , _._. st nam eµ r x.. NMMAI -NF IRST Ethnicity I W NAM ES. ETH N [CITY Race INMMAIN.RACE, PICKLIST W me Fnone area WE Phone Mamng aaaress po Dox mailing address city !Case status LWMAIN.VPDVINE NMMAIN.STREENBR NMMAIN. `STAR EET, AiAi CASS, Search Table = SYSTAB2 is is the sequence for the name involvment such as Victim 1,2 its will pull the entire name versus breaking down by Last, First middle as liste below. Import utility CiviCore will write SQL query to export data from Intergraph. Eagle County will provide CiviCore with remote access to a PC connected to Intergraph data. SQL exports will be written to txt file for import into the CiviCore database. Imports of data as described in Appendix 1 will be scheduled to run two times per day. The timing of the imports will be specified by Eagle County. Appendix 3: Checklist CiviCore will include all items marked as 5 = Base Package "off- the - shelf" in the following checklist. Items that are marked as 4 =Minor Customization will be billed at $125 per hour as requested by Eagle County. M Application Requirements Checklist Instructions The application requirements checklist must be completed in full by all bidders. Please place a 0, 1, 2, 3, 4, or 5 in the "Vendor Response" column based on the capabilities of your software package and project team. These response codes are described below. 5 - Base Package "off-the-shelf'- The requirements and tasks can be accomplished by the using the core "off- the - shelf' or "out of the box" software package. Virtually no configuration or customization is needed. The standard user interface can be used, and there is no need to make improvements through customization. 4 - Minor Customization - The requirements can be met with minor customization at the client's site. May require customizing components of the user interface, creating customized forms and reports, and changing the workflow procedures to match the customer's business practices. - Optional Module - The requirement can be met by purchasing an optional module or add - i piece of software produced by the vendor or a third -party vendor. For all #3 answers, ease list the name of the optional module in the "Comments" column. * uture Release - The functionality will be included in a planned, future release of the luct. For all #2 answers, please list the anticipated release date of the future version in the Comments" column. 1 - Custom Pro This requirement could be met, but new custom e would need to be written by the vendor, in order to provide this functionality. 0 - Not Supported - This requirement is not supported by the vendor's software or services. - Due to the style of question, an above number can not be assigned. Remark is required. Please note that the "Comments" column does not need to be filled in for responses of 0, 1, 4, or 5. However, vendors are welcome to add any comments which might elaborate upon or further clarify their responses. If you need additional space for comments regarding a specific question, feel free to attach additional pages. its checklist has been made available as both and EXCEL spreadsheet and Adobe PDF >cument. Vendors may either complete the checklist using the EXCEL spreadsheet, or they ay write their answers manually on hard copies of the PDF document. 5 = Base Package "off- the - shelf' Eagle County Innovation & Technology Checklist 4= Minor Customization 3 = Optional Module 2 = Future Release 1= Custom Programming 0 = Not 5upported n/a = Can't be answered by above A, remark 1 01 11 _ m, is re9uired Identification and Authentication Does the application require user authentication? 5 = Base Package "off- the - shelf" Is the application capable of automatic session timeouts? Please provide details of timeout options. _ 5 = Base Package "off- the - shelf' _____ Yes, standard setting is 30 minutes Are credentials in use with the application? If so, please describe how they are obtained. (i.e.1 through a trusted CA, self- signed, etc.) j n/a - Can't be answered by above #, remark is required �no j Are generic, built -in, or shared accounts necessary for the application to function? If so, provide details. - -n /a = Can't be answered by above #, remark is required no - - profiles are setup — -- — - - p -- Does the application support individually identifiable authentication for access - to sensitive 4= Minor Customization User p durin g the initial - - - - - - - Data Protection What encryption method is utilized bythe- application? If proprietary, please describe. 5 =Base Package "off- the - shelf" We use AES built into mysql /mariadb for - -- - -- - - - --- t tio - -- enc ryp n - If proprietary, does the encryption method meet NIST FIPS 140 -1 and 140 -2 standards? n/a = Can't be answered by above #, remark is require_ d Not proprietary - - - - How are encryption keys stored? Is there an encryption management policy? If so, please describe or provide. - n/a = Can't be answered by above #, remark is required N/A -- - - - -- - Sensitive data is encrypted before Is the application capable of encryption at rest of sensitive data elements? Please describe. IS =_ Base Package "off-the-shelf"_ istorage. Is the application capable of encrypting data in transit to internal and external devices? i Data is encrypted before transit and Please describe. -- 5 = Base Package "off- the - shelf' secure channels are used. -- - Is the application capable of encrypting application and database passwords at rest? Please [ Sensitive data is encrypted before ,;describe. 5 = Base Package "off- the - shelf'_ Is storage. the application capable of encrypting application and database passwords in transit? Please+ Sensitive data is encrypted before jdescribe. _ J5 = Base Package "off- the - shelf' stora e. - -- - - - g _ AUGIT Is the application capable of auditing events such as login, privileged use, account lockouts, access to sensitive information, access changes, and user creation? This auditing should include timestamps of the event and username. Please describe. 3 = Optional Module Does the application log contain credentials or other sensitive information? If yes, please describe why this is necessary. n/a = Can't be answered by above #, remark is required No Is the application capable of time stamping of application logs? 5 = Base Package "off- the - shelf' Controlled in server environment Is the application capable of configuring log retention policies? Please describe. 5 - Base Package "off- the - shelf' Controlled in server environment Is the application capable of notifying administrators when the logs are full? 5 =Base Package "off- the - shelf" Controlled in server environment Is the application capable of managing access to application logs? How are these logs protected within the application from unauthorized viewing or changes? I5 = Base Package "off- the - shelf' Controlled in server environment Is the application capable of sending application logs to a remote log aggregation host service, such as syslog? 5 - Base Package "off- the - shelf' -- - - g Controlled in server environment Does the application support the capability of displaying customizable login banners? (i.e., warning messages to users about acceptable use, etc.) 4 = Minor Customization How are user sessions managed by the application, i.e., are cookies used? What type of information is stored on the client computers? Are credentials ever stored on the client computer? If so, is this data removed after the session is over? _ 5 = Base Package "off- the - shelf'_ A cookie is used to store the session id etc. i - _g � j Click I g out link. Closing of browser will - What is the user logout procedure? (e.g., Close the browser window, click the to out button, 5 =Base Package "off- the - shelf" also to the user out. � Access restricted to SSL. No data If utilizing a browser, is information entered by the user cached? 