airport systems – electronic services (additional ... web viewitil ver. 3, cobit 5,...

72
ANNEXURE F PROPOSAL FORMAT AND RESPONSE FORM FOR IT STRATEGY OTHER SERVICES Page 1 of 72 ACSA CONFIDENTIAL INFORMATION

Upload: trinhthuy

Post on 30-Jan-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

ANNEXURE F

PROPOSAL FORMAT AND RESPONSE FORM

FOR

IT STRATEGY OTHER SERVICES

Page 1 of 53 ACSA CONFIDENTIAL INFORMATION

Page 2: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

BIDDER RESPONSES

This section describes the required format and content for the Bidders’ proposals. Failure to conform to the specified response format may result in the Bidder proposal being disqualified. It is vital that the bidder provide detailed and comprehensive answers to the requirements detailed in this RFP whilst at the same time ensuring that responses are precise and to the point.

The Bidder shall use the defined document structure for their responses including any costing / pricing schedules, to facilitate equitable evaluation. Responses shall not make references to corporate literature and any literature that is provided shall exist merely to supplement the response and not to replace the response.

All Requirements in this RFP will have a unique identifier and should be cross referenced accordingly. The original order and identification of the Statement of Works shall be maintained in the Response. All requirements can be interpreted to include the stated requirement but need not be limited to the requirement as stated.

Each Requirement Statement shall be answered as comprehensively as possible. Where a requirement statement is simply providing the Bidder with information and a compliance measure is not appropriate, the Bidder should simply note that they have read and understood the requirement. (N.B. If the requirement is not understood the Bidder should take the necessary steps to understand the requirement).

All Requirement Statements relating to the solution function must be completed in detail. Bidders must not make reference to answers within another requirement as these will not be scored. The Bidders response shall be inserted into the requirements table description field against the corresponding Requirement ID.

A description of how compliance to the requirement has been achieved is essential. In cases where information does not fit into the response table, the table may be adjusted to accommodate the response more easily. Responses provided in freeform text outside of response tables will be excluded from evaluation.

Page 2 of 53 ACSA CONFIDENTIAL INFORMATION

Page 3: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

SECTION A: WORK PACKAGE 2A – IT INFRASTRUCTURE CAPABILITIES

Bidders who do not score a minimum of 80 points on this section (including the minimum in each sub-section) will be disqualified from being evaluated further under Section B: WORK PACKAGE 2B – AIRPORT SYSTEMS.Bidders must submit a minimum of three (3) client reference letters to support their experience.

Page 3 of 53 ACSA CONFIDENTIAL INFORMATION

Page 4: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

1. IT Infrastructure Capabilities

1.1 LAN / WAN / Wireless and IP Telephony Services1.2 Network Firewalling and Security Services1.3 Backup, Storage and Storage Network Services1.4 Server and Virtualization Services1.5 IT Facilities & Data Cabling Services1.6 IT Power Services1.7 IT Cooling Services1.8 IT Infrastructure Service Tower Definitions1.9 IT Infrastructure Services Credit Methodology

Please refer to Annexure E - IT Strategy_Infrastructure Services Response Form for the detailed response form.

Page 4 of 53 ACSA CONFIDENTIAL INFORMATION

Page 5: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

SECTION B – WORK PACKAGE 2B – AIRPORT SYSTEMS

Bidders who do not score a minimum of 80 points on this section (including the minimum in each sub-section) will be disqualified from being evaluated further under Section C – WORK PACKAGE 2C BUSINESS ENABLEMENT.Bidders must submit a minimum of three (3) client reference letters to support their experience.

