Data Centre, Command Control System and Lawful Interception Unit

29
Request for Expression of Interest Towards Data Centre, Command Control System and Lawful Interception Unit Tender No.12.EOI.2011-2012 Dated.01 .03.2011 For Kolkata Police 1

Transcript of Data Centre, Command Control System and Lawful Interception Unit

                   

 

Request for Expression of Interest

Towards

Data Centre, Command Control System and Lawful Interception Unit

Tender No.12.EOI.2011-2012 Dated.01 .03.2011

For

Kolkata Police

1

Request for Expression of Interest (EOI)

Subject : Introduction of Data Centre, Command Control System and Lawful Interception Unit for Kolkata Police Date : 01/03/2011 EOI to : The Commissioner of Police Kolkata Police HQRS 18, Lalbazar Street, Kolkata – 700001 Last Date : 22/03/2011 (Extended Up to 31/03/2011) Document Availability: www.kolkatapolice.gov.in And at Tender Section, Ground floor Kolkata Police Hqrs, Lalbazar, 18, Lalbazar street, Kolkata - 700 001 (Ph:-2250-5048) (Fax:-2214-5512) (E-Mail:- [email protected]) Detailed Project Briefing will be done by Additional Commissioner of Police (III). A maximum of 3 participants from each prospective vendor may attend. Date & Venue will be fixed later. Eligibility of Applicants for EOI: 1. The applicant company should be a company, registered in India under the Indian Companies Act of 1956. 2. The applicant company should either be the original equipment manufacturer / developer (SW) or a subsidiary company of a manufacturer / developer (SW) company or an authorized supplier of the manufacturer / developer (SW) for the equipment, and software (SW) / firmware. 3. If the applicant is authorized supplier of the equipment, then the company shall have to have back-to-back agreement with each of the equipment manufacturer / developer (SW), so that direct support for maintenance, spares and upgrades are available for at least next 5 years. A copy of such agreement signed by the respective authorized signatories of the concerned companies shall be made available to KP along with the EOI. 4. Applicant is permitted to submit a valid ISO certificate (ISO 9001:2000) or equivalent for the manufacturer / developer (SW) in support of this clause. 5. The applicant company shall have or shall agree to set up test and repair centre or faulty parts replacement facility in India. 6. The applicant company should submit Partnership Deed / Articles of Memorandum of Association or Proprietorship Deed and MOU / Collaboration Deed with foreign manufacturer / developer (SW), as the case may be. 7. Certificate of Incorporation (if applicable) should be submitted. 1. Introduction, Purpose & Scope of Work:-

2

Pre-Qualification

Pre-qualification Criteria

(1) Bidder should be a Reputed Indian Company headquartered in India and registered under the Indian Companies Act, 1956. The Bidder should be in operation for the last 5 Years as on 31st March 2011 and involved in successful Design, Development, Installation and implementation of large IT & Communication and System Integration projects. Bidders must furnish the following supporting documents:

i) Certificate of Registration/Memorandum of Understanding

ii) Bidder should have at least one development center in Kolkata with minimum 25 employees on its payroll.

iii) Provide details of at least 1 similar project IT based solution for Government Agency (Private and PSUs not considered) within the last 5 years of value minimum 06 Crores. The solution should include at least one major component (Data Center or, Cyber Lab or Control Center).

(2) Bidder should have annual revenue (turnover) of minimum Rupees 200 Cr. in each of the last 5 financial years.

Out of the total annual revenue, minimum turnover of Rupees 150 Cr. should be from IT Telecommunication, Consulting and Software Services in each of the last 3 financial years. The Bidders must furnish the following supporting documents:

i) Audited annual financial statements for the last 5 financial years ending 2009-10.

ii) A certificate from the statutory auditors of the company stating that the revenues from Telecommunication, IT Consulting and Software Services in each of the last 3 financial years is not less than rupees 150 Cr., should be furnished.

(3) Bidder must be an SEI CMMi Level 3 company for the last 2 years, namely 20008-09 and 2009-10 financial years. The bidder must submit documentary evidence in support of their claim.

(4) Bidder must be an ISO 27001 certified company for the last 2 years namely 2008-09 and 2009-10 financial years. The bidder must submit documentary evidence in support of their claim.

(5) Bidder should not be in the list of ineligible/ blacklisted for corrupt and fraudulent practices, issued by Government of India, State Governments, PSU or international agencies like World Bank /ADB/DFID/UNDP and other UN agencies in last 7 years. Bidder shall submit a self declaration for not under any ineligibility for corrupt or fraudulent practices by any of its clients/Government agencies. (6) The bidder should be a profit making company for last 5 years. (7) Bidder needs to submit the Income Tax and Service Tax Certificate for the last financial year.

3

Solution Components Requirements: 1. Data Centre:

The purpose for maintaining the Kolkata Police Crime Data Center system is to provide a computerized database for ready access by a law enforcement agency. System will be available to local law enforcement and other stakeholders and will be operational 24 hours a day, 365 days a year. The Crime Data Center will be a computerized index of information pertaining to criminal record history information, absconding criminals, stolen assets, missing persons, accused persons in judicial custody or on court bail and other fields. It will be dynamic in nature with provision of expansion or deletion as and when required. To provide solution to make an enquiry and for prompt disclosure of information to assist authorized agencies in law enforcement objectives. , such as apprehending absconding criminals, locating missing persons, locating and returning stolen assets, as well as in the protection of the law enforcement officers encountering the individuals described in the system.

2. Command &Control System: The system is a mission-critical system that provides highly responsive and resilient communications capabilities to meet increasing safety and security needs. It supports an integrated command and control environment that includes radio, telephone, incident handling and resources dispatching functions, and caters for external interfaces to computer systems in other Government Departments.

There can be five major independent sub systems in the C&C System • The Integrated Radio Communication System. • Emergency Telephone Response System. • Automatic Vehicle Location System and Geographic Information System. • The Mobile Computing and Messaging System. • The Computer Assisted Command and Control System.