15 = Base Package "off- the - shelf' cached. - - - - - - 1 - - - - -- - - -- Data validation on fields where How does the application validate user inputs? Please describe the process. 5 = Base Package "off- the - shelf" appropriate. General How often are patches released for this application, and what sort of testing is done I lSoftware as a Service. Patches released regarding patches? 5 = Base Package "off- the - shelf' !frequently. - - - - - - i I Can aged data be purged through out of the system based on a user inputted date range? 10 = Not Supported Can be done manually - - - - -- - System allows simultaneous access to data by concurrent users? ;5 = Base Package "off- the - shelf' System is based on industry best practices and uses common business process flow? IS = Base Package_ "off-the-shelf"j Applications are integrated and modules work cohesively? Pp e - g _ -- Y• _ 5= Base Package "off- the - shelf' j - -- - - - IT he software creates and stores an audit trail of all edits to data. 3 = Optional Module The software uses a graphical user interface where major functions are accessible through � -- - — icons and /or drop down menus. 5 = Base Package "off- the - shelf' -- -- - - F - - - - Data is accessible as soon as it is entered. 15 = Base Package "off - the - shelf' -- - - ;The software supports Windows cut and paste capabilities. _TS =Base Package "off- the - shelf' ' ;The software provides an online help function. 5 = Base Package "off- the - shelf' Eagle County Innovation Technology Checklist -1 of 2 Reports, query results, drawings, and schematics can be printed to screen, clipboard, file, or network printers. - 5 = Base Package "off- the - shelf' via web browser The software is customizable through the use of user - definable fields. Customization of lookups. Fields 5= Base Package "off- the - shelf' configured as part of initial setup. Lookup lists for all coded data are provided, or full text descriptions are displayed for coded data. 5 = Base Package "off- the - shelf' The software can store and retrieve up to five years worth of data. 5 = Base Package "off- the - shelf' The software provides facilities for importing and exporting of data in user - definable formats: 4 = Minor Customization The software has an all user messaging feature that will alert all users logged in of a message defined by the software administrator. 5 = Base Package "off- the - shelf Data Retrieval and Flexibility Ability to generate predefined reports and manipulate (add, remove, group by) fields. �5 = Base Package "off -t_he- shelf' - Ability for users to easily create new reports. iAbility to save ad -hoc queries; Users can 5 = Base Package "off- the - shelf' I use the BIRT reporting engine to create — -- -- -- -- -- - -- - - - - Users can perform ad hoc queries of data using multiple complex search criteria, Boolean reports - - - i logic, and multiple criteria. P B T5 = Base Package "off- the - shelf "_ abase ppli - - An field in the database can be searched by, inside the applications search area. 5 =Base Packa a "off- the - shelf" — Excludin system fields g Commonly needed reports are provided. �5 = Base Package "off- the - shelf' Reports can present data in graphical form using graphs and charts. �4 =Minor Customization Abiltiy to copy data from any screen report and paste into any other_ application 15 =Base Package "off- the - shelf' Abilty to export in standard file formats (pdf, .csv, txt) 5 sea Package "off- the -shelf - - - _ csv, pdf, excel primarily supported - - Web based application -- - -- What browsers are supported? 75 =Base Package off - the - shelf" �iF u+ fhrnme f�fon C,.of Are there any specific ports in the firewall that will need to be opened? Are there any workstation requirements (ex. lava, x version of flash_) Can users print to local / network printers without any special configuration? Entire database can be exported by user in a text delimited format, or some other file standard. need to be installed locally on workstations? fill out "Application" worksheet /a = Can't be answered by above #, remark is required /a = Can't be answered by above_ #, remark is required = Base Package "off- the - shelf = Minor Customization /a = Can't be answered by above #, remark is Eagle County Innovation Technology Checklist - 2 of 2 No No We can provide database export on No 5 = Base Package "off-the-shell" 4 = Minor Customization Eagle County Sheriff Victim Services Checklist 2 z luour R Module 7 = uture Release 1= Custom Programming 0 =Not Supported nla= Can't be answered by abvep , remark Is req ed Software can import data directly from Intergraph into customizable records /fields including but not limited to name, address, gender, race, ethnicity, primary or secondary victim, offender information etc. Please see proposal -FIELD MAPPING 3 = Optional Module 1APPENDIX Software will auto - generate upload on periodic basis to be decided by ECSO I Please see proposal -FIELD MAPPING . 4 = Minor Customization (APPENDIX J ISoftware will identify blank /missing incident reports (IR)in numerical listing of IR numbers We are not completely sure what this and sort by agency, date, etc. request addresses. Most likely a report j could be generated to support this -- - - -- — - 14 - Minor Customization !functionality IVRA specific crimes will be flagged for priority response 14 = Minor Customization We can configure flags on initial setup. j - — - -- - -- Users have ability to edit imported data in any field 5 = Base Package "off- the - shelf' j Imported data can be viewed in customized windows 1= Custom Programming (Source Code) Notes clear on this item. Software has ability to upload customizable documents like case status letters, etc. � ! S =Base Package "off-the-shelf" - - - - -- ___ - -- - -- � Software will link victim info to service Info with multiple entries available for each type of service performed 5 = Base Package "off- the - shelf" Software will include fields for court information including but not limited to next court date, name of prosecutor, etc. 5 = Base Package "off- the - shelf' Software will flag upcoming dates of importance such as court dates, follow -updates, etc. and email reminder to user 5 = Base Package "off- the - shelf' Software will include list of referral agencies with checkboxes and date for user to Typically don't include date - but we complete 15 = Base Package "off- the - shelf' !could add this field. _ Software will upload information from Intergraph indicating whether or not a victim booklet was given by the officer. A report can be generated to show this _ �4= Minor Customization (information. Software will allow Coordinator to add /delete user access from any computer at any time I5 = Base Package "off- the - shelf' Software will allow Coordinator to determine level of use, for example view only and We can setup various levels of access. which fields can be viewed for certain types of case, i.e. sexual assault victim information These levels of access can then be _ 4= Minor Customization_ assigned to users. Software will automatically calculate age from date of birth field and include a field for age at time of crime and age as of current date. 5 = Base Package "off- the - shelf' Software will allow attachment or upload of specialized materials, i.e. grief packets, volunteer calendar, customized letters on agency letterhead _ 5= Base Package_ "off- the - shelf" _ Users have ability to create new /additional client files using formatting identical to Imported data report formatting Software has ability to sort data by any and all fields 5 = Base Package "off- the - shelf' Client files have pre- determined formatting to identify data collection requirements as We are assuming this means "masks" detailed by users IS = Base Package "off- the - shelf' and data validation. The software program can sort data to compile reports in pre - defined formats - i.e. VOCA & VALE grant reporting formats 4 = Minor Customization Tech support will assist administrator /user in setting up reports for individual funding !sources, individual police agencies and other criteria. 