Page 5 of 53 ACSA CONFIDENTIAL INFORMATION

Page 6: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

2. Integrated Security Systems:

2.1 Airport Systems – Security Experience

Provide information that indicates the bidders experience in supplying, commissioning, implementing, supporting and maintaining solutions/systems related to Airport Security technologies/services:

Solutions Supply

Experience (Yes/No)

Implementation

Experience (Yes/No)

Commissioning

Experience (Yes/No)

Support and Maintenance

Experience (Yes/No)

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Experience Write-up Attachment (Section and Page No)

2.1.1 Perimeter

Intrusion Detection System (PIDS)

2.1.2 Access Control and Permit Issuing System (Vehicle and Visitor Management Systems)

2.1.3 Integrated Security Management Systems (e.g. ISMS or PSIM)

2.1.4 Two Dimension Bar

Page 6 of 53 ACSA CONFIDENTIAL INFORMATION

Page 7: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Code Systems (2DBC-B)

2.1.5 Digital Trunking Radio Communication Systems and Ground to Air Radio Communication System

2.1.6 Panic Alarm System

2.1.7 Smart Security

2.1.8 Electronic Gates - Boarding and Security Check Points

2.1.9 Security X-ray machine Training Software

2.1.10 Close Circuit Television (CCTV), Video Management Systems, Video Analytics and Facial Recognitions

Page 7 of 53 ACSA CONFIDENTIAL INFORMATION

Page 8: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

2.2 Airport Systems – Electronic Services

Provide information that indicates the bidders experience in supplying, commissioning, implementing, supporting and maintaining solutions/systems related to Electronic Technology/Services for an airport:

Solutions Supply

Experience (Yes/No)

Implementation

Experience (Yes/No)

Commissioning

Experience (Yes/No)

Support and Maintenance

Experience (Yes/No)

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Experience Write-up Attachment (Section and Page No)

2.2.1 Time and

attendance

2.2.2 InfoGate

2.2.3 Display Technologies (Screens in

different sizes,

formats and

configuration)

2.2.4 Common Use Terminal Equipment and Common Use Self Service

2.2.5 Foot Counting and Queue Management System

Page 8 of 53 ACSA CONFIDENTIAL INFORMATION

Page 9: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

2.2.6 Parking Solutions (Pay on foot, License Plate Recognition System, Vehicle Message System and Bay Detection) including merchant bank interface for credit card payment and mobile payment solutions

2.2.7 Public Address (PA) and Evacuation Systems

2.2.8 Community Access Television (CATV)

2.2.9 Building Management Systems

2.2.10 Emergency and fire detection

Page 9 of 53 ACSA CONFIDENTIAL INFORMATION

Page 10: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

2.3 Airport Systems – Airport Applications

Provide information that indicates the bidders experience in supplying, commissioning, implementing, supporting and maintaining solutions/systems related to Applications for an airport:

Solutions Supply

Experience (Yes/No)

Implementation

Experience (Yes/No)

Commissioning

Experience (Yes/No)

Support and Maintenance

Experience (Yes/No)

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Experience Write-up Attachment (Section and Page No)

2.3.1 Apex and Zeus

2.3.2 Palladium (Health Safety Report)

2.3.3 Quality Management System

2.3.4 Airport Management System

2.3.5 Security QMS/Incident Logging

2.3.6 Slot Management (Score)

2.3.7 Qlikview

Page 10 of 53 ACSA CONFIDENTIAL INFORMATION

Page 11: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

2.3.8 SITATEX

Interactive KIOSK (Inforgate)

2.4 Airport Systems – Electronic Services (additional technologies/systems/solutions not listed above)

Provide information that indicates the bidders experience in supplying, commissioning, implementing, supporting and maintaining solutions/systems related to other Airport technologies/systems that are not listed above:

Solutions Supply

Experience (Yes/No)

Implementation

Experience (Yes/No)

Commissioning

Experience (Yes/No)

Support and Maintenance

Experience (Yes/No)

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Experience Write-up Attachment (Section and Page No)

2.4.1

2.4.2

Etc.

Page 11 of 53 ACSA CONFIDENTIAL INFORMATION

Page 12: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

SECTION C – WORK PACKAGE 2C – INTEGRATED AIRPORT PLATFORM

Bidders who do not score a minimum of 80 points on this section (including the minimum in each sub-section) will be disqualified from being evaluated further under Section D – Enterprise Applications WORK PACKAGE 3.Bidders must submit a minimum of three (3) client reference letters to support their experience.