COMMAND & CONTROL CENTER REQUIREMENTS

1. Advanced video security solutions enabling real-time like terra or digital glob from where Google also get the pictures, rich media collaboration, dramatically enhance situational awareness.

2. Capability to enhance safety with access to real-time and accurate data regarding

people, places and property in an hostage situation.

3. Users must be able to communicate with anyone logged into a centralized template based texting system controlled through the CCC. Users can read, respond to, or save messages for review at a later time.

4. Tracking in real time of every user movement through GPS positioning and integrating with the video security solution and voice based communication between the user and the CCC using the existing Tetra system of Kolkata Police.

4

5. GPS or other technology based tracking should reflect the exact position of the user operating inside/outside/vicinity of the existing 3D modeling of all vital installations to be executed by TerraExplorer Pro.

6. Geo-fencing (with deviation alerts) of operational area and subsequent marking of safe-zone for user movements in the field of operation.

7. Anti-jammer and jammer detection and recovery capability for all voice

communication between users themselves and also between users and CCC.

8. Inhouse infrastructure with video walls capable of broadcasting PIP-in TV news channels, projector integration and other required and relevant hardwares and softwares. 3. Lawful Interception Unit including Command Centre:- General Specifications In West Bengal Telecom Circle we have the following Telecom Operators:- Vodafone, AirTel, Aircell, BSNL, MTS, Reliance GSM, Reliance CDMA, Tata, Idea, Uninor, Videocon. Some of these operators have separate switches for Kolkata and rest of Bengal. Ability to bring all kind of intercepted communication (see technical details) through the networks of these operators to be brought to Command Centre. A Command Centre where these intercepted communication can be stored, analyzed and acted upon. Civil works of command Centre including the furniture etc is included in the tender. Financial Bids may be given operator wise, so that if required, project can be divided into phases with few operators being covered in first phase and rest in subsequent phases. Technical Specifications:-

• Web based interface with SSL data security. • Mediation server to be equipped with the X-1,2,3 interface connectivity and ETSI HI-

1,2,3 interfaces for connectivity with the monitoring centre. • Capable of intercepting following Data:-Voice(TDM and VOIP), SMS, FAX, IP

protocols:-SMTP/POP3/HTTP/FTP/TELNET/VOIP/3G Video Calls. • Capable of intercepting following Network:-GSM(2G & 3G), CDMA, PSTN, GPRS,

EDGE, Mobile Telephony Internet. Features of Interception & meditation circuit switched networks:-

• Supported tap interfaces Analogue E-1/T-1 (PRI/SS7/CAS). • TE and non intrusive high impedance interfaces.

5

• ETSI, CALEA, and country specific HI-1,2,3 interfaces. Features of Interception & Meditation Packet Switched Networks:-

• Supported tap interfaces. • Ethernet 100 MBPS, 1GBPS, and 10 GBPS POS STM 16/64. • ATM. • GPRS. • UMTS. • TIIT AND ETSI HI-1,2,3 interfaces. • Non intrusive high impedance interfaces.

Features of Monitoring Centre:-

• 30 Channels per service provider. • SS7/ISDN connectivity. • Target on A-Number, IMSI, IMEI, MSISDN, IP address or E-Mail address. • Voice, Fax and SMS decoding. • HTTP, POP3, SMTP, Radius and DHCP decoding. • Real time listening in. • Live notification for specific targets. • External diversion of intercepted calls. • Conferencing option. • Target location presentation. • Facility to display movements of a target dynamically on a map system, even if no

calls are being made. • Facility to access Data and voice over secured network from multiple locations. • Facility to conduct conference call among users and listen to the tapped call at the

time. Features of Tap Provisioning:-

• Simultaneous support for up to 256 interception devices. • Multi switch & multi vendor support. • Extensive system monitoring. • Secure encrypted tap provisioning Analogue E-1/T-1 (PRI/ SS7/ CAS). • Tap Management Provisioning software that offers centralised tap management,

through which telecom and IP switches can be programmed from anywhere. 4. STF Control Room/Command Centre /Mobile Command Centre (With Fax, Wireless, Internet connectivity, Projector, DVD player etc.) Overview STF Control Room & command system that integrates multiple terminals and means of communication providing services such as emergency-report handling, GIS-based automatic locating, automatic alarm allocation, sending of command and dispatch schemes, and

6

information feedback. It helps to coordinate governmental functional departments such as police, fire-fighting, transportation, and emergency rescue Operate and monitor communications, detection, and weapons systems essential for controlling operations. Duties include maintaining and relaying critical communications among the ground forces; implementing emergency plans for natural and wartime disasters; relaying command centre information to high-level Police, Military and government decision makers; monitoring surveillance and detection systems. Interpreting and evaluating tactical situations and making recommendations to superiors. Brief Description Command and Control System supports an integrated command and control environment that includes radio, telephone; incident handling and resources dispatch functions, and caters for external interfaces with computer systems in other Government Departments. Vision Objectives and Goals Command and Control System provides highly responsive and resilient communications capabilities to meet increasing safety and security needs. It is also capable of providing a common radio communication platform for other government departments in the public safety domain. Transferability Command and Control System provides a platform for sustainable development of a unified Digital Communications Platform (UDCP) among all the emergency services and other law enforcement agencies and to build up open standard that allows an incremental approach to future system enhancement for public safety. During emergency situations, the system program can be re-called to facilitate intercommunication between various agencies centralizing command to optimize control and deployment of resources. The coordination and communication among all the emergency services is always a subject of concern in major incidents or disasters. Using the same platform enhances interoperability between emergency services and law enforcement agencies and improves the effectiveness and efficiency during emergency and disaster operations. Project Summary The operational strategy is to provide the best police service possible by maintaining police presence and responding promptly and effectively to incidents. Command and Control Centre is a mission-critical system that provides highly responsive and resilient communications capabilities to meet increasing safety and security needs. It supports an integrated command and control environment that includes radio, telephone, incident handling and resources dispatching functions, and caters for external interfaces to computer systems in other Governments. There are five major independent sub systems in a command centre

• The integrated Radio Communication System. • Emergency Telephone System. • Automatic Vehicle Location System and Geographic Information system. • The Mobile Computing and Messaging System. • The Computer Assisted Command and Control System.