4= MinorCustomlzation IAs an example for number 25 & 26, VOCA requires a 13 year old sexual assault victim be ;counted as an adult. VALE requires anyone under 18 be counted as a child. Software will j populate periodic reports (monthly, quarterly) with those different user - defined criteria (Currently supports VOCA/VALE reports. j Future changes to VOCA/VALE reports 14 = Minor Customization Iwill be billed at standard $100 per hour. When compiling statistical reports software will be able to count each victim only once per incident regardless of the number of services provided. 5 = Base Package "off- the - shelf' Civicore will provide back -up discs upon request and within 5 days of any such request. Backups may be downloaded at any 5 = Base Package "off- the - shelf time by client. Users can perform ad hoc queries of data using multiple complex search criteria, Boolean We have complex search criteria. We are logic, and multiple sorting criteria. able to do all of the search criteria as either an "AND" or an "OR ". The system currently allows sorting of a single column. Additional sorting can be done upon export to excel Multiple advocates or agencies can be assigned on each case 5 = Base Package "off- the - shelf' Data fields include a searchable variable length text description field large enough to hold at least 500 characters. 5 = Base Package "off- the - shelf Software will allow manual entry of victim contacts in addition to the uploaded data. 5 = Base Package "off- the - shelf' Coordinator can record information about users including name, identification number 4 = Minor Customization and varying levels of access to data. per advocate or funding source. 5 = Base Package "off- the - shelf' Auto calculation of lapsed time between each interval of updates, events or status changes with email notification to supervisor if a preset amount of lapsed time is reached. 3 = Optional Module Client data can be exported to and imported from specialized software such as Primavera 4 = Minor Customization Software can interface with County's Document Management System "Laserfiche" to store 5 = Base Package "off- the - shelf' records and attachments 3 = Optional Module Client contacts can be routed for review and approval 4 = Minor Customization Predefined services can be selected from a customizable pick list, resulting in fields such as 3= Optional Module assigned advocate, type of service, with the incident number being subsequently incorporated into future communications 3 = Optional Module Client services may be charged to multiple funding sources in varying percentages 4 = Minor Customization Client contacts can be electronically routed for review and approval to other agencies, queues and individuals based on system configurable rules. 4 = Minor Customization Ability to assign cases to contractors 5 = Base Package "off- the - shelf' Ability to assign multiple workers to a case or victim 5 = Base Package "off- the - shelf' Separate fields for user's urgency and Coordinator's issued priority level. 4 = Minor Customization Video or audio files can be attached to a contact, victim or incident report. 5 = Base Package "off- the - shelf' Client files can include user - definable fields indicating the presence and nature of risk factors 4 = Minor Customization Client records contain a history of previous contacts with client or close associate. 5 = Base Package "off- the - shelf' Software alerts selected users to impending court dates with user - definable lead times. 4 = Minor Customization Information on clients and services can be queried and grouped by the advocate /employee and other user - definable fields 4 = Min_ or Customization _ Users can perform ad hoc queries of client or incident data using multiple complex search criteria, Boolean logic, and multiple sorting criteria including type of crime, case number, location of crime, victim demographics, etc. 5 = Base Package "off- the - shelf' Search results can be displayed in tables that Include links to detailed records. 4 =Minor Customization _ Software permits concurrent data entry from multiple client PCs. _ S = Base Package "off- the - shelf' Email interface supports Microsoft Outlook, Exchange, MAN and SMTP /POP3 internet mail. _ I n/a = Can't be answered by above #, remark is The software can be configured such that completion of certain fields of victim or contact information is mandatory. - - S =Base Package "off -t_he- shelf_' The website uses windows authentication so users do not need to enter a password and i only authorized users can submit client or case data 0 =Not Supported Software generates email notifications of receipt, status of work request and closed cases to Coordinator. These items can be turned on or off on a global level by Coordinator - -_L4 = M•mor Customization Data entered via the World Wide Web will update the software's database tables so that such requests need not be re- entered. 15 = Base Package "off- the - shelf' Software provides a means of restricting read and write access to various data to authorized users and groups. Coordinator can change access levels at any time from any computer. 15 =Base Package "off- the - shelf' Software provides configurable email links to departmental functions and employees. 14 =Minor Customization Software allows every web page to incorporate graphics - - 15 = Base Package "off- the - shelf' Would need to know more about "Laserfiche" We allow for upload of files. File uploads can not exceed 8MB but could be customized to handle larger files if necessary. Agency may store this information. Ad -hoc search If not handled by ad -hoc search managed by custom report which can be developed $100 per hour. We are assuming this refers to service delivery. to Excel or CSV. A funding source can be Id ces are identified by users. We have complex search criteria. We are able to do all of the search criteria as either an "AND" or an "OR ". The system currently allows sorting of a single Security levels can not be configured. But you can change a users security le 4 = Minor Customization Software can record work performed by users and such data can be accessed and grouped per advocate or funding source. 5 = Base Package "off- the - shelf' Software can provide utilization reports on employees, other agencies and contractors 3 = Optional Module Client data can be exported to and imported from specialized software such as Primavera and Microsoft Project. 