HomeMy WebLinkAboutBack-Up DocumentsCITY OF MIAMI, FLORIDA
TO: Arthur Noriega V
City Manager
FROM: Manuel A. Morales
Interim Chief of Police
INTER -OFFICE MEMORANDUM
DATE: JAN 1 8 2022 FILE :
SUBJECT FY2021/2022 Purchase Requisitions
REFERENCES:
ENCLOSURES:
Pursuant to Resolution No. 21-0408, I am requesting the following:
1. To transfer budgeted General Fund dollars from minor object code (531000) Professional Services
to Other Contractual Service (534000). The funds will be utilized to cover contractual services for
network (switches, routers, data circuits) monitoring and administration, through a Managed Service
agreement for Remote Monitoring and Management Service Desk within the Police Department IT
Department.
2. To transfer budgeted General Fund dollars from minor object code (546000) Repair and Maintenance
Services to Machinery and Equipment (664000) to cover a purchase requisition from FY2020/2021
which was processed on July 261, 2021. Based on the established process, the purchase requisition
was cancelled because it was determined that the equipment being requested through the Traffic
Enforcement Unit from CMI, Inc. required a sole source exemption.
Should you have any questions or concerns, please do not hesitate to contact Jorge A. Blanco, Police
Budget and Finance Manager at (305) 603-6198.
MAM/jab
CI) MIAMI POLICE DEPARTMENT
PURCHASE / SERVICE REQUEST FORM
UNIT: Computer Support Unit SECTION:
ITSS
CONTACT PERSON: Joseph Pontillo, Info. Systems Mgr. PHONE NUMBER: 305-603-6155
CONTRACT M DATE DELIVERY REQUIRED
TYPE OF FUNDS TYPE OF PURCHASES
® GENERAL FUND ® REGULAR PURCHASE
❑ L.E.T.F. ❑ EXPEDITE
❑ GRANT (SPECIFY): ❑ SOLE SOURCE PURCHASE
❑ OTHER (SPECIFY): ❑ OTHER
(IF NECESSARY, FINAL DETERMINATION OF FUNDING WILL BE MADE BY BUDGET UNIT)
BUDGETED ®YES ❑ NO Budget Line # 1866 Account Code #
(If not, please attach transfer of funds request indicating how you (For Budget Unit Use)
wish to accommodate this request or identify other funding source)
NAME: United Data
ATTENTION: Richard Sardinas 1
SUGGESTED SOURCE (cANLISTMORETHANONE) E C E I V E
Inc.
ADDRESS: 2900 Monarch Lakes Blvd., Suite 300 Miramar, FL 33027 ASSISTANT CHIEF
PHONE #: (305) 301-7976 FAX: ADMLKISTRATION DIV
ITEM DESCRIPTION (BEASDESCRIPTIVEASPOSSIBLE)
Contractual Services for Network
UDT Infrastructure Remote Monitoring and Management
See attached information
UNIT OF ESTIMATED SHIPPING ESTIMATED
QTY: 12 MEASURE: UNIT PRICE: $19.975.32 CHARGES: TOTAL: $239,703.84
MANUFACTURER: MODEL:
STYLE:
MEMO ...................COLOR ................... ASSEMBLY�REQUIRED:� �Q YES Q NO
JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. —GIVE HISTORY, EXPAND ON NEED,
ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE).
The purchase is to provide Contractual Services for network (switches, routers, data circuits) monitoring and administration.
Services also include monitoring and administration of patch management. The services are needed due to insufficient
personnel to perform these functions.
Computer Support Approval Date /Z r Z, Z
'(Required on computer related items only)
o
CV
OC11 1 1\V ALJV.
c� Lieutenant
w
cn
�— Captain
z
w
2Ei Commande
w
CD
Z r
cn Division
cn
w
z Deputy
cn
Busewss Management
Administration Asst.
P.I.N.
P.I.N. , /
P.I.N. Z ( 74/`f
P.I.N.
P.I.N.
P.I.N.
P.I.N.
P.I.N.
Date:
Date:
Date:
1 Z 2iF Z+2�
Date:
Date:
Date:
Date:
Date:
hn'D RF # 704 ( Budget tint ) Revised 10-13-16
Computer Support Unit ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE)
Managed IT as a Service Solution On -Boarding and Project
Non -Recurring Cost
UNIT OF ESTIMATED SKIPPING ESTIMATED
QTY: 1 MEASURE: UNIT PRICE: $19,975.32 CHARGES: TOTAL: $19,975.32
MANUFACTURER: MODEL: STYLE:
SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO
JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. —GIVE HISTORY, EXPAND ON NEED,
ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE).
ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE)
UNIT OF ESTIMATED SHIPPING ESTIMATED
QTY: MEASURE: UNIT PRICE: CHARGES: TOTAL:
MANUFACTURER: MODEL: STYLE:
SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO
sonsmassamommm
JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. --GIVE HISTORY, EXPAND ON NEED,
ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE).
ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE)
UNIT OF ESTIMATED SHIPPING ESTIMATED
QTY: _ MEASURE: UNIT PRICE: CHARGES: TOTAL:
MANUFACTURER: MODEL: STYLE:
SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO
..........................................................................................�
JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. —GIVE HISTORY, EXPAND ON NEED,
ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE).
