E Invoicing - RFP - Re-Tendering PDF
E Invoicing - RFP - Re-Tendering PDF
E Invoicing - RFP - Re-Tendering PDF
1
Table of Contents
2
4.4.3 Financial proposal requirements ..................................................................................... 37
4.4.4 Deliverables ..................................................................................................................... 37
4.5 COMPONENT 4 – CHANGE MANAGEMENT, TRAINING AND KNOWLEDGE TRANSFER ..................... 38
4.5.1 Winning bidder activities ................................................................................................. 38
4.5.2 Technical proposal requirements .................................................................................... 39
4.5.3 Financial Proposal Requirements .................................................................................... 39
4.5.4 Deliverables ..................................................................................................................... 39
4.6 COMPONENT 5 – OPERATIONS, MAINTENANCE AND SUPPORT ................................................... 39
4.6.1 Winning bidder activities ................................................................................................. 39
4.6.2 Technical proposal requirements .................................................................................... 40
4.6.3 Financial Proposal Requirements .................................................................................... 40
4.6.4 Deliverables ..................................................................................................................... 40
4.7 COMPONENT 6 – PROJECT MANAGEMENT ................................................................................ 41
4.7.1 Winning bidder activities ................................................................................................. 41
4.7.2 Technical proposal requirements .................................................................................... 42
4.7.3 Financial proposal requirements ..................................................................................... 42
4.7.4 Deliverables ..................................................................................................................... 42
4.8 COMPONENT 7 – QUALITY MANAGEMENT ................................................................................. 43
4.8.1 Winning bidder activities ................................................................................................. 43
4.8.2 Technical proposal requirements .................................................................................... 44
4.8.3 Financial proposal requirements ..................................................................................... 44
4.8.4 Deliverables ..................................................................................................................... 44
4.9 COMPONENT 8: IMPLEMENTATION TIMELINE.............................................................................. 45
5 SUBMISSION PROCEDURES AND REQUIREMENTS ................................................................................. 46
5.1 BIDDER QUALIFICATIONS ......................................................................................................... 46
5.2 RESPONSE PROCEDURES ........................................................................................................ 46
5.3 RESPONSE FORMAT ................................................................................................................ 47
5.3.1 Part I: Technical Proposal ................................................................................................ 47
5.3.2 Part II: Financial Proposal ................................................................................................ 49
5.3.3 Part III: Bid Security ......................................................................................................... 50
5.4 RESPONSE SUBMISSION .......................................................................................................... 50
5.5 RESPONSE EVALUATION .......................................................................................................... 51
5.5.1 Technical proposal ........................................................................................................... 52
5.5.2 Financial proposal ........................................................................................................... 53
5.6 FINANCIAL TERMS ................................................................................................................... 53
5.6.1 Pricing terms .................................................................................................................... 53
5.6.2 Tender bond..................................................................................................................... 53
5.6.3 Other commercial terms .................................................................................................. 54
5.7 KEY RFPS DATES & DEADLINES .............................................................................................. 54
6 GENERAL TERMS ................................................................................................................................... 56
6.1 ESCALATION PROCEDURE AND PENALTIES: .............................................................................. 56
6.2 PREVENTIVE MAINTENANCE (PM) ............................................................................................ 57
6.3 PENALTIES FOR DEFAULTING ON PM ........................................................................................ 57
6.4 LEGAL TERMS ......................................................................................................................... 57
6.4.1 Joint-ventures .................................................................................................................. 57
6.4.2 Proposal Authorization .................................................................................................... 58
6.4.3 Corrupt and Fraudulent Practices .................................................................................... 58
6.4.4 Sample Arabic Contract Agreement Approval: ................................................................ 59
6.4.5 Other Legal Terms ........................................................................................................... 59
6.5 CONFLICT OF INTEREST ........................................................................................................... 65
6.6 SECRECY AND SECURITY ......................................................................................................... 65
6.7 DOCUMENTS PROPERTY .......................................................................................................... 65
6.8 REMOVAL OR/AND REPLACEMENT OF PERSONNEL .................................................................... 65
6.9 OTHER PROJECT-RELATED TERMS........................................................................................... 66
7 ANNEXES ............................................................................................................................................... 67
3
7.1 BYLAW OF ORGANIZING & CONTROLLING INVOICING 34/ 2019 ( نظام تنظيم شؤون الفوترة والرقابة عليها
)2019 لسنة34 رقم............................................................................................................................. 67
7.2 GOVERNMENT PRIVATE CLOUD (GPC)..................................... ERROR! BOOKMARK NOT DEFINED.
7.3 NATIONAL E-GOVERNMENT CONTACT CENTRE REQUIRED INFORMATION ................................... 70
7.4 TECHNICAL PROPOSAL RESPONSE FORMAT............................................................................... 72
7.5 FINANCIAL PROPOSAL RESPONSE FORMAT .............................................................................. 77
7.6 CONFIDENTIALITY UNDERTAKING ............................................................................................. 83
7.7 JOINT VENTURE AGREEMENT TEMPLATE .................................................................................. 85
7.8 E-GOVERNMENT IMPLEMENTATION FRAMEWORK ...................................................................... 86
7.9 SAMPLE ARABIC CONTRACT AGREEMENT (ATTACHED) ........................................................... 109
4
DISCLAIMER
THIS DOCUMENT IS A REQUEST FOR PROPOSAL (RFP), AND SHALL NOT BE CONSTRUED IN WHOLE OR
PART AS A DIRECT OR INDIRECT ORDER. IT SHALL NOT BE CONSTRUED AS A REQUEST OR
AUTHORIZATION TO PERFORM WORK AT THE EXPENSE OF THE INCOME AND SALES TAX DEPARTMENT
(ISTD). THE INFORMATION IN THIS RFP IS INTENDED TO ENABLE BIDDERS TO FORMULATE A PROPOSAL
IN RESPONSE TO THE PROJECT REQUIREMENTS SET FORTH. ALTHOUGH THIS RFP CONTAINS SUCH
ENABLING INFORMATION, BIDDERS MUST MAKE THEIR OWN INDEPENDENT ASSESSMENTS AND
INVESTIGATIONS REGARDING THE SUBJECT MATTER OF THIS RFP. MODEE DOES NOT GUARANTEE THE
ACCURACY, RELIABILITY, CORRECTNESS OR COMPLETENESS OF THE INFORMATION IN THIS RFP. THE
BIDDER REMAINS RESPONSIBLE IN RELATION TO IDENTIFYING ANY FURTHER INFORMATION THAT IS
REQUIRED TO PREPARE THE PROPOSAL. THIS RFP SHALL CONSTITUTE PART OF THE CONTRACT THAT
WILL BE SIGNED BETWEEN ISTD AND THE WINNING BIDDER.
5
1 INTRODUCTION
1.1 RFP Organization
This RFP provides the information to enable bidders to submit written proposals for the sought
solution. The organization of the RFP is as follows:
Section 1: Introduction
This section provides general definition of the project scope and a high-level description of the
solution to be implemented,
This section describes the functional and technical requirements for the System.
This section defines scope of work, proposal requirements and deliverables for the Project.
This section describes the administrative rules and procedures that guide the proposal and its
processes. This section also contains the dates that govern this RFP.
This section describes legal terms in relation to this RFP, bidder submissions, project delivery, and
other contractual terms and conditions.
Section 7: Annexes
6
1.2 RFP Purpose
Ministry of Digital Economy and Entrepreneurship (MoDEE) is soliciting proposals from qualified
bidders as described in section 5 to provide Income & Sales Tax Department (ISTD) with a specialized
National E-Invoicing Solution and to collect data and manage information of sales processes from
sellers/ buyers or any third party, herein after referred to as the Project.
Income and Sales Tax Department (ISTD) is going to implement a national e-Invoicing solution as ISTD
is considering requiring sellers and buyers to use electronic invoices (e-Invoices) and submit those e-
Invoices to the ISTD.
Business-to-Business (B2B)
Business-to-Government (B2G)
Business-to-Consumer (B2C)
Types of invoices to be considered:
In-country with applied tax rate, for both domestic and foreign invoices
Export - with optional override of 0% tax rate
Import - with optional override of 0% tax rate
The proposed solution will benefit as the following:
Responses to this Request for Proposal (RFP) must conform to the procedures, format and content
requirements outlined in this document. Deviation may be grounds for disqualification.
7
2 PROJECT DEFINITION AND DESCRIPTION
2.1 Current Situation
ISTD does not have an E-invoicing solution that handles invoices issued by sellers of commodities or
services. As of 1st of July 2019, invoicing bylaw No. 34 of 2019 has become effective and sellers of
goods and / or service have been obliged to issue an invoice for the sale.
The ways businesses currently manage their invoices vary greatly, as some sellers have their own
invoicing systems, others use third party systems and services, and some do not have systems at all.
This results in many challenges when businesses are exchanging information with the department, for
various accounting and compliance reasons.
It is the ISTD’s priority to help enable smaller businesses to use a common e-Invoicing solution directly.
In addition, the final solution should support common accounting functions and practices as it relates
to invoicing.
This RFP document is being issued in response to the new invoicing provision of the tax law 38/2018
and bylaw of organizing & controlling invoicing 34/ 2019, please refer to (Annex 7.1) and the solution
must comply with Jordan Cloud Policy 2020 “2020 ”سياسة المنصات السحابية وخدماتها.
8
Service: any activity done by the person for a fee, including the provision of a benefit to
others. This work does not include the supply of a good unless this commodity is required to
provide this service.
Invoice: a statement issued by seller describes the good, service or commodity and quantity,
price, tax calculated.
Commodity selling: The transfer of the ownership of the commodity from the seller to the
buyer (for a fee or without) or use of the commodity by the person for his own purposes or
the empowerment of third parties for a price or for free or disposition of any of the legal
acts conveying ownership.
Business to Government (B2G): the sale of products and services to federal, state, or local
agencies.
Business to Business (B2B): transactions of goods and/or services that is conducted between
companies, rather than between a company and individual buyers.
Business to Consumer (B2C): selling products and services directly to individual buyers who
are the end-users of those products or services.
Service selling: Perform, deliver or provide the Service from Seller to Buyer for a fee.
9
3 SYSTEM FEATURES AND REQUIREMENTS
The project aims to build an E-Invoicing Solution based on industry best practices, information security
and Business continuity should be taken into consideration in the proposed system architecture.
In the following sub-sections, the requirements and features of the E-Invoicing Solution are explained
as follows:
User Groups
Access Channels
Use Cases
Systems
Conceptual Architecture
We have defined user groups according to types of needs and uses of the national e-invoicing system.
Individual Buyer The retail buyer, who pays the full invoice value and is not required to keep a
record of received invoices as costs to be offset against income. The
Individual Buyer is expected to either use a mobile phone or a computer to
access the system.
Commercial Any sized business that needs to receive and process invoices. Depending on
Buyer size, this type of business may use any access channel, including outsourced
accounting services.
Government A public service entity that needs to receive and process invoices using any
Buyer access channel.
Commercial Any size seller that may use any type of system to present e-Invoices for a
Seller transaction.
Accountant A specialized accounting business that may use desktop computers or APIs to
access e-Invoicing functionality.
Contact Centre A contact centre employee, who needs to track the status of open tickets on
Operator the e-Invoicing platform.
10
ISTD Auditor An ISTD employee responsible for reviewing and reconciling invoices to
ensure compliance and accuracy.
ISTD Analyst An ISTD employee responsible for compiling statistical and financial analysis
as well as identifying anomalies for Auditors to investigate.
The scope of the solution and services will rely upon the following access channels.
Web Portal The standard public-facing web interface to the e-Invoicing platform.
Application A web service interface to the e-Invoicing platform used for integrating
Programming third party systems.
Interface (API)
National E-Invoicing The standard user interface into the e-Invoicing platform for ISTD
System (NEIS) employees. This may be a web browser or a thick client.
E-Government Contact The standard user interface to the e-Government Contact Centre
Centre (EGCC) platform.
3.3 Systems
The scope of the solution and services will rely upon the following types of systems.
E-mail System used for receiving attachments as well as sending invoices and
notifications.
Close-Proximity Ability for users to receive invoice content on mobile devices via scan
Communication (machine-readable optical label, such as QR) or short-range wireless
communication (such as NFC).
11
Public Service used to check whether invoices are registered within the National E-
Verification Invoice System.
Service
National E- The system that is subject of this RFP. In requirements, this system shall be
Invoice System referred to as “System”.
Government SMS System to facilitate and streamline the sending and receiving of SMS
Gateway messages.
Number Requirement
QR code,
PDF,
R01.01 Image (photo),
Data object.
Other forms of receiving the invoice electronically may be proposed, ex. custom
mobile app to mobile app.
The System shall allow for receiving paper invoices by scanning them and entering
R01.02
information is manually by the receiving party.
The System shall allow the buyer/seller to export a collection of invoices that meet
R01.04 certain criteria for processing outside the system (ex. to import into accounting
software, store on disk, etc.).
The System shall provide an ability for a foreign buyer to submit collected officialised
R01.05 invoices for refunding paid sales tax. Foreign buyer types will be identified by ISTD.
ISTD will manage refund.
12
3.4.2 Use Case 2: Validate e-Invoice
This represents the user’s ability to validate if an e-Invoice has been registered in the National e-
Invoicing Solution and to verify the e-Invoice data format.
Number Requirement
The System shall provide a mechanism to verify the compliance of an e-Invoice to data
R02.01
format requirements. This may be done offline using a published toolkit.
The System shall provide a mechanism to allow an invoice holder to verify that an Invoice
has been registered with the System by the seller.
R02.02
This should be possible without the use of a trusted connection (i.e. no login required). Ex.
use cryptographic signatures.
