Browse
Search
2017-119-E IT - TMA Systems, LLC for facility maintenance software and annual software support
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2010's
>
2017
>
2017-119-E IT - TMA Systems, LLC for facility maintenance software and annual software support
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
7/23/2019 12:34:35 PM
Creation date
3/29/2017 8:39:30 AM
Metadata
Fields
Template:
Contract
Date
3/27/2017
Contract Starting Date
3/27/2017
Contract Ending Date
3/26/2024
Contract Document Type
Agreement - Services
Agenda Item
3/21/17
Amount
$137,622.00
Document Relationships
2018-038-E IT - TMA Systems change order 1
(Message)
Path:
\Board of County Commissioners\Contracts and Agreements\General Contracts and Agreements\2010's\2018
Agenda - 03-21-2017 - 8-e - Enterprise Asset Management Facilities Software Purchase and Support Agreement
(Linked To)
Path:
\Board of County Commissioners\BOCC Agendas\2010's\2017\Agenda - 03-21-2017 - Regular Mtg.
R 2017-119-E IT - TMA Systems, LLC for facility maintenance software and annual software support
(Linked To)
Path:
\Board of County Commissioners\Contracts and Agreements\Contract Routing Sheets\Routing Sheets\2017
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
154
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
DocuSign Envelope ID: D1041CA6-DBD4-42BE-8B32-7C592BF2BA15 <br /> inspections, audits or actual disasters? <br /> TMA Response: No <br /> If No, Explain: TMA Response: TMA has included our security and operation controls <br /> within the Attachments section of our proposal. This information is not included within <br /> the scope of the Subscription Agreement for contractual purpose. TMA is open to <br /> working with the County to define mutually agreed upon language for contractual <br /> purposes. <br /> 17. Does the contract require the cloud vendor to notify the County of any outsourced <br /> functionality and its provider? <br /> TMA Response: No <br /> If No, Explain: TMA Response: TMA is open to disclosing this information and <br /> providing language that is mutually agreeable within the scope of the contract. Please <br /> note that TMA utilizes Tulsa Connect as our Data Center partner, which is SSAE-16 II <br /> certified. <br /> 18. What are the contractually required notification period for the County or the cloud vendor <br /> for termination of the cloud services? <br /> TMA Response: Thirty(30) days prior to the expiration of the initial term or any renewal <br /> term. <br /> 19. Describe how the County's data will be stored,managed and archived. <br /> TMA Response: Please see the WebTMA Service Provider Security and Operations <br /> Controls document within the Attachment section of our response. Please note that <br /> additional fees apply to maintaining archived data within the TMA hosted environment. <br /> Pricing is based on the size of the archived database. <br /> 20. Will the County's data be stored and managed on a storage system with other data? <br /> TMA Response: Yes <br /> If Yes, Explain: TMA Response: The hosted environment is shared. However, for the <br /> protection of our clients all client data is stored in separate databases. <br /> 21. At what architectural point in the provider's cloud facility will the County's data be <br /> physically connected to networking equipment with non-County data? <br /> TMA Response: All client data is hosted on shared equipment. All traffic behind the <br /> firewall is physically connected to the same LAN. Client data is hosted in an independent <br /> database. Client data is never co-mingled. <br /> 22. What are the cloud provider's information security policies? <br /> TMA Response: TMA has an extensive Security Policy framework that addresses <br /> infrastructure security, information security plan, information security password policy, <br /> information security incident management, information technology policy, network <br /> administrative security policy, data encryption policy, log monitoring, etc. <br />
The URL can be used to link to this page
Your browser does not support the video tag.