05 TechnicalSpecifications Part1&2

58
Support to the Implementation of Intelligence Led Policing Technical Specifications The European Union’s IPA Programme for

Transcript of 05 TechnicalSpecifications Part1&2

Page 1: 05 TechnicalSpecifications Part1&2

Support to the Implementation of Intelligence Led Policing

Technical Specifications

The European Union’s IPA Programme for

Page 2: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

TABLE OF CONTENTS

1 INTRODUCTION 3

2 BACKGROUND INFORMATION 42.1 Introduction 4

2.2 Kosovo Police ICT Systems and Infrastructure 42.2.1. Communications Network 52.2.2. Analogue System of Radio Communication of Kosovo Police 52.2.3. Kosovo Police Telephone System (VoIP) 52.2.4. Kosovo Police Main Computer Network 62.2.5. Kosovo Police Systems 62.2.6. Kosovo Police Information System – System Issues 7

3 HARDWARE SYSTEM REQUIREMENTS 83.1 Introduction 8

3.2 Central System Requirements 9

3.3 KPS, RCC and PS Hardware Configuration 93.3.1 Headquarters Command Centre Configuration 93.3.2 Regional Command Centre Configuration 103.3.3 Police Station Configuration 10

3.4 LOT 1: Hardware Specification 11

4 SOFTWARE SYSTEM DEVELOPMENT REQUIREMENTS 174.1 Introduction 17

4.2 LOT 2: Kosovo Police Information System 21

5 SERVICES REQUIREMENTS 355.1 Introduction 35

5.2 Suggested Project Plan 355.2.1 Start-up and Planning 355.2.2 Development 355.2.3 Beta Test 365.2.4 Deployment 375.2.5 Operation and Maintenance (concern software only) 37

5.3 Equipment Installation, Commissioning & Implementation 38

5.4 Training Services 385.4.1 Training Courses 395.4.2 On the Job Training 40

5.5 Documentation Requirements 40

5.6 Acceptance Criteria 40

5.7 Warranty Services (concern hardware only) 40

Final Draft Page 2 of 40

Page 3: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

1 INTRODUCTION

The Kosovo Police (KP) is a relatively new organisation responsible for major law enforcement activities within Kosovo, and is still in the process of building its capacity and improving its services. Key areas identified for enhancement are the need to strengthen intelligence capabilities, to further develop strategic planning and to fully implement an Intelligence Led Policing system (ILP).

The European Commission Liaison Office to Kosovo will support the implementation of an Intelligence Led Policing concept in Kosovo through a project aimed at reducing crime through the establishment of an effective pro-active uniform intelligence information system utilizing intelligence led policing methodology to strengthen performance capability. This project will help increase the quality of service delivered by Kosovo Police through the improvement of collection, evaluation and analysis of police information, ensuring the availability of quality intelligence data in a secured database and enhancing the use of police intelligence data on strategic, operational management and tactical levels. Furthermore, it will help the KP to react to trends, rather than on events, prevent rather than detect crimes and play a proactive rather than reactive role.

The Instrument for Pre-Accession Assistance 2010 project supports:

a) New Kosovo Police Information System

The Kosovo Police Information System (KPIS) contains modules of incidents, traffic citations, lost documents, traffic accidents, wanted persons, weapons, property and a module of advanced searching and digital mapping. The functionalities of these modules need to be adapted to applicable legislation and to support the structural changes of Kosovo Police. The system is facing difficulties regarding authentication levels, levels of access are not properly defined and therefore infringing basic principles of data protection.

Furthermore, the platform on which the current KPIS database was established is MSQL 2000 and the Front-end Applications were done in Active X system which is no longer used in the field of information technology.

b) Training of KP staff to use the new system

Training needs to be provided to Kosovo Police officers on the use of the new system. The Training should include a range of courses including a ‘Train-the-Trainers’ module and on-the-job training.

The components of this project therefore include:

1) Establishment and documentation of the KP Functional Requirements;2) Development of the system (application, databases and infrastructure) the basis for the

above Functional Requirements Specification;3) Development of the necessary data exchange mechanisms in co-operation with the

relevant KPS unit and other governmental organisations;4) Installation, configuration, testing (pilot – beta test) of hardware for the new system at all

KP sites in Kosovo;5) Development of training courses in the use of the new Kosovo Police Information

System;6) The provision of support and maintenance services during the first two years of the

system’s operational use.

Final Draft Page 3 of 40

Page 4: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

2 BACKGROUND INFORMATION

2.1Introduction

As mentioned above, the objective of this Procurement is the replacement of KP’s existing Information System with a new improved Information System, which includes:

All the existing functionality; Enhanced integration with other databases; Improved security; Management of additional operational information; A fully integrated and improved active directory sub-system; An improved centralized system to manage the infrastructure including server, client,

distributions, patch management etc.

The Contractor is required to implement the system as a turn-key project on the basis of the requirements specified in the Sections following including:

Carry out a functional analysis to identify needs; Develop software application system(s) and database(s) based on the functional analysis; Provide for skills and knowledge transfer to KP staff through partnership working and on-the-

job training; Deliver, install, configure and beta test (pilot) the hardware and its network connections; Deliver standardised training modules and training of trainers.

It should be noted that this Overview is intended to provide Bidders with a brief outline of the current situation and the necessary developments; the specific mandatory equipment, software and services requirements are detailed in Sections 4, 5 and 6 below.

In general the offered solution must fulfil the following criteria:

Security: Provide a secure computing infrastructure and simplified processes for keeping the environment secure;

Reliability: Provide a dependable infrastructure based on international de facto standard technologies;

Manageability: Provide an infrastructure that is easy to monitor and maintain;

Supportability: To simplify and ease the burden on IT support staff, the solution must implement best practices recommended by the developer(s) of the proposed software and their partner service support organizations;

Comprehensiveness: Bidders must ensure that their proposals include all hardware and software components required to meet the KP’s functional and operational requirements.