Page 12 of 53 ACSA CONFIDENTIAL INFORMATION

Page 13: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3. Work Package 2 Integrated Digital Airport Platform Capabilities

3.1 Channels

Provide information on how the bidder has implemented solutions that utilises the below channels which enables a digital traveller, employee, internal and external airport stakeholder’s experience:

Solutions Company Contact

Company Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

3.1.1 Web

3.1.2 Mobile Web

3.1.3 Mobile Applications

3.1.4 B2B Gateway

3.1.5 Kiosk

3.1.6 Contact Centre

3.1.7 Social Networks

3.1.8 Sensors

3.1.9 M2M Gateway

Page 13 of 53 ACSA CONFIDENTIAL INFORMATION

Page 14: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.1.10 Business Intelligence Analytics

3.2 Data and Information Management & Analytics

Provide information that indicates the bidders experience on implementing solutions related to Data Information Management and Analytics:Solutions Company

ContactCompany Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

3.2.1 Data Warehouse/Big Data Platform

3.2.2 Master Data Management

3.2.3 Enterprise Integration

3.2.4 Data Analytics

3.2.5 Geospatial

3.2.6 Dashboards & Reporting

3.2.7 Knowledge & Content Management

Page 14 of 53 ACSA CONFIDENTIAL INFORMATION

Page 15: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.3 Business Management

Provide information that indicates the Bidders experience on implementing solutions related to Business Management:Solutions Company

ContactCompany Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

3.3.1 Airport Service Status Reporting

3.3.2 Revenue Analytics

3.3.3 Smart Asset Tracking and Management

3.3.4 Cargo Analytics

3.3.5 Business Performance Dashboards

3.3.6 Risk, Audit & Compliance Management

Page 15 of 53 ACSA CONFIDENTIAL INFORMATION

Page 16: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.4 Business Operations

Provide information that indicates the Bidders experience on implementing solutions related to Airport Business Operations:

Solutions Company Contact

Company Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

3.4.1 Self-check in Web3.4.2 Self-check in Kiosk3.4.3 Flight Information3.4.4 Passenger Survey3.4.5 Airport Directory3.4.6 Weather Information3.4.7 Traffic Information3.4.8 Basic Way Finding3.4.9 Complimentary Connectivity (Limited)3.4.10 Flight Status Checking3.4.11 General Parking Booking3.4.12 Parking Status Checking

Page 16 of 53 ACSA CONFIDENTIAL INFORMATION

Page 17: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.4.13 Parking Bay Utilisation3.4.14 Queue Monitoring3.4.15 Common Use Terminal Equipment3.4.16 Common Use Self Service3.4.17 Online Duty Free Shopping3.4.18 Airport Operations Analytics (basic)3.4.19 Bag drop-off (assisted)3.4.20 Bag drop-off (self-service)3.4.21 Bag Tag Print (self-service)3.4.22 Smart Security Scanners3.4.23 Electronic Bag Tagging3.4.24 Rapid Security Queue (paid service)3.4.25 Self-Boarding (e-Gates)3.4.26 Travel

Page 17 of 53 ACSA CONFIDENTIAL INFORMATION

Page 18: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Document checking (self-service)3.4.27 Interactive Customer contact (iHelp)3.4.28 Lost Bag Registration and Status (self-service)3.4.29 Centralised Image processing3.4.30 Lane Automation3.4.31 Paperless Travel3.4.32 Airport Concierge3.4.33 Traffic Alerts3.4.34 Complimentary Connectivity (full)3.4.35 Personalised Entertainment3.4.36 Smart Way Fining (in-airport navigation)3.4.37 Smart connections3.4.38 Airport Safety

Page 18 of 53 ACSA CONFIDENTIAL INFORMATION

Page 19: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Analytics3.4.39 Airport Security Analytics3.4.40 Airport Operations Analytics (advanced)3.4.41 Passenger Flow monitoring and management3.4.42 Cargo Analytics3.4.43 Billing