7

PLAN Kolkata Police which is operating the Police Radio operations is planning to unify various Land Mobile Radio (LMR) Channels & Frequencies using IP as the platform. The plan may be described as below: • Initially a Pilot project shall be implemented at Kolkata. • In Kolkata there are different divisions and departments of Kolkata Police (KP). • The Pilot will unify the LMR frequencies of all the divisions. • A Robust, Scalable & Cost effective IP Network needs to be set up using various available Wired & Wireless techniques. • Other forms of Communication like Analog Telephony can be integrated with the LMR system. • IP Telephony can be introduced which will also get converged in the new Unified System. • On success of the Pilot at Kolkata the project will be extended to other Districts & Towns in the entire State. • The State-wide rollout may also be taken up in phases. CURRENT SCENERIOThere are Several Divisions of KP including various department. • Each of the said divisions work on different Radio Frequencies for the LMR communication. • LMR handsets of various makes & models are in operation, they are: – Kenwood - Model TK-270G & TK-760G. – Vortex - Model VX-42A & VX-4204 – Motorola - Model GM-300 & GP-300 • Each of the Makes & Models of LMR are used by each of the departments in a mix & match format. • There may be an EPABX at the HQ and may be the specifications are as follows: – 208 no. of Extensions with 32 Trunk Line. – The system is upgradable to 2000 extensions. – There are 53 users (both direct line & EPABX extensions) who can make PSTN calls. – Rest of the 127 users can make calls within the office. REASON FOR CONVERGENCEAs on date each division of KP operates their Radio LMR operations within their respective frequencies. • Various forms of available communication systems like PSTN, EPABX system, LMR, Mobile Phones (GSM) etc. mostly work in silos. • There are divisions of KP where the only form of available communication is GSM Mobile Phones. • Now with various Financial restrictions on allocation of mobile phones to all users, even interoffice or intra-office communication becomes a challenge. • So thought has been put, to develop a way of communication where internal communication within the various arms of KP can be done without incurring any recurring cost. • This will reduce the OPEX for internal communication to almost Nil. • A communication system based on Internet Protocol (IP) will deliver multi-play of Voice, Video, Data & Mobility apart from reducing OPEX. • Another aspect of this communication unification is that there will be a revolutionary change in the way the existing LMR system operates. • The new system is capable of unifying the Radio frequencies of various divisions into a single. This system will enable to initiate PTT (Push-to-Talk) communication between IP Phones/Analog Phones/PCs/Mobile Phones and LMR devices.

8

• This will increase the flexibility of the entire communication system enabling KP to handle crisis situation like Riots, Public disruptions, natural calamities etc. much more efficiently. • Also with this system the superior officers can be in direct touch with grass roots in any situation and irrespective of the location they are in or multiple voice groups. CONVERGENCE PROCESS1. Setup an Internet Protocol (IP) based Secure WAN & LAN network using both Wired and Wireless technologies. 2. The WAN network will connect the divisions and departments of KP. 3. The LAN network will provide connectivity within each of the offices. 4. Implement Unified Communication (UC) system for an effective collaboration of technologies. 5. Setup the IP Interoperability and Collaboration System (IPICS).

• WAN Network 1. The main components of the WAN network are: i) Routers with Data Encryption capability. ii) Leased Line or Ethernet from Service Provider. iii) Wireless Radio Bridged Network to provide WAN Redundancy. 2. The WAN topology may be Star or Ring or a combination, whichever is found feasible. 3. Each site will have a Router to terminate the Wired or Wireless WAN links. 4. There are two possible options for having the Wired WAN links and any one may be chosen based on the history for Reliability: i) Connect the Router to the Fibre network of the Service Provider. (or) ii) Connect the Router to the Leased Line from the Service Provider. 5. The Wireless Bridge connectivity will also terminate on the same Router.

• LAN Network 1. The main components of the LAN network are: i) Ethernet Switches to provide Layer 2/3 connectivity to PCs /Laptops. ii) Category 6 (Cat 6) cables for wired physical connectivity. iii) Wi-Fi Wireless LAN to connect Wi-Fi based end points like Wi-Fi based IP Phones / GSM Phones / Laptops / PDAs. 2. LAN cabling will be done for KP HQ and each of the Divisional Head Quarters (Div. HQ) buildings. 3. Ethernet Switches will provide connectivity to all the connected Devices (PCs / Printers / Cameras / Router) 4. Wi-Fi network will be implemented to complement the Wired LAN and to provide mobility.

• IP Telephony 1. IP Telephony is one of the most important component of this convergence setup. 2. The main components of UC network are: i) IP Telephony Server (IP EPABX) ii) IP Phones (Hard Phones, Soft Phones & Wi-Fi IP Phones) iii) Telephony Gateway – Voice Gateway 3. A redundant IP EPABX shall be installed at the KP HQ. 4. IP Phones will be spread throughout the KP IP Network. 5. Telephony Gateway will also be placed at the KP HQ to terminate the PSTN network. 6. This integration will enable communication between the IP Telephony & existing PSTN network.

9

• Advantages of Unified Communication

1. The IP EPABX can be implemented in a single location which can serve many locations that may be spread across the state. 2. Redundant IP EPABX can be there in the Main Location or anywhere in the IP Network. 3. PSTN lines can be deployed at the Central location. 4. This will make PSTN facility available to those locations where Service Provider network do not reach. 5. IP Phones can double up as PTT devices.

• CONVERGENCE PROCESS

IP Interoperability and Collaboration System - IPICS 1. The components of IPICS are: i) Cisco IPICS Server ii) Cisco IP Phone Client iii) Cisco IPICS Policy Engine. iv) Land Mobile Radio Gateway (LMR). V) Router Media Services. vi) Push to Talk Management Centre. (PMC) Cost of the Expression of Interest Document: - Rupees 5000/-(Five Thousand Only).