In order to ensure the sustainability of the system, KP Information and Communications Technology Directorate (ICTD) staff will collaborate with the Contractor’s technical staff in the work of software requirements, analysis, design, hardware installation, configuring, software installation and commissioning/testing activities as hands-on training. The Contractor’s technical staff and/or appointed technical trainers will also provide formal training courses for KP staff.

2.2 Kosovo Police ICT Systems and Infrastructure

This section provides an overview of current KP ICTD including identifying the issues that will need to be resolved in the development of the new system.

Final Draft Page 4 of 40

Page 5: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

2.2.1. Communications Network

The Kosovo Police communication network covers the whole country. The diagram below illustrates the central communication points, the relationships and the equipment used to connect the network.

KP staff in all locations where the system is accessible can communicate using a four digit internal telephone system.

2.2.2. Analogue System of Radio Communication of Kosovo Police

In 2009 the radio system was expanded with more than 70 new radio hand-sets, 20 mobile radios, and 5 base radios for new stations and now covers almost 93% of the Kosovo territory or almost 5% more coverage than in year 2008. This system contains about 7100 radio hand-sets, 600 mobile radios in KP vehicles, more than 94 base radios and approximately 60 signal transmitters. The system works on UHF frequencies.

2.2.3. Kosovo Police Telephone System (VoIP)

This system is constructed on the technology of signal distribution through microwave links (Motorola Canopy Links) and installation of advanced telephone centrals TDA200-Panasonic IP Hybrid in each KP station. During 2008 more than 15 Microwave Canopy Links were installed, which along with the previous ones makes the total number of 85 functional links, 44 digital telephone centrals and more than 21 locations covered with analogue extensions through Canopy links, as a part of the KP telephone network project extension. Currently this system covers more than 94% of the Kosovo territory where KP members operate or about 9% more than the previous year (2007). Routers were also installed for the telephone Backup system and a new modification was done on the connections

Final Draft Page 5 of 40

Page 6: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

for stations which were in the Canopy namely Qafa e Prushit, Qafa e Morinës, Klina, Gjakova Border RHQ and at Traffic Prizren.

2.2.4. Kosovo Police Main Computer Network

ICT Directorate has built an independent computer network which serves the Kosovo Police needs for communication and interchange of data between police points. This network uses Microwave technology as the base of its infrastructure in Kosovo.

In 2009 2 microwave links with 155Mbps capacity were installed, bringing the total number of microwave links to 65 (each year this number is increased). In 2011 the KP WAN will be upgraded, the detailed information about the current KP WAN will be presented by KP to the potential offerer during the first stage – Start-up and Planning.

This network functions as the backbone for all KP data transmission as well as the use of different applications on the KP Intranet and the Internet.

2.2.5. Kosovo Police Systems

Currently the KP uses the following database systems:

Final Draft Page 6 of 40

Page 7: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

2.2.6. Kosovo Police Information System – System Issues

As noted above, KPIS is the primary information system recording operational activities of the KP. Its purpose is to manage information about police activity in Kosovo which it does essentially by capturing and storing information relating to incidents and formal police cases. It prompts users to record key case information (date, nature of crime/incident, status, evidence, weapons, persons involved etc.) through a series of tables and provides limited search capabilities on defined fields. It provides only a summary of case information as it does not allow for linkages to other files and because of the current procedures the data entry is often significantly delayed so it is not seen as being up-to-date and accurate.

KPIS Architecture

The KPIS has been developed in ASP.NET (web application) and MSSQL server 2008. Several data bases have been integrated, like vehicles, weapons and border crossing, so that searches can be done without being intermediated by regional communication centres. Those who have access to the KP internal network can also have access to the web application, i.e. internet has been used so the users can access the web server which is between KPIS and the internet.

The whole KPIS works on a Microsoft platform. The Front-end has been developed using Active X technology incorporated into MS Access, whereas the Backend is on a MS SQL Server 2000.

This application was developed by the UNMIK mission and is therefore based on the laws, regulations and organisational structures of UNMIK and consequently not always applicable given the development of the new constitution and laws in Kosovo. Due to the nature of the technology used by UNMIK it is almost impossible for Kosovo Police to adjust the system in terms of the new laws and generally update the system. There are also various difficulties in naming/renaming habitats/areas in KPIS. All these challenges are compounded by the fact that the language used in the application is English when the user requirement is in Albanian and Serbian.

The technology that is currently being used by Kosovo Police is practically obsolete and there is no support even by its developer Microsoft. For example: KPIS does not work on MS Access 2007 as it has compatibility issues with Active X.

The current KP software infrastructure is described in the figures below:

Final Draft Page 7 of 40

Page 8: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

KPIS Use and Maintenance

The ICT Directorate have primary responsibility for maintaining KPIS and in particular:

1. Creating network infrastructure; 2. Installing the application on new computers;3. Providing help desk support;4. Adding, editing and deleting users on this system.

Below is the chart of the users and equipment currently in use for KPIS.

3

HARDWARE SYSTEM REQUIREMENTS

3.1 Introduction

The hardware system requirements of the Kosovo Police are specified on three levels:

o The Central System, which acts as the hub of the system and carries out database updating from the participating organisations and replication of these to Regional Command Centres;

o Regional Command Centre, which acts as the hub of the sub-system and carries out database updating from the participating organisations (KP Pillars) and replication of these to Kosovo Police Station level;

o Kosovo Police Station; these are specified as a standard configuration.

The current inventory of equipment in KPIS and the proposed future number is presented in the table below.

Parameters Current KPISProposed full implementation

in the future

Number of workstations 165 computers/13 servers 1,500 – 2,000 computers

Number of workstations to be connected at the same time

100 – 120 1,000 – 2,000

Number of all users 500 7,000

Number of active users at the same time

100 – 120 1,000 – 1,500

3.2 Central System Requirements

It is required that the proposed servers should be based on “blade” technology and KP Net connectivity. The servers and associated equipment should be housed on a single chassis.