3.4.44 Point of Sales3.4.45 Customer Relationship Management3.4.46 Digital Market3.4.47 eSecurity3.4.48 Parameter Detection3.4.49 Video Analytics3.4.50 Flight Information Display System (FIDS)

Page 19 of 53 ACSA CONFIDENTIAL INFORMATION

Page 20: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.5 Business Enablement

Provide information that indicates the Bidders experience on implementing solutions related to Business Enablement:

Solutions Company Name

Company Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

3.5.1 Unified Communications

3.5.2 IT Resilience

3.5.3 ERP

3.5.4 Operation Automation

3.5.5 Near Field Communications (NFC)

3.5.6 Private Cloud

3.5.7 Beacon Technology

3.5.8 WIFI

3.5.9 Tenant Connectivity

3.5.10 Identity and Access Management

Page 20 of 53 ACSA CONFIDENTIAL INFORMATION

Page 21: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.6 Enterprise Architecture

Provide the bidders experience on Conceptualising, Designing and Implementing Enterprise Architecture.

Enterprise Architecture Domains

Conceptualising, Designing and Implementing

Experience (Yes/No)

Company

Resources Certified (Yes/No)

Company

Resources Proof of Certification Provided (Yes/No)

Please Indicate Section and Page Nr.

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Experience Write-up Attachment (Section and Page No)

3.6.1 Enterprise Architecture

3.6.2 Business Process Architecture

3.6.3 Application Architecture

3.6.4 Technology Architecture

3.6.5 Security Architecture

3.6.6 Data/Information Architecture

3.6.7 Integration Architecture

Page 21 of 53 ACSA CONFIDENTIAL INFORMATION

Page 22: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.7 Enterprise Applications (IBM and Microsoft)

Provide the bidders experience in designing and implementing solutions as indicated on the table below and provide references and technical write-up (where applicable).

Enterprise Applications (IBM and Microsoft)

Design and Implementation

Experience (Yes/No)

Company

Resources Certified (Yes/No)

Company

Resources Proof of Certification Provided (Yes/No)

Please Indicate Section and Page Nr.

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Experience Write-up Attachment (Section and Page No)

3.7.1 IBM AIX

3.7.2 IBM Websphere Message Broker (including Java technologies)

3.7.3 IBM MQ Series

3.7.4 Systems Integration (ESB)

3.7.5 BPM

Page 22 of 53 ACSA CONFIDENTIAL INFORMATION

Page 23: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Development (IBM)

3.7.6 DB2 (IBM)

3.7.7 Microsoft (.Net, SharePoint, SQL Server, etc.)

3.7.8 General Business Intelligence and Analytics

Page 23 of 53 ACSA CONFIDENTIAL INFORMATION

Page 24: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.8 Enterprise Applications (Oracle ERP)

Provide the bidders experience in designing and implementing solutions as indicated on the table below and provide references and technical write-up (where applicable).

Enterprise Applications (Oracle ERP)

Design and Implementation

Experience (Yes/No)

Company

Resources Certified (Yes/No)

Company

Resources Proof of Certification Provided (Yes/No)

Please Indicate Section and Page Nr.

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Experience Write-up Attachment (Section and Page No)

3.8.1

E-Business Suite (R12.1.3)

3.8.2 Human Resources Core

3.8.3 Cloud Solution Human Resources

3.8.4 Supplier Lifecycle Management

3.8.5 Finance

Page 24 of 53 ACSA CONFIDENTIAL INFORMATION

Page 25: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.8.6 Cloud Solution Finance

3.8.7 Commercial

3.8.8 Governance

3.8.9 Endeca

3.8.10 Business Intelligence / Performance Reporting OBIEE and OSSM

3.8.11 Database Services

3.8.12 Development Services

3.8.13 Supply Chain Management

Page 25 of 53 ACSA CONFIDENTIAL INFORMATION

Page 26: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.9 Information Security

Provide the bidders experience in designing and implementing solutions as indicated on the table below and provide references and technical write-up (where applicable).