10

KOLKATA POLICE

SPECIAL TASK FORCE

DATA CENTRE

Special Task Force of Kolkata Police has been formed to prevent, detect and control heinous crime ; especially it deals terrorism, ultra-extremist activities and cross border crimes i.e Fake Indian Currency Notes, Drugs and Arms Trafficking. In these aspects huge volume of Information in different formats are gathered for detecting and preventing crimes and also stored for future reference. At the eleventh moment or at short notice data may be required; manually it is impossible to retrieve. A huge quantity of information or data in different formats (text, video, audio, picture etc) is required for systematic and safe storing in computer; hence Kolkata Task Force has set up a primary Data Centre.

At Present Data Centre consists of a Windows based server having 2008 server edition operating system, 4GB RAM, 5 TB Hard Disk without UPS, Rack, LAN and anti virus updating system. There is only one data-feeding node without LAN facilities. Any database system is not installed in server; all type of data is saved as flat file system. Internet sleuthhound- a LAN search engine is loaded at the user node for retrieving data, which is now inactive due to unavailability of LAN. It may be mentioned here that Intranet sleuthhound does not support searching of scan documents, audio & video files.

Hardware- UPS, Rack, LAN and upgradeable anti-virus system are required along with alternative server back up and also at least two nodes, which will feed the data in the server through LAN. Software – Linux Operating system is required instead of Windows based server for security purpose. New applications software will be required if data is stored in database system.

In near future a complete will ensure the following facilities to the users: Ease of data accesses, sharing data with each other without manual barrier, easy retrieval of data, systemic data storage in server, less probability of damage or change after saving the data, availability of data, time consuming and man power saving, which will enrich the police force.

11

Scope of Work:

Kolkata Police Crime Datacenter (KPCD) KPCD will be a computerized index of information pertaining to criminal record history information, absconding criminals, stolen assets, missing persons, accused persons in judicial custody or on court bail and other fields. It will be dynamic in nature with provision of expansion or deletion as and when required. It will be available to local law enforcement and other stakeholders and will be operational 24 hours a day, 365 days a year.

PURPOSE: The purpose for maintaining the KPCD system will be to provide a computerized database for ready access by a law enforcement agency making an enquiry and for prompt disclosure of information in the system from other agencies about crimes and criminals. This information assists authorized agencies in law enforcement objectives, such as apprehending absconding criminals, locating missing persons, locating and returning stolen assets, as well as in the protection of the law enforcement officers encountering the individuals described in the system.

ACCESS CONSTRAINTS: All records in KPCD are protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These safeguards include restricting access to those with a need to know to perform their official duties, and using locks, alarm devices, passwords, and/or encrypting data communications.

USE CONSTRAINTS: Users of the KPCD system will be restricted to only those privileges necessary to perform an authorized task(s).

AGENCY PROGRAM: Kolkata Police will be authorized to acquire, collect, classify and preserve identification, criminal identification, crime, and other records and to exchange such information with authorized entities.

SOURCES OF DATA: Data contained in KPCD will be provided by the law enforcement agencies and other government stakeholders.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:

A. Wanted Persons: 1. Individuals for whom court warrants are pending, i.e. "warrantee". 2. Individuals who have committed or have been identified with an offence. 3. Juveniles who have been adjudicated delinquent and who have escaped or absconded

from custody.. 4. Individuals who have committed or have been identified with an offence committed in a

foreign country, which would be a crime if committed in India, and for whom a warrant of arrest is pending and for which act an extradition treaty exists between India and that country.

12

B. Individuals who have been charged with serious and/or significant offences: 1. Individuals who have been fingerprinted and whose criminal history record information

has been obtained. 2. Violent Crimes: Persons with three or more convictions for a violent crime or serious

drug offence. C. Missing Persons:

1. A person of any age who is missing and who is under proven physical/mental disability or is senile, thereby subjecting that person or others to personal and immediate danger.

2. A person of any age who is missing under circumstances indicating that the disappearance was not voluntary.

3. A person of any age who is missing under circumstances indicating that that person's physical safety may be in danger.

4. A person of any age who is missing after a catastrophe. 5. A person who is missing and does not meet any of the entry criteria set forth in 1-4

above. D. Organizations or Individuals/Members of organizations banned in India. E. Members of Violent Criminal Gangs: Individuals about whom investigation has

developed sufficient information to establish membership in a particular violent criminal gang.

F. Members of Terrorist Organizations: Individuals about whom investigations has

developed sufficient information to establish membership in a particular terrorist organization using the same criteria above as they apply to members of terrorist organizations.

G. Unidentified Persons: 1. Any unidentified deceased person. 2. Any person who is living and unable to ascertain the person's identity (e.g., infant,

amnesia victim). 3. Any unidentified catastrophe victim. 4. Body parts when a body has been dismembered.

CATEGORIES OF RECORDS IN THE SYSTEM:

A. Stolen Vehicles Record: 1. stolen vehicles. 2. Vehicles wanted in conjunction with any

crime or serious event. 3. Stolen vehicle parts including certificates of origin or ownership.

B. Stolen Gun Record: 1. stolen guns. 2. Recovered guns, when ownership of which has not

been established. C. Stolen Article Record.

13

D. Wanted Person Record: Described in "CATEGORIES OF INDIVIDUALS COVERED

BY THE SYSTEM. A. Wanted Persons, 1-4." E. Foreign Absconder Record: Identification data regarding persons who are absconding

from foreign countries, who are described in "CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: A. Wanted Persons 4."

F. Identification records regarding persons who have been charged with serious and/or

significant offences: Described in "CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: B."

G. Missing Person File: Described in "CATEGORIES OF INDIVIDUALS COVERED BY

THE SYSTEM: C. Missing Persons." H. Organizations or Individuals/Members of organizations banned in India: Described in

"CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: D." I. Terrorist File: A cooperative program for the exchange of information about terrorist

organizations and individuals described in "CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: F. Members of Terrorist Organizations."

J. Unidentified Person File: Described in "CATEGORIES OF INDIVIDUALS COVERED

BY THE SYSTEM: G. Unidentified Persons."

