Loading...
HomeMy WebLinkAboutBack-Up DocumentsCITY OF MIAMI, FLORIDA TO: Arthur Noriega V City Manager FROM: Manuel A. Morales Interim Chief of Police INTER -OFFICE MEMORANDUM DATE: JAN 1 8 2022 FILE : SUBJECT FY2021/2022 Purchase Requisitions REFERENCES: ENCLOSURES: Pursuant to Resolution No. 21-0408, I am requesting the following: 1. To transfer budgeted General Fund dollars from minor object code (531000) Professional Services to Other Contractual Service (534000). The funds will be utilized to cover contractual services for network (switches, routers, data circuits) monitoring and administration, through a Managed Service agreement for Remote Monitoring and Management Service Desk within the Police Department IT Department. 2. To transfer budgeted General Fund dollars from minor object code (546000) Repair and Maintenance Services to Machinery and Equipment (664000) to cover a purchase requisition from FY2020/2021 which was processed on July 261, 2021. Based on the established process, the purchase requisition was cancelled because it was determined that the equipment being requested through the Traffic Enforcement Unit from CMI, Inc. required a sole source exemption. Should you have any questions or concerns, please do not hesitate to contact Jorge A. Blanco, Police Budget and Finance Manager at (305) 603-6198. MAM/jab CI) MIAMI POLICE DEPARTMENT PURCHASE / SERVICE REQUEST FORM UNIT: Computer Support Unit SECTION: ITSS CONTACT PERSON: Joseph Pontillo, Info. Systems Mgr. PHONE NUMBER: 305-603-6155 CONTRACT M DATE DELIVERY REQUIRED TYPE OF FUNDS TYPE OF PURCHASES ® GENERAL FUND ® REGULAR PURCHASE ❑ L.E.T.F. ❑ EXPEDITE ❑ GRANT (SPECIFY): ❑ SOLE SOURCE PURCHASE ❑ OTHER (SPECIFY): ❑ OTHER (IF NECESSARY, FINAL DETERMINATION OF FUNDING WILL BE MADE BY BUDGET UNIT) BUDGETED ®YES ❑ NO Budget Line # 1866 Account Code # (If not, please attach transfer of funds request indicating how you (For Budget Unit Use) wish to accommodate this request or identify other funding source) NAME: United Data ATTENTION: Richard Sardinas 1 SUGGESTED SOURCE (cANLISTMORETHANONE) E C E I V E Inc. ADDRESS: 2900 Monarch Lakes Blvd., Suite 300 Miramar, FL 33027 ASSISTANT CHIEF PHONE #: (305) 301-7976 FAX: ADMLKISTRATION DIV ITEM DESCRIPTION (BEASDESCRIPTIVEASPOSSIBLE) Contractual Services for Network UDT Infrastructure Remote Monitoring and Management See attached information UNIT OF ESTIMATED SHIPPING ESTIMATED QTY: 12 MEASURE: UNIT PRICE: $19.975.32 CHARGES: TOTAL: $239,703.84 MANUFACTURER: MODEL: STYLE: MEMO ...................COLOR ................... ASSEMBLY�REQUIRED:� �Q YES Q NO JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. —GIVE HISTORY, EXPAND ON NEED, ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE). The purchase is to provide Contractual Services for network (switches, routers, data circuits) monitoring and administration. Services also include monitoring and administration of patch management. The services are needed due to insufficient personnel to perform these functions. Computer Support Approval Date /Z r Z, Z '(Required on computer related items only) o CV OC11 1 1\V ALJV. c� Lieutenant w cn �— Captain z w 2Ei Commande w CD Z r cn Division cn w z Deputy cn Busewss Management Administration Asst. P.I.N. P.I.N. , / P.I.N. Z ( 74/`f P.I.N. P.I.N. P.I.N. P.I.N. P.I.N. Date: Date: Date: 1 Z 2iF Z+2� Date: Date: Date: Date: Date: hn'D RF # 704 ( Budget tint ) Revised 10-13-16 Computer Support Unit ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE) Managed IT as a Service Solution On -Boarding and Project Non -Recurring Cost UNIT OF ESTIMATED SKIPPING ESTIMATED QTY: 1 MEASURE: UNIT PRICE: $19,975.32 CHARGES: TOTAL: $19,975.32 MANUFACTURER: MODEL: STYLE: SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. —GIVE HISTORY, EXPAND ON NEED, ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE). ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE) UNIT OF ESTIMATED SHIPPING ESTIMATED QTY: MEASURE: UNIT PRICE: CHARGES: TOTAL: MANUFACTURER: MODEL: STYLE: SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO sonsmassamommm JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. --GIVE HISTORY, EXPAND ON NEED, ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE). ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE) UNIT OF ESTIMATED SHIPPING ESTIMATED QTY: _ MEASURE: UNIT PRICE: CHARGES: TOTAL: MANUFACTURER: MODEL: STYLE: SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO ..........................................................................................� JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. —GIVE HISTORY, EXPAND ON NEED, ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE). GRAND TOTAL: $259.679.16 Managed IT as a Service Remote Monitoring and Management Service Desk Prepared for: INCR;$ ;RATER Version 1.0 November 411, 2021 ACCOMPLISH MORE Table of Contents 1. Services Overview.............................................................................................................................................................................3 2. Solution Entitlements........................................................................................................................................................................3 3. Scope of Services...............................................................................................................................................................................3 3.1. Service Delivery Management(SDM).......................................................................................................................................4 3.2. Remote Monitoring and Management (RMM)........................................................................................................................4 3.3. Supported Devices*Not limited to...........................................................................................................................................4 3.4. Key Monitoring Parameters.....................................................................................................................................................6 3.5. Standard Operating Procedures(SOPs)....................................................................................................................................6 3.6. Troubleshooting and Full Remediation....................................................................................................................................6 3.7. Vendor Escalations...................................................................................................................................................................6 3.7.1. 