GRAND TOTAL: $259.679.16
Managed IT as a Service
Remote Monitoring and Management
Service Desk
Prepared for:
INCR;$ ;RATER
Version 1.0
November 411, 2021
ACCOMPLISH MORE
Table of Contents
1. Services Overview.............................................................................................................................................................................3
2. Solution Entitlements........................................................................................................................................................................3
3. Scope of Services...............................................................................................................................................................................3
3.1. Service Delivery Management(SDM).......................................................................................................................................4
3.2. Remote Monitoring and Management (RMM)........................................................................................................................4
3.3. Supported Devices*Not limited to...........................................................................................................................................4
3.4. Key Monitoring Parameters.....................................................................................................................................................6
3.5. Standard Operating Procedures(SOPs)....................................................................................................................................6
3.6. Troubleshooting and Full Remediation....................................................................................................................................6
3.7. Vendor Escalations...................................................................................................................................................................6
3.7.1. 3'd Party Vendor Escalations............................................................................................................................................6
3.7.2. ISP Vendor Escalations and Follow-ups...........................................................................................................................7
3.8. Administrative Activities...........................................................................................................................................................7
3.8.1. Move, Add and Changes (MACs).....................................................................................................................................7
3.8.2. Windows Patch Management.........................................................................................................................................7
3.8.3. Linux Patch Management................................................................................................................................................8
3.8.4. Antivirus Definition Updates...........................................................................................................................................9
3.8.5. Bundled Anti -Virus and Malware (Optional)...................................................................................................................9
3.8.6. Preventive Maintenance Schedules................................................................................................................................9
3.9. Configuration Backup of Network Devices...............................................................................................................................9
3.10. Storage Maintenance.............................................................................................................................................................10
3.10.1. Monthly Storage Reclamation.......................................................................................................................................10
3.10.2. Storage Array Firmware Update and Deployment........................................................................................................10
4. Customer Visibility and Auditability................................................................................................................................................10
4.1.1. Auditability....................................................................................................................................................................10
4.1.2. Infrastructure Visibility Portal........................................................................................................................................10
4.1.3. Reports..........................................................................................................................................................................11
5. Financial Investment.......................................................................................................................................................................13
5.1. Device Inventory .....................................................................................................................................................................13
AppendixA. Signature Block....................................................................................................................................................................14
1. Terms...............................................................................................................................................................................................14
AppendixB. Service Level Agreements....................................................................................................................................................19
Appendix C. Key Monitoring Parameters for Different Devices*............................................................................................................21
Appendix D. Standard Operating Procedures SOP.................................24
1.Services Overview
This Service Catalog ('SC') describes the various types of services and service levels that may be obtained under this agreement. In
addition, it sets forth the Parties' responsibilities, prerequisites and assumptions that underlie the provision of the Services and
additional terms and conditions. The solution described within this document focuses on the following key areas:
Account Management from assigned UDT resources ('Account Manager, Service Delivery Manager and Customer Success Manager)
helps to build and maintain relationships with your management and service delivery staff and helps you arrange each service element
required to meet your business requirements.
Service Desk focuses on restoring service availability by handling incidents and requests occurring in the infrastructure or reported by
end users or IT systems. It uses industry standard management processes (ITIL) such as incident, problem, request, change,
configuration and release management processes in order to consistently deliver its support services to the enterprise.
2.Solution Entitlements
MITaaS1 • • and
Entitlements
24 X 7 x 365 Monitoring, Alert filtering, & Alert Priority from a Certified NOC
Included,,'UDT
Alert Validations and Escalations using Run Book Automations (RBA)
Alert and Incident Prioritization with Escalations to Customerfor Remediation
Patch Rating Service, Patch Failure Alerts
Patch Installations and Antivirus Definition Updates for Supported Antivirus Products
Standard UDT and Customer Specific Operating Procedures (SOPS) Based Initial
Remediation
ISP Vendor Escalations & Follow-up
Configuration Backup of Network Devices as Applicable
Firmware Upgrades as Required or on Request Basis
Troubleshooting and Full Remediation
3rd Party Vendor Escalations for Further Troubleshooting
Continuous Account Management and Support
Client Advisory Services
3.Scope of Services
The primary and day-to-day scope of this agreement is to provide the Customer with information technology services and technology
management expertise to ensure that all the supported technology assets and/or users are managed and supported using sufficiently
trained and experienced resources. The following represents the scope of service offerings:
3.1. Service Delivery Management (SDM)
UDT will provide a single point of contact for this engagement acting as the Service Delivery Manager. The main responsibilities
for this individual are as follows:
Review, update and maintain Service Level Agreement
ResponsibilitiesActivities
Responsible for maintaining the SLA
('SLA').
Maintain and define service improvement measures.
Responsible for defining service improvement areas.
Organize and facilitate Business Review Meetings
Responsible for organizing tactical service meetings
(e.g., Business Review, SLA Review Meeting, etc..).
Facilitate, produce and/or distribute Service
Responsible for communication with the business
Dashboards/Reports as defined in this document.
representatives.
Ensure efficient and effective communication lines between
Responsible for customer relationship management.
UDT and customer management.
Keep involved parties informed about achieved service
Responsible for negotiating and formalizing service
levels, costs and changes.
provisioning agreements and underpinning contracts.
Provide escalation support
Get involved in escalations impacting the SLA. Monitor
escalations and critical issues to resolution.
Address potential vendor issues affecting the delivery of the
Engage vendors, review vendor contracts, monitor
SLA
vendor accountability, recommend new vendor if
possible.
Conduct end -user satisfaction surveys and reviews
Assist in deploying and gathering end -user satisfaction
survey results and presenting them to management.
3.2. Remote Monitoring and Management (RMM)
This document specifies the scope and schedule of the services delivered within the UDT RMM MITaaS Solutions service level
agreement. As a requirement to start services, this document must be signed, as an agreement for the scope and deliverables of the
MITaaS Solutions package.
3.3. Supported Devices -Not limited to
EMC
Connectrix Switches and Directors, EMC CLARHON EMC Celerra EMC VNX
-. ..__..
NetApp
NetApp FAS 2xxx, 3xxx Series, NetApp F-500, F-600 & F_-700 Series, and C Series
Dell
!_EqualLogic PS Series, MD Series
HP
! EVA, Left Hand Solutions & MS_A_S_eries
v
Cisco
! MDS Fabric switches
j
ExaGrid
All Versions
Cisco - Catalyst Switches 2xxx, 3xxx,45xx, 49xx, Nexus
Juniper: EX 4200, E320 _—. __ — _--------_..
--------- ............... .._......
