HomeMy WebLinkAboutECAT19-007 Rhize TechFIRST AMENDMENT TO AGREEMENT BETWEEN EAGLE COUNTY AIR TERMINAL CORPORATION AND RHIZE TECH THIS FIRST AMENDMENT (“First Amendment”) is effective as of _________________, by and between Rhize Tech, a Colorado limited liability company (hereinafter “Consultant” or “Contractor”) and Eagle County Air Terminal Corporation, a Colorado non-profit corporation (hereinafter “ECAT”). RECITALS WHEREAS, ECAT and Consultant entered into an agreement dated the 14th day of May, 2019, for certain Services (the “Original Agreement”); and WHEREAS, the Original Agreement contemplated that the Consultant would perform certain duties with compensation in an amount not to exceed $ 25,000; and WHEREAS, ECAT and Consultant desire by this First Amendment to expand the scope of Services and compensation as set forth in the Original Agreement, to add terms and conditions accordingly, and to extend the term of the Original Agreement. FIRST AMENDMENT NOW THEREFORE, in consideration of the foregoing and the mutual rights and obligations as set forth below, the parties agree as follows: 1. The Original Agreement shall be amended to include additional Services as described in Exhibit 1, which is attached hereto and incorporated herein by reference. 2. The compensation for the additional Services set forth in Exhibit 1 shall not exceed $72,000 or a total maximum compensation under the Original Agreement and this First Amendment of $97,000. 3. The Original Agreement shall be amended to include additional terms and conditions, as set forth in Exhibit 2, which is attached hereto and incorporated herein by reference. 4. The Term of the Original Agreement is extended to July 31, 2020. 5. Capitalized terms in this First Amendment will have the same meaning as in the Original Agreement. To the extent that the terms and provisions of the First Amendment conflict with, modify or supplement portions of the Original Agreement, the terms and provisions contained in this First Amendment shall govern and control the rights and obligations of the parties. DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 8/6/2019 ECAT AM Scope Comp Final 5/14 6. Except as expressly altered, modified and changed in this First Amendment, all terms and provisions of the Original Agreement shall remain in full force and effect, and are hereby ratified and confirmed in all respects as of the date hereof. 7. This First Amendment shall be binding on the parties hereto, their heirs, executors, successors, and assigns. IN WITNESS WHEREOF, the parties hereto have executed this First Amendment to the Original Agreement the day and year first above written. EAGLE COUNTY AIR TERMINAL CORPORATION By: ______________________________ Jeff Shroll, Secretary CONSULTANT By: _____________________________________ Print Name:______________________________ Title: ___________________________________ DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 CEO Terry Williams EXHIBIT 1: ADDITIONAL SERVICES General Overview ECAT is contracting with Rhize Tech (Contractor) to provide after-hours support for the network and computing environment supporting the Amadeus shared gate technology (System). This includes issues that require remote or on-site response outside of normal working hours for Eagle County IT staff (ECG IT). Contractor staff will be acting as an extension of the ECG IT team covering early morning, nights, weekends, and holidays. Additionally, the Contractor will 1) proactively monitor overall System availability and 2) perform ongoing upgrades of in scope infrastructure. Contractor will actively work with both Amadeus support and ECG IT as issues are identified, and will document any System changes appropriately. Scope Of Services Supported System Infrastructure includes two host servers, one management server, 9 network switches, one Storage Area Network (SAN), and System related backups. System Infrastructure Monitoring Scope: Devices in scope will be monitored for up/down status at a minimum. If additional information is capable of being monitored within Rhize Tech’s monitoring solution, software for automated alerting attempts shall be made to do so. ● External data circuit availability. ● Airport network (EGE) network availability. ● System infrastructure performance concerns. ● Firewalls: Basic monitoring for up-down status and alerting only. Device health issues and alerts will be resolved Virtualization Management functionality and management to allow for guest virtual machines to properly access and utilize all underlying data center networking and storage technologies such as routers switches and additional technologies that may be acquired are Included. Device health issues and alerts will be resolved. ● Virtual Hosts: Device health, critical alerts, networking management and device management included ● Virtual Guests: Guest health, critical alerts, networking management, and device management DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 ● Route/Switch: Full management and support of switches that include system functionality, programming and network SSID management is covered. Device health issues and alerts will be resolved. ● Device management: to include capacity monitoring, storage availability. (Pools/LUN/availability groups, etc) and all aspects of device health is covered. ● Event logs for in scope devices are to be reviewed for critical alerts Event logs for in scope devices are to be reviewed for critical alerts Proactive / Maintenance. Specific examples of covered events include: ○ Proactive third-party patching for servers and supporting software (in conjunction with Amadeus and ECG IT). ○ Server Hardware issue - Calling in and replacing failed hard drives. ○ Network hardware issue - Calling in and replacing failed network equipment. ○ Troubleshooting connectivity issues for external circuits. Including calling vendor and opening support tickets. ○ Helping Amadeus 2nd level support and above as needed to address major support issues. Patching The patching process for all devices is to utilize only the most current stable release from the manufacturer