3'd Party Vendor Escalations............................................................................................................................................6 3.7.2. ISP Vendor Escalations and Follow-ups...........................................................................................................................7 3.8. Administrative Activities...........................................................................................................................................................7 3.8.1. Move, Add and Changes (MACs).....................................................................................................................................7 3.8.2. Windows Patch Management.........................................................................................................................................7 3.8.3. Linux Patch Management................................................................................................................................................8 3.8.4. Antivirus Definition Updates...........................................................................................................................................9 3.8.5. Bundled Anti -Virus and Malware (Optional)...................................................................................................................9 3.8.6. Preventive Maintenance Schedules................................................................................................................................9 3.9. Configuration Backup of Network Devices...............................................................................................................................9 3.10. Storage Maintenance.............................................................................................................................................................10 3.10.1. Monthly Storage Reclamation.......................................................................................................................................10 3.10.2. Storage Array Firmware Update and Deployment........................................................................................................10 4. Customer Visibility and Auditability................................................................................................................................................10 4.1.1. Auditability....................................................................................................................................................................10 4.1.2. Infrastructure Visibility Portal........................................................................................................................................10 4.1.3. Reports..........................................................................................................................................................................11 5. Financial Investment.......................................................................................................................................................................13 5.1. Device Inventory .....................................................................................................................................................................13 AppendixA. Signature Block....................................................................................................................................................................14 1. Terms...............................................................................................................................................................................................14 AppendixB. Service Level Agreements....................................................................................................................................................19 Appendix C. Key Monitoring Parameters for Different Devices*............................................................................................................21 Appendix D. Standard Operating Procedures SOP.................................24 1.Services Overview This Service Catalog ('SC') describes the various types of services and service levels that may be obtained under this agreement. In addition, it sets forth the Parties' responsibilities, prerequisites and assumptions that underlie the provision of the Services and additional terms and conditions. The solution described within this document focuses on the following key areas: Account Management from assigned UDT resources ('Account Manager, Service Delivery Manager and Customer Success Manager) helps to build and maintain relationships with your management and service delivery staff and helps you arrange each service element required to meet your business requirements. Service Desk focuses on restoring service availability by handling incidents and requests occurring in the infrastructure or reported by end users or IT systems. It uses industry standard management processes (ITIL) such as incident, problem, request, change, configuration and release management processes in order to consistently deliver its support services to the enterprise. 