LAN Switches
HP Procurve
------ ----------
Switches
Brocade
Aero H ive
FortiNet - FortiSwitch
FortiNet— FortiVoice, FortiGW, FortiSwitch, FortiFone—�
Telephony
Gateways, Routers, IP Phones
—_—_`
Cisco —All Models
Routers j Branch Routers / Service Provider
Edge Routers
i
Firewalls Network Security
I
I
I
I
WAP Wireless Access points & Controllers
i
i
Cisco- 8x, 18xx, 19xx, 2800, 2900, 3200, 3800, 3900, 7200,
7300, 7500, 76xx Series. Juniper - M , E , ERX , J, Series,
AeroHive _
Cisco - ASA 5500 series, SA 500 series, ACA Express
Juniper - SRX Series Services Gateway, Net Screen Series,
SA Series SSL VPN Appliance, SSG VPN Security Platform
SonicWALL: TZ, NSA, Fortinet Firewall
PaloAlto
CheckPoint
FortiNet - FortiGate
Cisco - Wireless Access Points(500 Series Wireless Express,
Cisco Aironet Series, ) and WLAN Controllers (21xx, 25xx,
44xx, 55xx), Meru WLAN Controller, Aruba WLAN
Controllers
Cisco Meraki - ALL
Aruba (HP) -All
Meru Networks -
AeroHive
f FortiNet— FortiAP - AII
IT Infrastructure ISupported Technology
Server Operating I Windows: Windows Server 2008 and upwards
Systems Linux: Centos/ Redhat 5.3 & above, and Ubuntu 10.0 & above
File & Print, DNS, DHCP, Domain Controller(Active Directory), Email (Microsoft Exchange), Mobile
Infrastructure (BlackBerry Enterprise Server), Virtual Hosts(VMware, Citrix Xen, Hyper-V), and Terminal
Applications j Services/Remote Desktop Services
All Citrix Applications and Components
Backup Applications
j (if purchased I Symantec, NT Backup, CA ARCserve, Vaultlogix, Acronis, Datto G Series and Veeam
separately or owned
Antivirus Products j Symantec, McAfee, Trend Micro, VIPRE Business Premium, Kaspersky, ESET NOD32, and Microsoft
Security Essentials
Bundled Anti -virus , VIPRE Business Premium
Virtualization
Services:
XenApp 6.05, XenApp 6.0 and XenApp 5.0 - Advanced, Enterprise and platinum
Citrix XenApp
; editions. XenDesktop
Application
I
Virtualization
VMware
I
I VMware ESXi
i
Microsoft
Hyper-V
D.SQL
Services
Database
Microsoft SQL
MSSQL Express/Standard/Enterprise 2005, 2008 and 2008 R2 or upward
Welbserver
Operating Systems
Linux Centos/ Redhat 5.3 & above, Ubuntu 10.0 & above, Fedora
Windows
Windows 2003 Server and above
Webservers
Apache, Tomcat, and IIS
3.4. Key Monitoring Parameters
UDT monitors the customer's infrastructure using standard Windows WMI or SNMP data collection. The UDT platform also enables
the UDT staff to remotely and securely access the monitored devices in order to perform SOPS (Standard Operating Procedures),
advanced troubleshooting, remediation and maintenance tasks.
For Details, please refer Appendix B
3.5. Standard Operating Procedures (SOPs)
UDT supports the execution of pre -defined and customer specific custom SOPS. This means that the SOPS are executed when an
alert is triggered, incident raised or a request submitted in reference to an issue or move -add -change (MAC) within the customers
infrastructure.
/ Incoming alerts will be initially validated to identify false alerts or alerts where no action is required
► Actionable alerts will be ticketed by the NOC engineer and any documented Standard Operating Procedure (SOP) will be
executed as first level of support and/or troubleshooting and remediation steps determined by the technician or engineer
assigned.
/ If the SOPS fail to resolve the problem, the ticket will be updated and immediately escalated to the next level of NOC
Engineers for further troubleshooting and remediation. Escalations outside of the scope of support which require
escalation to a customer contact will be established and documented during the on -boarding period of the project.
List of base SOPS executed, but not limited to: Please refer Appendix C
3.6. Troubleshooting and Full Remediation
UDT NOC will remotely troubleshoot and fix issues for alerts that are generated from the existing configuration of your network
infrastructure. Following are some of the tasks and activities performed, but not limited to this sampling:
► If the SOPS fail to resolve the problem, then the ticket will be updated and immediately escalated to the domain expert
within the NOC team to troubleshoot the issue and remediate it in a comprehensive fashion
► If the problem involves a 3rd party vendor for any configuration issues with the applications and operating systems, then
the UDT NOC will contact the vendor technical support for further troubleshooting and full remediation
► Root cause analysis of critical (PO) incidents are performed to identify underlying problem
/ If an incident is raised, then the UDT NOC will fix it within the predefined SLA
► If a remediation activity is performed, then it is logged into an ITIL based ticketing system and the ticket is updated with its
complete chronology as well as the steps taken to remediate the incident.
3.7. Vendor Escalations
3.7.1. 3rd Party Vendor Escalations
If the UDT services team determines a configuration issue that relates to a 3rd party vendor, then UDT will contact the vendor's
technical support team to resolve any configuration issues with the applications and operating systems. Under these conditions the
following requirements take effect:
/ The UDTSLA may be impacted by the terms of the SLA and contract that the customer has with the vendor's technical support
organization
► UDT recommends that the customer maintain valid support contracts for the entire infrastructure managed by UDT
/ UDT requires that the customer authorize UDT to act on their behalf when it interacts with the vendor tech support
organization.
3.7.2. ISP Vendor Escalations and Follow-ups
UDT will drive ISP vendor escalations for internet, leased lines, or MPLS circuits for the following events (a) link down (b) high latency
(c) high interface errors. UDT will create a ticket and escalate the issue according to the escalation matrix provided in the partner
portal.
Note: To avail of the ISP vendor escalations services, it is mandatory to subscribe to UDT services for the monitoring of internet and
WAN links on the interfaces of managed devices.
Deliverables:
To deliver the SLAB, UDT will follow the process defined below as part of UDT delivery model:
/ UDT will monitor WAN connectivity and if there is a problem UDT will contact the ISP or create online ticket or both.
/ All ISP related issues, such as, internet or WAN links down will be escalated to the ISP either by phone call or online ticket or
both. UDT will also escalate the issue to the solution provider following the standard escalation process
/ Summary of conversations with the ISP will be updated in the ticket
► UDT recommends the solution provider or customer to maintain valid support contracts with all ISPs they use
/ It is required that the customer and/or solution provider authorize UDT to act on their behalf during any escalation with the
ISP, this is usually accomplished through a signed Letter of Authorization (LoA) with the carrier/ISP.
/ The response and resolution SLAB of UDT for any issue escalated by UDT to the ISP is now dependent on the response and
resolution SLAB provided by the ISP. As a result, the response and resolution SLAB of UDT may be impacted negatively for
this issue if the ISP is not responsive.
3.8. Administrative Activities
UDT NOC team will perform administrative activities as part of the Move, Add and Changes (MACs).