that will not risk the stability of the environment. Contractor will maintain, support, and patch (quarterly) listed technologies and uphold listed SLA and will also provide testing and capacity planning. Documentation Update network documentation will be kept by the contractor to include device name, location, production IP address(es), management IP address(es) SNMP credentials and purpose for all in- scope devices. Yearly License and support contract review for cloud-managed (switch & router), virtualization environment, and storage are sufficient for the forthcoming budget year including: ● Verify available port count per device (Routers/Switches) is sufficient for foreseeable events. ● Available capacity on storage systems is sufficient for foreseeable events. ● Available compute resources on server systems are sufficient for foreseeable events. ● Recommendations completed prior to Eagle County’s annual budget season. ● Quarterly reporting (QBR) and recommendations for potential issues identified during normal network management operations. DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 Expectations, Requirements, and Restrictions Contractor will complete any research necessary to avoid recommending the purchase of unnecessary devices by identifying areas where existing equipment may be over-allocated and better utilized elsewhere through the capacity Planning process. ECAT will then, at their own discretion opt to purchase and sufficiently license the recommended devices. All software and hardware must be properly licensed, and under an active support contract (Rhize Tech will not support end of life or unsupported hardware or software) ● Modifying permissions to network shares, granting access to devices, secured networks and other general user/staff entitlements to remain the sole responsibility of ECG IT. ● Rhize Tech will only grant themselves additional access needs in emergency situations where the IT team is unreachable after waiting 20 minutes for a response. ● Rhize Tech staff will be authorized sufficient management level access to complete their responsibilities listed in this scope of work on all devices but will adhere to the same entitlement process as general staff. ● Rhize Tech will adhere to any change management procedures as required. ● Rhize Technicians will maintain active airport security badge. Service Level Agreement (SLA) ● Priority 1 – Critical: means an existing Network or Environment down or there is a critical impact to EndUser’s business operation. Airport Authority personnel and Contractor personnel both will commit full-time resources to resolve the situation. ● Priority 2 – High: means operation of an existing Network or Environment is severely degraded or significant aspects of End User’s business operation are negatively impacted by unacceptable Network or Environment performance. Airport personnel and Rhize Tech both will commit full-time resources during Standard Business Hoursto resolve the situation. ● Priority 3 – Medium: means the operational performance of the Network or Environmentisimpaired, although most business operations remain functional. EndUser and Rhize both are willing to commit resources during Standard Business Hours to restore service to satisfactory levels. • ● Priority 4 – Low: means information is required on Rhize product capabilities, installation, or configuration. There is little or no impact on EndUser’s business operation. EndUser and Rhize both are willing to provide resources during Standard Business Hours to provide information or assistance as requested. DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 All priority 1, 2, and 3 issues need to be reported to both ECG IT and Amadeus by email within two hours of notification. Target Response Time: ● Priority 1 – Critical respond within 2 Business Hours ● Priority 2 - High respond within 4 Business Hours ● Priority 3 – Medium 12 Business Hours ● Priority 4 – Low 24 Business Hours Hours Covered under SLA: Weekdays 6:AM to 8:AM, and 5:PM to 11PM Weekends 6:AM to 11:PM Holidays as recognized by Eagle County Government from 6:AM to 11:PM Issue Resolution and responsibilities AIRPORT AUTHORITY The local AIRPORT AUTHORITY Support staff are responsible for handling the initial call from AIRPORT AUTHORITY’ s customers or AIRPORT AUTHORITY Operations recording the issue and escalating it to the appropriate party. Typical level 1 support issues handled by the airport staff include individual PC hardware or power issues and printer Jams and equipment failures that can be handled by replacing with spares. Price Matrix Prices are per device per month for each device type monitored. Product Description Suggested Price Discounted Amount Override Price Managed Meraki Switch $150.00 $55.00 $95.00 Monitored Palo Alto Firewall $400.00 $305.00 $95.00 Managed Virtual Host $400.00 $305.00 $95.00 Managed Virtual Guest $165.00 $70.00 $95.00 Managed End Point $165.00 $105.00 $60.00 Managed SAN $275.00 $180.00 $95.00 Managed Circuit $200.00 $105.00 $95.00 Network Printer $25.00 $25.00 $0.00 Out of Scope Items (but can be provided at T&M rates) DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 ● Firewall changes, troubleshooting, configuration. No remediation issues of firewalls are included in management. Nor does it include VPN troubleshooting or configuration. ● Rhize Tech is not responsible for material purchases - Additional hardware needs are to be recommended by Rhize Tech as part of the Capacity Planning offering. ● All net new hardware-software will require professional services fee for Rhize Tech installation ● Virus and malware remediation ● Disaster Recovery ● Data breach/security remediation activities. ● Wireless surveys ● Phone system programming ● Call routing/phone trees or voicemail, Analog Voice Gateways ● Overhead Paging system ● DNS & DHCP management, IP Address Management and DHCP functionality) ● Active Directory management or support. ● HVAC (Heating, Ventilation, Air Conditioning) ● Power ● Issues arising from Force Majeure DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 EXHIBIT 2: ADDITIONAL TERMS AND