Number Requirement
The System will send notification(s) for significant transaction events. The supported
notification delivery methods includes and not limited to:
R03.01 1. E-Mail
2. SMS
3. Push notifications on the solution portal and mobile app.
As well as any other channel that will improve service delivery.
The System shall generate a QR code that contains invoice data allowing for receiving of the
R03.02
invoice with the help of a QR code scanner.
Email,
QR code,
R03.03 File on disk.
As a:
PDF file,
Data object.
13
The vendor may suggest other delivery methods that will improve service delivery. An email
gateway will be provided.
Number Requirement
R04.01 The System shall be able to generate e-Invoices as PDF documents that can be printed.
The System shall provide issuing and modification functionality including: add, delete,
R04.05
modify for all invoices.
The System shall allow for some sellers to be authorized to generate a report of invoice
records for a given time period as a report that is generated submitted as a single invoice
to the System.
R04.06
Such Sellers must still be able to generate an individual invoice for a buyer that requests it.
Such an invoice would not be included in the report.
R04.07 The System shall also enable users to associate other files with an invoice.
The System shall provide the ability to amend invoices after issuance or after the transfer
to ISTD so that the old invoice is not deleted but shows the modification made and the
R04.08
adjustments to the invoices. This should also include which user made the adjustments and
the associated time stamps.
The System shall allow for invoices to be generated offline for later registering/uploading
R04.09
individually or in batch.
The System shall have the ability for the seller to save a draft invoice to be able to come
R04.10
back to it later, before it is finalized (signed and registered).
The System shall allow for the creation of invoices for foreigners with the purpose of filing
R04.11
for tax return during exiting the country.
14
3.4.5 Use Case 5: Store e-Invoice
This represents the user’s ability to store an e-Invoice in a convenient location while maintaining
privacy. The requirements in this section also address invoice data and features.
Number Requirement
R05.01 The System shall store registered invoices for later retrieval.
The period of storage of invoices by The System shall be indefinite. It is allowable for long
R05.02 term storage (ex. after 6 months) to be in an archival subsystem with lower performance
parameters.
If an invoice is in hardcopy format, it is required that it is scanned (by photo and/or scanner)
R05.03 and captured along with an identification number and regular invoice data in order to be
accessed and retrieved.
The System shall contain a database of harmonization codes for which there will be defined
R05.04
allowable tax rates that may vary with time according to changing government policy.
The harmonization codes shall be imported from an external Customs system and
R05.05 maintained by ISTD users locally with custom codes that will map back to the Customs
codes.
The System shall accept and store invoices in Universal Business Language (UBL) standard.
R05.06
The System shall provide the ability of dealing with lease contracts as invoices. See
R05.09 section 7.1: Bylaw of organizing & controlling invoicing 34/ 2019 ( نظام تنظيم شؤون الفوترة
)2019 لسنة34 والرقابة عليها رقم7.1
The System shall have the capability to store and link scanned/captured paper invoices with
R05.10
invoice data in the same way as regular e-Invoices associated with buyers and sellers.
15
The System shall allow for an e-Invoice to contain the buyer’s name and identifier in some
R05.11
situations. Ex. Invoice amount over 10k JOD, post-payment.
The SKU database must be connected and mapped to the standardized tax harmonization
R05.14 codes. The database will be under the sole management of ISTD users for maintenance and
upkeep of codes and SKU mappings.
Optional Feature: The solution should be able to scan/capture paper invoices, identifies
R05.15
their data and details, and converts them into UBL.
The System shall have advance search and filtration option so it will facilitate retrieving the
R05.16
required invoice data by ISTD users.
R05.17 The System shall log all create, read, update, and deletion requests.
The ability to share, access, and issue invoices must comply with privacy rules and
R05.18
regulations (e.g. confidential, sensitive, or personally identifiable information).
The System shall allow for Invoice storage operation by a buyer or seller to be either
R05.19
individual or in batch for a group of invoices.
R05.20 The System shall allow attachments to be stored along with an invoice.
Number Requirement
The System shall allow for generated invoices to be signed by the seller and officialised by
R06.01
registering them with the ISTD system individually or in batch.
The System shall allow for a corrected version of a signed invoice to invalidate the previous
R06.02
signed version of the same invoice.
The System shall allow for cancelling/deletion of signed and registered invoices by the seller
R06.03
and buyer. Such invoices shall no longer pass validation defined in requirement R2.02.
16
The System shall require and facilitate meeting the requirement that invoices above 10,000
R06.04 JD or that are postpaid receive confirmation of receipt by the buyer. This should dynamically
update per the specific invoice amount. See Annex in section 7.1.
The System shall allow interaction between sellers & buyers in order to correct the e-
R06.05
Invoice through credit and debit notes.
Number Requirement
The System shall provide dashboard for statistical information and generate analytical and
operational reports to provide live dashboard information on specified business KPIs.
R07.01
The winning bidder shall gather all reporting related requirements during business
requirements gathering and analysis phase to be able to build 5 report types.
The System shall employ the latest technological methods available to allow the
R07.02
administrator to assign roles to users: system administrators, seller, buyer, etc.
The system administrator may configure and provision access rights and functionality based
on roles.
The system administrator roles themselves may involve a hierarchy of administrative sub-
roles and functions.
The sellers and buyers group should be granted access to free services by default.
R07.05
During the requirements gathering phase some functionalities will be defined as premium
services.
17
Within the free service functionality the seller/buyer shall have access to his file which
R07.06 includes the invoices, their values and details, and ability to report over date and time
ranges.
The System shall have functionality to mark seller types required by tax law in section 7.1.
These types will include:
R07.07
Sellers allowed to issue cumulative invoice reports,
Sellers required to create tax invoices.
The System shall have flexibility to be efficiently modified/reconfigured in response to
R07.08
legislation amendments.
Number Requirement
The System shall have a buyer/seller registration mechanism that includes 2-factor
R08.01
authentication, with a secondary factor such as e-mail, user's phone number, token, etc.
The System shall support user profile management and the ability to update the user profile
R08.02
information.
The System shall have an authentication module related to the “Sellers” and “Buyers” which
shall implement information security measures that guarantee information confidentiality,
R08.03
integrity, availability and accountability (non-repudiation) to meet the security level
sufficient to guarantee service delivery.
The System shall have an authentication module related to the administration and ISTD
R08.04 user part of the solution that should be integrated with the ISTD LDAP to allow ISTD
employees to access the system with a predefined roles and responsibilities.
The System shall support the ability for sellers to use two types of identifiers to register in
R08.05
the system: sales tax number, or the national number if sales tax number does not exist.
18
Number Requirement
The System shall make available a query interface with National Contact Centre (NCC) for
all raised complaints regarding the proposed e-Invoicing solution that allows for status
R09.01 tracking by ISTD-authorized Contact Centre employees.
Such employees can access and check the tickets information, status, and history.
Accordingly, enabling the agents to access the entity’s related applications for retrieving
R09.02 information, tracking the status of a service.
Please refer to (Annex 7.2) for more information about the Contact Centre requirements.
Number Requirement
The System shall allow for a data science team to create analytic reports to help identify
anomalies to identify audit subjects, and support business intelligence and risk analysis
capability.
R10.01
The system shall provide analytics and techniques to deal with, manipulate and provide
deep insights from high volumes of different types of data contained in e-invoices.
Number Requirement
The System shall have the ability to create dynamic report and save the result as template
so it can be reused later. Main functionality that can be provided are:
19
Exporting data to multiple format
Add Chart and Images
Connect to different Data Sources
Matrix Report
Form Report
This requirement may be met with the use of a standard reporting product, such as Crystal
Reports.
The System shall allow for ISTD Auditors to be able to find and view individual invoices that
R11.02
are stored in the system.
The System shall be able to generate reports for a given buyer/seller for reconciliation with
R11.03
tax return filings.
To help inform and structure the RFP requirements we propose a conceptual architecture that
represents high level relationships between the following entities:
User groups
Access channels
Use cases
Systems
20
3.5.2 User groups to access channel interactions
21
API Use Cases
22
3.5.4 Use cases to system interactions
The table below details the non-functional requirements as part of the proposed national e-Invoicing
solution.
3.6.1 General
Number Requirement
23
NFR01 Proposed solution should be centralized and hosted on a public cloud.
Proposed solution should be friendly and easy to use. (For the user experience compliance
NFR02
see Section 3.6.2)
The System shall meet efficiency targets to serve volumes of transactions described in
Usage Statistics section and number of users. Please find the performance measures
defined below.
System reaction time: The time taken for logging into a system. [Up to 5
seconds].
Response time: The time the system takes to respond to specific query by the
NFR04 user. [Up to 4 seconds].
Capacity: The capability of the newer system to handle a number of
simultaneous requests from the network for the application and the volume
of data that it can handle from each of the users.
In addition to the H/W capacity such as processing capability of all servers
including DB, Apps. [CPU Utilization: 70%, Memory Utilization: 70%].
Utilization: The system minimum availability time vs. the system down time
[99.9].
The System shall contain administration module, to enable administrators to perform all
day-to-day administrative tasks at data, administrative task automation (scripting) engine,
and application levels.
NFR05
The winning bidder shall gather all solution related administration requirements during
business requirements gathering and analysis phase.
NFR06 The System shall include performance monitoring for all transactions.
In the cases where any parts of the user interface solution were developed web forms,
NFR08 those forms should support latest versions of the most popular browsers. According to the
W3C standards.
NFR09.1 The System shall support the Arabic language, including invoice language.
NFR09.2 The System shall support the English language, including invoice language.
The System shall provide a user-friendly interface along with on-line help (in both
languages) for user guidance while applying for different services transactions (through
NFR10
messages, wizard …etc.). Available across all access channels (Mobile App, Web Browser,
…etc.).
24
System should Keep track of who logs in and in what time and what action they did.
The technical readiness and the possibility of invoicing system to be integrated with any
systems necessary to maintain its work and / or provide data for the invoice according to
the legislation in force and to meet the public interest and the purpose of the system.
The proposed system should be able to integrate with the invoices issuers’
“Sellers” current systems.
NFR13 The proposed system should be able to integrate with the third party (system
provider) via an API, which provides service to invoices issuers that do not have
their own invoicing system.
The system allows invoices issuers to transfer data over mobile applications and
through web browsers.
The bidder must provide a web portal specified for invoicing services.
All integrations with government entities should be done through GSB service see
(Annex 7.7).
A dedicated backup solution must be provided, installed and configured by the winning
NFR14
bidder to serve as a backup solution for the proposed e-Invoicing solution.
DAMP (Database activity monitoring and Protection): Proposed solution should have
NFR15 a database Real-time protection and security technology for auditing, monitoring and
analyzing database activities.
Integration with SMS Gateway Winning bidder shall utilize current SMS gateway provided
NFR18 by the e-Government.
25
The System shall integrate with the stakeholders’ systems involved in the e-Invoicing
solution through GSB.
The winning bidder must commit to adopting the ISTD project management tool as the sole
NFR20
tool for management and collaboration regarding project activities.
It shall be possible to integrate the system with a future loyalty system that will motivate
NFR21
adoption.
NFR23 Browser Compatibility: The winning bidder must ensure that e-Services works equally well
with all popular browsers including Chrome, Firefox and Internet Explorer etc.
Systems Integration: The developer must ensure e-Services integrates with the relevant
NFR24 backend systems e.g. CRM, Billing, payments gateway etc. and make sure transactions are
recorded on such systems and customer records are updated correctly.
NFR25 Alerts: If, for some reason, the site is down, the ISTD teams should be informed
immediately in an automated manner.
Content Management System: As well as delivering e-Services, the vendor must deliver a
NFR26 Content Management System (CMS) that will allow ISTD team (webmaster) to add, edit,
delete, publish etc. items including text, multimedia and links on their own without having
to go back to the vendor in the form of a ‘Request for Change’ (RFC).
26
Load Time: The winning bidder must ensure that the speed of the main page and
NFR27 associated pages always load up within 4 seconds. The speed test must be performed
using recognized applications/tools e.g. pingdom.com or similar
3.6.2.2 Features:
Number Requirement
NFR28 Bi-Lingual: e-Services must cater for both Arabic and English versions.
NFR29 Search Engine: e-Services must contain a search engine that can be interrogated for
keywords and multiple criteria where appropriate.
NFR30 Feedback Form: e-Services must provide a ‘Feedback form’ to enable the customer to
provide comments, questions or report problems/complaints.
Links to e-Government Social Media Accounts: e-Services must provide working links to
MoDEE, e-Government Social Media Accounts
NFR31
NFR32 Frequently Asked Questions: e-Services should include an FAQ section to answer basic
questions that the user may have.
NFR33 Rating: e-Services must provide a function for the user to provide customer satisfaction
rating for Voice of Customer purposes
NFR34 Site Map: e-Services should include a site map that can be used for quick and painless
navigation.
On-Screen Message Confirmation: For non-browsing function, each customer transaction
NFR35 must display a ‘success’ or ‘failure’ message on the screen to notify the customer of the
outcome of his/her transaction.
3.6.2.3 Logs/Reports:
Number Requirement
NFR36 No. of users/hits: The winning bidder must provide systematic daily reports to show the
number of users, and unique users to the site and the number of hits per page of the site.
Transaction Logs: The winning bidder is expected to provide daily transaction logs that
NFR37 would contain key information relating to ‘non-browsing’ functions e.g. payment, rating,
feedback. Each transaction should have a unique identification number that is system
generated and can be used to traceability purposes.
NFR38 Incidents Report: all incidents should be reported on the same day to the ISTD teams.
NFR39 Service Level Agreement: The winning bidder is expected to provide 24/7
27
3.6.2.4 Customer feedback:
Number Requirement
Focus Group: The vendor is expected to conduct a Net Promoter Score (NPS) survey
NFR40 through the use of focus group (10-20 people from the general public) through a
recognized market research agency to assess the user-acceptability levels of e-Services.