3.8.1. Move, Add and Changes (MACs)
Your IT team can create a ticket and assign it to the NOC for executing MAC requests:
For Details please refer Appendix C
3.8.2. Windows Patch Management
UDT will scan servers for missing patches every Wednesday or as per the customer's patch policy/schedule and publishing of the
results of the patch scan and actions to be taken for partner approval in the portal.
► If installation of the patch fails, UDT will take corrective action and the failed patches will be re -installed during the next
scheduled patch maintenance window or during the current patch maintenance window if time allows. Failed patches will
be communicated to the customer and reflected on the Patch Status portal. Based on severity of Patch UDT will recommend
opening an additional maintenance window to immediately address and install failed patches.
/ Windows server patches have to be approved by end customer or by UDTteam based on agreed upon Patch Approval Process
(PAP).
► The installation of security patches on servers that have been approved will be scheduled as defined by the solution customer.
► Windows security patches and critical only patches are tested by UDT using known IT standard best practices — UDT then
rates the patches as Whitelisted or Blacklisted.
Supported Operating Systems and Applications
Operating Systems Windows, Linux ,Windows Server 2003 and upwards _
Application (Default) ( MS Office
Application (On Request) Active Directory, Microsoft Exchange Blackberry, Virtual Hosts(VMware, Xen Server and
Hyper-V), Backup application, webservers, Citrix, MS SQL, and Microsoft SharePoint
Patch Configuration and Policy
Default patch approval configuration Y Manual Approve for Servers'
Auto Approve: Optional (customers choice)
How does Auto patch Approval" ► "Auto approve' policy in the portal will approve Security and Critical Operating
works? System patches only
► Customer can approve application patches from the UDT Portal
Sanity Checks (Servers Only): After Windows Patch Installation and Server Reboot
UDT conducts sanity checks on Windows servers after a patch installation and server reboot. Sanity checks include the following:
/ Windows services: Check for services where "Start-up" type is "Automatic" and "Status" is "Started". UDT will re -start the
Windows service if "Start-up" type is "Automatic" and "Status" is "Stopped". Standard Operating Procedures for servers
that have checks and needs outside of those in scope will be developed during the on -boarding process. Post OB requests
to adjust recorded sanity checks can be submitted for review and approval to the UDT via a Request Ticket.
/ Event logs: Application and system event logs that show "Severity Level" as "Error" will be checked.
Note:
/ Default Windows patch management includes installation of security patches and critical patches. It is the responsibility of
the customer to hold a genuine Windows license for the server.
► It is important to note that a device will be rebooted following any patch installation that requires rebooting. Therefore,
customer's approval of the patching time window should take into consideration the possibility of a device reboot.
/ Windows Patch Testing: Windows security patches are tested by UDT using known IT standard best practices. Windows
security patches released by Microsoft are first installed in a restricted test environment (that supports standard
applications & tools). It is then tested for installation issues, standard application compatibility, and malfunction. UDT
personnel will also periodically review forums on patch testing to understand other known issues. UDT testing procedures
are best effort in a limited testing environment. After installation of whitelisted Windows security and critical patches, UDT
does not accept any liability resulting from crashes or malfunction of devices and applications, should they occur, but will
work with customer, vendors and all parties needed to arrive at a solution.
3.8.3. Linux Patch Management
UDT will scan servers for missing patches every Wednesday or as per the customer's patch policy/schedule and publishing of the
results of the patch scan and actions to be taken for partner approval in the portal.
/ If installation of the patch fails, UDT will take corrective action and the failed patches will be re -installed during the next
scheduled patch maintenance window or during the current patch maintenance window if time allows. Failed patches will
be communicated to the customer and reflected on the Patch Status portal. Based on severity of Patch UDT will
recommend opening an additional maintenance window to immediately address and install failed patches.
/ Linux server patches have to be approved by end customer or by UDT team based on agreed upon Patch Approval Process
(PAP).
/ The installation of security patches on servers that have been approved will be scheduled as defined by the solution
provider or end customer
Sanity Checks (Servers Only): After Linux Patch Installation and Server Reboot
UDT conducts sanity checks on Linux servers after a patch installation and server reboot. Sanity check includes the following:
/ Check for running Linux services. UDT will restart the Linux service if stopped.
► Check for application & system logs.
/ Post OB requests to adjust recorded sanity checks can be submitted for review and approval to the UDT via a Request
Ticket.
Note:
/ Default Linux patch management includes security patches. It is the responsibility of the customer to hold a genuine Linux
license for the server.
► It is important to note that a device will be rebooted following any patch installation that requires rebooting. Therefore,
customer's approval of the patching time window should take into consideration the possibility of a device reboot.
3.8.4. Antivirus Definition Updates
This activity includes checking the anti -virus definitions on the windows server and updates to those definitions on a scheduled
basis. Additionally, the following is done:
► Anti -virus or anti-malware definitions will be updated on a daily basis by default, monitor sets are in place to monitor
supported AV/MW software.
/ The customer will be alerted if any major issue such as corruption or license expiry is observed either with the anti -virus or
anti-malware application or with its definition update, followed by necessary steps taken to resolve alerted issue.
► If the anti -virus or anti-malware update event fails in its regular schedule, then UDT will validate and run the definition
updates once again. If the definition updates fail two consecutive times or if the definition versions are older than two
days, then UDT will remedy the issues as per the SLA under effect.
/ All issues arising out of anti -virus definition updates are categorized at a "P3 Priority" unless otherwise agreed upon with
customer.
/ If the anti -virus or anti-malware update event causes system related issues, then the UDT Services team will engage as per
the SLA under effect.
Supported Anti -Virus Products
Symantec, McAfee, Trend Micro, Kaspersky, ESET NOD32, Microsoft Security Essentials, and VIPRE.
3.8.5. Bundled Anti -Virus and Malware (Optional)
UDT bundles VIPRE Business Premium with its services and will be provided to customers who opt for it. The UDT NOC team will
make available a copy of the VIPRE Business Premium MSI package to the customer if needed. The customer may perform a self -
install of the software, or request UDT to install it on its servers and/or workstations during the on -boarding process. For these
environments, the following apply:
► The VIPRE client configuration is updated every 4 hours, and managed by UDT from a central VIPRE console
/ The VIPRE clients will periodically download definition file updates from the local update server, or from the VIPRE update
site over the internet
► Scheduled anti -virus scans run every Friday at 4PM on all the managed clients or as needed by customer policies and
procedures.