K. Mobile user database File: Of all licensed mobile service providers of whole India. L. Electoral Photo ID Card File: provision for whole India data. M. UID database File: provision for whole India data. N. Passport Database File: provision for whole India data. O. All vehicle Owner's Database File (with mobile number): provision for whole India data. P. Ration card holder's database File: provision for whole India data. Q. PAN card database File: provision for whole India data.

Purpose(s): The purpose for maintaining the KPCD system of record will be to provide a computerized data base for ready access by a law enforcement agency making an enquiry and for prompt disclosure of information in the system from other agencies about crimes and criminals (cloud access option should be incorporated). This information will assist authorized agencies in apprehending absconded criminals, locating missing persons, locating and returning stolen assets, as well as in the protection of the law enforcement officers encountering the individuals described in the system.

14

Routine uses of records maintained in the system, including categories of users and the purposes of such uses: Data in KPCD files will be exchanged with and for the official use of authorized stakeholders. The data will be exchanged through existing KPCD network (dynamic).

System Maintenance Policies

Storage: Information maintained in the KPCD system will be stored electronically for use in a computer environment.

Retrievability: On line access to data in KPCD will be achieved by using the following search descriptors:

A. Stolen Vehicle File: 1. Vehicle identification number; 2. Owner applied number; 3. License plate number; 4. KPCD number (unique number assigned by KPCD computer to each KPCD record.) B. Stolen Gun File: 1. Serial number of gun; 2. KPCD number. C. Stolen Article File: 1. Serial number of article; 2. Owner applied number; 3. KPCD number. D. Wanted Person File: 1. Name and one of the following numerical identifiers: a. Date of birth; b. PAN/UID number; c. Operator's license number (driver's number); d. Miscellaneous unique identifying number; e. Originating agency case number; 2. Vehicle or license plate known to be in the possession of the wanted person; 3. KPCD number. E. Foreign Absconder File: See D, above. F. Missing Person File: See D, above, plus the age, sex, race, and descriptive role of the missing person. G. Intelligence Report File: See D, above. H. Violent Criminal Gang File: See D, above. I. Terrorist File: See D, above. J. Unidentified Person File: the age, sex, race, height and weight, eye and hair colour of the unidentified person.

K. Mobile user database File: Of all licensed mobile service providers of all states.

15

L. Passport Database File: provision for whole India. M. All vehicle Owner's Database File (with mobile number): provision for whole of India. N. Ration card holder's database File: provision for whole of India. O. PAN card database File: provision for whole of India. P. UID database File: provision for whole of India (when implemented). Q. Electoral Photo ID Card File: provision for whole of India. N.B.: From K to Q above, provision for Application Program Interface (API)to access those data

from other concerned stakeholders via valid authenticity check.

Safeguards: Data that will be stored in the KPCD will be a documented confidential information and access to that data will be restricted to only government stakeholders through valid governmental process. The following security measures are the minimum to be adopted by all having access to the KPCD.

1. Computer Centre. (a). The KPCD computer site must have adequate physical security to protect against any unauthorized personnel gaining access to the computer equipment or to any of the stored data. (b). since personnel at these computer centres can have access to data stored in the system, they must be screened thoroughly under the authority and supervision of an KPCD control terminal agency (This authority and supervision may be delegated as deemed fit and proper). This screening will also apply to other maintenance or technical personnel. (c). All visitors to these computer centres must be accompanied by staff personnel at all times. (d). Computers having access to the KPCD must have the proper computer instructions written and other built-in controls to prevent criminal history data from being accessible to any terminals other than authorized terminals. e. Computers having access to the KPCD must maintain a record of all transactions against the criminal history file in the same manner the KPCD computer logs all transactions. The KPCD identifies each specific agency entering or receiving information and maintains a record of those transactions. This transaction record must be monitored and reviewed on a regular basis to detect any possible misuse of criminal history data. (f). Each State Control terminal shall build its data system around a central computer, through which each enquiry must pass for screening and verification. The configuration and operation of the centre shall provide for the integrity of the data base. 2. Communications: (a). Lines/channels being used to transmit criminal history information must be dedicated solely to Kolkata Police, i.e., there must be no terminals belonging to agencies outside Kolkata Police sharing these lines/channels. (b). Physical security of the lines/channels must be protected to guard against clandestine devices being utilized to intercept or inject system traffic. 3. Terminal Devices Having Access to KPCD: (a). All units having terminals on this system must be required to physically place these terminals in secure locations within the authorized agency. (b). The units having terminals with access to criminal history must screen terminal operators and restrict access to the terminal to a minimum number of authorized employees. (c). Copies of criminal history data obtained from terminal devices must be afforded security to prevent any unauthorized access to or use of the data. (d). All remote terminals will

16

maintain a manual or automated log of computerized criminal history enquiries with notations of individuals making requests for records for a minimum of one year. Retention and disposal: Unless otherwise removed, records will be retained in files as follows: A. Vehicle File: a. Unrecovered stolen vehicle records which do not contain vehicle identification number

therein, will be purged from file 14 years after date of entry. Unrecovered stolen vehicle records which contain vehicle identification number will remain in file for the year of entry plus 14. b. Unrecovered vehicles wanted in conjunction with a crime will remain in file for 14 years after entry. In the event a longer retention period is desired, the vehicle must be re-entered. c. Unrecovered stolen plates, certificates of origin or title, and serially numbered stolen vehicle engines or transmissions will remain in file for the year of entry plus 14. B. Gun file: a. Unrecovered weapons will be retained in file for an indefinite period until action is taken by the originating agency to clear the record. b. Weapons entered in file as "recovered" weapons will remain in file for the balance of the year entered plus 10. C. Article File: Unrecovered stolen articles will be retained for the balance of the year entered plus 10 years. D. Wanted Person File: Person not located will remain in file indefinitely until action is taken by the originating agency to clear the record. E. Foreign Absconder File: Person not located will remain in file indefinitely until action is taken by the originating agency to clear the record. F. Violent Crime File: Will remain in file until action is taken by the concerned authority to clear or cancel the records. G. Missing Persons File: Will remain in the file until the individual is located or action is taken by the originating agency to clear the Record. H. Intelligence Report File: Will be retained until names are removed by concerned competent authority. I. Violent Criminal Gang File: Records will be retained indefinitely. J. Terrorist File: Records will be retained indefinitely. K. Unidentified Person File: Will be retained for the remainder of the year of entry plus 10.