Solutions Company Name

Company Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

3.9.1 Security Incident and Event Solutions (SIEM)

3.9.2 Security Vulnerability Solutions

3.9.3 End Point Security Solutions

3.9.4 Data Protection Solutions

3.9.5 Web Content Scanning (Proxy) Solutions

3.9.6 Mail Content Scanning Solutions

3.9.7 Digital

Page 26 of 53 ACSA CONFIDENTIAL INFORMATION

Page 27: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Certificate Solutions

3.9.8 Mobile Device Management Solutions

3.9.9 Authentication and Access Management Solutions

3.9.10 Database Security Solutions

3.9.11 Data Loss Prevention Solutions

3.9.12 IT Forensic Solutions

Page 27 of 53 ACSA CONFIDENTIAL INFORMATION

Page 28: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

3.10IT Commercialisation

Provide the bidders experience in designing and implementing solutions/models as indicated on the table below and provide references and technical write-up (where applicable).

Solutions/Services

Company Name

Company Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

3.10.1 Customer Identification, Validation and Commercial Assessment

3.10.2 Intellectual Property and Contract Management

3.10.3 Product/ Service Pricing Models

3.10.4 Product/ Service Licensing Models

3.10.5 Product/ Service Support Models

3.10.6 Product/ Service Launch Strategies

Page 28 of 53 ACSA CONFIDENTIAL INFORMATION

Page 29: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

SECTION D – WORK PACKAGE 3 IT OPERATIONS RUN CAPABILIITES

Bidders who do not score a minimum of 80 points on this section (including the minimum in each sub-section) will be disqualified from being evaluated further under Section E – WORK PACKAGE 1.Bidders must submit a minimum of three (3) client reference letters to support their experience.

Page 29 of 53 ACSA CONFIDENTIAL INFORMATION

Page 30: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

4. Work Package 3 Capabilities

4.1 Strategic Sourcing

Provide information on IT Services Sourcing Models that were implemented in previous clients and provide evidence in form of reference letters.

Type of IT Services Sourcing Model

(e.g. Insourcing, Outsourcing, etc.)

Company Name

Company Contact

Company Address

Telephone Number

Reference Letters included (Yes/No)

Experience Write-up Attachment (Section and Page No)

Page 30 of 53 ACSA CONFIDENTIAL INFORMATION

Page 31: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

SECTION E – WORK PACKAGE 1 - CAPABILITY TRANSFORMATION SUPPORT

Bidders who do not score a minimum of 80 points on this section (including the minimum in each sub-section) will be disqualified from being evaluated further under PRICE AND BEE.Bidders must submit a minimum of three (3) client reference letters to support their experience.

Page 31 of 53 ACSA CONFIDENTIAL INFORMATION

Page 32: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5. Capability Transformation Support

5.1 Enterprise Development Plan Approach and Framework

Provide an Enterprise Development Plan which should specify the: What: Design How: Plan, the plan should cover the section on the IT Strategy Implementation Roadmap When: Timeframe

Page 32 of 53 ACSA CONFIDENTIAL INFORMATION

Page 33: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.2 Experience of Airport Environment

5.2.1 Industry Knowledge:

Describe your knowledge of and insight to Airport industry. Include membership with Airport Governing Bodies where applicable (but not limited to below examples):

IATA - International Air Transport Association ICAO - International Civil Aviation Organization SACAA - South African Civil Aviation Authority Etc.

5.2.2 Airport Business Models:

Provide demonstrable knowledge of the Airport Business Models (at least 3 different types of models should be provided) that are utilised by other Airports.

Page 33 of 53 ACSA CONFIDENTIAL INFORMATION

Page 34: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.2.3 Product Knowledge:

Describe your knowledge of and insight to Airport business and associated products and their application. Information provided to refer and align to Section 2.2 in the Response Form

5.2.4 Airport Solutions Knowledge:

Describe your knowledge of the systems required within an airport environment.