NFR42 Forgotten userid/password: E-Services shall be able to receive requests where the
customer forgets his/her userid/password.
Re-activation of userid/password: In cases where the customer terminates his/her
NFR43 account for a service, e-Services needs to handle cases where the customer can re-
activate his/her account within a given grace period in a secure manner.
Fonts & color schemes: E-Services should use the fonts (type & size) and color schemes as
NFR45 per ISTD website www.ISTD.gov.jo, this is to give a consistent ‘look & feel’ for all e-
Government services.
Ownership: E-Services should clearly show its ownership for ISTD and that it is part of the
NFR46
e-Government services through the use of Joint logos.
Information Structure: The information must be organized in such a way (links, drop-down
NFR47
menus etc.) that the user must be able to access the required information within 3 clicks.
3.7.1 Definitions
3.7.1.1.1 Severity One (Urgent)
A severity one (1) issue is a catastrophic production problem which may severely impact the Proposed
Solution Availability, In such case, part or all proposed Solution production components are down or
not functioning; loss of production data and no procedural work around exists.
28
Examples of Severity one cases: DB becoming corrupted or inaccessible.
Example of Severity two cases: one node of cluster becomes down or unavailable, inability to update
DB by entities representatives or solution administrators, or inability to synchronize data between DB
nodes.
The response and resolution times shall fall within the values specified in Table 1: Required
NFR48
response/resolution times for different severity levels.
1 1 hour 4 hours
2 3 hours 24 hours
29
3 4 hours 72 hours
30
4 SCOPE OF WORK FOR PROJECT DELIVERY
4.1 Project Overview
There are certain activities to be performed and deliverables to be provided by the winning bidder during
execution of the Project.
The bidder shall provide the solution, knowledge transfer, training, support, maintenance and warranty,
including any requirements or activities needed for the proper functioning of the system beside those outlined
in the following listing and the cost of these requirements or activities should be included in the fixed lump sum
price submitted by the bidder. Note that the bidders should detail in their proposals all recommended
mechanisms and methodologies through which its services and deliverables will be accomplished. All the final
documentation deliverables of the project are required to be prepared in English.
The sign off and approval will be given on both Arabic and English language deliverables for the deliverables that
are required bilingual. In case the documents differed due to translation, the Arabic documents shall prevail and
will be considered as the official ones.
For the purpose of the completion of this project, some of the activities must be implemented and
certified and approved by the Solution Vendor, these will be explicitly mentioned in the scope of work
of this RFP as Vendor Activities and Winning Bidder Activities respectively.
Final deliverables submitted by the winning bidder should be attached to an original official letter
properly bounded, stamped and signed by the winning bidder as shall be defined and approved by
ISTD.
Proposals submitted by bidders that do not properly describe an acceptable solution for the whole
solution components delivery shall be rejected for being not responsive to the RFP requirements
The expected duration of the project is (365) calendar days for pilot go-live, and 18 months (6 months
post pilot) for mass rollout of the e-invoicing system.
It is expected that the bidder will include 36 months for maintenance and support time post mass-
rollout of the system.
Overview of Activities
Perform requirements gathering and analysis for solution processes related to the
delivery of the solution keeping in mind implementation of worldwide best practices
31
Perform requirements gathering and analysis for solution stakeholders keeping in mind
implementation of worldwide best practices.
Develop needed policies, procedures and internal controls embedded in these policies
and procedures to govern the solution.
Create a detailed requirements specifications document showing Integration with both
ISTD back-end system(s) and stakeholders.
Starting with the high level requirements outlined in Section 3, create a detailed
functional design document together with detailed functional, non-functional and
technical specifications of the proposed solution, use cases and use case diagrams
considering the integration with all e-government shared services and the required
access and delivery channels
Develop a prototype for the proposed system including user interfaces that can be
integrated with the e-government shared services
Design, develop, implement, deploy (install, test, launch) and rollout of the proposed
solution. This needs to be aligned with the e-Government Architecture Framework
(including but not limited to the use of shared components and services like the SMS
Gateway, e-Government Contact Centre, and Government Service Bus (GSB).
Develop on-line help for the solution through which users can inquire (via web) or any
other access channel provided by the e-Government Contact Centre.
Design and build required interfaces for the various shared e-government infrastructure
components and integration with stakeholders through GSB
Develop and conduct the User Acceptance Test (UAT) in collaboration of ISTD and
Stakeholders’ teams.
Ensure high level of security for production environment layer.
Prepare all needed documentation that shall enable ISTD to take over the operational
part for the proposed solution smoothly, this shall include the Operation manual for the
managing the major functionalities of the proposed solution, in addition to System
administration manual.
Copyright to all bespoke and customization source code pertaining to Smart Attestation
solution applications must be handed over to MoDEE.
Any open source software used as part of the solution must be licensed to use for this
project the terms of this license must be disclosed by the bidder in the bid terms. The
source code to such software must accompany the deliverables.
Any closed source software used as part of this solution must be licensed to use by
MoDEE and the terms of this license must be disclosed by the bidder in the bid terms.
System Implementation
Provide a high-level design of the solution, describing system architecture, functions and
interactions of all the components,
Describe how the solution will meet functional requirements, as described in
Section 3.4: Use Cases and Functional Requirements. Use the attached compliance
matrix excel to complement the answer.
32
Describe how the solution will meet non-functional requirements as described in
Section 3.6: Mandatory Non-Functional Requirements. Use the attached compliance
matrix excel to complement the answer. (the winning bidder will be provided with the
relevant documentation describing the integration with the available access and delivery
channels)
Describe approach to developing the prototype of the system
Describe approach and methodology for integrating the solution with shared e-
government infrastructure and integration with stakeholders through GSB
Describe approach of launching and rolling out the solution
Provide a list of deliverables for the System Implementation
Describe bidder’s qualifications in e-Invoicing Implementation
System Documentation
List all cost associated with the hardware equipment’s and software licenses included in
the proposed technical solution
List all costs associated with the activities mentioned above
4.2.4 Deliverables
The winning bidder is required to provide the deliverables mentioned below, noting that any other
related deliverables needed for the proper functioning of The System shall be also provided by the
winning bidder and its cost should be included in the fixed lump sum price submitted by the bidder:
System Implementation
o Requirements Analysis Document
o Detailed requirements specifications document
o Detailed functional, non-functional design, and technical specifications of the
system
o System prototype
o Implemented overall system delivery including relevant interfaces, data
migration (if needed), and web services necessary for integration with all related
internal and external systems and stakeholders.
o On-line help for the solution in Arabic language
o Detailed documented approach and implementation for the integration with the
shared e-government infrastructure and integration with stakeholders through
GSB.
System Documentation
33
o System technical documentation (covering use cases and use case diagrams,
detailed requirements, architecture, data model, algorithms, protocols,
functionality of modules, quality-related documentation and artifacts, etc.)
o System manuals (covering software and hardware installation and configuration,
maintenance, backup, recovery, optimization etc.)
o End-user manuals (including and not limited to FAQ, “How do I” questions; in
Arabic & English).
o Detailed User Acceptance Test (UAT) Document and UAT test result report
based on Winning Bidder execution of those tests.
Note: If during implementation found that the components described in the technical proposal
submitted by the winning bidder do not fulfil the requirement of the scope of this project, then the
winning bidder must provide all additional needed components and the cost of these additional
components will borne by the winning bidder.
Note: the financial proposal shall list all costs associated with all required licenses to provide the
proposed solution as listed in the technical proposal regardless of whether these licenses are covered
under the framework agreements with the government of Jordan or not and shall be included in total
project lump sum price.
34
4.3.3 Deliverables
The winning bidder is required to provide the deliverables mentioned below:
Develop a detailed backup policy and related procedures encompassing handling the
proposed solution and security controls. i.e. backup policy and procedures, auditing policy,
etc., and in compliance with ISO 27001 standard. The policy and procedures should consider
the operational environment of ISTD.
Assess security risks implied in implementation of the proposed solution and in integration,
if any, with legacy system. And recommend and include controls to mitigate them.
Conduct risk assessment by identify security threats and risks to the developed system, and
identify the controls applied by the developing bidder and the suggested controls.
Appropriately assess, implement, test and deploy information security controls and
measures to secure the System considering the following:
o Controls to enforce separation of duties depending on Need-to-Know and Need-to-
Do.
o Controls to ensure input validation, data processing and output integrity and
confidentiality.
o Controls to ensure secure data at rest, in use and in transit, including encryption and
hashing algorithms and encryption keys management.
o Controls to ensure secure messaging according to the WS-Security Standard.
o Controls to secure transactions and messaging among all stakeholders and solution
components.
o Controls to ensure user privacy, including but not limited to, cookies management,
users log file and behavior.
o Controls to ensure secure exception and error management that is both user-
friendly and not revealing sensitive and structure data.
Design and build secure connections and communication channels to ensure:
o Secure connections between clients and the System.
o Secure connections between the System and back-end systems (if any).
o Communication channels should be secured as per WS-Security specifications.
o Internet access should use encrypted communication channels.
Provide and deploy security applications/solutions to secure the communication channel for
front-end and back-end systems.
Design and build secure user identification and authentication approach.
Ensure that Portlets are protected against web application threats, such as dangerous URL
and attacks such as cross-site scripting, Session Hijacking. The solution should ensure that it
is not vulnerable to common vulnerabilities and latest OWASP Top 10 vulnerabilities.
35
Ensure that the final solution include comprehensive audit and log management and
reporting tools for all transactions, especially security logs, based on need-to-know and
need-to-do basis and having the following criteria:
o Audit and logging, comply with ISO 27001 and contain but not limited to:
- Input validation failures e.g. protocol violations, unacceptable encodings, invalid
parameter names and values
- Authentication successes and failures
- Authorization (access control) failures
- Session management failures e.g. cookie session identification value
modification
- Application errors and system events e.g. syntax and runtime errors,
connectivity problems, performance issues, file system errors, file upload virus
detection, configuration changes
- Application and related systems start-ups and shut-downs, and logging
initialization (starting, stopping or pausing)
- Use of higher-risk functionality e.g. addition or deletion of users, changes to
privileges, assigning users to tokens, adding or deleting tokens, use of systems
administrative privileges, access by application administrators, all actions by
users with administrative privileges, access to payment cardholder data, use of
data encrypting keys, key changes, creation and deletion of system-level objects,
data import and export including screen-based reports, submission of user-
generated content - especially file uploads
- Modifications to configuration
- Application code file and/or memory changes
NOTE: ISTD reserves the right to perform their own vulnerability assessment and/or penetration test
on the solution and provide the vulnerability reports to the winning bidder to apply appropriate
recommendations to ensure system security. Another security test should be conducted to ensure
recommendations are reflected
36
Risk Assessment plan or methodology.
List of policies to be developed.
Proposed security design of controls to be applied within the design in all layers: network
security, host security, application security, data security, and access management, if any.
Proposed approach(s) to ensure confidentiality, integrity, availability, authenticity, auditing,
non-repudiation and accountability of data and services usage for the solution.
Proposed approach(s) to ensure security for the following requirements:
o Separation of duties depending on Need-to-Know and Need-to-Do.
o Input validation, data processing and output integrity and confidentiality.
o Secure data at rest, in use and in transit, including encryption and hashing
algorithms and encryption keys management.
o Secure messaging according to the WS-Security Standard.
o Secure transactions and messaging among all stakeholders and solution
components.
o Ensure secure identification, authentication and user profile management.
o Ensure user privacy, including but not limited to, cookies management, users log file
and behaviour.
o Ensure secure exception and error management that is both user-friendly and not
revealing sensitive and structure data.
Proposed design for secure connections between clients and the System.
Proposed design for secure connections between the System and back-end systems.
Proposed solution for encrypting internet communication channels.
Proposed secure user identification and authentication approach.
Proposed design to protect Portlets against web application threats. The solution should
ensure that it is not vulnerable to OWASP Top 10 latest vulnerabilities. I.e. design to secure
session management; security control such as session time out and secure channel and
access to session store should be used.
4.4.4 Deliverables
The winning bidder is required to provide the deliverables mentioned below:
Detailed security policy and related procedures encompassing handling the proposed
solution and security controls. i.e. backup policy and procedures, auditing policy, etc., Risk
assessment and mitigation document.
Security design of controls appropriately implemented and tested information security
controls and measures to secure the target solution Separation of duties depending on
Need-to-Know and Need-to-Do.
Input validation, data processing and output integrity and confidentiality.
Secure data at rest, in use and in transit, including encryption and hashing algorithms and
encryption keys management.
Secure messaging according to the WS-Security Standard.
Secure transactions and messaging among all stakeholders and solution components.
Ensure secure identification, authentication and user profile management.
Ensure user privacy, including but not limited to, cookies management, users log file and
behaviour.
37
Ensure secure exception and error management that is both user-friendly and not revealing
sensitive and structure data.
Appropriately designed and built secure connections between clients and the System.
Appropriately designed and built secure connections between the System and back-end
systems.
Appropriately configured and secured user identification and registration.
Security Test Results clarifying the elimination of the System from dangerous URL and
attacks such as cross-site scripting, Session hijacking. And it is not vulnerable to latest
OWASP Top 10 vulnerabilities.
Audit and log management and reporting tools for all transactions, especially security logs
based on need-to-know and need-to-do basis.
Verification check list against all the applied controls of the required in OWASP Application
Security Verification Standard V4.0 (2019) Level 1 and 2.
Develop and execute awareness sessions plan in accordance to the current situation and
execute awareness sessions for identified entities, employees in involved entities and any
other identified stakeholders.