Final Draft Page 8 of 40

Region Nr.of users

KPMHQ 122Pristine 58Mitrovice 40Peje 48Prizren 46Ferizaj 43Gjilan 45Border Police 96

Total: 498

Equipment Number

computer 165Server 13Cisco Switch 15Dell Switch 4UPS 3000 6UPS 800 7UPS 5000 5

Page 9: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

The Central Server System of the KP should comprise the following functional servers required for police management service provision as well as security, system and network operations and management. These include:

Application server(s) to run the KP’s planned operational software systems; Database server(s) to hold and manage the databases required by the above application

systems; Web server; accepts requests and returns responses to clients, logging information on client

requests and responses for subsequent analysis to identify actual or potential performance problem areas;

Certification Authority/Authentication Server; security management of specific functional user groups of the KP, with data encryption and verification;

Back-up and Archiving Solution.

It should be noted that the other necessary centralised services (Proxy, Active Directory, DHCP and Domain Name Servers etc.) will continue to be provided and operated by KP ICTD.

3.3 KPS, RCC and PS Hardware Configuration

3.3.1 Headquarters Command Centre Configuration

Final Draft Page 9 of 40

Page 10: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010Support to the Implementation of Intelligence Led Policing

3.3.2 Regional Command Centre Configuration

3.3.3 Police Station Configuration

Final Draft Page 10 of 40

Page 11: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

3.4 LOT 1: Hardware Specification

ItemNo:

REQUIREMENT SPECIFICATION OFFERED SPECIFICATION Bidder’s Notes& Comments

EvaluationC’ttee Notes

1 Blade Server – 57 items • Processor(s): 2x Intel Xeon E5650 2.66GHz

(or functional and performance AMD equivalent), 2 x 6MB Level 2 cache, 1333 FSB;

• Main Memory: 32GB PC2-5300 fully buffered DIMMs;

• Disk Storage: 2 x 146GB 15K SAS2 Hot-plug Dual Port HDD;

• Storage Controller(s): RAID Controller, with 128MB battery-backed cache;

• I/O Expansion Slots: Support for up to 2 Mezzanine cards;

• Host Bus Adapter: QLogic QMH2462 FC HBA Adapter for storage connection (or functional and performance equivalent);

• Network Adapter: two embedded Multifunction Gigabit Server Adapters

• Form Factor: Vertically plugged into Blade Enclosure;

• SAN Compatibility: compatible with requested Storage Area Network solution;

• Operating System Support: MS Windows, Linux, Netware and Solaris OS (See point 6).

2 Storage Area Network Infrastructure – 1 item Controller: Two, in U2 Controller Enclosure; Controller Cache: 4 GB per Controller pair; RAID Levels : 0, 1, 5, 6, 10 Capacity: Support for up to 96 Terabytes;

Final Draft Page 11 of 40

Page 12: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT SPECIFICATION OFFERED SPECIFICATION Bidder’s Notes& Comments

EvaluationC’ttee Notes

HDD Enclosure: Fibre Channel Drive Enclosures;12-bay disk enclosure in 2U, dual-redundant FC Loop; Support for up to 8 Disk Enclosures;Mounting hardware to be included;Hot pluggable power supplies and fans.

Hard Drives: 24 x 146GB 15K 4Gb dual-port FC Hard Drive, support for up to 96 HDDs;

Drive Interface: Two 4Gb/sec FC-AL ports per controller in redundant pairs, two paths to each dual ported HDD;

Hot-Plug Support: hot pluggable disks, I/O modules, cache batteries, power supplies and fans;

Host Supported: Single Path 512, Dual Path 256;

Network Connectivity: Gigabit Ethernet: 2 x RJ45 Connectors, both supporting TCP/IP offload. Optional add-in NICs including 10Base

Rack Integration: Must be factory integrated in Rack cabinet; Same brand as the SAN solution;Height: 42 UFeatures should include:- Stabilizer Kit, Grounding Kit, Side-panel Kits and Ventilation Unit;Two Power Distribution Units (PDUs) 32A;Input Connection: IEC 309-32A; PDU’s must have extension bars with IEC 320 C-13 receptacles.

Storage Licence: Licensed for 1 Terabyte usage;

Operating Systems Support: Windows 2008 Standard and Enterprise Edition,

Final Draft Page 12 of 40

Page 13: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT SPECIFICATION OFFERED SPECIFICATION Bidder’s Notes& Comments

EvaluationC’ttee Notes

Windows 2003 Standard Edition (32-bit/x64), Windows 2003 Enterprise Edition (32-bit/ x64), Linux, Sun Solaris, VMware, Novell NetWare, IBM AIX, Apple Mac OS X(See point 6).

3 Storage Area Network Infrastructure – 6 items Controller: Two, in U2 Controller Enclosure; Controller Cache: 4 GB per Controller pair; RAID Levels : 0, 1, 5, 6, 10 Capacity: Support for up to 9,6 Terabytes; HDD Enclosure: Fibre Channel Drive

Enclosures;12-bay disk enclosure in 2U, dual-redundant FC Loop; Support for up to 8 Disk Enclosures;Mounting hardware to be included;Hot pluggable power supplies and fans.

Hard Drives: 12 x 146GB 15K 4Gb dual-port FC Hard Drive, support for up to 48 HDDs;

Drive Interface: Two 4Gb/sec FC-AL ports per controller in redundant pairs, two paths to each dual ported HDD;

Hot-Plug Support: Hot pluggable disks, I/O modules, cache batteries, power supplies and fans;

Host Supported: Single Path 512, Dual Path 256;

Network Connectivity: Gigabit Ethernet: 2 x RJ45 Connectors, both supporting TCP/IP offload. Optional add-in NICs including 10Base

Rack Integration: Must be factory integrated in Rack cabinet; Same brand as the SAN solution;Height: 42 UFeatures should include:- Stabilizer Kit,

Final Draft Page 13 of 40

Page 14: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT SPECIFICATION OFFERED SPECIFICATION Bidder’s Notes& Comments

EvaluationC’ttee Notes

Grounding Kit, Side-panel Kits and Ventilation Unit;Two Power Distribution Units (PDUs) 32A;Input Connection: IEC 309-32A; PDU’s must have extension bars with IEC 320 C-13 receptacles.