Solution Name Description Work Performed

For example:

Common Use Terminal Equipment, Common Use Self Service Solution

Self-service and common use equipment for passenger processing (Boarding).

Installation, commissioning, testing of system

Page 34 of 53 ACSA CONFIDENTIAL INFORMATION

Page 35: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.2.5 Channels:

Describe your experience in the airport Channels environment with reference to strategy definition, product definition, business process definition and systems.

Channel Name Description Work Performed

For example:

Web Mobile Web Mobile Applications B2B Gateway Kiosk Contact Centre Social Networks Sensors M2M Gateway

5.2.6 Airport Commercial Operations:

Describe your experience in the Airport Commercial Operations environment with particular reference to strategy definition, product definition, business process definition and systems.

Page 35 of 53 ACSA CONFIDENTIAL INFORMATION

Page 36: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.2.7 Airport Operations:

Describe your experience in the Airport Operations environment with reference to strategy definition, product definition, business process definition and systems.

5.2.8 Airport Corporate Core:

Page 36 of 53 ACSA CONFIDENTIAL INFORMATION

Page 37: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Describe your experience in the Airport Corporate Core business environment with particular reference to ACSA Operating Model as provided below. (Strategy definition, Product definition, Business Process definition and systems.

Page 37 of 53 ACSA CONFIDENTIAL INFORMATION

Page 38: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.2.9 Airport Data/Information Management:

Describe your experience in the Airport Data/Information Management environment e.g. Data Model, Data Interchange standards, with particular reference to strategy definition, product definition, business process definition and systems.

Data/Information Management Description Work Performed

Page 38 of 53 ACSA CONFIDENTIAL INFORMATION

Page 39: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.3 Track Record and Capability - Reference Sites (Minimum of 3 Reference Sites)

The Bidder must include the references where they have successfully implemented IT Strategy projects. Provide an overview of the components and functionality of the solution provided at these sites. ACSA reserves the right to independently approach these companies without consulting the Bidder. Reference sites related to a similar environment will be beneficial. The reference letters must indicate the performance of the bidders (Exceptional, Good or Poor).

Company Name

Company Contact

Company Address

Telephone Number

Reference Sites

Components of Solutions

Functionality of Solutions

Reference letters included (Yes/No)

5.4 Credentials, Certification Standards, Quality Requirements and Quality Awards

5.4.1 Credentials

Credentials shall include the experience and knowledge gained in previously completed projects within an Airport environment and for: Designing Detailed IT Operating Model Reshaping IT Project Portfolio and Architecture Designing Outsourced Services Model Designing Organizational Change Management

As a minimum, the response should indicate the role played (implement, manage etc.), the outcome of the endeavour, and the extent to which the knowledge and experience gained will enhance successful delivery.

5.4.2 Certification

Page 39 of 53 ACSA CONFIDENTIAL INFORMATION

Page 40: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Address capabilities including certification requirements (It should include but not limited to ITIL ver. 3, Cobit 5, Information Security, Business Continuity Management) that allow for the successful implementation of the planned solution. Provide information related to quality standards (e.g. ISO standards).

Work Package 1 Sections Certifications Quality Standards

Designing Detailed IT Operating Model ITIL ver. 3, Cobit 5, Information Security, Business Continuity Management Reshaping IT Project Portfolio and Architecture, etc.

ISO 9001, ISO/IEC 27001, etc.

Reshaping IT Project Portfolio and Architecture

Prince 2, Togaf, PMBOK, etc.

Designing Outsourced Services Model Insource, Outsource, Co-Sourcing

Designing Organizational Change Management

Prosci, Lewin’s CM Model, Adkar, etc.

5.4.3 Quality Award

Bidders must provide details of the various quality awards received (certificate/letter should be provided as evidence), awards related to the design, implementation and running of IT Strategy Implementation programme. At least three Quality Awards should be provided.