5 = Base Package "off- the - shelf' Software can reference a funding source to which costs will be charged, or contacts tabulated using a field of no less than 20 alphanumeric characters. 3= Optional Module Software can post services to victims daily or more frequently 3 = Optional Module Client services may be charged to multiple funding sources in varying percentages 4 = Min_ or Customization _ Users can perform ad hoc queries of client or incident data using multiple complex search criteria, Boolean logic, and multiple sorting criteria including type of crime, case number, location of crime, victim demographics, etc. 5 = Base Package "off- the - shelf' Search results can be displayed in tables that Include links to detailed records. 4 =Minor Customization _ Software permits concurrent data entry from multiple client PCs. _ S = Base Package "off- the - shelf' Email interface supports Microsoft Outlook, Exchange, MAN and SMTP /POP3 internet mail. _ I n/a = Can't be answered by above #, remark is The software can be configured such that completion of certain fields of victim or contact information is mandatory. - - S =Base Package "off -t_he- shelf_' The website uses windows authentication so users do not need to enter a password and i only authorized users can submit client or case data 0 =Not Supported Software generates email notifications of receipt, status of work request and closed cases to Coordinator. These items can be turned on or off on a global level by Coordinator - -_L4 = M•mor Customization Data entered via the World Wide Web will update the software's database tables so that such requests need not be re- entered. 15 = Base Package "off- the - shelf' Software provides a means of restricting read and write access to various data to authorized users and groups. Coordinator can change access levels at any time from any computer. 15 =Base Package "off- the - shelf' Software provides configurable email links to departmental functions and employees. 14 =Minor Customization Software allows every web page to incorporate graphics - - 15 = Base Package "off- the - shelf' Would need to know more about "Laserfiche" We allow for upload of files. File uploads can not exceed 8MB but could be customized to handle larger files if necessary. Agency may store this information. Ad -hoc search If not handled by ad -hoc search managed by custom report which can be developed $100 per hour. We are assuming this refers to service delivery. to Excel or CSV. A funding source can be Id ces are identified by users. We have complex search criteria. We are able to do all of the search criteria as either an "AND" or an "OR ". The system currently allows sorting of a single Security levels can not be configured. But you can change a users security le Software allows special formatting capabilities for alerts and special messages appearing on Web pages or forms. 4 = Minor Customization Software can email various kinds of other alerts to designated users _ 4 = Minor Customization Users can enter data on behalf of someone else in their unit. 4 = Minor Customization I Existing client information can be copied to create new client records 4 =Minor Customization Client contacts can be assigned to specific employees or groups of employees 4 = Minor Customization Software can generate reports of overdue client contacts 4 = Minor Customization Depending on exact requirements the software can generate reports detailing adherence of actual client contact ! _ ,One client can have several incident numbers assigned to them Minor Customization mization 5 = Base Package "off- the - shelf' (One incident report can have several victims assigned to it. "off- Software - 5 Base Package the - shelf' - provide a way to plan and schedule follow -up contacts and to alert workers to daily scheduled tasks i - 4 Minor Customization Software places no limits on the number of services that can be provided to a client. -- 15 = Base Package "off- the - shelf' - g- !software can maintain a list of materials given (victim booklet, grief resources, etc.) and - —- - generate re -order lists as needed — 14 = Minor Customization Field solutions are compatible with handheld /mobile devices, laptops and Tablet PCs Works in any web enabled device. running on the Windows 7/Windows Mobile operating systems However, is not optimized for smaller `R 15 =Base Package "off-the-shelf" g- idevices (Read time data field /office data available when connected via cell or wireless connection - -_ _ Assuming evice is connected to the I __ i5 -Base Package "off-the-shelf" - g_ Internet via data service. Mobile solution uses store and forward type technology. The would allow user to _ -_ _ ,download their client info locally to their mobile device, update or add new data while �offline that would then sync with the database when connected via cell or network '[connection. - 10 = Not Supported Provide maps and data of client contacts and /or crime scenes. 4 = Minor Customization Provide spatial topology of user - definable fields. 4 _- Minor Customization Appendix 4: Hosting Services Provided The following services are provided as part of the monthly hosting services proposed • Application hosting • Data backup • Security monitoring and tuning • Security software upgrades • Server operating system upgrades and maintenance • Database software upgrades and maintenance • Hardware upgrades (servers, memory, etc.) • Performance monitoring and tuning • Anti -virus software maintenance • Database performance tuning, indexing, etc. • Basic customer service calls on functionality, help desk, etc., not to exceed 2 • hours per month. • Defect fixes, and minor functionality modifications to achieve design goals 14 Page EXHIBIT B INSURANCE CERTIFICATE 12 Eagle County Professional Services IT Final 5114 ACORbr CERTIFICATE OF LIABILITY INSURANCE DATE (MM /DD/YYYY) 1 05/12/2015 THIS CERTIFICATE IS ISSUED AS A MATTER OF INFORMATION ONLY AND CONFERS NO RIGHTS UPON THE CERTIFICATE HOLDER. THIS CERTIFICATE DOES NOT AFFIRMATIVELY OR NEGATIVELY AMEND, EXTEND OR ALTER THE COVERAGE AFFORDED BY THE POLICIES BELOW. THIS CERTIFICATE OF INSURANCE DOES NOT CONSTITUTE A CONTRACT BETWEEN THE ISSUING INSURER(S), AUTHORIZED REPRESENTATIVE OR PRODUCER, AND THE CERTIFICATE HOLDER. IMPORTANT: If the certificate holder is an ADDITIONAL INSURED, the policy(ies) must be endorsed. If SUBROGATION IS WAIVED, subject to the terms and conditions of the policy, certain policies may require an endorsement. A statement on this certificate does not confer rights to the certificate holder in lieu of such endorsement(s). PRODUCER NAME: Scott Ligouri The Insurance Loft CNN , Ext: Off: 303 - 872 -9017 (A/C, No): 888-645-4229 1630 Welton St. Ste. 202 ADDRESS: scott@theinsuranceloft.com INSURER(S) AFFORDING COVERAGE NAIC # Denver CO 80202 INSURERA: TRAVELERS CAS INS CO OF AMER 19046 INSURED INSURER B $ 300000 Civicore, LLC INSURER C : $ 5000 1580 Lincoln St INSURER D: Ste 520 INSURER E: Denver CO 80203 INSURER F COVERAGES CERTIFICATE NUMBER: REVISION NUMBER: THIS IS TO CERTIFY THAT THE POLICIES OF INSURANCE LISTED BELOW HAVE BEEN ISSUED TO THE INSURED NAMED ABOVE FOR THE POLICY PERIOD INDICATED. NOTWITHSTANDING ANY REQUIREMENT, TERM OR CONDITION OF ANY CONTRACT OR OTHER DOCUMENT WITH RESPECT TO WHICH THIS CERTIFICATE MAY BE ISSUED OR MAY PERTAIN, THE INSURANCE AFFORDED BY THE POLICIES