17

Record access procedures: The procedure by which computerized criminal history record information about an individual may be obtained by an individual are as follows: If an individual has a criminal record supported by fingerprints and that record has been entered in the KPCD file, criminal history record information, it will be available to that individual for review, upon presentation of appropriate identification and in accordance with applicable statutory regulations. Appropriate identification includes being fingerprinted for the purpose of ensuring that the individual is who the individual purports to be. The record on file will then be verified through comparison of fingerprints. Procedure: 1. All requests for review must be made by the subject of the record through Kolkata Police. That agency within statutory or regulatory limits can require additional identification to assist in securing a positive identification. 2. If the cooperative law enforcement agency can make an identification with fingerprints previously taken which are on file locally it can make an on-line inquiry of KPCD to obtain the record on-line or, if it does not have suitable equipment to obtain an on-line response, obtain the record by mail. The individual will then be afforded the opportunity to see that record. 3. Should the cooperating law enforcement agency not have the individual's fingerprints on file locally, it will be necessary for that agency to relate the prints to an existing record by having the identification prints compared with those already on file.

The Expression of Interest (EOI) is sought for the above mentioned Scope Of Work - it's feasibility, detailed technical specifications along with required hardware and software’s, infrastructural necessities and other miscellaneous requirements should be mentioned in the EOI.

18

System Maintenance Policies

Storage: Information maintained in the KPCD system will be stored electronically for use in a computer environment.

Retrievability: On line access to data in KPCD will be achieved by using the following search descriptors:

A. Stolen Vehicle File: 1. Vehicle identification number; 2. Owner applied number; 3. License plate number; 4. KPCD number (unique number assigned by KPCD computer to each KPCD record.) B. Stolen Gun File: 1. Serial number of gun; 2. KPCD number. C. Stolen Article File: 1. Serial number of article; 2. Owner applied number; 3. KPCD number. D. Wanted Person File: 1. Name and one of the following numerical identifiers: a. Date of birth; b. PAN/UID number; c. Operator's license number (driver's number); d. Miscellaneous unique identifying number; e. Originating agency case number; 2. Vehicle or license plate known to be in the possession of the Wanted person; 3. KPCD number. E. Foreign Absconder File: See D, above. F. Missing Person File: See D, above, plus the age, sex, race, and descriptive role of the missing person. G. Intelligence Report File: See D, above. H. Violent Criminal Gang File: See D, above. I. Terrorist File: See D, above. J. Unidentified Person File: the age, sex, race, height and weight, eye and hair colour of the unidentified person.

K. Mobile user database File: Of all licensed mobile service providers of all states. L. Passport Database File: provision for whole India. M. All vehicle Owner's Database File (with mobile number): provision for whole of India. N. Ration card holder's database File: provision for whole of India.

19

O. PAN card database File: provision for whole of India. P. UID database File: provision for whole of India (when implemented). Q. Electoral Photo ID Card File: provision for whole of India. N.B.: From K to Q above, provision for Application Program Interface (API)to access those data

from other concerned stakeholders via valid authenticity check.

Safeguards: Data that will be stored in the KPCD will be documented confidential information and access to that data will be restricted to only government stakeholders through valid governmental process. The following security measures are the minimum to be adopted by all having access to the KPCD.

1. Computer Centre. (a). The KPCD computer site must have adequate physical security to protect against any unauthorized personnel gaining access to the computer equipment or to any of the stored data. (b). since personnel at these computer centres can have access to data stored in the system, they must be screened thoroughly under the authority and supervision of an KPCD control terminal agency (This authority and supervision may be delegated as deemed fit and proper). This screening will also apply to other maintenance or technical personnel. (c). All visitors to these computer centres must be accompanied by staff personnel at all times. (d). Computers having access to the KPCD must have the proper computer instructions written and other built-in controls to prevent criminal history data from being accessible to any terminals other than authorized terminals. e. Computers having access to the KPCD must maintain a record of all transactions against the criminal history file in the same manner the KPCD computer logs all transactions. The KPCD identifies each specific agency entering or receiving information and maintains a record of those transactions. This transaction record must be monitored and reviewed on a regular basis to detect any possible misuse of criminal history data. (f). Each State Control terminal shall build its data system around a central computer, through which each enquiry must pass for screening and verification. The configuration and operation of the centre shall provide for the integrity of the data base. 2. Communications: (a). Lines/channels being used to transmit criminal history information must be dedicated solely to Kolkata Police, i.e., there must be no terminals belonging to agencies outside Kolkata Police sharing these lines/channels. (b). Physical security of the lines/channels must be protected to guard against clandestine devices being utilized to intercept or inject system traffic. 3. Terminal Devices Having Access to KPCD: (a). All units having terminals on this system must be required to physically place these terminals in secure locations within the authorized agency. (b). The units having terminals with access to criminal history must screen terminal operators and restrict access to the terminal to a minimum number of authorized employees. (c). Copies of criminal history data obtained from terminal devices must be afforded security to prevent any unauthorized access to or use of the data. (d). All remote terminals will maintain a manual or automated log of computerized criminal history enquiries with notations of individuals making requests for records for a minimum of one year.