Storage Licence: Licensed for 1 Terabyte usage;

Operating Systems Support: Windows 2008 Standard and Enterprise Edition,Windows 2003 Standard Edition (32-bit/x64), Windows 2003 Enterprise Edition (32-bit/ x64), Linux, Sun Solaris, VMware, Novell NetWare, IBM AIX, Apple Mac OS X (See point 6).

4 Blade Infrastructure – 9 items Blade Server Bays: up to 16 half-height or

up to 8 full-height server blades; Switch Bays: 8 switch bays; SAN Switch: Two x 4Gb SAN Switches;

24 ports enabled: 16 ports internal, 8 ports external; 8 short wave 4Gb SFPs transceivers to be included;

Ethernet Switch: 2 Ethernet Blade Switches for blade system:- 16 internal downlinks, 5 uplinks and 2 internal cross-connects;5 x network - Ethernet 10Base-T/100Base-TX/1000Base-T - RJ-45;

Systems Management: 1 Management Module;

Power Supplies: 6 x Hot-swap power supplies;

Fans: 10 x hot-swap blowers; Form Factor: Rack 10U; Rack Integration: Factory integrated in Rack

Final Draft Page 14 of 40

Page 15: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT SPECIFICATION OFFERED SPECIFICATION Bidder’s Notes& Comments

EvaluationC’ttee Notes

cabinet, to be the same brand as the Blade infrastructure;Rack Height: 42 UFeatures should include Stabilizer Kit, Grounding Kit, Side-panel Kits, Ventilation Unit and 2 x PDU 40 A;

Operating Systems Support: Microsoft Windows Server 2008, Microsoft Windows 2003 Server/Advanced Server, Red Hat Linux, SUSE LINUX, Novell NetWare9, AIX10 (See point 6).

5 Tape Back-up Library – 2 items Drive Technology: Automated Tape Library

LVD SCSI, 4 Gb/s FC, 8 Gb/s FC, 3 Gb/s SAS, 6 Gb/s SAS

Number of Tape Drives: 2 Number of Slots: minimum 40; Capacity: 613 TB (with 409 LTO-5

cartridges); Max. Data Transfer Rate: Native Maximums:

(with 18 LTO-5 drives) 2520 MB/s 9072 GB/hr;

Interface: 4Gb Native Fibre Channel Ultra320 SCSI LVD/SE;

Cables: 2 x 5-metre LC-LC Multi-mode fibre cables;

Media: 100 x LTO5 1.5 TB Read-Write Data Cartridges;

Back-up Software Licenses: Backup Software to be included;Licenses for tape drives;

Licenses for SAN Storage Backup to be included.

6 UPS – 16 items

Final Draft Page 15 of 40

Page 16: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT SPECIFICATION OFFERED SPECIFICATION Bidder’s Notes& Comments

EvaluationC’ttee Notes

Hold up time: minimum 1 hour (for 80% output power;

Input voltage range: 230V (-30% ÷ +20%); Smart microprocessor control; Intelligent LCD display; Hot-swappable battery; Automatic battery test and protection against

deep discharges; Event log for easy fault detection; Management through various protocols (for

example: HTTP, SNMP, XML, Telnet); Integration with Network Management

Systems; Safety markings: UL/TÜV, GS mark, CB, C-

Tick, CE; EMC Markings: IEC 62040-2; EN 50091-2;

FCC class A; EMC B level.

7 Software:MS Windows Vista/7 and MS-Office should be pre-installed on workstations. However, note that the Government of Kosovo has an Enterprise Agreement with Microsoft, therefore each system should have a pre-qualified licence OS.

8 Installation and Commissioning:Installation and Commissioning of the above as specified at 5.3 below.

9 Warranty: 12 months (one year).

Final Draft Page 16 of 40

Page 17: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

4 SOFTWARE SYSTEM DEVELOPMENT REQUIREMENTS

4.1 Introduction

As noted above, the purpose of the new KPIS is to provide an integrated information management tool for Kosovo Police which provides information in support of intelligence led policing. The focus of KPIS will be the capture of key operational information which acts as a record of actions and can be used for investigations as well as strategic and tactical planning. Therefore the system must be designed to support the basic policing activities of the KP while also allowing for integration with other databases currently in use or which might be developed in the future.

The current system already delivers much of the proposed functionality but is in unsupported software, on an out-dated platform, has no integration with other information databases in use and is not in the appropriate language. The new system must:

Be compliant with Government of Kosovo standards for IT systems; Meet all national standards for data protection; Provide for the migration of key data from the existing system; Provide users with a single point of entry to all databases used by KP; Provide for the exchange of information with selected external sources; Provide a robust security system.

Currently the system provides for data capture well after the event by the submission of written reports which are then entered by KPIS administrators into the system. This delay needs to be shortened and the intention is that KPIS is used by all staff both for data entry and searching, ideally real time update and interrogation. While the system will continue to rely on data entry and searching from dedicated computers, the design must allow for remote access in the future as well as integration with dedicated telephone systems.

Key issues for the system include:

System user languages must be in Albanian, Serbian and English; Need for enhanced security models; Improved processes for data capture; Development of an Intelligence Module to capture standard ILP reports; Increased searching capabilities; Integration with other databases in particular CIS; Better reporting functions; Improved integration with active directory services and security services.

It is envisaged that the system should conform to:

Information architecture model such as defined in the figure IT Information Architecture; The composition view of the systems and their link such as defined in the figure IT Business

Architecture (macro and detailed); The modern 3-tier architectural mode (Front End, Applications, Database); The solution for the system must provide high reliability, high scalability and high availability; The software code requirements shall be provided in three layers:

Presentation logic; Business logic; Data logic.

The bidding for the software part only should add the recommendation for the hardware according to point 3.4. (LOT 1. Hardware Specification).