► The UDT team checks virus infection logs every 8 hours
/ UDT accepts no liability if systems are infected by a virus not caught by the VIPRE software, or if the VIPRE software cannot
catch new or existing viruses on servers and/or workstations.
3.8.6. Preventive Maintenance Schedules
Servers/Workstations
-..... ___ _..._-....._....-..._.._..__.._._.__......._.............__---------- _.._....._......_................................... ... ---------- _._._........... .......... ._...___..._....... ___-_.................... -..............
Maintenance Activity Frequency Schedule
Anti -virus or Anti-malware Daily or Weekly 2 PM if daily;
definition updates
Patch Scan Wednesdav 1 PM
Patch Management (Install) Monthly One weekend in the month (Sat. or Sun.)
_._...._._...__._...--._.._.__.---.-.--.--_.__.___._..._._______.__—_.___.--.—._..___.____._—,.-.. —.
NOTE: These Maintenance Schedules are standard UDT NOC schedules if customer has preset standards and/or policies UDT will
adhere to customers published schedules.
3.9. Configuration Backup of Network Devices
Network Device configurations are periodically backed up. UDT performs a backup of the network device configuration every 7
days. The configuration backup will be stored in the cloud and managed by the UDT ITOP Platform.
NOTE: Configuration backup is an automated process and is supported only on supported device types. If an automated process is
not supported by the device, then UDT will not be able to backup network device configuration.
Deliverables:
/ If the backup configuration event triggers other issues on the device, then the UDT team will be engaged to resolve the
issue if it is within the scope of the defined SLA.
3.10. Storage Maintenance
3.10.1. Monthly Storage Reclamation
Monthly once storage reclamation will take place on need basis/on customer request and after a review of active, inactive LUNs by
UDT. Migration and reclamation of storage will be provided after the approval from customer. The following are the steps in the
monthly storage reclamation process.
Scope:
All storage (LUNs) within the storage array(s) in the customer environment which are agreed upon in the engagement.
UDT responsibility:
- Review active/inactive LUNs, capacity used and preparing the overview report
- Following Change management process for raising the change request for kicking off storage reclamation
- Starting storage reclamation via migration of data to/from LUNs
- Re -assign LUNs to storage ports/Servers
Customer responsibility:
- Approving the change request for optimizing storage
- Providing 'window' for reclamation to take place and communication to affected parties
Deliverables:
- Generating updated LUN/data/Server(s) assignment report for Storage array(s).
3.10.2. Storage Array Firmware Update and Deployment
Storage array OS version updates are performed on need basis/on customer request and only after the approval from customer. This
procedure is only included for in -place / non-destructive updates.
Scope:
All the storage arrays in the customer environment which are agreed upon in the engagement.
UDT responsibility:
- Verification of availability and requirements of firmware update/upgrade
- Following Change management process for raising the change request for deploying the updates. Confirm operational
window for service delivery.
- Update/upgrade the storage array(s) controllers.
- Validate controllers have rebooted and operational.
- Execute CIFS and NFS mounts
4.Customer Visibility and Auditability
4.1.1. Auditability
All remote activities performed by UDT NOC engineers are recorded and available for the customer to replay and review via the
session recordings capability in the UDT ITOP Platform.
4.1.2. Infrastructure Visibility Portal
UDT MITaaS Solutions provide visibility into your IT infrastructure via the UDT ITOP Platform. This provides access to current status
of the devices across different locations, while providing useful trending reports for advanced analysis.
4.1.3. Reports
UDT MITaaS Solutions also include reports that offer a comprehensive view of performance and availability of the customer's
infrastructure.
You can generate on -demand and/or schedule reports from the UDT ITOP that include the following:
/ Inventory reports
► Problem & incident management reports
Additionally, monthly reports are available which includes:
► Executive summary reports, Executive reports
Dashboard and Portal Sample Screenshots:
#1 - SLA Priority Dashboard
Minutes
Days
228 bt 46
zuamo-me w,omm.o4w..
d ttrzars 0.05
120 HGt^5 7.59
rt #2 — SLA Resoonse Time Dashboard
aaa
Report #3 - SLA Resolution Time Dashboard
Report #3 — Patch Compliance Dashboard
5. Financial Investment
.. • •
Solution List
Monthly Recurring
Description
Cost
UDT Infrastructure Remote Monitoring and Management
- 24 x 7 x 365 Remote Monitoring and Management
$19,975.32
- Patch Management and Configurations Backups as applicable
- Client Success, Service Delivery, and Account Management
Description
Non -Recurring Cost
Managed IT as a Service Solution On -Boarding and Project
Management
- Service On -Boarding and Documentation
$191975.32
- Standard Operation Procedures (SOP) and Workflow Build
- UDT Management Tool Implementation, Configuration, and Agent rollout
- Project Management
*Based on 59-month term
GSA Service Category- 5415S — IT Professional Services: Network Administrator $113.26
GSA Service Category- 5415S — IT Professional Services: Project Manager $143.20
SERVICES PROVIDED UNDER THIS SOW ARE SUBJECT TO THE TERMS AND CONDITIONS OF GSA
SCHEDULE #GS-35F-538-GA UNDER PDA.