CONDITIONS A. Data Protection. Consultant shall not access ECAT or Eagle County Data, except (1) in response to service or technical issues; (2) for proactive service and problem resolution; (3) for the purpose of performing its obligations under the Agreement this Agreement; or (4) at ECAT’s written request. Consultant agrees to keep confidential all ECAT and Eagle County Data, and Amadeus configuration information, and agrees not to sell, assign, distribute, or disclose any such information to any other person or entity without seeking written permission from ECAT and Eagle County. For purposes of this Section A of Exhibit 2, ECAT and Eagle County Data means all information, whether in oral or written (including electronic) form, created by or in any way originating with ECAT or Eagle County and End Users, and all information that is the output of any computer processing, or other electronic manipulation, of any information that was created by or in any way originating with ECAT or Eagle County and End Users, in the course of using and configuring the Software, Equipment and Services provided under this Agreement. For purposes of this Agreement, End User means the individuals (including, but not limited to employees, authorized agents of ECAT and Eagle County; third party consultants; any governmental, accrediting or regulatory bodies lawfully requesting or requiring access to any Services; customers of ECAT or Eagle County provided services such as third-party airlines, charter carriers, non-hosted carriers and other flight operations at the Airport; and any external users collaborating with County) authorized by ECAT or Eagle County to access and use the Software, Equipment and the Services provided by Consultant under this Agreement. B. Third Party Remote Access. Consultant agrees to comply with ECAT’s policy for third party remote access to ECAT and Eagle County computing resources. Specifically, Consultant shall ensure that due care is exercised with the management of its devices used to connect to ECAT’s or Eagle County’s network. It is imperative that any remote access connection used to support ECAT’s systems be utilized appropriately, responsibly, and ethically. Therefore, Consultant agrees to observe the following rules surrounding the utilization of third party remote access tools: (1) All remote computer equipment and devices used by Consultant for accessing ECAT or Eagle County systems will institute reasonable security measures. At a minimum, Consultant’s source devices used to access ECAT or Eagle County systems should be properly secured with unique strong passwords; current antivirus software; and up to date operating systems; (2) In no instance shall Consultant’ s employees or subconsultants provide their individual login credentials to anyone, including their co-workers or Eagle County staff; (3) Consultant is responsible for immediately advising Eagle County’s IT Department to revoke remote access privileges upon the termination of any employee or subconsultant with Eagle County login credentials. At no time shall Consultant download, share, or distribute ECAT or Eagle County data without the explicit authorization of the relevant ECAT or Eagle County LOB application system owner; (4) Any software support tools installed by Consultant on Eagle County’s network should be documented and communicated to the Eagle County IT Department. This includes remote access software, backdoors, and any tools used for administering Eagle County system resources. All third party software installed on ECAT or Eagle County systems should be legally obtained and have proper licensing; (5) Standard proactive business application software maintenance upgrade requirements should be coordinated and scheduled well in advance with the Eagle County IT Department. All configuration changes made to ECAT or Eagle County systems or environment should be documented and tracked. DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7 C. Data Breach. Consultant will respond to, contain and remediate security incidents, using commercially reasonable efforts, on a 24 hours a day, 7 day a week basis. Consultant shall notify ECAT of security incidents within twenty-four (24) hours of becoming aware of an actual incident involving ECAT or Eagle County Data. An “incident” is a breach of data protection, confidentiality, data integrity or a security compromise of a network or server resulting in the unauthorized access, use, transfer or acquisition of ECAT or Eagle County Data. Consultant shall inform ECAT about incident response activities in reasonable intervals until the incident is resolved, which may include documenting and keeping ECAT reasonably informed of all investigative and recovery efforts related to any such incidents, including discovery, investigation and containment, recovery, use of data and experience for gap identification and process improvement, mitigation plans, and cooperation with law enforcement, if legally permissible, as reasonably appropriate. q. Breach Responsibilities. Unless otherwise stipulated, if a data breach is a direct result of Consultant’ s breach of its contractual obligation in Section XYZ to prevent the unauthorized release of ECAT or Eagle County Data ( a “ Data Breach”), Consultant shall bear the reasonable and documented costs associated with (1) the investigation and resolution of the Data Breach; ( 2) ECAT’s notifications to individuals, regulators or others as may be required by applicable state law; (3) a credit monitoring service as may be required by applicable state ( or federal) law; (4) a website or a toll-free number and call center for affected individuals as may be required by applicable state law; and ( 5) all corrective actions based on root cause. In the case of a breach originating from ECAT or Eagle County, Consultant will provide reasonable assistance to ECAT or Eagle County for identification and resolution, but ECAT or Eagle County will have sole responsibility for any remediation actions, costs and expenses necessary as a result of the Data Breach. DocuSign Envelope ID: 6CF4D5A9-1532-4F03-BA28-85B5DC86ABD7