Page 40 of 53 ACSA CONFIDENTIAL INFORMATION

Page 41: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.5 Strategic Capabilities, Experience and Responsibilities

5.5.1 Transform IT Operating Model – (To establish credibility and the relevance of IT):

Provide information about the degree of success with which this requirement (as listed below) has been implemented in an Airport environment and the tenure of such solutions. These projects should have been implemented within the past 15 years (2001-2016).

WP 1 Deliverables Project Name

Client Start Date

End Date

Work Performed

Processes, Methodology used or Framework adopted

Degree of Success(Fully Successful, Partially Successful, Failure)

Reason for Failure

Designing Detailed IT Operating Model

Reshaping IT Project Portfolio and Architecture

Implement retained IT functions, establish capabilities and processes

Execute the workforce transformation strategy (including skills and knowledge transfer)

Page 41 of 53 ACSA CONFIDENTIAL INFORMATION

Page 42: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.5.2 Design detailed IT Operating Model (including Service Management & Service Integration capabilities):

Provide information about the degree of success with which this required has been provided in environments and/or industries similar to ACSA and the tenure of such solutions.

WP 1 Deliverables Project Name

Client Start Date

End Date

Work Performed

Processes, Methodology used or Framework adopted

Degree of Success(Fully Successful, Partially Successful, Failure)

Reason for Failure

Design detailed IT Operating Model (including Service Management & Service Integration capabilities)

5.5.3 Reshape Project Portfolio and Architecture:

Provide information about the degree of success with which this requirement has been provided in environments and/or industries similar to ACSA and the tenure of such solutions.

WP 1 Deliverables Project Name

Client Start Date End Date Work Performed

Processes, Methodology

Degree of Success

Reason for Failure

Page 42 of 53 ACSA CONFIDENTIAL INFORMATION

Page 43: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

used or Framework adopted

(Fully Successful, Partially Successful, Failure)

Provide information on how the Project Portfolio was reshaped and enterprise architecture implemented:

5.5.4 Transform IT functions, capabilities and processes:

Provide information about how to transform IT functions, establish new capabilities and processes in an IT environment and/or industries similar to Airport environments and the tenure of such solutions

5.6 Work Package 1 Deliverables

5.6.1 IT Transformation Plan

Provide information on how would the bidder approach (methodology) the IT Transformation and a high level plan to be executed. The plan should include the “What, How, When”:

Page 43 of 53 ACSA CONFIDENTIAL INFORMATION

Page 44: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Page 44 of 53 ACSA CONFIDENTIAL INFORMATION

Page 45: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.6.2 IT Architecture Development - Optimise Architecture

(Optimise the enterprise architecture to innovate and enable a world-leading digital airport business):

Provide information about how innovative and business focused IT Architecture capabilities have been conceptualised, designed and implemented in environments and/or industries similar to ACSA and the tenure of such solutions

WP 1 Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

Optimise Architecture (Optimise the enterprise architecture to innovate and enable a world-leading digital airport business):

5.6.3 Workforce Transformation Strategy

5.6.3.1 Execute the workforce transformation strategy (including skills and knowledge transfer):

Provide information about how the IT workforce was transformed through skills and knowledge transfer in an environment and/or industries similar to Airport. This should be supported by the provision of the AS-IS and TO-BE states.

Page 45 of 53 ACSA CONFIDENTIAL INFORMATION

Page 46: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

5.6.3.2 Build Innovative and Business focused IT capability:

Provide information about how innovative and business focused IT capabilities and culture were developed in an environment and/or industries similar to Airport.

Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

Page 46 of 53 ACSA CONFIDENTIAL INFORMATION

Page 47: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.6.4 Project Portfolio

5.6.4.1 Manage the build projects:

Provide information about how IT projects were planned, designed, built, tested, and implemented in an Airport environment and the tenure of such solutions.

Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

5.6.4.2 Execute prioritised build programme:

Provide information about how Integrated and Intelligent Digital Airport Platform was executed in environments and/or industries similar to airports.