5.1. Device Inventory
6
Server-VMWare ESXi Hypervisor
71300
Mobile Device - Android
2174
Endpoints — Workstations, Laptops, Surface Tablets2
Mobile Device - iPad
1
Cisco Unified Computing System
13
Network Device - Routers
21
Network Device - Switches
2
Network Access Control — Cisco ISE
37
Wireless Access Point - Meraki
1
Network Access Control — Forescout
LIZ MIAMI POLICE DEPARTMENT Tracking
JD/
PURCHASE / SERVICE REQUEST FORM
ro '
UNIT: ,traffic Enforcement Unit SECTION: Specialized Operations Section
CONTACT PERSON: Sgt. Mario Dell Amico PHONE NUMBER: 305-603-6540
CONTRACT #: DATE DELIVERY REQUIRED 30 Days
TYPE OF FUNDS TYPE OF PURCHASES
® GENERAL FUND ® REGULAR PURCHASE
❑ L.E.T.F. ® EXPEDITE
❑ GRANT (SPECIFY): ❑ SOLE SOURCE PURCHASE
❑ OTHER (SPECIFY): ❑ OTHER
(IF NECESSARY, FINAL DETERMINATION OF FUNDING WILL BE MADE BY BUDGET UNIT)
BUDGETED ❑YES ® NO Budget Line # J �9 Account Code #
(If not, please attach transfer of funds request indicating how you (For Budget Unit Use)
wish to accommodate this request or identify other funding source) pp �r
• ■ • ■ ■ • • • ■ • ■ • • ■ • • • ■ • • • • ■ ■ ■ ■ • ■SUGGESTED SOURCE (CANNY LIST MORL: ! / lONE) ■ • • ■ ■ ■ • • '1
Rr.%0 E
NAME: CMI, Inc. II JI i i 9(l91
ATTENTION: —Pamela J. Hagan ;. SSfST a NT a ft
tEF
ADDRESS: 316 East Ninth Street Owensboro, KY 42303 ar�x,rri.ttern
PHONE #: 866-835-0690 FAX: 270-685-6678
ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE)
Intoxilyzer 8000
UNIT OF ESTIMATED SHIPPING ESTIMATED
QTY: 2 MEASURE:— UNIT PRICE: $7501.00 CHARGES: 0.00 TOTAL: $15002.00
MANUFACTURER: CMI, Inc. MODEL: I8000 STYLE:
SIZE: 4.5"Lx10"Wx8.4"D COLOR: GREY ASSEMBLY / SET-UP REQUIRED: ❑ YES ® NO
JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION.'=GIY;ETIISTORY, EXPAND -ON NEED,
ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE).
This CMI Intoxilyzer 8000 will be mainly utilized to process Impaired drivers. j
.: ,
i
Computer Support Approval Date
(Required on computer related items only)
APPROVALS:
Lieutenant P.I.N. �(��� Date: Q%/?t�y24
Captain P.I.N. Date:
Commander P.I.N. Date:
Major P.I.N. %:�o Date: Z
Division Chief •�� P.I.N. 7 Date:
Deputy Chief P.I.N. 74NP(— Date: 1 ��
Business Management Sect. P.I.N. LL ' ' Date: ` 7i�%�` 21iyt
Administration Asst. Chief HP.I.N. Date: 3
biPD RF # 704 ( Budget Unit) Revised 10-13-16
ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE)
UNIT OF ESTIMATED SHIPPING ESTIMATED
QTY: _ MEASURE: UNIT PRICE: _ CHARGES: 0.00 TOTAL: $
MANUFACTURER: MODEL: STYLE:
SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO
map..........................■............................................................�
JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. -GIVE HISTORY, EXPAND ON NEED,
ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE).
ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE)
UNIT OF ESTIMATED SHIPPING ESTIMATED
QTY: _ MEASURE: UNIT PRICE: $ CHARGES: 0.00 TOTAL $
MANUFACTURER: MODEL: STYLE:
SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO
JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. -GIVE HISTORY, EXPAND ON NEED,
ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE).
GRAND TOTAL: $15002.00
G
Approved
Art Acevedo
Chief of Police
CITY OF MIAM FLORIDAFL
INTER-OFFICE MEMORANDUM
TO: ArtAcevedo
Chief of Police
(Through Channels)
jCFPause.��3�
FROM: Cherise
Assistant Chief of Police
Administration Division
DATE: AUG 12 2021
SUBJECT: Procurement Director's
Approval
FILE LEG 7-2
REFERENCES : Purchase of Intoxilyzer 8000
ENCLOSURES:
The Traffic Enforcement Unit is requesting a sole source finding for the purchase of two (2)
Intoxilyzer 8000 to include its software and required components, to equip the Traffic Enforcement
Unit officers, from CMI, Inc., in the amount of $15,002.00; allocating funds from the Police
General Fund Account Code No. 00001.190101.664000.0.0. Based upon the attached, we are
requesting the Procurement Department to take the necessary steps to verify that CMI, Inc.,
located at 316 East Ninth Street, Owensboro, KY 42303 is the sole provider of this purchase.
The Traffic Enforcement Unit is expanding and is in dire need of these added resources to be
utilized mainly to process impaired drivers.
CMI, Inc. affirms that the software that is being used in the Intoxilyzer 8000 is, in fact, a
proprietary product of their incorporation.
We strongly feel that this added purchase will equip more Traffic Enforcement officers with these
needed breath testing tools, that will allow them to be more effective in serving and protecting the
City of Miami.
Please sign the appropriate documents and return the entire package to the Business
Management Section, for proper distribution.
Should you have any questions, or require additional information, please contact me at extension
6130.
CGG/JAB/jms
Attachments
.y� ore`,
RECEIVED
AUG 16 2021
LEGISLATION DETAIL
j
t.
AUG 12 2021
OFFICE c�
PSEF i= P0LI
CMI Inc
316 E 9th Street
Owensboro KY 42303
USA
Phone:866-835-0690
Fax: 270-685-6268
Date: 1 /5/2022
Expires: 3/6/2022
Reference:
Terms: NET 30 DAYS
QUOTE: 18858
AC"V/INC.
Sales Person: Pamela Hagan
Phone: 270-685-6294
Fax: 270-685-6678
Email: pjhagan@alcoholtest.com
Quote To: Jose F. Pastor Ship To: Fort Myers Regional Operations Center
Miami Police Department 4700 Terminal Drive, Suite 3
2200 W Flagler St FDLE Alcohol Testing Program
Miami FL 33135 Fort Myers, FL 33907
USA USA
Phone: 305-603-6537 Fax: Phone #: Fax #:
Email: 5533@miami-police.org Ship Via: Best Way GND
Customer #: 331350
Purchase order required.
Price includes ground transportation.
Shipment 4 - 12 weeks ARO.
Sales tax may apply. Please forward a copy of your tax exemption certificate.
If instrument is to be used for e vidential breath testing under Florida Administrative Code, instrument must ship
to FDLEA TP - Tallahassee or Fort /Ayers (depending upon agency location) for registration and inspection
before e vidential use. All other items ordered - printer, paper, printer cable, gas cylinder, and mouthpieces will
ship directly to the ordering agency.
Notwithstanding any provisions or terms set forth in other contracts or agency purchasing web sites. the
software contained in the Intoxilyzer 8000 is, in its entirety. a proprietary product of CMI, Inc. All intellectual
property rights in and to software are retained by CMI,. Inc., regardless of whether such software ("or any portion
thereoo was created prior to or in connection with any purchase. Placement and/or payment of a purchase
order based upon this pricing proposal constitutes acceptance of this condition, which shall supersede any
other agreements or understandings relating to the purchase of the Intoxi/yzer 8000 and the use of its software
and components.