DESCRIBED HEREIN IS SUBJECT TO ALL THE TERMS, EXCLUSIONS AND CONDITIONS OF SUCH POLICIES. LIMITS SHOWN MAY HAVE BEEN REDUCED BY PAID CLAIMS. INSR LTR TYPE OF INSURANCE INSD WVD POLICY NUMBER (MM/DD/YYYY) (MM /DD/YYYY) LIMITS ✓ COMMERCIAL GENERAL LIABILITY CLAIMS -MADE I-V OCCUR EACH OCCURRENCE $ 1000000 PREMISES (Ea occurrence) $ 300000 MED EXP (Any one person) $ 5000 PERSONAL & ADV INJURY $ 1000000 A X 680OF327276 10/01/2014 10/01/2015 GEN'L AGGREGATE LIMIT APPLIES PER: RPOLICY F—] PRO JECT F—] LOC GENERAL AGGREGATE $ 2000000 PRODUCTS - COMP /OP AGG $ VOTHER: HRDBD $ 1000000 AUTOMOBILE LIABILITY (Ea accident) $ BODILY INJURY (Per person) $ ANY AUTO ALL OWNED SCHEDULED AUTOS AUTOS BODILY INJURY (Per accident) $ HIRED AUTOS NON -OWNED AUTOS (Per accident) $ UMBRELLA LIAR OCCUR EACH OCCURRENCE $ AGGREGATE $ EXCESS LIAB CLAIMS -MADE DED I RETENTION $ $ • WORKERS COMPENSATION AND EMPLOYERS' LIABILITY YIN FFICERIME BER EXCLUDED? PROPRIETOR/PARTNER/EXECUTIVE Y N � A UBOF34046A 02/01 /2015 02/01/2016 - STATUTE V ER E.L. EACH ACCIDENT $ 500000 E.L. DISEASE - EA EMPLOYEE $ 500000 Mandatory In NH) If yes, describe under DESCRIPTION OF OPERATIONS below E.L. DISEASE - POLICY LIMIT Is 500000 • Errors & Omissions Liability Coverage X 680OF327276 10/01/2014 10/01/2015 Claims Made $3,000,000 each wrongful act limit. $3,000,000 Aggregate DESCRIPTION OF OPERATIONS / LOCATIONS / VEHICLES (ACORD 101, Additional Remarks Schedule, may be attached if more space is required) Please note the Errors & Omissions Coverage (Professional Liability), is limited to the policy language provided as an attachment to this certificate. Coverage Will not extend outside those specific terms of this current and in force policy language section as it pertains to Civicore's Professional Liability Coverage. Please note coverage and or policy language may change at the renewal of the policy. At the request of the certificate holder we will provide updated policy language and certificates on an ongoing basis. Please note: Eagle County, its associated or affiliated entities, its successors and assigns, elected officials, employees, agents and volunteers are Additional Insureds under the commercial general liability coverage section, which also extends to hired and non -owned auto on the general liability section. I SHOULD ANY OF THE ABOVE DESCRIBED POLICIES BE CANCELLED BEFORE Eagle County, Colorado THE EXPIRATION DATE THEREOF, NOTICE WILL BE DELIVERED IN ACCORDANCE WITH THE POLICY PROVISIONS. 500 Broadway AUTHORIZED REPRESENTATIVE PO Box 850 Eagle CO 81631'f"� ©1988 -2014 ACORD CORPORATION. All rights reserved. ACORD 25 (2014/01) The ACORD name and logo are registered marks of ACORD AGENCY CUSTOMER ID: _ LOC #: A ADDITIONAL REMARKS SCHEDULE Page 1 of 1 AGENCY The Insurance Loft NAMEDINSURED Civicore, LLC POLICY NUMBER 680OF327276 CARRIER TRAVELERS CAS INS CO OF AMER NAIC CODE 19046 EFFECTIVE DATE: 10/01/2014 THIS ADDITIONAL REMARKS FORM IS A SCHEDULE TO ACORD FORM, FORM NUMBER: 25 FORM TITLE: CERTIFICATE OF LIABILITY INSURANCE Please See attached Travelers Insurance Policy Language Form for Specific E &O coverages. ACORD 101 (2008101) © 2008 ACORn CORPr1RATION All rinhfc ro.-A The ACORD name and logo are registered marks of ACORD TRAVELERS) CYBERFIRST ESSENTIALS COVERAGE PART DECLARATIONS One Tower Square, Hartford, Connecticut 06183 POLICY NUMBER: 680- OF327276 -14 -42 ISSUE DATE:. 10 -02 -14 THIS COVERAGE IS PROVIDED ON A CLAIMS -MADE BASIS. DEFENSE EXPENSES ARE PAYABLE WITHIN, AND ARE NOT IN ADDITION TO, THE LIMITS OF INSURANCE. INSURING COMPANY: TRAVELERS CASUALTY INSURANCE COMPANY OF AMERICA Policy Period: From 10 -01 -14 to 10 -01 -15 12:01 A.M. Standard Time at your mailing address shown in the Common Policy Declarations. Information Security Retroactive Date: 10 -01 -14 Errors And Omissions Retroactive Date: 10 -01 -14 The CyberFirst Essentials Coverage Part consists of these Declarations, the CyberFirst Essentials General Provi- sions Form and the Coverage Forms shown below. ITEM 1. COVERAGE CYBERFIRST ESSENTIALS INFORMATION SECURITY LIABILITY COVERAGE FORM CYBERFIRST ESSENTIALS TECHNOLOGY PRODUCTS AND SERVICES ERRORS AND OMISSIONS LIABILITY COVERAGE FORM ITEM 2. LIMITS OF INSURANCE: Aggregate Limit $ 3,000,000 Each Wrongful Act Limit $ 3,000,000 ITEM 3. DEDUCTIBLE: Each Wrongful Act Deductible $ 2,500 ITEM 4. NUMBERS OF FORMS, SCHEDULES AND ENDORSEMENTS FORMING THIS COVERAGE PART ARE ATTACHED AS A SEPAR ATE LISTING. PR TO 19 02 12 Page 1 of 1 POLICY NUMBER: 680- OF327276 -14 -42 CYBER LIABILITY ISSUE DATE: 10 -02 -14 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. BREACH ESSENTIALS ENDORSEMENT - TECHNOLOGY This endorsement modifies insurance provided under the following: CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM CYBERFIRST ESSENTIALS INFORMATION SECURITY LIABILITY COVERAGE FORM CYBERFIRST ESSENTIALS TECHNOLOGY PRODUCTS AND SERVICES ERRORS AND OMISSIONS LIABILITY COVERAGE FORM SCHEDULE OF CYBER FIRST -PARTY LIMIT AND DEDUCTIBLE Limit Deductible Cyber First -Party Limit and Deductible $ 10,000 $ 0 PROVISIONS A. INTRODUCTION The following is added to the Introductory Note in the CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM: THE LIMITS OF INSURANCE WILL BE RE- DUCED BY THE PAYMENT OF: 1. YOUR SECURITY BREACH NOTIFICATION AND REMEDIATION EXPENSES, YOUR PAYMENT CARD EXPENSES AND YOUR CRISIS MANAGEMENT SERVICE EX- PENSES COVERED BY YOUR CYBER- FIRST ESSENTIALS INFORMATION SE- CURITY LIABILITY COVERAGE FORM; AND 2. YOUR CRISIS MANAGEMENT SERVICE EXPENSES COVERED BY YOUR CYBER- FIRST ESSENTIALS TECHNOLOGY PRODUCTS OR SERVICES ERRORS AND OMISSIONS LIABILITY COVERAGE FORM, IF THAT COVERAGE FORM IS PART OF YOUR POLICY. B. CYBER FIRST -PARTY COVERAGES 1. The following is added to Paragraph 1., in- suring Agreement, of SECTION I — INFOR- MATION SECURITY LIABILITY COVERAGE in the CYBERFIRST ESSENTIALS INFOR- MATION SECURITY LIABILITY COVERAGE FORM: Security Breach diation Expenses penses Coverage Notification And Reme- And Payment Card Ex- We will reimburse you for loss to which this insurance applies that is "your security breach notification and remediation expenses" or "your payment card expenses" directly attrib- uted to a "security breach" that: (1) Is caused by an "information security wrongful act" committed on or after the Information Security Retroactive Date shown in the Declarations of this Cover- age Part and before the end of the policy period; (2) Occurs during the policy period; and (3) Is first reported to us during the policy pe- riod or within 90 days after the end of the policy period. But we will not reimburse you for "your pay- ment card expenses" that are "payment card contract penalties" or "chargebacks" unless you have agreed to pay such "payment card contract penalties" or "chargebacks" in a "merchant service agreement" you entered into before such "security breach" occurred. Each "security breach" in a series of "related security breaches" will be deemed to occur on the date the first "security breach" in that se- ries occurs. A "security breach" will be deemed to have been first reported to us on the date that we first receive a written notice of such "security breach" from any insured or any authorized government entity. PR TS 01 10 13 © 2013 The Travelers Indemnity Company. All rights reserved. Page 1 of 6 CYBER LIABILITY Crisis Management Service Expenses Coverage We will reimburse you for "your crisis man- agement service expenses" that: (1) Arise out of loss to which this insurance applies that is caused by an "information security wrongful act" committed on or af- ter the Information Security Retroactive Date shown in the Declarations of this Coverage Part and before the end of the policy period; (2) Are first incurred by you during the policy period; and (3) Are reported to us during the policy pe- riod or within 90 days after the end of the policy period. Each "information security wrongful act" in a series of "related information security wrong- ful acts" will be deemed to have been commit- ted on the date the first "information security wrongful act" in that series is committed. Any of 'your crisis management service ex- penses" that: (1) Are first incurred by you after the end of the policy period; and (2) Relate to any of 'your crisis management service expenses" that are first incurred by you during the policy period; will be deemed to have been incurred by you during the policy period. 