Final Draft Page 17 of 40

Page 18: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

IT Information Architecture

Final Draft Page 18 of 40

Page 19: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

IT Business Architecture

Final Draft Page 19 of 40

Page 20: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

Detailed IT Business Architecture

Final Draft Page 20 of 40

Page 21: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

4.2 LOT 2: Kosovo Police Information System

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

1 1.The system must provide the following functions:

A. Operational Functions/Records (Operation Management Systems)

Incident Reporting: manage information relating to incidents including allocation of unique incident number, drop down menus for method of reporting, type of incident, region etc. Must prompt user to open formal case and link to original incident number.

a) Must provide for managing Traffic Citations including the possibility to create and issue a citation.

b) Must provide for the management of Traffic Accidents including information exchange with vehicle registration systems.

c) Must provide for the management the Statement (Notify an incident).

d) Operational Reports: manage information about operational activities for defined periods of time including:

Allocation of resources; Summary of main activities; Lines of responsibility; Must provide for the exchange of

information with the Human Resources System.

Final Draft Page 21 of 40

Page 22: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

B. Investigative and Intelligence Sub-system

Must provide the following functions:1. Case Management: manage information

relating to Criminal Cases: case registration, status, operational responsibility, case progress relating to persons, objects or evidence.

a) The system must allow for the attachment of various file formats (images, text documents, audio, video, etc.).

b) Must provide for the management of warrants including the request, justification and status of warrant.

c) Must provide for linking warrants to cases, people and object.

d) Must provide for information exchange with CMIS and BMS.

2. Evidence Logs: manage information relating to the collection, registration, handling, location, access and disposal of evidence.

a) Must be able to attach multiple file formats to the log.

b) Must be linked to a case.c) Must provide for information exchange

with CMIS.3. Objects: manage information relating to

objects involved in incidents, cases or intelligence reports (including documents, weapons etc.). This function will be the basis for recording and managing all evidence in the

Final Draft Page 22 of 40

Page 23: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

Central Evidence Room in PHQ and must manage an audit trail to/from Regional/station evidence rooms. It:

a) Must provide for information exchange with the Firearms Registration system.

b) Must provide for information exchange with Customs Systems.

4. Custody Management: manage information about individuals in police custody from arrival to release or appearance at court including the ability to document physical state, interactions with officers, property log, monitoring of custody, allocation of cells etc.

a) Must allow a link to case.b) Must allow a link to person.

5. Enhanced Investigation/Management Toolsa. Single-point of query: the user logged into

the KPIS will have the ability to search all elements of the system as well as specified data from other systems from a single search screen.

b. The system will return results so that when a record is selected all existing linkages to other records will be displayed.

c. Information in KPIS will be available to CIS through a simple search mechanism.

d. Increased mapping capabilities including the use of GIS: the system must provide users with accurate up to date mapping of crime, incidents, vehicles and workforce by linking identified elements to geographical representations at national, regional, city and grid reference.

Final Draft Page 23 of 40

Page 24: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

e. Enhance management, strategic, tactical and operational reporting capabilities: the system design should allow for the generation of standard report types identified during the development of the detailed functional requirements as well as assist users in creating customised reports, as and when needed, by the selection of elements.

C. Intelligence Reporting: Manage information relating to the gathering, recording, analysis and disseminating of intelligence on persons, vehicles organisations, activities or objects. Must be accessible to CIS and utilise the 5x5x5 model for ILP reports. Further, must provide mechanism to extract information (Person, Objects, Property, etc.) and recording information in other subsystems (CIS, Integrated Record Management).

D. Integrated Record Management Sub-system The sub-system must provide the following functions relating to persons (manage information relating to the biographical record about individuals) including but not limited to:

a) Link them to incidents, cases or intelligence reports;

b) Linking with objects, properties, criminal group, gang, etc.;

c) Specify the incident/case reference and status (accused, witness, suspect, victim etc);

d) Must have the capacity to link to biometric

Final Draft Page 24 of 40

Page 25: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

data; e) Must provide for the exchange of

information with the Civil Registration Database;

f) Must provide for the exchange of information with BMS.

E. Information Exchange with other SystemsThe system design must develop a mechanism for providing for the exchange of information between the new KPIS and other systems including but not limited to:

1. CIS 2. KP Human Resources3. Vehicle Registration4. Civil Registration/ID Cards5. Foreign Citizens Registration6. Asylum and Immigration7. Prosecutors (CMIS)8. Border Management9. Firearms Registration10. Corrections4 11. Telephone Systems12. Utility Companies13. Taxation14. Customs15. AFIS16. Evidence Management17. Human Resource

F. System Security FeaturesThe supplier must provide a security solution which is compliant with KP legislation including Data Protection requirements. The system features must include, but are not limited to:

Final Draft Page 25 of 40

Page 26: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

1. Access, Authorization Management and SecurityThe system must ensure the security of information against unauthorized access and possible tampering. Consistent with security policy, defined functions must be implemented that can operate both at the level of the application and operating system middleware.

The system must: Meet the following minimum security

requirements:• The unambiguous identification and

authentication of users; • The protection of information relating to

each user from others;• Guaranteed access to resources only to

authorized users;• Encryption of information transmitted.

Allow the definition and assignment of different access rights to individual users and groups of users enabling the system to allow selective control access to resources, including through the creation of user profiles. Thus for each user or class of users it can inhibit or deny access to certain features.

Provide for the encryption of sensitive information.

Provide mechanisms to manage the identification, implementation, administration and termination of digital identities of the users that access the system. (Identity Management).

Ensure identity management is integrated

Final Draft Page 26 of 40

Page 27: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

inside the technological platform used to host the systems.

Provide mechanisms for strong authentication: The system must provide functions to

manage audit information (Audit Management):

• Register user activities;• Register change to the

information;• Backup and recovery of audit

information;• Search of audit information.

Register the activities relevant to the security held by each user, so as to ensure their identification. The following minimum information must be stored:

• User• Time• Activities

For all the information changed, the system must store each change event, the author of the amendment and at least the date and time when the change occurred. The records relating to the change events and their perpetrators should be stored with a guarantee of immutability by unauthorized users and lack of appropriate access rights.

2. Must ensure data encryption of the Intelligence reporting database.

3. Must have a hidden flag warning system advising an enquiry relating to sensitive target data (named subject or specific data) linked to the originator.