L1ne Part
1 002480FL
Lead 4 - 12 weeks ARO
Quantity
Line Part
2 011148
Line Part
3 015111
Line Part
4 015088
Line Part
5 340234
Quantity
Quantity
Quantity
Quantity
Description
UNIT ASSY,I8000
USD
Rev
ND
2 EA Unit Price 7,501.00
Ext Price: 15,002.00
Description
Rev
GAS SYSTEM,MOBILE FLORIDA
C
2 EA Unit Price
Ext Price:
Description
Rev
MOUTHPIECES,VALVED,BAG OF 100
-
2 EA Unit Price
Ext Price:
Description
Rev
PAPER, ROLL,THERMAL,58MM X
ND
25MM
6 EA Unit Price
Ext Price:
Description .
Rev
CYL,EGS,.080g/210L,105L,ST
ND
2 EA Unit Price
Ext Price:
Total: 15,002.00
Plus shipping and any applicable taxes
Please include a copy of this quote with your order
15% Restocking Fee for Returned Items unless noted otherwise
ouolFornr:sov-PROO.ue�i.3�2�11-os-os� For detail Terms of Sale, please go to http://mpdinc.com/cos.htm Page: 1 of 1
CITY OF MIAMI, FLORIDA
INTER -OFFICE MEMORANDUM
Arthur Noriega V DATE: JAN 21 2022
City Manager
SUBJECT. Prior Period Invoices
Manuel A. Morales REFERENCES:
Interim Chief of Police
ENCLOSURES:
i-11 F
Pursuant to Resolution No. 21-0408, I am requesting to transfer budgeted General Fund dollars from
minor object code (546000) Repair and Maintenance Services to Other Current Charges and Obligations
(549000). The funds will be utilized to cover meal expenses incurred during the Civil Unrest period
which were originally entered under the Coronavirus project.
Should you have any questions or concerns, please do not hesitate to contact Jorge A. Blanco, Police
Budget and Finance anager at (305) 603-6198.
Approved Date
Art Noriega V, Cit' nager
MAM/jab
�1
�k M .......... .........
enUtkw:.,.m.,N xa>manm:>.:wm�mmaoN-a>avN:,z.
�kna.n owroa er I 'a �� �.-___._ 4
__
.vrR..:_.
a,wmn w�coa i
>t«Nnrr:CrlNex
0.11m:
............:
9ae[traaselufm,: tMvrP n:aw l4W!rauirw
mAetaeyaWlunikw'YatM
Iaal tlnnnrvy 1pAnm:i I:va'xA«t (ntMM.9.(.Yk'IInm
D-aa^ rs 9hdtr >Polatm
i,. � w,,we.�. "Hflr.."; 'vf:.
5"n'W.SC IMi11 os.•. P
,•.55:: 1 i Nat...:w. �;ix'J, 9.an ' J:a'.5rn.:.,:,A,:
r.,1�n'.'1w'Yi."Ji4+:et�:".^py�.kC&iYllLLiiKflLXSffifJSs%NSf4Y:i!"w=4G':G`iRll.Fdff31T[i.SYi:tll&K.ri+`1L`1
9.411.Y.IVW 'Y; l5a 0
:[. ,.tnn CUFsn Sa.,cm t:: JE, tlIS:91tltl:y+i�,.�
.. z�@1'.:..,a-Ne.ini4'"'.'.a"ri.:.i�YffircAkub..AAfCS.'1'urtAf l4 ii�.:xr.k.m:.li13.2_-ift.:MM. :3.Si'T.9p.:1:.CF:t�.:A:1
:4aTt xo nwl :It:> Gw ,;
ttx
.; to SCN,Ia-tn-V.epkutttl."�RS�taan�u,x•sx..«u: ma
�. tiet^t«•to>'lnae'.'.1k1a.:.➢.N:.otkeak..: ":>«mPn:v�a•:c-u.
tlea.^5uW
:romtrw:
t•. nm ,:,�utxs xn Wpaal.fal%ewcl�ae
awoauss sx »o D
aesat-
:a�.:;ttrat�_la6sfse.:tt�xts.:w!!S!?s:t
z.,.DD•w.ea, ,k.�. t«:a :,,
rt IrM9-9,tkn;lz aumr:xt.:lau�tvi:a�,,;wv;:. tsas.a
,+n:,�,urs,9srtr,ar.Ncwaza�a
ur..a:ro ,. 15P P
uwnnrn
vn.ca.z,u zcma,�smt..:to.�irm<.. •"'mac awa
,..., n. Wgoi, fah Na%l: !,N
9.15Exirn SSE S5P P
D3SIXt SU Yk9a'Da':agl.WR41.4R1:tW:<W an iw is t-.,4M'a
D#+elax
,� A'.: .S'4!.:iuR„xi.�?Yi.'IY.�i{f9C L9C11x tPn.Bi ?'.'r.NRi r.`J...N!.:•rlSh'i.�ti"
5�.t�ld'U SIP': SIP ti
a2r Y3ulilw.SS.la':�Yi.e59a.dPX2Nst^>'�*k'9'SZW«I:L 43fa.
'.Cxvua
1Si:FJfM'.snfi.U�,rcslmWu.a:INL,d;..M<ti!!.ila(�.PaFLtct.+kttt..M1ccax?3
t3c.0P:no K:P' 6.So o
eFan- la:ieufm rn#'kh.4'�ue swam t:: Nb'a
' AIM W.Alks`..:.AiNP.',rK±'AT
IP,aeP suss+ o'n: BPO a
.tYm.zt: IktP:el +uP,R.aA71Tsm..4a=k`nx4f qA'a
,.. :151k5J :'L48kFi',VL Ai'Nt Saafn,.a,:xx^:xuayreen..w-^rs:�f-_.;.t.+xme xT.x:alrmx a.�>-�ttitc;ti..axaaar,.a.ta.:uwekDPx::,: a.:w<a.<,
'xx.�!. i2S 725z.
wls9.tc �.nu wt» �alw D
olr s. z>u Y:o: xo wo�we.. ,n k�nww.�.Wx craw.