20

Retention and disposal: Unless otherwise removed, records will be retained in files as follows: A. Vehicle File: a. Unrecovered stolen vehicle records which do not contain vehicle identification number

therein, will be purged from file 14 years after date of entry. Unrecovered stolen vehicle records which contain vehicle identification number will remain in file for the year of entry plus 14. b. Unrecovered vehicles wanted in conjunction with a crime will remain in file for 14 years after entry. In the event a longer retention period is desired, the vehicle must be re-entered. c. Unrecovered stolen plates, certificates of origin or title, and serially numbered stolen vehicle engines or transmissions will remain in file for the year of entry plus 14. B. Gun file: a. Unrecovered weapons will be retained in file for an indefinite period until action is taken by the originating agency to clear the record. b. Weapons entered in file as "recovered" weapons will remain in file for the balance of the year entered plus 10. C. Article File: Unrecovered stolen articles will be retained for the balance of the year entered plus 10 years. D. Wanted Person File: Person not located will remain in file indefinitely until action is taken by the originating agency to clear the record. E. Foreign Absconder File: Person not located will remain in file indefinitely until action is taken by the originating agency to clear the record. F. Violent Crime File: Will remain in file until action is taken by the concerned authority to clear or cancel the records. G. Missing Persons File: Will remain in the file until the individual is located or action is taken by the originating agency to clear the record. H. Intelligence Report File: Will be retained until names are removed by concerned competent authority. I. Violent Criminal Gang File: Records will be retained indefinitely. J. Terrorist File: Records will be retained indefinitely. K. Unidentified Person File: Will be retained for the remainder of the year of entry plus 10.

21

Record access procedures: The procedure by which computerized criminal history record information about an individual may be obtained by an individual are as follows: If an individual has a criminal record supported by fingerprints and that record has been entered in the KPCD file, criminal history record information, it will be available to that individual for review, upon presentation of appropriate identification and in accordance with applicable statutory regulations. Appropriate identification includes being fingerprinted for the purpose of ensuring that the individual is who the individual purports to be. The record on file will then be verified through comparison of fingerprints. Procedure: 1. All requests for review must be made by the subject of the record through Kolkata Police. That agency within statutory or regulatory limits can require additional identification to assist in securing a positive identification. 2. If the cooperative law enforcement agency can make an identification with fingerprints previously taken which are on file locally it can make an on-line inquiry of KPCD to obtain the record on-line or, if it does not have suitable equipment to obtain an on-line response, obtain the record by mail. The individual will then be afforded the opportunity to see that record. 3. Should the cooperating law enforcement agency not have the individual's fingerprints on file locally, it will be necessary for that agency to relate the prints to an existing record by having the identification prints compared with those already on file. The Expression of Interest (EOI) is sought for the above mentioned Scope Of Work - it's feasibility, detailed technical specifications along with required hardwares and softwares, infrastructural necessities and other miscellaneous requirements should be men

The Bidder must submit the documentary proof as per pre qualification criteria and the followings components of the solution: • The Outlines of the solution offering of Project.

• The Implementation Plan.

• Installation, Testing and Commissioning of the equipment, Warranty and support plan

• The Operation and Maintenance plan with training arrangements for the systems.

3. Guidelines: 3.1. Respondent’s proposal must respond to each and every requirement outlined in this EOI in order to be considered responsive. Proposals must be clear and concise, mentioning international standards, technology with possible upgradeability and extendibility, and also should mention proprietary technology (if any) in the product and in its interfaces.

22

3.2. Respondents submitting EOI, not crossing the last date of submission, may be afforded an opportunity for discussion and revision. 3.3. The EOI must contain detailed description of how the Respondent will provide each of the services outlined in the EOI with international standard interfaces with other components, and interoperability with different standards (if any). This may also include descriptions of any enhancements or additional services or qualifications the Respondent may provide that are not mentioned in the EOI. 3.4. Two hard copies of the EOI shall be submitted in a sealed package clearly marked with the name of the Respondent mentioning the “subject”. One of the copies shall be marked "Master Copy" and will contain original signatures. The remaining copy does not require original signatures. One Soft Copy in non-refundable CD shall also be submitted, along with presentation material, and supporting soft copy of brochure mentioning technological standards of the product and interfaces. All soft copy must be in portable document format (pdf). 3.5. The Kolkata Police will not be responsible for any expenses incurred by the Respondent(s) in preparing and submitting the EOI. 3.6. The Kolkata Police reserves the right to withdraw this Expression of Interest, to reject any proposals, to waive minor irregularities in proposals or to allow the Respondent(s)t to correct a minor irregularity if the best interest of Kolkata Police is served by doing so. 4. Expression of Interest: Introduction of Data Centre, Command Control System and

Lawful Interception Unit. 4.1 Introduction:

The Kolkata Police seeks Expression of Interest for the introduction of Data Centre, Command Control System and Lawful Interception Unit on a turnkey basis. 4.2. Scope of Service: i) Site plan and equipment layout plan for the Data Centre, Command Control System and Lawful Interception Unit. shall be prepared by contractor including power supply equipment. The layout plan shall show interconnecting cable routes between various equipments. ii) Installation shall be as standard procedure approved by Purchaser. iii) The successful bidder shall test each electronic equipment after installation and prepare a test report. This shall be compared with the factory test reports to ensure that there is no deterioration in the equipment parameters during storage, transportation and installation. iv) Installation and testing procedures for individual equipments and for the Data Centre, Command Control System and Lawful Interception Unit shall be provided by the successful bidder. These test procedures should include test setup and measuring instruments required for test parameters.

23

v) The performance of individual equipment and complete system shall be tested to ensure that individual equipment and complete system meets the technical specifications and other operational and technical requirements of tender. vi) Complete documentation of all the measurements conducted during installation period shall be submitted by the successful bidder for future reference. This document shall include the measurements conducted on individual equipments on the hop. Five copies of this documentation shall be supplied by successful bidder to Purchaser. vii) The technical problems faced during installation, testing and commissioning period and their solutions shall be submitted by successful bidder at the time of handing over the completed works to the related Police Officer. Five sets of this documentation shall be supplied by successful bidder to Purchaser. c. Site Preparation: The Supplier shall carry out the site preparation work of all Repeater & Master sites before the installation of Data Centre, Lab, Command Control System and Lawful Interception Unit. Site preparation shall include the site inspection, required civil work, equipment rack, installation of. The supplier shall prepare the room for water & dust proofing and interior. The purchaser will provide approximately 200 sq.ft. Room at each Repeater & Master site. 4.2 Project Objectives:

a. Provide Easy Access to Voice & Data: Provide a departmental database management system that will maintain and manage tabular data needed for the police management. Capture all voice information necessary to track, analyze, review, approve and support law enforcement and traffic management efforts in spatially enabled form using computer-assisted procedures.

b. Automate Everyday Workflow Activities: Provide appropriate interfaces to permit management and analytical personnel to monitor all voice information. Provide the ability to print textual information from the system for hardcopy record keeping, or sharing with other departments/ agencies. c. Provide for Process Revisions/Enhancements: Ability to easily configure the system to reflect revisions to business processes or to provide additional capabilities. 4.3 System Objectives: The objective of the above-described system is to provide a viable, cost effective solution, capable of providing a comprehensive information management solution.