2. The following is .added to Paragraph 1., In- suring Agreement, of SECTION I — ER- RORS AND OMISSIONS LIABILITY COV- ERAGE in the CYBERFIRST ESSENTIALS TECHNOLOGY PRODUCTS OR SERVICES ERRORS AND OMISSIONS LIABILITY COVERAGE FORM, if that coverage form is part of your policy: Crisis Management Service Expenses Coverage We will reimburse you for 'your crisis man- agement service expenses" that: (1) Arise out of loss to which this insurance applies that is caused by an "errors and omissions wrongful act" committed on or after the Errors And Omissions Retroac- tive Date shown in the Declarations of this Coverage Part and before the end of the policy period; (2) Are first incurred by you during the policy period: and (3) Are reported to us during the policy pe- riod or within 90 days after the end of the policy period. Each "errors and omissions wrongful act" in a series of "related errors and omissions wrong- ful acts" will be deemed to have been commit- ted on the date the first "error and omissions wrongful act" in that series is committed. Any of 'your crisis management service ex- penses" that: (1) Are first incurred by you after the end of the policy period; and (2) Relate to any of "your crisis management service expenses" that are first incurred by you during the policy period; will be deemed to have been incurred by you during the policy period. 3. The following replaces the third paragraph of Paragraph 1.a., Defense Of Claims Or Suits, of SECTION I — COVERAGE in the CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM: We may, at our discretion, investigate any "wrongful act" or "claim" and settle any "claim" or "suit ". But our right and duty to de- fend ends when we have used up the: a. Aggregate Limit in the payment of: (1) Judgments, settlements or "defense expenses "; and (2) Loss that is 'your cyber first -party loss "; or b. Each Wrongful Act Limit in the payment of judgments, settlements or "defense expenses". 4. The following replaces the last paragraph of Paragraph 2., Supplementary Payments, of SECTION I — COVERAGE in the CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM: Our duty to make such payments ends when we have used up the: a. Aggregate Limit in the payment of: (1) Judgments, settlements or "defense expenses "; and (2) Loss that is 'your cyber first -party loss'; or b. Each Wrongful Act Limit in the payment of judgments, settlements or "defense expenses ". Page 2 of 6 © 2013 The Travelers Indemnity Company. All rights reserved. PR TS 01 10 13 S. The following exclusion is added to Para- 2. graph 2., Exclusions, of SECTION I — IN- FORMATION SECURITY LIABILITY COV- ERAGE in the CYBERFIRST ESSENTIALS INFORMATION SECURITY LIABILITY COVERAGE FORM: PCI Attestation Of Compliance "Your payment card expenses" if: (1) You have not attested compliance with the "payment card security standards" by completing and signing a "PCI attestation of compliance" within the twelve months immediately preceding the "security breach "; or (2) You fraudulently or intentionally misrep- resent that you are in compliance with the "payment card security standards" in completing the "PCI attestation of compli- ance ". C. LIMITS OF INSURANCE 1. The following is added to SECTION III — LIMITS OF INSURANCE in the CYBER- FIRST ESSENTIALS GENERAL PROVI- SIONS FORM: Subject to the Aggregate Limit, the Cyber First -Party Limit shown in the Schedule Of Cyber First -Party Limit And Deductible is the most we will pay for the sum of all loss that is "your cyber first -party loss ". 2. The following replaces the first paragraph of Paragraph 2. of SECTION III — LIMITS OF INSURANCE in the CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM: The Aggregate Limit is the most we will pay for the sum of all: a. "Damages" and "defense expenses" for the combined total of all "claims" or "suits" for loss; and b. Loss that is "your cyber first -party loss "; to which the insurance provided under one or more of "your cyber liability coverage forms" applies. D. DEDUCTIBLE 1. The following is added to the last sentence of Paragraph 1. of SECTION IV — DEDUCTI- BLE in the CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM: The Each Wrongful Act Deductible does not apply to payments we make for loss that is "your cyber first -party loss." CYBER LIABILITY The following is added to SECTION IV — DEDUCTIBLE in the CYBERFIRST ESSEN- TIALS GENERAL PROVISIONS FORM: We will not reimburse you for any of "your cy- ber first -party loss" to which this insurance applies until the amount of such loss exceeds the deductible shown in the Schedule Of Cy- ber First -Party Limit And Deductible. We will then reimburse you for the amount of such loss in excess of the deductible, up to the limit of insurance shown in the Schedule. E. CYBER LIABILITY CONDITIONS 1. The following replaces the last sentence of Paragraph 11., When We Are Prohibited From Defending An Insured, of SECTION V — CYBER LIABILITY CONDITIONS in the CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM: Our duty to make such payments ends when we have used up the: a. Aggregate Limit in the payment of: (1) Judgments, settlements or "defense expenses "; and (2) Loss that is "your cyber first -party loss "; or b. Each Wrongful Act Limit in the payment of judgments, settlements or "defense expenses ". 2. The following is added to Paragrap h 14., Cur- rency, of SECTION V — CYBER LIABILITY CONDITIONS in the CYBERFIRST ESSEN- TIALS GENERAL PROVISIONS FORM: Payments for loss that is "your cyber first - party loss" will be in currency of the United States of America. At our sole option, we may make these payments in a different currency. Any necessary currency conversion for such payments will be calculated based on the rate of exchange published in the Wall Street Journal immediately preceding the date the payment is processed. 