Final Draft Page 27 of 40

Page 28: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

4. Must provide a mechanism for recording justification of system searches.

5. Must allow for restricting particular activities to particular PC Workstations.

6. Must notify systems administrators in real time when unauthorised access or alterations are attempted.

7. Must provide data backup and archiving mechanisms.

2. Non Functional Requirements 1. Product Requirements

Usability requirements: Must have a unified Common Interface

in terms of desktop client (Windows GUI and Web Client) and mobile phone device;

The concept of user experience and the use of RIA Technologies has to be put in place;

Must have user interface in Albanian, Serbian and English;

Should wherever possible make use of auto-completion;

Should in cases where auto-completion is not possible assist users as much as possible with drop down menus;

Must be case neutral for data entry; Should provide user prompts to

complete forms; Should have mandatory completion of

sequential sections before access permitted to next completion area;

Should offer tips/hints on system usage;

Final Draft Page 28 of 40

Page 29: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

Must, depending upon the detailed requirements, mark certain elements as mandatory and the record cannot be saved until they have been completed;

Must provide the ability to carry out a global search of the system as well as assisting users by suggesting specific search parameters.

Efficiency Requirements Response Time - the solution must

provide acceptable time depending on the capacity of hardware, software and telecom resource;

Space - the solution must provide acceptable spaces to manage users, functions perform by the systems and information managed.

Portability Requirements - Not Applicable; Reliability Requirements (Defect ratio), MTBF

not less than 1,000 etc.

2. Organizational Requirements Delivery requirements: The system must have

the following deliverables: Source Code; Technical Documentation.

The following documents must be delivered: User Manual; Software Requirements

Document; Software Design Document; Software Detailed Design

Document; Test Plan, Test Case, Evidence

of the Test, Test Summary

Final Draft Page 29 of 40

Page 30: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

Report; Software Project Management

Document (Status Meeting, Change Requests etc.);

Software Deployment Plan; Software Installation and

Configuration; Software Build Manual;

The entire documentation must be written in English. The User Manual in Albanian and Serbian language.

3. Implementation Requirements The System must be developed using AGILE Methodologies. SCRUM Methodologies is preferred.

The System must have a dedicated Training Environment.

The System must have a dedicated User Test Environment; The system must have a dedicated

Development Environment.

4. Standards RequirementsThe system must be developed according to SWEBO, PMOK, ITIL, COBIT and relevant IT best practice standards not limited to but include the following standards:

Technical documentation is developed according to ISO/IEC standards for software: ISO/IEC 9003:2004; ISO/IEC 27001:2005; ISO/IEC 25000:2005; ISO/IEC 9126;

Final Draft Page 30 of 40

Page 31: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

ISO/IEC 9241-11; Standards related to Data Format for the

Interchange of Fingerprint, Facial & Other Biometric Information: ANSI/NIST-ITL 1-2007 ; ANSI/NIST-ITL 1-2008; ANSI/NIST-ITL 1a-2009;

PMBOK for Project Management; UML must be used to model the system

and this component (Use Cases, Object Data Model, Deploy View, etc.);

Entity Relationship Diagram must be provided (Visio format or ERWin format).

5. External Requirements Inter-operability requirements: The system

must be capable to operate with major technologies present in the market. The use of COTS solutions must comply with the technical specification and any defects in an intended COTS solution will not be accepted.

Ethical Requirements: Not Applicable. Legislative Requirements in Kosovo.

3. The new infrastructure must be compliant with current technologies platform and have:

High scalability; High availability – 24/7; High reliability; The design of the services should be based onto

a distributed system such as the organization of Kosovo Police (Main HD, Regional Centre). The Supplier will provide the best design according to the availability of wide band network connections.

Final Draft Page 31 of 40

Page 32: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

Furthermore, it must provide the following Services and Functions:

Advanced Active Directory Services; Identity Management Services; Single Sign On Services; Firewall Services; PKI Infrastructure; Unified Communication Services; Workflows Services; Web Services; Search Services; Presentation Services; Reporting Services; Database Management Services; Data Warehouse and Data Mining Services; Virtualization Services; Infrastructure Management Services:

Patch Management; Software Distribution; Auditing and Monitoring; System Management; Hardware and Software Inventory; Antivirus.

4. Database Requirements The different types of information that Kosovo

Police use must be separated in different DBMS. The design of the physical data model must reflect the following partition:

a. Intelligence Information (Case, ILP Reports, Intelligence Information);

b. Operational Information (Incident, etc.);c. Biometric (Fingerprint, DNA, etc.);

Final Draft Page 32 of 40

Page 33: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

d. Multimedia;e. Data Warehouse and Data Mining.

The supplier must provide functions to migrate the old DBMS of Kosovo Police to the new KPIS. The following databases must be migrated:

a. KPIS DB; b. Traffic DB; c. MAP DB.d.

5. System DevelopmentThe tools used to develop this system must be compliant with current technology platforms.

2. Software InstallationInstallation, testing, beta test (piloting) and phased implementation of the software and database management system as specified at 5.2 and 5.3 below.

3. TrainingTraining in the use and management of the system as specified at 5.4 below.

4. Software and Technology SupportApplications software (KPIS) and its related technology must be supported by the supplier, namely by providing Corrective Maintenance. Kosovo Police will send a bug report for each bug reported during the operation of the system.

The Supplier must resolve bugs in accordance with the time-frames contained within the service level agreement. The Software Configuration Management will be under the control of KP IT Directorate. When the bug is resolved (bug corrected, software system is rebuilt, user has formally accepted the resolution) the Supplier must provide a Summary Report that includes the following

Final Draft Page 33 of 40

Page 34: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

ItemNo:

REQUIREMENT OFFER Bidder’s Notes& Comments

EvaluationC’ttee Notes

information: Information originally provided by Kosovo Police; Duration of resolution; Source of defect; List of software code components that have been

changed and the exact nature of amendment.