;� .tW::S 2. 'G,rta'6L:,'iPJ.:TalA:Y'.Y :L:�FYtxW..6Yi-�-:Yfi-.N.'.aax ccv:u!7,>di'.1eaYa'r.f^rlxuxarW'.hmwa�.:-.x.:'atMwv^x.:I.-9..:5.
:IaMa.Y tlsli ItFSa! I:SW P
PIa;RMt)Ik03Nt,VCCIX11lR::i'.i.'4�sar� Seca LC,1'b'a
1aAkeaaimNc -. (MTa.Gmt <anW lPmaaMYm ; 9:Nwgn
,nary Services/DeliverLean / DL Grab-n-
McKinley Street Bay 2
,lywood, FL 33020 US
:61) 287-7900
accounting@deliverlean.com
www.deliverlean.com
BILL TO
Yadissa A Calderon
CITY OF MIAMI PROCUREMENT
DEPARTMENT
444 SW 2 Ave, 6th FL
MIAMI, FL 33160
INVOICE n DATE TOTAL DUE
15787 06/04/2020 $6,050.00
SHIP DATE
06/04/2020
AC71VIT(
851218008827
Turkey Caprese Wrap
851218008698
Italian Hoagie
851218008834
Chicken Caesar Wrap
POLICE DEPARTMENT
Invoice
SHIP TO
Yadissa A Calderon
CITY OF MIAMI PROCUREMENT
DEPARTMENT
444 SW 2 Ave, 6th FL
MIAMI, FL 33160
DUE DATE TERMS ENCLOSED
07/04/2020 Net 30
P.O. NUMBER
Yadissa A Calderon
QTY
RATE
AMOUNT
233
8.50'
1,980.50
233
8.50 :
1,980.50
234
8.50
1,989.00
SUBTOTAL
5,950.00
SHIPPING
100.00
TOTAL
6,050.00
BALANCE DUE
$6,050 00
Lean Culinary Services/DeliverLean / DL Grab-n- Invoice
go, LLC
2050 McKinley Street Bay 2
Hollywood, FL 33020 US
(561) 287-7900
accountingCa deliverlean.com
www.delivedean.com
BILL, T(7
Yadissa A Calderon
CITY OF MIAMI PROCUREMENT
DEPARTMENT
444 SW 2 Ave, 6th FL
MIAMI, FL 33160
INVOICE 9
DATE TOTAL DkI[
27517
05/31 /2020 $21,012.50
SHIP DATE
05/31 /2020
SHIP TO
710 SW 12th AVE,
MIAMI, FL 33130
DUE DATE TFRMS
06/07/2020 Net 7 days
P.O. NUMBER
Yadissa A Calderon
EN.GIt?SEi}
ACTIVItY QTY gA-fE AMOUNT
PORTIONED MEALS 900 11.95 10,755.00
LUNCH
PORTIONED MEALS 850 11.95 10,157.50
DINNER
SUBTOTAL 20,912.50
SHIPPING 100.00
TOTAL 21,012.50
BALANCE DUE $21,012.50
Lean Culinary Services/DeliverLean / DL Gnab-n-
go, LLC
2050 McKinley Street Bay 2
Hollywood, FL 33020 US
(561) 287-7900
accounting@deliverlean.com
www.deliverlean.com
SiLL T
Yadissa A Calderon
CITY OF MIAMI PROCUREMENT
DEPARTMENT
444 SW 2 Ave, 6th FL
MIAMI, FL 33160
TOTAL DUE
27518 06/01 /2020 $5,477.50
SKIP DATE
06/01 /2020
4CTIVIT`,
PORTIONED MEALS
BREAKFAST
Invoice
4 am
MIAMI POLICE DEPARTMENT
400 NW 2nd Avenue,
MIAMI, FL 33128
DUE GATE
06/08/2020 Net 7 days
P.O. NUMBER
Yadissa A Calderon
450
SUBTOTAL
SHIPPING
TOTAL
BALANCE DUE
RATE AMOUNT
11.95 5,377.50
5,377.50
100.00
5,477.50
$5,477.50
_aan Culinary Services/DeliverLean / DL Grab-n-
go, LLC
2050 McKinley Street Bay 2
Hollywood, FL 33020 US
(561) 287-7900
accounting@deliverlean.com
www.deliverfean.com
BILL TO
Yadissa A Calderon
CITY OF MIAMI PROCUREMENT
DEPARTMENT
444 SW 2 Ave, 6th FL
MIAMI, FL 33160
27519 06/01/2020 $11,452.50
SHIP DATE
06/01 /2020
PORTIONED MEALS
LUNCH
5yk
Invoice
SHIP TO
MIAMI POLICE DEPARTMENT
400 NW 2nd Avenue,
MIAMI, FL 33128
E DATE ENCLOSED
06/08/2020 Net 7 days
P.O. NUMBER
Yadissa A Calderon
AMOUNT
950 11.95 11, 352.50
SUBTOTAL
11,352.50
SHIPPING
100.00
TOTAL
11.452.50
BALANCE DUE
$1 1 9452.50
Lean Culinary Services/DeliverLean / DL Grab-n-
Invoice
goy LLC
2050 McKinley Street Bay 2
Hollywood, FL 33020 US
;
'}
(561) 287-7900
v
accounting@deliverlean.com
www.deliverlean.com
OiLC:70
SHIP TO
Yadissa A Calderon
4 am
CITY OF MIAMI PROCUREMENT
MIAMI POLICE DEPARTMENT
DEPARTMENT
400 NW 2nd Avenue,
444 SW 2 Ave, 6th FL
MIAMI, FL 33128
MIAMI, FL 33160
INVOICEDATE:` TOTALDUE
DUE DATE TERMS
ENCLOSED !.
27526 06/04/2020 $6,050.OQ
06/11 /2020 Net 7 days
SHIP DATE
P.O. NUMBER
06/04/2020
Yadissa A Calderon
_.
ACTIVITY '.
OTY
-RATE,.:.AMOUNT;
Wholesale Menu:WS - Turkey Caprese Wrap
233
8.50 1,980.50'
Turkey Caprese Wrap
Wholesale Menu:855842007638
233
8.50 1,980.50
Italian Hoagie
855842007607-1
234
8.50 1,989.00;
Chicken Caesar Wrap
- -
SUBTOTAL 5,950.00
SHIPPING 100.00
TOTAL 6, 050.00
BALANCE DUE $6,050 00
�2�5�j