3. The following is added to SECTION V — CYBER LIABILITY CONDITIONS in the CY- BERFIRST ESSENTIALS GENERAL PRO- VISIONS FORM: Duties In The Event Of A Security Breach a. You must see to it that we are notified in writing as soon as practicable of a "secu- rity breach" which may result in "your se- curity breach notification and remediation PR TS 01 10 13 © 2013 The Travelers Indemnity Company. All rights reserved. Page 3 of 6 CYBER LIABILITY expenses" or "your payment card ex- penses". Such notice should include: (1) How, when and where the "security breach" occurred; and (2) The nature and extent of fees, costs or expenses incurred and paid by you which can be directly attributed to a "security breach ". b. You must: (1) Authorize us to obtain records and other information; (2) Cooperate with us in the investigation of the "security breach "; and (3) Assist us, upon our request, in the enforcement of any right against any person or organization which may be liable to you because of loss to which this insurance may also apply. F. DEFINITIONS The following is added to the DEFINITIONS Sec- tion in the CYBERFIRST ESSENTIALS GENERAL PROVISIONS FORM: "Chargebacks ": a. Means "payment card" charge reversals be- cause of the fraudulent use of "payment cards" or "identity information ". b. Includes transaction fees assessed to proc- ess such "payment card" charge reversals. "Merchant service agreement" means a contract between you and an acquiring bank or other ac- quiring institution that establishes the terms and conditions for accepting and processing "payment card" transactions. "Payment card" means a credit card, debit card or charge card issued by a financial institution. "Payment card contract penalties ": a. Means fines or penalties incurred by you after a "security breach" because of non- compliance with the "payment card security standards ". b. Does not include: (1) Fines or penalties assessed because of not promptly reporting a "security breach "; (2) Fines or penalties assessed because of failure to properly validate system secu- rity according to the "payment card secu- rity standards "; or (3) Any interchange fees or changes in inter- change fee schedules. "Payment card security standards" means: a. The most current edition of security standards contained in: (1) The Payment Card Industry Data Security Standards program (PCI DSS); (2) Visa's Cardholder Information Security Program (CISP); (3) MasterCard's Site Data Protection pro- gram (SDP); (4) American Express's Data Security Oper- ating Policy; or (5) Discover's Information Security and Compliance program (DISC): or b. Other security standards similar to those in Paragraphs a.(1) through a.(5) above that you have agreed to in a "merchant service agreement" with a financial institution; that apply to you. "PCI attestation of compliance" means the decla- ration of compliance status with the Payment Card Industry Data Security Standards program found in the "PCI self- assessment questionnaire" that applies to you. "PCI forensic investigation" means a professional review of your computer systems by a "qualified forensic investigator" to determine your compli- ance with the "payment card security standards ". "PCI self- assessment questionnaire" means the questionnaire, developed by the Payment Card Industry Security Standards Council, that assists you in self - evaluation of your compliance with the "payment card security standards ". "Qualified forensic investigator" means an organi- zation approved by the applicable "payment card" issuing bank to conduct forensic investigations af- ter a "security breach ". "Qualified security assessor" means a person or organization certified by the Payment Card Indus- try Security Standards Council to assess compli- ance with "payment card security standards ". "Related security breaches" means two or more "security breaches" that have as a common con- nection, tie, or link any fact, circumstance, situa- tion, event, transaction, cause, or series of related facts, circumstances, situation, events, transac- tions, or causes. Page 4 of 6 © 2013 The Travelers Indemnity Company. All rights reserved. PR T5 01 10 13 "Security breach" means unauthorized access to, or acquisition of, "identity information" owned, li- censed, maintained or stored by you. "Security breach notification law" means any law or regulation that requires an organization to no- tify persons that their nonpublic personal informa- tion was or may have been accessed or acquired without their authorization. "Software and hardware upgrade and scanning services expenses" means: a. Fees, costs or expenses for a "PCI forensic investigation" arising out of a written notifica- tion by a "payment card" issuing bank, mer- chant bank, acquiring bank or other acquiring institution that you are a likely common point of purchase source of a "security breach" or otherwise involved in a "security breach" to determine if you are in compliance with the "payment card security standards "; b. Costs or expenses to purchase and install anti -virus software, point -of -sale systems software, firewall protection software, or fire - wall protection hardware that satisfies the re- quirements of the "payment card security standards ", if, after a "security breach ", it is determined through a "PCI forensic investiga- tion" that you are out of compliance with the "payment card security standards "; or c. Costs for the scanning services of a "qualified security assessor" to certify that your up- graded software and hardware systems meet the requirements of the "payment card secu- rity standards ", but only for the first such scanning services after your software or hardware systems, or both, are upgraded. "Your crisis management service expenses ": a. Means the reasonable fees, costs or ex- penses incurred and paid by you in: (1) Retaining a public relations consultant or firm, or a crisis management consultant or firm; or (2) Planning or executing your public rela- tions campaign; to mitigate any actual or potential negative publicity generated from loss to which this in- surance applies. b. Does not include fees, costs or expenses you incur to comply with any law or regulation. "Your cyber first -party loss" means loss that is: a. "Your security breach notification and reme- diation expenses "; CYBER LIABILITY b. "Your payment card expenses'; or c. "Your crisis management service expenses ". "Your payment card expenses ": a. Means any of the following reasonable fees, costs or expenses incurred and paid by you which are directly attributed to a "security breach ": (1) "Software and hardware upgrade and scanning services expenses "; (2) "Payment card contract penalties "; or (3) "Chargebacks ". b. Does not include: (1) Remuneration paid to your regular "em- ployees" for work beyond their normal scheduled hours; (2) Fees, costs, or expenses of outside con- sultants retained by you, unless we agree to reimburse you for such fees, costs, or expenses; (3) Amounts that you voluntarily agree to pay to any person whose "identity informa- tion" was accessed or acquired without his or her authorization; (4) Fees, costs, or expenses in: (a) Retaining a public relations consult- ant or firm, or a crisis management consultant or firm; or (b) Planning or executing your public re- lations campaign; to mitigate any actual or potential nega- tive publicity generated from the "security breach "; or (5) "Your security breach notification and remediation expenses ". "Your security breach notification and remediation expenses ": a. Means any of the following reasonable fees, costs or expenses incurred and paid by you which can be directly attributed to a "security breach ": (1) Forensic fees, costs or expenses to de- termine the cause of the "security breach" and the persons whose "identity informa- tion" was accessed or acquired without their authorization. (2) Fees, costs or expenses to develop documents or materials to notify the per- sons whose "identity information" was ac- PR T5 01 10 13 © 2013 The Travelers Indemnity