Final Draft Page 34 of 40

Page 35: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

5 SERVICES REQUIREMENTS

5.1 Introduction

As noted above, this Tender should be regarded by Bidders as a turn-key project, culminating in the hand-over to the Kosovo Police by the selected Contractor of a fully operational system, replacing the current KPIS. Apart from the actual costs of the equipment and software development detailed above, the Tender should also include all associated services costs, including installing, configuring, data migration and functional testing by the technical staff of the Contractor of the equipment and the necessary operating/applications software. They will be assisted in this task by designated technical specialists of the KP Information and Communications Technology Directorate (ICTD) as part of their hands-on training.

The Services required to be provided by the selected Contractor are detailed below.

5.2 Suggested Project Plan

The supplier will provide two teams. One small team (Project Manager, Analyst and Architect (Application and Infrastructure)) will work together with Kosovo Police to define Plans, Software Functions and requirements for the infrastructure. The other Team (Development of the System) will work in the structure of the Supplier.

The project should be organized in five stages:

a) Start-up and Planning;b) Development;c) Beta Test;d) Deploy;e) Operation and Maintenance (warranty).

5.2.1 Start-up and Planning

During this phase the contractor will meet the principal stakeholders in order to:

Develop the user requirements specification; Establish the software development plan according to the requirements and the Agile

Methodology; Create a change management policy to define all changes during all phases of the project; Provide initial training for the IT Directorate staff including; Attend meetings for appropriate project management and systems development

methodologies.

5.2.1.1 Duration, Deliverable and Exit Criteria

1. Suggested duration: 1 month.2. Deliverables:

a. User Requirements Document;b. Software Development Project Plan;c. Change Management Procedure and Templates;d. Minutes of Meetings.

3. Exit Criteria:a. Acceptance of User Requirements Document.

5.2.2 Development

The application will be developed according to the plan prepared during the first phase and the agreed methodology. For each Sprint (duration 1 month) the contractor will provide the technical documentation. The user will accept the deliverables for each Sprint.

Final Draft Page 35 of 40

Page 36: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

The software must be developed using a dedicated Environment that corresponds to the designed solution (Virtual Machines for example). A final internal System Test including integration with other systems has to be put in place before full Beta Testing can commence.

5.2.2.1 Duration, Deliverable and Exit Criteria

1. Suggested duration: 6-9 months.2. Deliverables:

a. Source Code;b. Technical Documentation;c. Project Management Documentation;d. Minutes of Meetings.

3. Exit Criteria:a. Acceptance of Internal System Test and Intermediate Sub-system Component

development during the phase;b. Beta Test Plan accepted;c. The Supplier for the Hardware must install and configure the Hardware and related

Operating Software according to the Beta Test Plan;d. The Supplier for the Hardware must install and configure the system on the installed

Hardware according to the Beta Test Plan.

5.2.3 Beta Test

During this phase the application will be installed and configured onto defined KP sites according to the agreed Beta Test Plan (for example one Regional Centre and a related Police Station). The Kosovo Police will provide at the end of the Development Stage the precise number of sites and the location of each site to be part of the Beta Testing. The number of sites for the test phase will not exceed 10-15 percent of the total sites for the project.

The contractor must provide the following services during this phase:

Train the Trainers; Installation, configuration, testing of hardware and new the system at the defined sites in

Kosovo; Corrective Maintenance as described in the section Operation and Maintenance; Additional Software Development to improve the system or add some functionalities (this to

be no more than 15 percent of the total cost of the software development); A change management process operating in accordance with the Change Management Plan

defined at the Start-Up and Planning of the project; Testing of the interfaces with other systems.

5.2.3.1 Duration, Deliverable and Exit Criteria

1. Suggested duration: 1-2 months.2. Deliverables:

a. Training Plan;b. Training Documentation;c. Technical Documentation (Upgrade in accordance with the Test Plan, Test Cases,

Test Evidence, etc);d. Project Management Documentation;e. Minutes of Meetings;f. Bug Reports as best described in the next section;g. Summary of Bug Reports.

3. Exit Criteria:a. Acceptance of the System.

Final Draft Page 36 of 40

Page 37: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

5.2.4 Deployment

During this phase the contractor will provide the following services:

Evaluation against agreed criteria of initial roll out training by new KP trainers; Installation and configuration of the entire system (all sites); Migration of the existing database to the system; Installation Test of the System; Support during the User Acceptance Test.

5.2.4.1 Duration, Deliverable and Exit Criteria

1. Suggested duration: 1-2 months.2. Deliverables:

a. Technical Documentation;b. Project Management Documentation;c. Minutes of Meetings.

3. Exit Criteriaa. Positive Conclusion of User Acceptance Test with independent Commission.

5.2.5 Operation and Maintenance (concern software only) – Warranty Services

During this phase the Supplier must provide Corrective Maintenance. Kosovo Police for each bug reported during the operation of the system will send a bug report. The bug report will include the following minimum information:

ID Bug; Bug Description; Where found; Time and date; Severity of the Bug and timescale for the resolution (according to quality of service level

agreement):

o Blocker – blocks: 1-2 hours for the resolution;

o Critical - crashes, loss of data: 2-4 hours for the resolution;

o Major - major loss of function: 24 hours for the resolution;

o Minor - minor loss of function or other problem where easy workaround is present: 2-4 days for resolution;

o Trivial - cosmetic problem like misspelled words or misaligned text: Maximum 1 week;

Central Contact Point/Help Desk.

The Supplier must resolve bugs in accordance with the time-frames contained within the service level agreement. The Software Configuration Management will be under the control of KP IT Directorate. When the bug is resolved (bug corrected, software system is rebuilt, and user has formally accepted the resolution) the Supplier must provide a Summary Report that includes the following information:

Information originally provided by Kosovo Police; Duration of resolution; Source of defect; List of software code components that have been changed and the exact nature of

amendment.