Develop and execute training plan and knowledge transfer for identified team Training shall
be arranged at various phases of the project.
Training venue and all needed PCs and equipment for training purposes must be provided by
the winning bidder.
Number of trainees as follows:
1. NCC personnel (6).
2. Training of Trainers (ToT) for all types of end users (20)
3. System Administrators (12)
4. Security Training (10)
Train ISTD team on the major components of the installed solution, this shall include the
following knowledge areas beside any tailored training that is related to the solution
components:
1. System Administration
2. System Monitoring
3. Data management
4. Reports and dashboards
Knowledge Transfer: Transferring knowledge ISTD team for the following subjects:
1. System Installation
2. System Operation and Troubleshooting
3. System Backup and Restore
4. System Failure and Recovery Procedures
38
4.5.2 Technical proposal requirements
Describe approach, including tools for knowledge transfer, awareness sessions and training
Describe and list the proposed training sessions, session duration, and number of attendees
per session
Provide a high-level training schedule showing the training activities
Provide Awareness sessions plan.
Provide a list of deliverables for the Knowledge Transfer, and Training
Describe bidder’s qualifications in training including references and resumes of trainers.
4.5.4 Deliverables
The winning bidder is required to provide the deliverables mentioned below, and any other related
deliverables needed for the proper Knowledge Transfer, and training and its cost shall be included in
the fixed lump sum price submitted by the bidder:
Training needs assessment report, knowledge transfer plan and awareness session plan.
Knowledge transfer, and training sessions schedule and curricula
Executed Knowledge Transfer and training sessions for all nominated trainees
Provided training handout material.
Executed awareness sessions for all involved entities.
Assign a contact person / account manager to be responsible during the support and
maintenance period of this contract.
Provide support and maintenance services on 24x7 basis for the implemented solution by a
team which possesses the proper knowledge and proven experience of the proposed
solution.
Ensure the availability of educated resources to provide on-site support when needed
Provide detailed implementation plan for any pre-planned maintenance operation that may
affect ISTD services availability, functionality or stability, with necessity to provide roll-back
plan before commencing with maintenance operation
39
Issue a service report after each and every site visit registering the reported incident, its root
cause and the followed procedures for issue(s) successful resolution including the taken
and/or suggested recommendations and measures that shall prevent such incidents / issues
from reoccurring in the future.
Renewal of the licenses for the software products (required for the covering and completion
of the scope of work in this RFP) should be for duration of 36 months starting from the date
of preliminary acceptance.
Comply with the service level requirements defined by ISTD and as shown in Section 3.7:
Service Level Agreement Requirements of this document.
Assign a hot line number to be used for reporting incidents
Provide a ticketing system that records all reported incidents and that can be accessed by
ISTD and generated various incident reports
Applying the latest fixes, patches and required upgrades to the installed software during the
support and maintenance period (if required) while ensuring system’s integrity, reliability,
conformity and normal operation for all system features including the content.
The bidder is required to provide the following information in the financial proposal in relation to the
“Operation, Maintenance and Support” component:
List all costs associated with the Operations Management component
4.6.4 Deliverables
Service reports for all reported and resolved incidents signed by a representative from ISTD
Proof of software subscription for the period of 36 months (If required)
List of all fixes, patch and upgrades implemented during the support and maintenance
period
Fixed and resolved outcomes of heath check (if required).
40
4.7 Component 6 – Project Management
In order to provide project management services, the winning bidder is required to perform the
project management processes in addition to the activities mentioned below, noting that any other
related activities and processes needed for the proper functioning of the project implementation
should be provided by the winning bidder and its cost should be included in the fixed lump sum price
submitted by the bidder:
Appoint a designated Project Manager (full-time for the contract duration) to oversee the
project execution together with project teams to execute all designated tasks and activities
Develop a Project Plan, including project objectives and success criteria, deliverables,
role/responsibilities, communication protocols, document control methodology, cost
management, schedule management, quality management plan and any needed project
plan.
Develop and maintain the overall project schedule, and review and verify the integration of
the project team’s activities & deliverables
Develop project implementation strategy based on the needs and priorities of the business
owner that will ensure stakeholders buy-in and creates the needed impact at the different
stages of the project
Develop a project plan that will determine and ensure the attainment of all project
objectives through the proper prioritization and dependency consideration of different
project activities.
Work with ISTD and its stakeholders to come up with solid rational for phased approach of
the project implementation plan
The winning bidder should implement a pilot according to working environment on one of
the sectors (such as the medical sector) and determine the duration of subsequent
application. The pilot then will be evaluated by both parties for any required modifications.
The pilot is expected to be implemented within 12 months of the start of the project.
Ensure close cooperation with ISTD Project team as well as the service provider and
dependencies representatives
Schedule and conduct on-site bi-weekly progress meetings involving the project team.
Meeting Minutes will be recorded and distributed, including an outstanding action Item Log,
detailing the status of key decisions, responsibility and required timing.
Conduct Weekly progress meetings with ISTD team.
Conduct periodic progress (steering committee) meetings with ISTD and all stakeholders’
representatives at least once a month. Provide and maintain a full and comprehensive plan
that covers all project management knowledge areas (i.e., time, scope, quality, HR,
communication, risk, etc.)
Develop project organization structure to underline all possible resources needed from
engaged parties including their roles and responsibilities as well as their involvement at
different stages of the Project
Establish and execute a process of Quality Assurance (planning, assurance and control) for
all components included in the scope of work
Establish and execute a process for reporting project progress including deadlines; delays,
issues and critical paths to ensuring deliverables are met within resource constraints
Establish and execute a process for project risks and issues management and mitigation
41
Implement submission, key performance indicators and acceptance procedures for
approving project deliverables
Close the project and document lessons learnt.
The project’s implementation methodology and approach. And the description of the
different phases of the project
Describe ideas how the overall project coordination should be tackled in order to assure
proper time and effective use of resources and information
Describe proposed implementation strategy that will ensure project success.
Provide Project management organization structure describing roles and responsibilities
Describe approach to Quality Assurance for all components of the scope and relevant
qualifications in this field
Describe approach for communication on the project
Describe approach to report on project progress
Describe approach to risks and issues management and mitigation
Provide a list of deliverables for the Project Management.
Describe methodology for the overall Project Management and bidder’s professional
qualifications (like PM certificates) in project management field
The bidders must explicitly state their commitment and acceptance to adopt and utilize the
ISTD project management tool as the sole tool for management and collaboration regarding
project activities.
A detailed operational action plan should be provided, including the activities, procedures & time of
work implementation, and identification of those responsible for supervision and implementation, in
order to identify the required systems & equipment's during the implementation process. The
communication protocols, security and protection systems, in addition to identifying the required
training programs and the required operational manuals.
4.7.4 Deliverables
The winning bidder is required to provide the deliverables mentioned below, noting that any other
related deliverables needed for the proper functioning of the project implementation should be
provided by the winning bidder and its cost should be included in the fixed lump sum price submitted
by the bidder:
42
Project management documentation that will cover the different knowledge areas, listed
below but not limited to:
1. Project Charter
2. Project management plan
3. Stakeholder management plan including project organization structure and roles
and responsibilities
4. Communications management plan
5. Quality management plan ( as Described in Quality Management Component)
6. Risk management plan
7. Scheduled project status and progress reports, addressing Reasons behind any
deviation from Project baseline plan.
8. Deliverables traceability matrix.
Issues and risk logs
Action log
Weekly and monthly status and progress reports
Project closing presentation (in English or Arabic)
Project conclusion document outlining work completed, lessons learned and
recommendations for “next steps”.
Perform agile testing as it will be an integral part of the software development, where the
whole development team will be conducting the testing on the developed features and
functionalities and check behaviour of the outcomes according to the expectations and
requirements of ISTD team:
o Conduct sprint units testing for eservices and integrations points.
o Conduct sprint test.
Assign a dedicated Quality team to ensure quality of project deliverables or software
through the related set of (Verification and Validation) activities.
Prepare a detailed Quality plan scope that should include all project phases, deliverables,
and artifacts of any type relevant to the project nature like Portals, websites, e-Services
software, documentation, etc.
Provide all Quality deliverables which ensure that all related activities are done successfully.
This includes but not limited to Test Plans, Test Case Scenarios including acceptance test
scenarios, Testing results/reports, Testing Summary report, Defect (Bug) report and other
required/proposed artifacts.
Ensure proper deployment from staging environment to the ultimate Production
environment after getting the approval from ISTD.
Perform all needed activities in the User Acceptance Testing that should be done in
cooperation with ISTD, all bugs and defects should be solved in order to get the approval on
e-Services launching before each phase.
43
4.8.2 Technical proposal requirements
The bidder is required to provide the following information in the technical proposal in relation to the
Quality Management and validation and demonstrate the approach and components through which
the quality plan shall be implemented. The proposal should provide adequate explanation regarding
the proposed Quality management plan, including but not limited to:
Describe methodology for the overall Quality Management and bidder’s professional
qualifications (like Quality certificates/accreditation) in quality management.
Assurance and Conformance of project deliverables and work products to established
contractual agreements, processes, plans, policies, standards and procedures and e-
Government requirements.
Identify and describe the process for reviewing the test plans, test cases, and test results,
identify the defect tracking processes, test environments, test roles and responsibilities, and
test phase entrance/exit criteria.
Identify and describe the process for determining whether deliverables are ready to deploy
to the ultimate Production environment and production readiness criteria.
Describe the project's quality practices, including but not limited to:
The set of reviews and checkpoints for the project, including entry and/or exit criteria; hold
those reviews, and measure against entry/exit criteria.
The standards and KPI’s to be used to measure project deliverable quality.
The Quality metrics to be used to measure project deliverable quality.
Identify and describe the testing tools should be used by the bidder to perform all required
testing types to measure of project deliverables quality and final products.
Provide a list of deliverables for the Quality Management, as mentioned in the deliverable
section below, and as per the bidder proposed approach.
4.8.4 Deliverables
The winning bidder is required to provide the deliverables mentioned below, noting that any other
related deliverables needed for the proper functioning of The System shall be provided by the winning
bidder and its cost should be included in the fixed lump sum price submitted by the bidder. Quality
management documentation that will cover the different knowledge areas, including but not limited
to:
44
4.9 Component 8: Implementation Timeline
The bid shall include the implementation timeline with significant milestones clearly defined in terms
of deliverables and success criteria for that milestone.
MoDEE is seeking an approach that develops a scalable product ready to deploy with a first release
for one taxpayer group in the first 6 months, followed by a phased roll-out approach across different
user groups, channels, or functions.
Months 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Activities
Requirements Gathering
Implementation of Release1 1
Rollout and Next Phases 2
Maintenance & Support
Figure 1: Timeline for project implementation and maintenance in the first 18 months
45
5 SUBMISSION PROCEDURES AND REQUIREMENTS
5.1 Bidder Qualifications
Bidders responding to this RFP should demonstrate up-to-date capabilities and experience in
providing similar services and similar engagements of the same scope, size and nature especially in
the public sector. These services and engagements must be accomplished successfully by the bidder
during the last 5 years. The bidder must have the following qualification:
1. Bidder is:
A local company alone or having joint venture with local or international
company.
OR
Note: All partners to a joint venture will be jointly and severally responsible towards ISTD.
2. Bidders should be a Partner for the proposed solution Technology vendor, valid
partnership certificate must be attached to the technical proposal.
Where some skills are not available, the bidder should sub-contract with a reputable firm to cover for
this specific skill(s), service(s) or equipment(s). The subcontractor must be approved by ISTD and the
contractor will be liable for all works performed by the sub-contractor.
All inquiries with respect to this RFP are to be addressed to MoDEE Tendering Department in writing
by mail, e-mail or fax with the subject “NATIONAL E-INVOICING SOLUTION". Inquiries can only be
addressed to [[email protected]] or by Fax by [16/8/2020]. Responses will be sent in
46
writing no later than [19/8/2020]. Questions and answers will be shared with all Bidders’ primary
contacts.
Bidders’ written response to the RFP must include both a technical and financial proposal. An overview
is provided in this section, with further details are provided in Annex 7.3.
47
requirements for replacements and approvals. In the
implementation phase; ISTD reserves the right to request
replacement of any resource that cannot fulfil the job.
Project Description and references to similar projects performed.
References
Sample Reference to appropriate work samples.
Deliverables
Project The roles and relationships of all project team members.
Organization
Structure
Proposed Work A high-level plan indicating activities and milestones for
Plan successful project delivery.
Resource Resource allocation throughout each phase of the project
Allocation with their percentage of involvement.
Technical Description of the approach to address the technical proposal
Proposal requirements for each of the project components
Requirements for Component 1 - System Design, Installation and
each Component Configuration
Component 2 - Required Solution Infrastructure
Component 3 - Solution Security
Component 4 - Training and Knowledge Transfer
Component 5 - Operation Support, Maintenance
Project Delivery and Support
Component 6 - Project Management
Component 8 - Quality Management
Deliverables for Describing the approach to developing the deliverables, as
each Component well as the scope and structure for each. Provide appropriate
work samples as it pertains to the deliverables criteria for
each of the project components, as applicable.
Detailed timeline Describe the activities, duration, and milestones to execute
for each each component and develop the corresponding
Component deliverables.
Proposed Demonstrate compliance by submitting a populated
Solution Requirements Compliance Matrix, including descriptions for
Compliance with how the proposed solution will address functional
National E- Functional requirements.
Invoicing Requirements
Solution
Requirements Proposed Demonstrate compliance by submitted a populated
Solution Requirements Compliance Matrix, including descriptions for
Compliance with how the proposed solution will address non functional
Non Functional requirements.