Company. All rights reserved. Page 5 of 6 CYBER LIABILITY cessed or acquired without their authori- zation. (3) Costs of mailings or other communica- tions required to notify the persons whose "identity information" was accessed or acquired without their authorization. (4) Costs of providing 365 days of credit monitoring services to persons whose "identity information" was accessed or acquired without their authorization, start- ing with the date that you first notify such persons of the "security breach ". (5) Costs of establishing and maintaining a call center to be used by persons whose "identity information was accessed or ac- quired without their authorization. (6) Any other fees, costs, or expenses nec- essary 'to comply with any "security breach notification law" that applies to you. b. Does not include: (1) Remuneration paid to your regular "em- ployees" for work beyond their normal scheduled hours. (2) Fees, costs, or expenses of outside con- sultants retained by you, unless we agree to reimburse you for such fees, costs, or expenses. (3) Fines or penalties imposed by law. or that any insured has agreed to pay for any reason. (4) Amounts that you voluntarily agree to pay to any person whose "identity informa- tion" was accessed or acquired without his or her authorization. (5) "Your crisis management service ex- penses". Page 6 of 6 © 2013 The Travelers Indemnity Company. All rights reserved. PR T5 01 10 13 EXHIBIT C SECURITY PROTOCOLS 13 Eagle County Professional Services IT Final 5/14 Overview System reliability and security is of paramount importance to CiviCore. Maintaining reliable and secure systems is a multidimensional effort requiring careful planning and consideration at the following levels. Physical Environment CiviCore utilizes Amazon Web Services (AWS) for server hosting. AWS is the market leader offering world - class, highly secure data centers that utilize state -of- the art electronic surveillance and multi- factor access control systems. Data centers are staffed 247 by trained security guards, and access is authorized strictly on a least privileged basis. For more information please see - http: // media .amazonwebservices.com /pdf/AWS Security Whitepaper.pdf. Application Architecture CiviCore applications are built on a multi- tenant architecture enabling each client application to share infrastructure across the platform of CiviCore applications. This type of architecture is considered "best practice" for software as service applications. Multi- tenant architecture enables economies of scale to be achieved when testing and monitoring of applications for security vulnerabilities. CiviCore software engineers test applications for vulnerability and continually apply released patches as needed. Data security and integrity Application data is stored in a commercial grade MariaDB databases. Client data is stored in client specific databases. All backups are encrypted before being transferred. Network and Data Transmission Depending on the sensitivity of the data being transmitted Secure Sockets Layer (SSL) Protocol and Server Digital Certificates are used to encrypt all data traffic between our servers and client machines. Key security attributes: ■ Hosted at top -tier hosting facilities staffed 24x7 ■ Redundant systems including RAID -10 disk storage ■ Multi- tenant architecture ■ Data encryption and transmission using secure sockets layer protocol ■ Continual intrusion detection and monitoring -To] I car* I Aft Intrusion Detection and Access Controls CiviCore servers are protected by network firewalls. These firewalls protect CiviCore servers from unauthorized network access and traffic. Network access to CiviCore applications may be restricted to specific IP addresses. CiviCore servers are continually monitored for unauthorized access. For the past several years, CiviCore has undergone an annual security audit by a third -party security and compliance firm. These audits include penetration testing and a review of internal policies and procedures. Vulnerability Testing and Monitoring CiviCore servers are tested for security vulnerabilities on a monthly basis by a third -party security firm. The contracted firm provides risk management and threat intelligence to CiviCore in order to protect CiviCore systems. Additionally, CiviCore employs several performance monitoring systems that monitor CiviCore firewalls and system uptimes 240. CiviCore engineering staff is alerted 247 of any system failures or threats in order to immediately address system issues as they may occur. Compliance The AWS cloud infrastructure has been designed and managed in alignment with regulations, standards, and best - practices including HIPAA, SOC 1 /SSAE 16 /ISAE 3402 (formerly SAS70), SOC 2, SOC 3, PCI DSS Level 1, ISO 27001, FedRAMP, DIACAP and FISMA, ITAR, FIPS 140 -2, CSA, MPAA. Compliance responsibilities are most often shared requiring controls be in place at multiple layers of the information management process. The Amazon and CiviCore infrastructures provide a solid foundation for all of your compliance objectives. For more information on compliance please see - https: / /aws.amazon.com /compliance /. Additionally, CiviCore maintains PCI (Payment Card Industry Data Security Standard) compliance. These requirements are designed to ensure that credit card processes, storage and transmittal is conducted in a secure environment. Authorization Policies CiviCore applications include a robust set of security policies that may be implemented to provide clients with a security configuration that provides them with highly configurable and granular access control. Groups of users may be established and granted specific field or tab level security rights. Additionally, custom security requirements may be set that define password strength requirements. Service Level Commitment CiviCore guarantees to deliver at least 99.9 percent system availability. This includes all network, hardware and application configurations of the Developer domain. On a monthly basis, 99.9 percent availability equates to a maximum of 43.2 minutes of unscheduled downtime. Updated: 08115114 EXHIBIT D DATA BACKUP PROTOCOLS 14 Eagle County Professional Services IT Final 5/14 �CiviCore Overview Key backup and recovery attributes: CiviCore understands.the importance of our client's data. CiviCore has carefully developed a backup plan to insure data integrity and maintenance. CiviCore client o All backups encrypted databases are backed up in multiple locations to guard against data loss. e Redundant backup systems Daily backups Client databases are backed up daily on the CiviCore network infrastructure. Data ® Three physical backup is encrypted using 256 bit advanced encryption standards before being locations transmitted out of the production environment to an off -site secure facility. Redundant storage Multiple backup locations are used to store 30 days of encrypted daily data backups to guard against a single point of failure. Frequent tests of backup procedures are used to insure data integrity of backups. Data Retention Policies CiviCore retains client data according to the following schedule. • Daily Backups — 6 months • Weekly Backups —1 year • Monthly Backups — 2 years Therefore, clients may request data be restored for any single day in the past 6 months, any single week during the past year, or any month for the past two years. • Multiple data backups Updated: 0812712013