24

A. Provide a 24x7 service. B. Effective reception of all calls and automating it by recording, registering with date, time & unique ID no. C. The system should be easy to use. D. The information should only be accessible to authorized personnel and all their interactions should be logged and reported with proper auditing system.

5. Submission of EOI: The response to the request of EOI should be submitted AT “Tender Section” addressed to The Commissioner of Police; Kolkata Police HQs; 18, Lalbazar Street; Kolkata – 700001. The proposal for EOI has to be delivered in a sealed cover at the address given above and bear the Project Name “Request for EOI – Data Centre, Command Control System and Lawful Interception Unit". The last date for submission of the EOI is 08/03/2011 and should reach at the above address by 17.30 p.m. on that day. Any EOI submitted after the above deadline will not be accepted. 6. Validity of EOI: The EOI would be valid for a period of 180 days from the last day for submission of EOI's. 7. Evaluation of Responses to EOI: Kolkata Police is keen to identify a Solution Provider who has demonstrable technical competence and capability in developing, implementing and supporting the project similar to that proposed by Kolkata Police. The response submitted should be comprehensive for the requirements mentioned above. The Proforma for submission of response is given in annexure.

Kolkata Police will constitute a committee to examine in detail, the suggested project, the competence of respondents to ensure capabilities to handle proposed project. Kolkata Police also reserves the right to include any outside consultants/experts in the said Technical Committee. The criteria for evaluation shall be Financial and Technical Capability of the respondent and also the track record of successfully delivering/implementing the similar projects/services as required by Kolkata Police. However, Kolkata Police in its sole/absolute discretion can apply whatever criteria deemed appropriate in determining the responsiveness of the EOI submitted by the respondents, and its decision will be final. No further, representation whatsoever will be entertained. After evaluation, only those respondents who have been short-listed by the Kolkata Police shall be informed in writing. The Request for Proposal / Tender Document shall be given to the short-listed respondents only at a cost. 8. Clarification to the EOI from the Respondents: During evaluation, Kolkata Police, at its discretion, may seek any information clarification from respondents/s without notifying other respondents. The request for information,

25

clarification shall be in writing, and no change in the substance of the submission shall be sought, or permitted. Kolkata Police reserves the right to verify the facts mentioned in the offer and visit site / installation given by the respondent to determine / verify the information given therein. Kolkata Police reserves the right to conduct the due diligence checks of any or all parties to the Consortium. Kolkata Police may ask the respondents to give demo/presentation of the products and services offered by them, at their own cost. 9. Kolkata Police’s Right to Accept Any Response to the EOI and Reject any or All EOIs: Kolkata Police reserves the right to accept or reject any response received to the EOI, and to cancel the entire process at any time prior to awarding of contract, without thereby incurring any liability to the affected respondent(s). Kolkata Police shall neither be bound to offer any reasons for such acceptance / rejection nor entertain any correspondence with the rejected respondents in this matter. 10. Cost to be borne by the Respondents: All expenses incurred for preparation, submission or demonstration in response to this EOI including providing any additional requirements shall be entirely borne by the respondent(s). 16. Disclaimer: The Request for EOI shall neither bind Kolkata Police in any contract nor is an offer of contract.

26

ANNEXURE

Proforma to be used for submitting information

Please ensure that all rows under "Response” are filled up without ambiguity. If any additional schedules or documents are submitted to support the response, it should be ensured that they are clearly cross-referenced to the relevant "Particulars". PART – I. Basic Information of the Vendor

Sr No.

Particulars

Response

1 The registered name of the company

2 Name and Designation of the authorized official

3 Contact telephone number, fax number and E-mail address

4 Registration number Registered Office (address) Legal form of organization

5 Name and address of Parent company, consortium members, if any

6 Brief description of the organization, including date of incorporation, list of major business areas and divisions, list of products and services provided, key milestones in the organization (Not more than one A4 size sheet)

7 A brief account of the Firm's; a) Consultancy services, b) Total solutions to organizations c) Hardware/Networking infrastructures d) Support services (please specify)

8 Financials: (Rs. lacs) (i) Turnover:

Year Year (2008-09) (2009-10)

27

(ii) Copies of audited financial statements viz., Balance sheet & Profit & Loss A/c for the last 3 years to be enclosed.

9 List of major customers with contact details and

products / services rendered to them

10 Number of technical personnel in the organization

11 Certifications (i) Name and level of certified international quality

standards obtained by the Company; (enclose copies)

(ii) Is it for a Specific Division or for the Organization as a whole? Please specify.

(iii) Is it for the Division that may be undertaking this project? Please specify.

12 Profile of persons, who could be undertaking the project for Kolkata Police

13 Any other relevant details

NB: Separate sheet may be enclosed, wherever required with proper references.

28

PART II. Technical details: A. Give the following details about top two works similar to that proposed in the EOI

executed in the last three years each in a separate sheet:

1 Name of client

2 Nature of project

3 Scope of the project

4 Value of the project

5 Date of award of contract

6 Date of commencement of the project

7 Date of successful commissioning of the project

8 Name of the person who can be referred to from Clients’ side, with name, designation, postal address, contact phone, fax number, e-mail id etc.

B. Give a brief write-up about the solution proposed explaining how it meets the

requirements as mentioned in the EOI.

Sd/-

For Commissioner of Police, Kolkata

29