sole source certification


sole source certification - Rackcdn.com10ba4283a7fbcc3461c6-31fb5188b09660555a4c2fcc1bea63d9.r13.cf1.rackcdn.com/...

1 downloads 137 Views 162KB Size

Business Unit & Req. # 1450-54808643 Note:

ECCN:

This Sole Source Certification will become a public document, open to public inspection; therefore, you should be certain all material facts are true, relevant and clearly understandable. Under the requirement of University of Florida Rule No. 6C1-3.020(5)(f)(2), the following is submitted in support of this request for authority to purchase, without bidding, the items available from only one source.

SOLE SOURCE CERTIFICATION Note:

Total Amount: 200,000.00

Sole Source means that the item/service is unique and that the vendor is the only one from whom the item/service can be provided. Best Price alone cannot be used for sole source. If the item/service is available from more than one source of supply, best price must be determined through the competitive bid process.

A. Sole Source Vendor Company Name: Tera Insights Contact Person: Alin Dobra, CEO and Founder Address: 235 S Main St, Suite W206-M, Gainesville, FL 32601 Telephone: 352-514-0743

Fax:

Email: [email protected]

B. Describe in lay language, what the item/service is and how it is to be used in your area of research. (cont. P2)

Tera Insights will provide design, testing, and programming services to build a secure infrastructure for working with restricted data, including PHI (protected health information) in addition to standard implementations of data security available including: C. What feature or special condition of this commodity/service is unique and cannot be obtained from any other source? (cont. P2)

Tera Insights has developed an architecture for storing and processing data with a higher level of security by adding the following innovative and original features that are not available from any vendor: ✘ Yes D. Is this product being purchased directly from the manufacturer? No ✘ No If No, is it available from more than one dealer? Yes If Yes, it is available from more than one dealer, why can this item not be bid? (cont. P2)

No product with the listed features exists. ✘ Yes E. Prior to submitting this requisition, did you investigate other possible sources? No ✘ If Yes: 1) Did you obtain quotes from the other sources? Yes No If Yes, attach copies. 2) Is this Vendor's price lower than the other sources? Yes No If No, justify the additional cost below.

Other Universities operate data enclaves: 1. University of Utah, 2. NORC at University of Chicago, 3. ICPSR at University of Michigan. These are all custom built by the institutions using multiple vendors providing components. F. Other Sole Source comments or explanations. (cont. P2)

The Tera Insight has developed a user interface that integrates with the unique features 1 through 4 listed in section C. This provides added value to the varied user community supported by Research Computing. I / We, the undersigned, certify the above to be true and correct to the best of my / our knowledge and belief and the user and / or undersigned does not have a financial interest in the above named vendor. DEPARTMENT APPROVAL

PURCHASING APPROVAL

I hereby certify the validity of the information and feel confident the Sole Source Certification will meet University criteria and would withstand any audit or vendor protest.

10/14/2014 Principal Investigator's Signature

Date

FAILURE TO FILE A PROTEST IN ACCORDANCE WITH BOARD OF GOVERNORS (BOG) REGULATION 18.002 OR FAILURE TO POST THE BOND OR OTHER SECURITY AS REQUIRED IN THE BOG REGULATION 18.002 AND 18.003(3) SHALL CONSTITUTE A WAIVER OF PROTEST PROCEEDING.

FA-PDS-SOLSRC 02/2009

This acquisition is approved as a non-competitive purchase. Digitally signed by Karen Olitsky DN: cn=Karen Olitsky, o=University of Florida, ou=Purchasing Services, [email protected], c=US Date: 2014.11.04 15:41:23 -05'00'

Purchasing Coordinator Signature

Date

Purchasing Authorized Signature

Date

Digitally signed by Nicola Heredia DN: cn=Nicola Heredia, o, ou, [email protected], c=US Date: 2014.11.04 15:57:39 -05'00'

Sole Source Certification (Continued)

Please use the following sections to continue documentation if needed. B. continued 1. Encryption of all communication between users and the secure environment 2. Encryption of data stored in the system while at rest 3. Logging of all data accesses and data movements Research Computing staff and Tera Insights will provide these features as a base level.

C. continued 1. public-key technology is used to control access by any user (person) or any system (an executing real or virtual machine image) to a data set, encrypted data can be securely shared by public-key. 2. data is decrypted after transmission to RAM of the executing system, hence no decrypted data is ever left anywhere even in case of a system failure 3. encryption keys are not stored on the systemn system administrators cannot decrypt data 4. transaction logs are encoded so that any tampering will be discovered D. continued

E. continued Offerings from vendors offer the minimal requirement standard features 1, 2, and 3 under B. For example 1. Dimension Data, 2. HP Autonomy, 3. BEAR Data Solutions, 4. Cisco Systems, "Secure Enclaves Architecture Design Guide". But they lack the advanced features 1 through 4 in section C. F. continued The functionality uses the secure public-key technology of Tera-Insight and offers a drop-box user interface, familiar to large numbers of users.

FA-PDS-SOLSRC 02/2009 cert. posted

[email protected]

Digitally signed by [email protected] DN: [email protected] Date: 2014.11.04 16:20:45 -05'00'