Requirements
48
5.3.2 Part II: Financial Proposal
The bidder is asked to provide two financial proposals:
The total projected income from transactions should be capped to a maximum total fee that is no
more than twice the implementation price for the 7 year duration as calculated based on the Turn-
key Pricing bid. This number assumes a Present Value of return at year 7 and 10% cost of capital. Cost
of platform infrastructure operation may be added to this value.
The transactions that will be subject to pricing may include items such as taxpayer registration and
invoice creation/registration. The bidder is invited to propose an appropriate pricing model along with
required assumptions and boundary conditions.
Consistent with requirement R07.05 and R07.06, the solution should provide a free service
variant for the smallest businesses,
5% market coverage resulting from phase I deployment, full market coverage possible after
18 months,
Use market size assumptions based on volume data given in section 2.3,
All implementation costs performed under the Transaction Financed Pricing bid shall include
the activities performed under the Classic Pricing bid, rendering the TFP bid no worse in terms
of technical scope.
In addition to implementation, the full operation, SLA, and maintenance costs of the solution
for 7 years should be covered by the transactional pricing model.
The Form of Bid ( )عرض المناقصةduly filled; signed and stamped by the bidder
49
The summary of remuneration ) (خالصة بدالت األتعابattached in the Arabic Sample
Agreement under )3 و رقم2 )ملحق االتفاقية رقمduly filled; signed and stamped by the
bidder.
The Financial proposal should be submitted in separation of the technical proposal. In order for the
evaluation to progress quickly and effectively, bidders are requested to provide their proposal as per
the format described in (Annex 7.4).
- ) اال اذا كانت الشركة خاضعة للضريبة% 16 (على الفريق الثاني ان يشمل سعره الضريبة العامة على المبيعات بنسبة
(بموجب كتاب رسمي من هيئة االستثمار يرفق مع العرض المالي) ويتم عكس هذه%)0( العامة على المبيعات بنسبة
. النسبة على السعر المقدم من قبلها
- في حال عدم توضيح الضريبة العامة عل المبيعات على السعر المقدم من قبل الشركة يعتبر سعر الشركة شامل للضريبة
% 16 العامة على المبيعات بنسبة.
Bidders must submit proposals to this RFP to the MoDEE no later than 12:00 PM on [2/9/2020] (Jordan
Local Time).
8th Circle
E-mail: [email protected]
Proposals should be submitted as 3 separate parts each part in a separate well-sealed and wrapped
envelope clearly marked, respectively, as follows:
50
Part I “NATIONAL E-INVOICING SOLUTION - Technical and Corporate
Capabilities Proposal”. This part (envelop) should contain 3 hard copies (1
original and 2 copies) and 1 softcopy (CD) [in Microsoft Office 2010 or Office
2010 compatible formats]. This part should not contain any reference to
cost or price. Inclusion of any cost or price information in the technical
proposal will result in the bidder’s proposal being disqualified as
irresponsive.
Part II “NATIONAL E-INVOICING SOLUTION –– Financial Proposal for Both
Options”. This part (envelop) should contain 3 hard copies (1 original and 2
copy) and 1 softcopy (CD) [in Microsoft Office 2010 or Office 2010
compatible formats].
Part III “NATIONAL E-INVOICING SOLUTION– Bid Security" This part
(envelope) should contain 1 hard copy. This part should not contain any
reference to cost or price. Inclusion of any cost or price information in the
technical proposal will result in the bidder’s proposal being disqualified as
irresponsive.
Note: Each CD should be enclosed in the relevant envelop. Late submissions will not be accepted nor
considered and in case of discrepancy between the original hard copy and other hard copies and/or
the soft copy of the proposal, the hard copy marked as original will prevail and will be considered the
official copy. Proposals may be withdrawn or modified and resubmitted in writing any time before the
submission date.
Regardless of method of delivery, the proposals must be received by the MoDEE no later than 12:00
PM on [2/9/2020] (Jordan Local Time).MoDEE will not be responsible for premature opening of
proposals not clearly labeled.
All responses to the RFP will be evaluated technically and financially and the winning proposal will be
selected on the basis of “best value” in terms of technical superiority as well as cost effectiveness.
Technical and financial proposals shall be reviewed by the Special Tendering Committee and evaluated
in accordance with the following criteria:
MoDEE reserves the right not to select any offer. MoDEE also assumes no responsibility for costs of
bidders in preparing their submissions.
51
5.5.1 Technical proposal
The technical proposal shall be first evaluated according to the following criteria:
52
Overall Technical Proposal 100
See section 5.3.2 Part II: Financial Proposal for a description of financial details. In addition, the bidder
must be able to provide a breakdown of fees and costs in accordance with all financial proposal
requirements outlined in section 4 of this RFP according to the structure per Annex 7.6.2.
Bidders should take into consideration the following general financial terms when preparing and
submitting their proposals.
The bond will be in the form of a bank guarantee from a reputable registered bank,
located in Jordan, selected by the bidder.
53
The bidder shall ensure that the (tender bond) proposal security shall remain valid for a
period of 90 days after the bid closing date or 30 days beyond any extension
subsequently requested by the tendering committee and agreed to by the bidder.
Any proposal not accompanied by an acceptable proposal security (tender
bond) shall be rejected by the tendering committee as being non-responsive
pursuant to RFP.
The proposal security of a joint venture can be in the name of all members
participating in the joint venture submitting the proposal or in the name of
one or more members in the joint-venture.
The proposal security of the unsuccessful bidders will be returned not later
than 30 days after the expiration of the proposal validity period.
The winning bidder is required to submit a performance bond of 10% of the
total value of the contract within 14 days as of the date of award notification
letter.
The proposal security of the winning bidder will be returned when the
bidder has signed the contract and has furnished the required performance
security.
The proposal security may, in the sole discretion of the tendering
committee, be forfeited:
If the bidder withdraws its proposal during the
period of proposal validity as set out in the RFP; or
In the case of winning bidder, if the bidder fails
within the specified time limit to sign the contract;
or sign the joint venture agreement in front of a
notary public in Amman, Jordan; or furnish the
required performance security as set out in the
contract.
ITEM DATE
(DD/MM/YY)
54
Expected date for answers to bidders’ questions 9/10/2019
55
6 GENERAL TERMS
6.1 Escalation Procedure and Penalties:
1. Passed the Response Time: first level of escalation will be applied by notifying winning
bidder’s Technical Support Manager or the assigned contact person.
2. Passed the Resolution Time: ISTD is entitled to fix the problem and to apply penalty on
the winning bidder in accordance with the following criteria in the below table and all
costs incurred by ISTD for fixing will be charged to the winning bidder.
Table 2: Penalties
56
6.2 Preventive Maintenance (PM)
The winning bidder is required to provide the following visits for the purpose of PM on the hardware
equipment and software from the date of the preliminary acceptance by ISTD.
- Site visits to NITC one time for each month for the first six months and one time for each
quarter for the remaining maintenance period.
- Certified engineer with transportation who must present during all PM visits.
- Checking all the items that are included in the checklist that will be provided by ISTD.
- A PM form that must be signed by the winning bidder team and NITC representative.
- Compliance with the PM schedule that will be provided by NITC.
- Solution to all problems found during PM visits.
A penalty of 500 JD per visit per location will be charged for not accomplishing the PM aforementioned
responsibilities.
Bidders should take into consideration the following general legal terms when preparing and
submitting their proposals.
6.4.1 Joint-ventures
If the Bidder decides to form a joint venture, the joint venture members
should duly sign the joint venture agreement attached to this RFP under
(Annex 7.6) by authorized representatives of the joint venture partners
without being certified by a notary public and to be enclosed in the technical
proposal in addition to authorization for signature on behalf of each
member. Only the winning bidder partners in a joint venture should duly
sign the joint venture agreement attached to this RFP under (Annex 7.6) by
authorized signatories and this agreement is to be certified by a Notary
Public in Jordan within (10) calendar days as of the date of award
notification and before signing the Contract; otherwise MoDEE is entitled to
forfeit the bid bond whether it is in the name of all partners to the joint
venture or in the name of any of the joint venture partners. Each partner in
the joint venture shall be a business organization duly organized, existing
and registered and in good standing under the laws of its country of
domicile. The Bidder must furnish evidence of its structure as a joint venture
including, without limitation, information with respect to:
A. the legal relationship among the joint venture members that shall include
joint and several liability to execute the contract; and
B. the role and responsibility of each joint venture member
57
The Bidder must nominate a managing member (leader) for any joint
venture which managing member will be authorized to act and receive
instructions on behalf of all the joint venture members.
All bidders should duly sign the joint venture agreement attached to this RFP
under (Annex 7.6) by authorized representatives of the joint venture
partners without being certified by a notary public and to be enclosed in the
technical proposal in addition to authorization for signature on behalf of
each member. Only the winning bidder partners in a joint venture should
duly sign the joint venture agreement attached to this RFP under
(Annex 7.6) by authorized signatories and this agreement is to be certified
by a Notary Public in Jordan.
If the bidder is a joint venture, then the partners need to be identified with
the rationale behind the partnership. Corporate capability statement should
also be provided for all partners
58
prices at artificial non-competitive levels and to deprive MoDEE of the benefits of free and
open competition.
The laws and regulations of The Hashemite Kingdom of Jordan shall apply to
awarded contracts.
Bidders must fill out, stamp and duly sign the Form of Bid (نموذج عرض
) المناقصةattached to the Arabic Sample Agreement under )2( ملحق رقمand
enclose it in their financial proposals.
Bidders must fill out the summary payment schedule form sub annex 3
)3 (الملحق رقمwhich is part of the Arabic Sample Contract version provided
with the RFP, sign and stamp it, and enclose it with the Financial Proposal.
MoDEE takes no responsibility for the costs of preparing any bids and will
not reimburse any bidder for the cost of preparing its bid whether winning
or otherwise.
59
Bidders must review the Sample Arabic Contract Agreement provided with
this RFP and that will be the Contract to be signed with the winning bidder.
Provisions in this Sample Arabic Contract Agreement are not subject to any
changes; except as may be amended by MoDEE before tender submission;
such amendments are to be issued as an addendum.
Proposals shall remain valid for period of (90) days from the closing date for
the receipt of proposals as established by the Special Tenders Committee.
MoDEE reserves the right to accept, annul or cancel the bidding process and
reject all proposals at any time without any liability to the bidders or any
other party and/withdraw this tender without providing reasons for such
action and with no legal or financial implications to MoDEE.
MoDEE reserves the right to disregard any bid which is not submitted in
writing by the closing date of the tender. An electronic version of the
technical proposal will only be accepted if a written version has also been
submitted by the closing date.
MoDEE reserves the right to disregard any bid which does not contain the
required number of proposal copies as specified in this RFP. In case of
discrepancies between the original hardcopy, the other copies and/or the
softcopy of the proposals, the original hardcopy will prevail and will be
considered the official copy.
MoDEE reserves the right to enforce penalties on the winning bidder in case
of any delay in delivery defined in accordance with the terms set in the
sample Arabic contract. The value of such penalties will be determined in
the Sample Arabic contract for each day of unjustifiable delay.
Bidders may not object to the technical or financial evaluation criteria set
forth for this tender.
ISTD is entitled to meet (in person or via telephone) each member of the
consulting team prior to any work, taking place. Where project staff is not
felt to be suitable, either before starting or during the execution of the
60
contract, ISTD reserves the right to request an alternative staff at no extra
cost to ISTD.
Each bidder will be responsible for providing his own equipment, office
space, secretarial and other resources, insurance, medical provisions, visas
and travel arrangements. ISTD will take no responsibility for any non-
Government of Jordan resources either within Jordan or during travel
to/from Jordan.
The bidder may modify or withdraw its proposal after submission, provided
that written notice of the modification or withdrawal is received by the
tendering committee prior to the deadline prescribed for proposal
submission. Withdrawal of a proposal after the deadline prescribed for
proposal submission or during proposal validity as set in the tender
documents will result in the bidder’s forfeiture of all of its proposal security
(bid bond).
A bidder wishing to withdraw its proposal shall notify the Special Tenders
Committee in writing prior to the deadline prescribed for proposal
submission. A withdrawal notice may also sent by fax, but it must be
followed by a signed confirmation copy, postmarked no later than the
deadline for submission of proposals.
The Bidder accepts to comply with all provisions, whether explicitly stated in
this RFP or otherwise, stipulated in the Government Procurement By-Law
No. 28 of 2019 and its amendments and instructions, and any other
61
provisions stated in the Standard Contracting sample Arabic Contract
Agreement annexed to this RFP including general and special conditions.
The winning bidder shall perform the Services and carry out their obligations
with all due diligence, efficiency, and economy, in accordance with the
highest generally accepted professional techniques and practices, and shall
observe sound management practices, and employ appropriate advanced
technology and safe methods. The Winning Bidder shall always act, in
respect of any matter relating to this Contract or to the Services, as faithful
advisers to ISTD, and shall at all times support and safeguard ISTD‘s
legitimate interests in any dealings with Sub-contractors or third parties.
If there is any inconsistency between the provisions set forth in the Sample
Arabic Contract Agreement attached hereto or this RFP and the proposal of
Bidder; the Sample Arabic Contract Agreement and /or the RFP shall prevail
ISTD reserves the right to furnish all materials presented by the winning
bidder at any stage of the project, such as reports, analyses or any other
materials, in whole or part, to any person. This shall include publishing such
materials in the press, for the purposes of informing, promotion,
advertisement and/or influencing any third party, including the investment
community. ISTD shall have a perpetual, irrevocable, non-transferable, paid-
up right and license to use and copy such materials mentioned above and
prepare derivative works based on them.
Bidders (whether in joint venture or alone) are not allowed to submit more
than one proposal for this RFP. If a partner in a joint venture participate in
more than one proposal; such proposals shall not be considered and will be
rejected for being none-responsive to this RFP.