5.2.5.1 Duration, Deliverable and Exit Criteria

1. Duration: 12 months.

Final Draft Page 37 of 40

Page 38: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

2. Deliverables:a. Defect Reports.

5.3 Equipment Installation, Commissioning & Implementation

The equipment is to be installed at the following locations:

LOCATION CONFIGURATION

KP HQ Pristina 15 x Item 1, 1 x Item 2, 3 x Item 4, 2 x Item 5, 4 x Item 6

KP RHQ Pristina 7 x Item 1, 1 x Item 3, 1 x Item 4, 2 x Item 6

KP RHQ Gjilan 7 x Item 1, 1 x Item 3, 1 x Item 4, 2 x Item 6

KP RHQ Ferizaj 7 x Item 1, 1 x Item 3, 1 x Item 4, 2 x Item 6

KP RHQ Prizren 7 x Item 1, 1 x Item 3, 1 x Item 4, 2 x Item 6

KP RHQ Pejë 7 x Item 1, 1 x Item 3, 1 x Item 4, 2 x Item 6

KP RHQ Mitrovicë 7 x Item 1, 1 x Item 3, 1 x Item 4, 2 x Item 6

The equipment and operational software specified in Section 4 above should be installed by the selected Contractor and put into full operation.

The following implementation activities should therefore be included in the development of the Contractor's implementation plan in collaboration with the appropriate technical staff of KP ICT Directorate:

Design the new server infrastructure; Design and implement a new structure of Directory Service; Secure users and computer environment using Group Policy; Install and configure servers to support the appropriate end-user services; Configure connection services to:

Support KP user access to the KPS Intranet, Internet (where appropriate) and other designated external network locations;

Control user access to external resources by agreeing and applying appropriate access policies;

Implement Backup and Archiving Solution; Implement the standard KP anti-virus solution and automatic updating services for the

installed KP equipment.

5.4 Training Services

As part of the design and installation process it is required that the Contractor work in partnership with KP ICTD staff to ensure knowledge transfer and further build local capacity for maintaining the system. In particular the Contractor will involve KP ICTD staff when developing administration and users manuals. As part of the final hand over the Contractor will provide KP management with a written assessment confirming that the ICTD staff are competent to assume full responsibility for the system and make appropriate recommendations about further training or support they should receive.

In addition to informal learning through collaborative working the Contractor will also prepare a formal training programme which will identify timing, structure and content of the following training programmes for the new KPIS:

Training of trainers; Initial roll out training for officers; Annual Refresher Training;

Final Draft Page 38 of 40

Page 39: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

Induction Training Module.

In addition to developing the courses listed above the Contractor will be responsible for delivering the training of trainers as well as providing on the job training and support to KP ICTD staff. A general approach to the training is suggested below.

5.4.1 Training Courses

The participants in the training of trainers should be a mixture of the dedicated training staff who are based in the Kosovo Centre for Public Safety Education in Vushtrri and ICTD staff. The participants should include representation from every region to ensure adequate trainers are available outside of Pristina. Training of the other officers will be dependent upon the implementation plan and the ongoing training plan of the KP.

Training Content

The training of trainers should cover:

System use (introduction to all modules, data entry, searches, reporting etc.); Information management procedures (how and when information is captured, used and

shared as part of the business processes); Information security and handling (protective markings, risk assessments, physical control

etc.); Training Methods and Delivery (basic skills and techniques of training including how to

design a course, presentation styles, learning activities and how to assess impact).

Only the first three elements are necessary for the other courses.

Training Style

The training should be delivered in Albanian and Serbian (for the training of trainers it can be in English with a translator) and involve:

Presentations; Discussions; Practical exercises using the system.

The learning of participants should also be evaluated against agreed criteria. When using the system, each participant’s work should be checked before moving on to the next exercise and a final practical exam should be held requiring participants to receive a passing grade before they can complete the training.

It is particularly important that the newly trained trainers are evaluated not just on system knowledge but on training skills. Before completing the training, each participant should have an individual session with trainers to review the training skills and identify strengths and areas for enhancement.

Training Outcome

At the end of the Training of Trainers programme, Kosovo Police will:

Have an adequate number of trainers (20 suggested) to meet current and future training needs;

A plan for the initial delivery of training to officers indicating which trainers will work together and where based upon the evaluation of the participants strengths;

A detailed trainers manual in Albanian, Serbian and English which includes:

Course Programme; Timings of sessions; Slides and other training tools; Presenter’s notes; Evaluation tools.

Final Draft Page 39 of 40

Page 40: 05 TechnicalSpecifications Part1&2

Technical Assistance for preparation of Technical Specifications for the IPA 2010 Support to the Implementation of Intelligence Led Policing

5.4.2 On the Job Training

As noted previously, the Contractor will work closely with KP ICTD staff during the design and implementation phase and provide support and mentoring. As part of the implementation process the Contractor will also sit in on the initial training sessions delivered by the new KP trainers and provide support and feedback on performance. During the first phase of implementation the Contractor will spend 3 days in the offices providing immediate support to officers using the system in an operational environment and thereafter this role will be fulfilled by the KP trainers.

5.5 Documentation Requirements

The Tender should include the provision of all necessary and relevant standard technical documentation for the proposed equipment and operational software in English. However, additional documentation should be produced relating to the installation and hardware/software configuration parameters of the equipment at each location, as carried out by the Contractor’s technical staff. This additional documentation should be provided in English, Albanian and Serbian.

Documentation relating to the new KPIS should include: Functional Requirement Specification; Systems Design Specifications; Relational Database Schemes and Tables as appropriate; Applications Source Code (in hard copy and electronic form); User Manual; Training Manuals; System and Database back-up and recovery procedures.

5.6 Acceptance Criteria

Site Acceptance Test (SAT)

The Site Acceptance Test will be performed after the full installation of all software and hardware at the sites described at point 5.3 above, with all the equipment working in normal conditions (included in Beta Test - see point 5.2.3 above).

System Acceptance Test (SAcT)

The System Acceptance Test will be performed in the main Headquarters Centre and Regional Headquarters after installation of the software of Police Stations computers. During the System Acceptance Test the complete functionality of the system will be validated in accordance with relevant international standards (included in Deployment - see point 5.2.4 above).

5.7 Warranty Services (concern hardware only)

All hardware equipment should be supplied with a Standard manufacturer warranty. Conditions for hardware support and the Contractor’s response to warranty support requests will be the subject of a Service Level Agreement to be established between the KP and the Contractor.

Final Draft Page 40 of 40