WP 1 Deliverables Work Processes, Degree of Success Reason for Failure Reference letter included (Yes/No)

Page 47 of 53 ACSA CONFIDENTIAL INFORMATION

Page 48: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

Performed Methodology used or Framework adopted

(Fully Successful, Partially Successful, Failure)

Integrated and Intelligent Digital Airport Platform Implementation:

5.6.4.3 Green IT Solutions:

The bidder should be able to provide their experience with regards to implementing programmes/projects using Green IT solutions.

Page 48 of 53 ACSA CONFIDENTIAL INFORMATION

Page 49: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.6.5 IT Services Sourcing Model

5.6.5.1 Service Catalogue Definition

Provide information on how (methodology) would the bidder approach the analysis of the IT Services offering and the development of the Service Catalogue.

5.6.5.2 IT Services Sourcing Model Definition

Provide information about how (methodology) the IT Sourcing Model was defined (the definition should include; insourcing, outsourcing or co-sourcing) in previous projects. Based on the recommended model, what was the impact to the IT Organogram and how was the Migration Plan (As-Is to the To-Be) managed.

Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

Page 49 of 53 ACSA CONFIDENTIAL INFORMATION

Page 50: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.6.6 Organization Change Management

5.6.6.1 Design organisational change management:

Provide information about how (methodology) the organisational change management projects were designed, led and managed in environments and/or industries similar to airport which should include the following:

Change Management Strategy Change Management Plan Change Accountability Matrix Communication Plan and Approach Change Management Role Players Training Programme Change Champions Change Sustainability Process Change Effectiveness Assessment Tool

Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

Page 50 of 53 ACSA CONFIDENTIAL INFORMATION

Page 51: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.6.6.2 Communicate and raise awareness:

Provide information about how the Communication Management Plan was developed and implemented to raise awareness on the impact the programme will have on different stakeholders. The information provided should include but not limited to:

Communication Methods and Channels Communication Frequency Targeted Stakeholders Templates used, etc.

Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

5.6.6.3 Provide support, training and development of staff:

Provide information about how (methodology) the provision of support, training and development of staff within change management projects were led and managed within environments similar to airport. The information provided should include but not limited to:

Training Plan Training Courses Job Shadowing, etc.

Deliverables Company Name

Client Name

Start

Date

End

Date

Work Performed

Processes, Methodology used or Framework adopted

Reference letter included (Yes/No)

Page 51 of 53 ACSA CONFIDENTIAL INFORMATION

Page 52: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.7 Work Package 2 and 3 Management Oversight and Approach

Provide information about the overall Management Oversight function and team structure that is being proposed as well as how this has been run and the tenure of such function.

WP 1 Deliverables Work Performed

Processes, Methodology used or Framework adopted

Degree of Success(Fully Successful, Partially Successful, Failure)

Reason for Failure

Management Oversight and Approach for Enterprise Supplier Development:

5.8 Programme Risk Management - Measurement, Risk & Reporting

Provide information on how the Programme Risks were managed in programme similar to IT Strategy Implementation. The information provided should include but not limited to:

Risk Management Strategy Risk Management Plan

5.9 Client References Verification and Site Visits (3 Clients will be verified per discipline)

Bidders to submit client references letters in every section where they are required.

Page 52 of 53 ACSA CONFIDENTIAL INFORMATION

Page 53: Airport Systems – Electronic Services (additional ... Web viewITIL ver. 3, Cobit 5, Information Security, ... The project schedule can be produced in any format but submitted as

5.10 Work Package 1 Delivery Timelines

Please provide project schedule that indicates the activities that will be undertaken and their duration for the execution of work package 1. The project schedule can be produced in any format but submitted as an Appendix in Microsoft Word format.

5.11Enterprise Development Manager (EDM) Qualification and Experience

Please provide EDM Curriculum Vitae that clearly indicates the Qualification, Professional Certifications and Experience (attach proof of certified qualifications and certifications) and Experience that will be used to manage the Enterprise Development deliverables.

Page 53 of 53 ACSA CONFIDENTIAL INFORMATION