62
The Winning Bidder, their Sub-contractors, and the Personnel of either of
them shall not, either during the term or after the expiration of the
Contract, disclose any proprietary or confidential information relating to the
Project, the Services, the Contract, or The ISTD’s business or operations
without the prior written consent of The ISTD. The Winning Bidder shall sign
a Non-Disclosure Agreement with ISTD as per the standard form adopted by
the ISTD. A confidentiality undertaking is included in (Annex 7.5).
PROHIBITION OF CONFLICTING ACTIVITIES
Neither the Winning Bidder nor their Sub-contractors nor their personnel shall engage, either directly
or indirectly, in any of the following activities:
o If requested by ISTD to do so, the Winning Bidder shall bring into existence,
sign, execute or otherwise deal with any document that may be necessary or
desirable to give effect to these provisions.
o The Winning Bidder shall at all times indemnify and hold harmless ISTD, its
officers, employees and agents from and against any loss (including legal
costs and expenses on a solicitor/own client basis) or liability incurred from
any claim, suit, demand, action or proceeding by any person in respect of
63
any infringement of Intellectual Property by the Winning Bidder, its officers,
employees, agents or Sub-contractors in connection with the performance
of the Services or the use by ISTD of the Contract Material. This indemnity
shall survive the expiration or termination of the Contract.
o The Winning Bidder not to benefit from commissions discounts, etc. The
remuneration of the Winning Bidder stated in the Decision of Award of the
bid shall constitute the Winning Bidder sole remuneration in connection
with this Project and/or the Services, and the Winning Bidder shall not
accept for their own benefit any trade commission, discount, or similar
payment in connection with activities pursuant to this Contract or to the
Services or in the discharge of their obligations under the Contract, and the
Winning Bidder shall use their best efforts to ensure that the Personnel, any
Sub-contractors, and agents of either of them similarly shall not receive any
such additional remuneration.
LIABILITY
o The liability of either party for breach of the Contract or for any other
statutory cause of action arising out of the operation of the Contract will be
determined under the relevant law in Hashemite Kingdom of Jordan as at
present in force. This liability will survive the termination or expiry of the
Contract. Winning bidder’s total liability relating to contract shall in no event
exceed the fees Winning bidder receives hereunder, such limitation shall not
apply in the following cases (in addition to the case of wilful breach of the
contract):
gross negligence or wilful misconduct on the part of
the Consultants or on the part of any person or firm
acting on behalf of the Consultants in carrying out
the Services,
an indemnity in respect of third party claims for
damage to third parties caused by the Consultants
or any person or firm acting on behalf of the
Consultants in carrying out the Services,
infringement of Intellectual Property Rights
64
6.5 Conflict of Interest
The Winning bidder warrants that to the best of its knowledge after making
diligent inquiry, at the date of signing the Contract no conflict of interest
exists or is likely to arise in the performance of its obligations under the
Contract by itself or by its employees and that based upon reasonable
inquiry it has no reason to believe that any sub-contractor has such a
conflict.
If during the course of the Contract a conflict or risk of conflict of interest
arises, the Winning bidder undertakes to notify in writing ISTD immediately
that conflict or risk of conflict becomes known.
The Winning bidder shall not, and shall use their best endeavours to ensure
that any employee, agent or sub-contractor shall not, during the course of
the Contract, engage in any activity or obtain any interest likely to conflict
with, or restrict the fair and independent performance of obligations under
the Contract and shall immediately disclose to ISTD such activity or interest.
If the Winning bidder fails to notify ISTD or is unable or unwilling to resolve
or deal with the conflict as required, ISTD may terminate this Contract in
accordance with the provisions of termination set forth in the Contract.
The Winning bidder shall comply and shall ensure that any sub-contractor complies, so far as
compliance is required, with the secrecy and security requirements of ISTD, or notified by ISTD to the
Winning bidder from time to time.
All plans, drawings, specifications, designs, reports, and other documents and software submitted by
the Winning bidder in accordance with the Contract shall become and remain the property of ISTD,
and the Winning bidder shall, not later than upon termination or expiration of the Contract, deliver all
such documents and software to ISTD, together with a detailed inventory thereof. Restrictions about
the future use of these documents, if any, shall be specified in the Special Conditions of the Contract.
Except as ISTD may otherwise agree, no changes shall be made in the key
Personnel. If, for any reason beyond the reasonable control of the Winning
bidder, it becomes necessary to replace any of the key Personnel, the
Winning bidder shall provide as a replacement a person of equivalent or
better qualifications and upon ISTD approval.
If ISTD finds that any of the Personnel have (i) committed serious
misconduct or have been charged with having committed a criminal action,
or (ii) have reasonable cause to be dissatisfied with the performance of any
of the Personnel, then the Winning bidder shall, at ISTD’ s written request
specifying the grounds thereof, provide as a replacement a person with
qualifications and experience acceptable to ISTD.
65
6.9 Other Project-related Terms
ISTD reserves the right to conduct a technical audit on the project either by ISTD resources or by third
party.
66
7 ANNEXES
7.1 Bylaw of organizing & controlling invoicing 34/ 2019 ( نظام تنظيم شؤون
)2019 لسنة34 الفوترة والرقابة عليها رقم
Issued pursuant to paragraph (f) of Article (23) of the Income Tax Law No. 34 of 2014
Article 1:
This Regulation shall be cited “Invoicing Organization and Control Regulation of 2019” and come into
force after 60 days from the date of its publication in the Official Gazette.
Article 2:
A. The following terms and expressions shall have the meanings assigned there to unless
indicated otherwise:
Law: The effective Income Tax Law.
Commodity : Each natural substance or animal, agricultural, or industrial product including electricity.
Service: Each paid or unpaid work done by the person including provision of a benefit to the others,
and such work does not include commodity provision unless such commodity is necessary to provide
such service.
Invoice: A document issued by the seller whether the commodity seller or service provider to the
buyer or service recipient, indicating a description of the commodity/service, price, quantity, as well
as the general sales tax of taxpayers registered with general sales tax, that is issued under the terms
and conditions specified in this Regulation.
Commodity selling: is transference of the commodity’s ownership to the buyer whether for a return
or not, using the commodity by the taxpayer for their private purposes, enabling the others to do so
for a return or not, or any legal ownership transference disposition.
67
Service selling: is the provision of the service by the seller to the buyer for a return or not.
B. The definitions provided for in the Law wherever they appear in this Regulation shall be
used unless indicated otherwise.
Article 3:
A. The time and date on which the selling process takes place under Paragraphs (A, B) of this
Article shall be the time and date of occurrence of the commodity or service selling.
Article 4:
For the purposes of implementing the provisions of this system shall be adopted invoice in all forms,
whether paper, computer or electronic.
Article 5:
Each person selling a commodity or service for over one Dinar shall issue the invoice in duplicate
including the following information:
A copy of the invoice shall be delivered to the buyer in accordance with the method used by the seller
in organizing and issuing invoices, while the remaining copies shall be kept by the seller.
The seller shall confirm receipt of the invoice by the buyer If the value of it exceeds (10,000 JD).
The seller shall issue and regulate the invoice upon occurrence of the selling.
Article 6:
Each person required to organize and issue the invoice shall prepare a paper-based or computerized
log for commodity and/or service sales with the letterhead in the name of the seller with the following
contents:
The commercial markets or any other entity may organize a total invoice for each day, including all its
daily sales, with the prior approval of the Director at the request of these authorities. This shall be
regulated by instructions issued by the Minister for this purpose.
68
It is permissible for malls and shopping centers to organize a total invoice of their daily sales for the
purposes of this Regulation provided that pre-consent of the Director shall be obtained upon the
request of such entities. This shall be regulated by instructions issued by the Minister for this purpose.
Article 8:
Every person is obliged to organize and issue the invoice under the provisions of this Law:
A. Each person required to organize and issue the invoice under the provisions of this
Regulation shall keep them for four years as of the latest of the following dates:
1. Ending date of the tax period during which the invoice was organized and issued
2. Date of filing the tax return
3. Date of notification of an administrative assessment decision.
In the case of any dispute over the invoice, amount of tax due, or
any penalties and related amounts, each person required to
organize and issue the invoice under the provisions of this
Regulation shall keep such invoice until the dispute is resolved or a
final court decision is made. In all cases, the period of retention
shall not be less that the period specified under Paragraph (A) of
this Article.
Article 9:
Each commodity/service seller shall enable the Department to transfer all invoice data and
information electronically to the Department, and the unit established in the Department shall be
responsible for this.
Article 10:
Responsibility of matching the data and information mentioned on the invoice with the real process
of commodity selling or service provision shall be on the seller and buyer alike, and each shall be
responsible for the invoices that do not match with the real process.
Article 11:
A. Subject to Paragraph (B) of this Article, the establishment whose purpose on the commercial
register, company register, or professional licensing is “grocery, minimarket, supermarket,
and shop” and actually practice this activity with annual turnover of less than 75,000 Dinar,
craftsmen whose annual turnover from the craft is less than 30,000 Dinar, as well as any
other groups specified by the executive instructions shall be excluded from invoice
organization and issuance.
B. If a person, not required to organize and issue the invoice, has sold a commodity/service and
has enough evidence that their turnover is not less than the threshold specified under
Paragraph (A) of this Article, the Director may require them to organize and issue the
invoice, and the provisions of this Regulation shall apply thereto.
C. Any of the entities provided for in Paragraph (A) of this Article may submit a written request
to the Department to issue the invoice, and in such case the provisions of this Regulation
shall apply thereto.
Article 12:
69
Regulation apply, may amend the data of the invoices or issue invoice templates in line with
the nature of the seller or entity’s activity.
B. In case the seller does not have an electronic invoicing system, the manual invoicing system
shall be used.
Article 13:
Notwithstanding the provisions of this Regulation, leasing contracts containing the data and
information specified under Article 5 of this Regulation shall be used in lieu of the invoices.
Article 14:
Each person failing to issue the invoice in accordance with the provisions of this Regulation shall be
penalized of tax evasion as provided by Law.
Article 16:
The Minister shall issue the executive instructions necessary to implement the provisions of this
Regulation, provided that they shall be published in the Official Gazette.
The offered e-service solution should provide contact center agents users with enough privileges and
access to Information for them to perform their required role.
In addition to the above, the winning bidder is required to deliver the following for contact center use:
o Technical
o Business (informational)
70
Furthermore, a number of categories of queries / contact reasons and contact drivers are anticipated:
Category:
Difference between “What are the benefits, “I have completed this “I used to receive
E-Service and compared to going to the process now, should I not notification via letter, is
traditional service relevant government go somewhere to pick up the e-mail I just received
entities?” the paperwork?” replacing the letter?”
“What kind of
information do I need to
have in order to
complete the process?”
Fulfilment “If I submit the request “It has been 2 weeks since
tomorrow, when will I I was supposed to receive
receive the output?” my paperwork. Why
71
haven’t I received it
already?”
The winning bidder should make the following information ready to the contact center team to learn
about:
o The Service
o The issues related to the current processes
o The changes and improvements made with the E-Service
o The processes surrounding the E-Service
o The remaining issues that people have to deal with around the E-
Service
o The impact on the Civil Servants population
o identify the as-is situation in the relevant government entities, as
well as the expected changes due to the introduction of E-Service
o Activities that the contact center could / need to “piggyback” in
order to complete the whole process.
Introduction
Executive Summary
This includes the bidder’s understanding of the terms of reference, scope of work and necessary skills,
and company profile. This involves including an overview of the main points contained in the proposal
with references to sections where more detailed discussion of each point can be found (maximum 4
pages).
Approach
72
A detailed description of how the bidder will undertake each major area in the SCOPE OF THE PROJECT
and DELIVERABLES section (see section 4), required resources (bidder, ministry and third party) and
any special skills required, the deliverables (format and structure), use of any methodology and how
it will cover the scope, use of any standard tools, and duration of any work streams.
[Activity 1]
Implementation Approach
Actions Approach
… …
Deliverables
Deliverables Format and Structure
Provides a listing of the deliverables of Describes the format (e.g. MS Word document) and
the Activity Structure (e.g. Outline, indicating the scope and
content) of each deliverable.
… …
[Activity 2]
Implementation Approach
Actions Approach
… …
Deliverables
73
Deliverables Format and Structure
Provides a listing of the deliverables of Describes the format (e.g. MS Word document) and
the Activity Structure (e.g. Outline, indicating the scope and
content) of each deliverable.
… …
[Activity…]
Implementation Approach
Actions Approach
… …
Deliverables
Deliverables Format and Structure
Provides a listing of the deliverables of Describes the format (e.g. MS Word document) and
the Activity Structure (e.g. Outline, indicating the scope and
content) of each deliverable.
… …
The work plan and duration for the overall consulting work, including any dependencies between the
separate items in the scope. The bidder should provide milestones for each deliverable. The work
plan should break down the phases and tasks within each phase and indicate which resources will be
working on these tasks
Track Record
The bidder’s track record on projects similar in both size and nature undertaken in the last five years,
and references of suitable client references with contact details
74
CVs of Project Staff
A summary of proposed team and a description of each project staff role and their relevant
experience. Brief resumes of the team who will work on the project (all detailed resumes should be
included in an Appendix). The bidder should also indicate the availability of the proposed staff and
indicate which phases of the project each team member is participating in, what role they will be
playing, and what their utilization rate will be (percentage of their time), below is the required
template to be filled for each team member
Curriculum Vitae
Profession/Position: ______________________
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
75
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
________________________________________________________________________________
_
Education
________________________________________________________________________________
_
Employment Record:
Employer ___________________________________
76
Position held ________________________________________________
Employer ___________________________________
Employer ___________________________________
Languages:
ReadingSpeaking Writing
Language 1
Language n
------------------------------------------------------ -----------------------------
Signature Date
Cost should be broken down as per the schedules below as well as the detailed scope of work
presented in section 3 of this document.
The price quotation should be all-inclusive fixed lump sum price and provided in Jordanian Dinars (JD).
All prices are inclusive of all fees and taxes. All prices are for site delivery.
Project Total Cost (Lump Sum Contract Amount) for the total compensation for the whole WORK
contemplated under this proposal: [ JD]
77
Services Amount
Project Management
Quality Management
Total
(Jordanian Dinars)
Skill 2
Skill 3
Skill N
TOTAL
78
Total Amount in Words: (Only ------------------------------------------------------------------------------Jordanian
Dinars)
Skill 2
Skill N
TOTAL
79
Proposed Software Licenses
Software Supplier Name of License Metrics No Unit price Total One year maintenance Total (inc maint)
Software (i.e. by number of Licenses (24/7) and upgrade
clients, processor
power or other
TOTAL
(i) Use several lines in the table if the license complexity warrants
80
Training and Knowledge Transfer
Skill 2
Skill n
TOTAL
Skill 2
Skill n
TOTAL
Project Management:
81
[ List all activities Skill 1
associated with Project
Management]
Skill 2
Skill n
TOTAL
Quality Management:
Skill 2
Skill n
TOTAL
Note (1): The Itemized Financial Proposal will be examined prior Contract Award in order to ascertain
that the items are correctly calculated. The itemized prices are for reference only and the lump sum
price shall constitute all costs …etc incurred by the bidder for the execution of the project. Should any
arithmetical error be found, it will be corrected and the Proposal Value will be amended accordingly.
MoDEE encourages all bidders to study carefully their prices and to submit their final and lowest
prices.
Note (2): The bidder shall also take into account that all the rates quoted in his Price Proposal shall be
fixed throughout the Contract duration and that no adjustment to such rates shall be accepted by
MoDEE , except when otherwise provided for in the Contract.
82
7.5 Confidentiality Undertaking
Confidentiality Undertaking
___________________________________
This Undertaking is made on [DATE] by [NAME] “[Consultant]” to the benefit of ISTD, “[Principal]”
[Address XXXXXXX].
WHEREAS, ISTD possesses certain financial, technical, administrative and other valuable Information
(referred to hereinafter as Confidential Information)
WHEREAS, [Consultant], while performing certain tasks required by the Principal in connection with
the ………………. (the Project), did access such Confidential Information,
WHEREAS, the Principal considers the Confidential Information to be confidential and proprietary.
Confidential Information:
As used in this Agreement, the term “Confidential Information” means all information, transmitted by
Principal or any of its subsidiaries, affiliates, agents, representatives, offices and their respective
personnel, consultants and winning bidders, that is disclosed to the Winning bidder or coming to his
knowledge in the course of evaluating and/or implementing the Project and shall include all
information in any form whether oral, electronic, written, type written or printed form. Confidential
Information shall mean information not generally known outside the Principal, it does not include
information that is now in or hereafter enters the public domain without a breach of this Agreement
or information or information known to Winning bidder by Third Party who did not acquire this
information from Principal”.
1) The Confidential Information will be retained in the Principal’s premises and will not be
moved without the express written consent of the Principal. All Confidential Information
shall be and remain the property of the Principal, and such Confidential Information and any
copies thereof, as well as any summaries thereof, shall be promptly returned to the Principal
upon written request and/or destroyed at the Principal's option without retaining any
copies. The Winning bidder shall not use the Confidential Information for any purpose after
the Project.
2) It will use all reasonable means and effort, not less than that used to protect its own
proprietary information, to safeguard the Confidential Information.
3) the Winning bidder shall protect Confidential Information from unauthorized use,
publication or disclosure.
4) It will not, directly or indirectly, show or otherwise disclose , publish, communicate, discuss ,
announce, make available the contents of the Confidential Information or any part thereof
to any other person or entity except as authorized in writing by the Principal.
5) It will make no copies or reproduce the Confidential Information, except after the Principal’s
written consent.
83
The Winning bidder acknowledges that monetary damages for unauthorized disclosure may not be
less than 20% of the Project and that Principal shall be entitled, in addition to monetary damages and
without waiving any other rights or remedies, to such injunctive or equitable relief as may be deemed
proper by a court of competent jurisdiction.
It is understood that the Winning bidder might need from time to time to discuss the details of
confidential Information with other individuals employed within its own or associated companies in
order to support, evaluate, and/or advance the interests of the subject business transaction. Any such
discussion will be kept to a minimum, and the details disclosed only on a need to know basis. Prior to
any such discussion, the Winning bidder shall inform each such individual of the proprietary and
confidential nature of the Confidential Information and of the Winning bidder’s obligations under this
Agreement. Each such individual shall also be informed that by accepting such access, he thereby
agrees to be bound by the provisions of this Agreement. Furthermore, by allowing any such access,
the Winning bidder agrees to be and remain jointly and severally liable for any disclosure by any such
individual that is not in accordance with this Agreement.
Miscellaneous
The obligations and rights of the Parties shall be binding on and inure to the benefit of their respective
heirs, successors, assigns, and affiliates. This Agreement may be amended or modified only by a
subsequent agreement in writing signed by both parties. Winning bidder may not transfer or assign
the Agreement or part thereof. No provision of this Agreement shall be deemed to have been waived
by any act or acquiescence on the part of the Principal, its agents or employees, nor shall any waiver
of any provision of this Agreement constitute a waiver of any other provision(s) or of the same
provision on another occasion. This Agreement shall be construed and enforced according to
Jordanian Law. The Winning bidder hereby agrees to the jurisdiction of the Courts of Amman, Jordan
and to the jurisdiction of any courts where the Principal deems it appropriate or necessary to enforce
its rights under this Agreement.
Term of Agreement
The obligations of the parties under this Agreement shall continue and survive the completion of the
Project and shall remain binding even if any or all of the parties abandon their efforts to undertake or
continue the Project.
IN WITNESS WHEREOF, the Winning bidder hereto has executed this Agreement on the date first
written above.
Consultant:
By:____________________________
Authorized Officer
84
7.6 Joint Venture Agreement Template
1- To form a Joint Venture to execute the works specified ( على تشكيل ائتالف فيما بينهم لتنفيذ أشغال عقد العطاء رقم-1
in the Contract of the Central Tender No. ( / ) المبرم أو الذي سوف.......................................) المتعلق بـ /
......................................................... which was signed or .يبرم مع صاحب العمل
to be signed with the Employer.
يلتزم جميع أطراف االئتالف بإنجاز جميع االشغال المتفق عليها مع-2
2- All parties of the Joint Venture shall be obliged to صاحب العمل والمنصوص عليها في عقد العطاء ويكونون متضامنين
perform all works agreed upon with the employer which ومتكافلين في مسئولياتهم نحو صاحب العمل فيما يخص كافة األشغال
are specified in the tender contract, and they are jointly وفي حالة تخلف أو. ) والعقد الخاص به/ ( المتعلقة بالعطاء رقم
and severally responsible for all works related to tender ً تأخر أحد أطراف االئتالف عن إنجاز المسئوليات المناط به تنفيذها جزئيا
no. ( / ) and the contract pertaining thereto. Should أو منفردين دون تحفظ بإنجاز/ أو كليا ً يلتزم بقية األطراف مجتمعين و
one party fails or delays to perform its obligations either جميع االلتزامات المحددة بالعقد الموقع مع صاحب العمل بالشكل المتفق
partially or totally, it shall be the responsibility of all other .عليه في العقد
parties jointly and severally without reservation to
execute all obligations set under the contract with the
Employer to the same standards specified by the contract
.
3- The parties to the Joint Venture nominate .....................................، يعين أطراف االئتالف رئيسا ً لالئتالف-3
............................................. as leader of the Joint وأي مراسالت تتم بين صاحب العمل، ) / ( إلدارة العطاء رقم
Venture. Any correspondence between the Employer and التجمع او المشاركة توجه إليه،واالئتالف
the parties to the Joint Venture shall be addressed to such
leader.
ممثالً لرئيس االئتالف.................. يسمي أطراف االئتالف السيد-4
ومفوضا" بالتوقيع نيابة عن االئتالف على كافة األوراق والعقود الخاصة
4- The parties to the Joint Venture nominate
Mr........................................ as a representative of the
) وبتمثيل االئتالف أمام المحاكم المختصة والدوائر/ ( بالعطاء رقم
leader and he is authorized to sign on behalf of the Joint
والمالية الرسمية وغير الرسمية في كافة األمور العقدية واإلدارية
Venture all documents and contracts related to tender no. . به الخاص ) والعقد/ ( والقضائية المتعلقة بالعطاء رقم
( / ) , and to represent the Joint Venture before all
competent courts and non-official bodies in all
85
contractual, administrative , financial and legal issues ال يحق ألطراف االئتالف أو أي طرف فيه فسخ االئتالف فيما بينهم أو-5
related to tender No. ( / ) and the contract pertaining تبديل ممثل رئيس االئتالف إال بعد انتهاء األشغال المحالة عليهم بموجب
thereto. العقد الخاص بهذا العطاء وتكون مسئولياتهم تجاه صاحب العمل قائمه إلى
حين تسليم األشغال استالما ً نهائيا حسب شروط االستالم المحددة في وثائق
5- The parties to the Joint Venture have no right to العطاء/ العقد
terminate this agreement or substitute the leader’s
representative until the works awarded to them by the
contract to this tender are completed and shall remain
responsible before the employer until the works are حررت هذه االتفاقية باللغتين العربية واإلنجليزية في حالة نشوء أي-6
finally taken over as per the conditions of taking over اختالف في تفسير أي من بنودها تعتبر لغة العقد المعتمدة هي اللغة العربية
specified in the Tender / Contract documents .
وملزمة للطرفين
6- This agreement is written in both Languages Arabic and
English should any discrepancy in interpretation arise the
Arabic text shall be considered the authentic.
الطرف الثالث
الطرف الثاني الطرف األول
الخاتم المعتمد
Seal
................ ................ ................
Implementation Framework
This section provides a definition of a general framework for e-government infrastructure components
that is based on the concept of the e-Government Architecture Framework (eGAF) and Service
Oriented Architecture (SOA) as well as two other major initiatives – e-Government Portal and Secure
86
Government Network – that are major supporting infrastructure components for e-Services. In
addition to other important initiatives like the e-Government Contact Centre, National Payment
gateway(EFAWATEERcom), Government Service Bus (GSB), and National E-gov Portal.
e-Government Architecture
As the facilitator of the implementation and delivery of governmental e-Services, the e-Government
Program has been working diligently to define its target e-Government federated enterprise
architecture, which is meant to enable seamless integration and secure interoperability of services
between distributed entities cohesively and cost effectively using SOA. The responsibility of the
implementation and delivery of government e-Services lies upon the government and its various
entities:
The e-Government Program plays the role of the “e-Services enabler” by providing the components
that constitute the Central e-Government Service Delivery Platform;
The other governmental entities (mainly ministries) play the role of the “e-Services providers” by
composing and operating their e-Services, having the choice to either outsource these services, or
operate them in-house.
87
The following diagram presents a high-level view of the various e-Government stakeholders, and
depicts the federated, customer-centric nature of the e-Government architecture1:
Governmental Portals
E-Government Portal
Services
E-Gov
Services
Contact
Center
E-Government
Program Businesses
Business Portals
The following diagram depicts the main building blocks for the e-Government target architecture:
1
The diagram is meant to present a high-level view of the e-Government from a business perspective; hence
many businesses and technical details do not appear for the sake of the overall understanding.
88
Figure 5.4.2: e-Government Architecture High-level View
As shown in the above diagram, the e-Government Program will provide a central Government Service
Bus (GSB) that will serve as a unique point of traffic. It will take care of routing service invocations
towards service providers and of returning responses back to the service clients (which could be the
portal or some other service as in the case of cross-organizational e-Services). The e-Government
Program will also provide a set of shared services (for instance National Payment Gateway
,EFAWATEERcom, notification gateway, etc.) that can be invoked from within the context of any
e-Service, promoting reuse of components across the government and thus reducing the costs by
eliminating the needs for dedicated implementations of components that perform the same
functionalities offered by any of the central shared functionalities at the entities side. The services
directory will maintain an active list of all available services as well as their interface specifications. A
central identity management solution will be used to federate identities, provide (when applicable)
single-sign-on, facilitate propagation of user identities and attributes across the e-Government trust
domain, and enable account provisioning. Finally, a central technical performance model will be put
in place to enable concerned technical stakeholder at the e-Government Program to monitor the
health and performance of the overall e-Government and identify issues and bottlenecks as well as
potential areas for improvement. In order to prevent vendor lock-in, all of the above components will
be built solely upon open standards, such as Web Services, SOAP. Where necessary, all service
providers shall conform to the above standards in order to interoperate with other components within
the e-Government framework.
The e-Government of Jordan Program will also provide Government Entities with an Enterprise
Architecture Framework and methodology to help them in building their Enterprise Architecture in
respect of the above principles. The e-Government Program will also provide help and support on how
to apply this framework to aid the entities during the course of the framework implementation.
The e-Government Program will provide all necessary documentation and support in order to enable
project implementers to produce deliverables that are in line with the e-Government architecture
vision in the form of a Reference Model Winning PSPs shall have to access the necessary
documentation.
89
Government-to-Citizen (G2C)
Government-to-Business (G2B)
Government-to-Government (G2G)
Jordan e-government program is capitalizing over the G2G, G2B, and G2C service models in order to
provide information integration between the different government entities to improve government
processes efficiency, easy end users accessibility, increase transparency and reduce total cost of
ownership.
The following figure depicts the different parties involved in the integration.
Government entities: Government entities form the major customer and beneficiary for
the business integration service provided by the e-government central platform. G2G
integration model shall introduce efficient mechanism for integrating the government
entities in order to deliver G2C, G2E and G2B services.
Telecommunication companies: Telecommunication companies are considered business
partners. The program will be responsible for providing the G2B integration services
between those companies and the government entities. One example of such services
can be the SMS notification.
Business partners: The program will be responsible for providing the G2B integration
service between business partners and government entities. Example for such business
partners: payment service providers (PSP) and private banks.
Contact center: Contact center’s business is to serve the government entities end users.
The program will be responsible for providing the G2B integration services between
those contact centers and the government entities.
The IT infrastructure in the government entities and other business partners in Jordan is
heterogeneous across operating systems, applications and software packages. Existing applications
are used to run current business processes; so starting from scratch to build new infrastructure is a
very expensive and non-practical option. Hence; government entities should quickly respond to
business changes with agility; leverage existing investments in applications and application
90
Infrastructure in order to address newer business requirements; support new channels of interactions
with clients and partners (other government entities); and feature an architecture that supports
business oriented model.
SOA is efficient for large and distributed systems where other types of integration are more complex
and costly.
Vertical e-Services integration pattern: defines the pattern in which services are provided
end-to-end by one government entity. It’s true that such services are provided by one
government entity but their integration pattern may use some of the e-government central
platform shared services such as authentication, online payment, notification, contact
center … etc.
Cross organizational e-Services integration pattern: defines the pattern in which a
government service requires the involvement of several government entities in order to be
delivered.
Composite e-Services integration pattern: defines the pattern in which a service flows across
multiple government entities and contribute to e-Government overall objectives (e.g. GRP).
Shared e-Services integration pattern: shared services are defined as the ‘’enablers’’,
providing technology-based functionality that are central to the provision of vertical and
cross-organizational services. Their ultimate ownership belongs to the e-government central
platform as part of the federated architecture framework.
Jordan Information Interoperability Framework (IIF)
The Jordan e-government program has initiated an information interoperability framework that will
manage and standardize the exchange of common and shared information between the different
parties involved in the e-government of Jordan such as the government entities, central platform and
business partners.
The IIF mandates that all the parties should speak the same language and this includes:
Protocol: SOAP/HTTP(s)
Content type: XML
Standards: Jordan e-government standards
Format: IIF format
Note : For any new service that will be integrate with GSP it’s recommended to be implemented using
the WCF standard.
91
A government entity will utilize the central platform integration services published web services, and
other government entities published e-Services to compose the business processes for their cross
organizational e-service. The following figure depicts the relation between the integration
infrastructure provided by the e-government central platform and the BPM components at the
government entities premises.
2
WFMS: A software application that stores process definitions and runs jobs based on those process definitions
via its workflow engine component. The workflow engine is the runtime execution module.
92
Figure 5.4.5: E-GAF Integration Reference Model
As depicted in the figure above; the reference model crosses the different parties involved in the SOA
architecture: service consumer; integration services (GSB), and the service provider.
The consumer will implement the Web service client application that contains either direct calls to
published Web services or calls to the orchestrated or choreographed or business processes.
The provider publishes his services (atomic and composite) through the GSB. The services are enabled
by a set of components (JavaBean, EJB, COM, DCOM, PLSQL … etc.). Such components form the bridge
between the backend applications, business applications and databases on one side and the web
services on the other side.
The integration services at the central platform represented by the GSB form the mediator between
the service consumer and service provider. The GSB provides several services and functionalities such
as integration hub, services registry, security, intelligent routing …etc.
Security, audit, high availability, manageability are quality of service attributes for the integration
model.
The Secure Government Network (SGN) is a large initiative linking all government entities to a secure
Government Network as a part of a recently developed Connectivity Strategy.
The main role of the SGN is to provide connectivity to government entities. Currently, the following
services are provided through the SGN:
93
The Government Service Bus (GSB) is the central enabling set of components of the e-Government
infrastructure that is based on Service Oriented Architecture (SOA). The GSB provides an infrastructure
that removes any direct connection between service consumers and providers. Consumers connect to
the bus and not the provider that actually implements the service. This provides location
independence to all services.
The GSB also implements further value add Infrastructure or “Fabric” services. For example, security,
transaction, scalability, directory, registry and delivery assurance are implemented centrally within
the bus instead of having these buried within the applications or at the government agency back-ends.
The GSB architecture enables governmental entities to connect and use ready-made components of
the e-Government. The diagram below shows the conceptual architecture of the GSB.
IBM WebSphere Data Power SOA Appliances are purpose-built, easy-to-deploy network devices that
simplify, secure, and accelerate your XML and Web services deployments while extending your SOA
infrastructure. Data Power provides configuration-based approach to meet MoDEE’s edge ESB
requirements. The DataPower Appliance provides many core functions to applications, such as
service-level management, routing, data and policy transformations, policy enforcement, access
control, and hardened security—all in a single “drop-in” device.
Platform for Vertical e-Services integration: Web services from different government entities
(service providers) can be securely exposed using Data Power.
Cross Organizational e-Services Platform: Data Power provides role-based access control to
ensure the right level of secure access for cross-organizational e-Services.
Composite e-Services integration platform: Data Power is the service composition layer that
exposes composite services to service consumers.
Shared e-Services integration platform: Data Power supports modular service integration
architecture.
When deploying this IBM appliance in your network, you secure your enterprise at the Application
Layer vs. at the Network Layer. DataPower is a next-generation appliance that operates on MESSAGES
instead of PACKETS. This enables offloading security checks and structural checks from the service
providers, there by simplifying integration while minimizing performance degradation.
Solution Benefits
Using IBM Data Power as the ESB appliance, this provides the following benefits:
94
Purpose built firmware, offering wire-speed processing.
Prepare your environment for the future: DataPower is ready for mobile and
web 2.0
Extensible architecture: add-on modules can be turned on as required.
Highly fault tolerant device (multiple power supplies, multiple network ports)
with in-built load balancing & clustering options.
The Data Power Appliance is purpose-built, easy to consume and easy to use. Data Power delivers
security, common message transformation, integration, and routing functions in a network device.
IBM approach helps you to leverage and scale your existing infrastructure investments.
The below sections lists the used components and the utilized features within the Data Power
appliance during the implementation of the Edge ESG to help meet MoDEE requirements:
Logging
IBM Data Power appliance offers a bunch of different options when it comes to logging. MoDEE’s main
concerns when it came to logging were:
- The ability to troubleshoot a problem when one arises: As for this point in the solution IBM
Data Power offers a feature called ‘debug probe’, this feature can be enabled to log the
messages temporarily and then view them at each stage within the policy execution, this
also offers information like the requested and source URL/IP which should be sufficient
when a problem arises at the message level.
- Being able to view and track events as they occur (mostly errors): As for this DataPower’s
out of the box logging behavior should suffice, it offers the ability to filter the logs based on
the component from which they originated and the ability to increase and decrease the level
of logging details based on the current need.
- DataPower auditing: Out of the box, DataPower offers the ability to log any administrational
actions, by which user where they performed and when (this also included some lower level
relevant action logging).
Security using SSL certificates
When it comes to SSL, the solution includes two different implementations:
95
Mutual authentication or two-way authentication (sometimes written as 2WAY authentication) refers
to two parties authenticating each other at the same time. In technology terms, it refers to a client or
user authenticating themselves to a server and that server authenticating itself to the user in such a
way that both parties are assured of the others' identity. As for the certificates issuing three different
options were discussed:
DER
PEM
PKCS #8
PKCS #12
Note: DataPower offers notifications for the box administrators/developers when an SSL certificate is
going to expire within a month to insure minimized service downtime and a minimal impact of this
event.
The first step of implementing a web service in DataPower is always obtaining the WSDL (by uploading
to the device or fetching from WSRR), after doing so the Web Service Proxy starts offering options
starting with specifying the end point to be exposed and the protocol to be used. After that one can
start applying the required policy. In the current scenario we have two policies to be applied per
service the first (client to server) at the service level and another policy to apply on the way back but
on a lower level and that is the operation level.
- Within the AAA action the service credentials will be extracted from the message
(Password-carrying UsernameToken element from WS-Security header), this identity
will be validated against LDAP to decide whether the consumer is eligible to
consume the service based on whether the identity is a member of the service group
or not.
- At this stage the SLA is enforced.
- An attribute containing the identity’s access level to the services is queried and
stored in context variables.
- The identity within the message is replaced with another identity which is meant to
authenticate DataPower boxes at the service provider’s side.
- The destination URL is replaced with the actual service provider’s URL instead the
one that came with the message here.
96
On the way back (server to client) each response to a consumer is filtered based on the consumer’s
access level to a service using a transformation action (an XSLT style sheet) and finally the response is
returned to the consumer here.Guidelines for web service integration
The below is a list containing all the guidelines for a service provider willing to expose a service or a
service consumer willing to integrate with the GSB:
In addition to all the above mentioned guidelines in the G2G section above, any entity outside the
government (outside the SGN network) who would like to integrate with the GSB must comply with
the below:
97
1- The entity must comply with the mutual authentication or two-way authentication
(sometimes referred to as 2WAY authentication) specifications.
Establishing the encrypted channel using certificate-based mutual authentication involves:
98
Sample request message
<s:Header>
<ActivityId CorrelationId="bcf08350-0ad0-4e6a-b596-9994e137b45c"
xmlns="http://schemas.microsoft.com/2004/09/ServiceModel/Diagnostics">9dc40624-0ae7-4984-
8806-4e251982b213</ActivityId>
<o:Security s:mustUnderstand="1"
xmlns:o="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" >
<o:UsernameToken u:Id="uuid-1349a92e-13f7-41d1-bdde-0021a9c1d276-79">
<o:Username>UserName</o:Username>
<o:Password>********</o:Password>
</o:UsernameToken>
</o:Security>
</s:Header>
<s:Body>
<NationalNo>123456789</FirmNationalNo>
</operation>
</s:Body>
</s:Envelope>
99
eFAWATEERcom:
eFAWATEERcom solution has the ability to connect different banks and PSPs with different billers
and/or financial houses or services providers, and at the same time, the solution integrates with the
RTGS and the ACH for settlement.
The following workflow shows the main stages that eFAWATEERcom consists of:
Bill Upload
Bill Presentment
Bill Payment
Settlement and Reconciliation
Note:
The solution is capable of supporting different types of payments (periodic, one-off, non-existing bill,
non-banked customer payments) in addition to handling all payment status cycle (New, Updated,
Sent, Completed).
100
Figure 5.4.7 Business Process Operation
Bill Upload
101
Figure 5.4.8 Bill Upload Process
The previous workflow describes in general the bill upload process:
102
Figure 5.4.9 Bill Presentment
Bill Payment
103
Figure 5.4.10 Bill Payment Sequence
The previous workflow describes in general the bill payment process:
104
Figure 5.4.11 Settlement & Reconciliation Process
The previous workflow describes in general the settlement and reconciliation process:
eFAWATEERcom sends a settlement file to RTGS (STMTR) that
includes all payments details in totals.
CBJ “RTGS” will process the STMTR file and sends the response
(STMTA) to eFAWATEERcom system.
Same operation is repeated for the purpose of the fees totals,
meaning that settlement with RTGS will happen for the payments
and the fees separately.
eFAWATEERcom sends two settlement files to the Banks/PSPs
including the net total payments and total fees in CSV format,
where each file will contain one row for the total payments and in
the other file one row for the total fees.
eFAWATEERcom will allow paying banks to reconcile their payment
transactions using the standalone application (Which is a website
that is used for reconciliation purposes) where each bank is
supposed to upload its data and match with eFAWATEERcom data.
As for settlement banks, and for any unmatched payment
transaction (After receiving settlement payment and fees
notifications from RTGS end of that particular day), they can use the
standalone application for investigating their transactions statuses.
Paying banks can send their reconciliation results to
eFAWATEERcom, where the result file will be placed automatically
105
on the bank inward FTP directory where eFAWATEERcom support
team will investigate unmatched payments.
More details will be given upon award.
http://bulksms.arabiacell.net/vas/http/send_sms_http?login_name=login&login_password=passwor
d&msg=messageText&mobile_number=9627XXXXXXXX&from=senderID&tag=X&delivery_date=XXX
X-XX-XXXX:XX&charset=XXXXXX&unicode=X&dlr=X&dlr-url=
http://xyz.com/get_status.php?msg_id=XXXXXX&status=%d
- Parameters:
login_name (Mandatory) Login name used to access your account over the SMS PUSH Interface.
login_password
Password used to access your account over the SMS PUSH Interface.
(Mandatory)
Sender ID or name already reserved and defined over the SMS PUSH
from (Mandatory)
Interface.
Message Type :
3. ترويجية
4. داخلي اتصال
2. Undelivered messages.
106
3. All messages delivery statuses (Delivered and Undelivered).
- API Responses:
In case of success message submitting to the eGov PUSH SMS Sender, the below are the possible
return messages:
- I01-Job (Job ID) queued for processing. (For messages with message date equal to
the current date and time)
- I02-Job (Job ID) has been scheduled. (For messages with message date greater than
the current date and time)
And below are listing of possible errors could be returned by the system.
- Errors:
http://bulksms.arabiacell.net/vas/http/sch_tasks_http?login_name=login&login_password=passwor
d&action=n
- Parameters:
107
Parameter Name Description
- API Responses:
In case of success request, the returned values will be one of the responses mentioned in the
description column for parameter (Action). In addition, below are listing of possible errors could be
returned by the system.
- Errors:
108
7.8 Sample Arabic Contract Agreement (Attached)
109