2.Solution Entitlements MITaaS1 • • and Entitlements 24 X 7 x 365 Monitoring, Alert filtering, & Alert Priority from a Certified NOC Included,,'UDT Alert Validations and Escalations using Run Book Automations (RBA) Alert and Incident Prioritization with Escalations to Customerfor Remediation Patch Rating Service, Patch Failure Alerts Patch Installations and Antivirus Definition Updates for Supported Antivirus Products Standard UDT and Customer Specific Operating Procedures (SOPS) Based Initial Remediation ISP Vendor Escalations & Follow-up Configuration Backup of Network Devices as Applicable Firmware Upgrades as Required or on Request Basis Troubleshooting and Full Remediation 3rd Party Vendor Escalations for Further Troubleshooting Continuous Account Management and Support Client Advisory Services 3.Scope of Services The primary and day-to-day scope of this agreement is to provide the Customer with information technology services and technology management expertise to ensure that all the supported technology assets and/or users are managed and supported using sufficiently trained and experienced resources. The following represents the scope of service offerings: 3.1. Service Delivery Management (SDM) UDT will provide a single point of contact for this engagement acting as the Service Delivery Manager. The main responsibilities for this individual are as follows: Review, update and maintain Service Level Agreement ResponsibilitiesActivities Responsible for maintaining the SLA ('SLA'). Maintain and define service improvement measures. Responsible for defining service improvement areas. Organize and facilitate Business Review Meetings Responsible for organizing tactical service meetings (e.g., Business Review, SLA Review Meeting, etc..). Facilitate, produce and/or distribute Service Responsible for communication with the business Dashboards/Reports as defined in this document. representatives. Ensure efficient and effective communication lines between Responsible for customer relationship management. UDT and customer management. Keep involved parties informed about achieved service Responsible for negotiating and formalizing service levels, costs and changes. provisioning agreements and underpinning contracts. Provide escalation support Get involved in escalations impacting the SLA. Monitor escalations and critical issues to resolution. Address potential vendor issues affecting the delivery of the Engage vendors, review vendor contracts, monitor SLA vendor accountability, recommend new vendor if possible. Conduct end -user satisfaction surveys and reviews Assist in deploying and gathering end -user satisfaction survey results and presenting them to management. 3.2. Remote Monitoring and Management (RMM) This document specifies the scope and schedule of the services delivered within the UDT RMM MITaaS Solutions service level agreement. As a requirement to start services, this document must be signed, as an agreement for the scope and deliverables of the MITaaS Solutions package. 3.3. Supported Devices -Not limited to EMC Connectrix Switches and Directors, EMC CLARHON EMC Celerra EMC VNX -. ..__.. NetApp NetApp FAS 2xxx, 3xxx Series, NetApp F-500, F-600 & F_-700 Series, and C Series Dell !_EqualLogic PS Series, MD Series HP ! EVA, Left Hand Solutions & MS_A_S_eries v Cisco ! MDS Fabric switches j ExaGrid All Versions Cisco - Catalyst Switches 2xxx, 3xxx,45xx, 49xx, Nexus Juniper: EX 4200, E320 _—. __ — _--------_.. --------- ............... .._...... LAN Switches HP Procurve ------ ---------- Switches Brocade Aero H ive FortiNet - FortiSwitch FortiNet— FortiVoice, FortiGW, FortiSwitch, FortiFone—� Telephony Gateways, Routers, IP Phones —_—_` Cisco —All Models Routers j Branch Routers / Service Provider Edge Routers i Firewalls Network Security I I I I WAP Wireless Access points & Controllers i i Cisco- 8x, 18xx, 19xx, 2800, 2900, 3200, 3800, 3900, 7200, 7300, 7500, 76xx Series. Juniper - M , E , ERX , J, Series, AeroHive _ Cisco - ASA 5500 series, SA 500 series, ACA Express Juniper - SRX Series Services Gateway, Net Screen Series, SA Series SSL VPN Appliance, SSG VPN Security Platform SonicWALL: TZ, NSA, Fortinet Firewall PaloAlto CheckPoint FortiNet - FortiGate Cisco - Wireless Access Points(500 Series Wireless Express, Cisco Aironet Series, ) and WLAN Controllers (21xx, 25xx, 44xx, 55xx), Meru WLAN Controller, Aruba WLAN Controllers Cisco Meraki - ALL Aruba (HP) -All Meru Networks - AeroHive f FortiNet— FortiAP - AII IT Infrastructure ISupported Technology Server Operating I Windows: Windows Server 2008 and upwards Systems Linux: Centos/ Redhat 5.3 & above, and Ubuntu 10.0 & above File & Print, DNS, DHCP, Domain Controller(Active Directory), Email (Microsoft Exchange), Mobile Infrastructure (BlackBerry Enterprise Server), Virtual Hosts(VMware, Citrix Xen, Hyper-V), and Terminal Applications j Services/Remote Desktop Services All Citrix Applications and Components Backup Applications j (if purchased I Symantec, NT Backup, CA ARCserve, Vaultlogix, Acronis, Datto G Series and Veeam separately or owned Antivirus Products j Symantec, McAfee, Trend Micro, VIPRE Business Premium, Kaspersky, ESET NOD32, and Microsoft Security Essentials Bundled Anti -virus , VIPRE Business Premium Virtualization Services: XenApp 6.05, XenApp 6.0 and XenApp 5.0 - Advanced, Enterprise and platinum Citrix XenApp ; editions. XenDesktop Application I Virtualization VMware I I VMware ESXi i Microsoft Hyper-V D.SQL Services Database Microsoft SQL MSSQL Express/Standard/Enterprise 2005, 2008 and 2008 R2 or upward Welbserver Operating Systems Linux Centos/ Redhat 5.3 & above, Ubuntu 10.0 & above, Fedora Windows Windows 2003 Server and above Webservers Apache, Tomcat, and IIS 3.4. Key Monitoring Parameters UDT monitors the customer's infrastructure using standard Windows WMI or SNMP data collection. The UDT platform also enables the UDT staff to remotely and securely access the monitored devices in order to perform SOPS (Standard Operating Procedures), advanced troubleshooting, remediation and maintenance tasks. For Details, please refer Appendix B 3.5. Standard Operating Procedures (SOPs) UDT supports the execution of pre -defined and customer specific custom SOPS. This means that the SOPS are executed when an alert is triggered, incident raised or a request submitted in reference to an issue or move -add -change (MAC) within the customers infrastructure. / Incoming alerts will be initially validated to identify false alerts or alerts where no action is required ► Actionable alerts will be ticketed by the NOC engineer and any documented Standard Operating Procedure (SOP) will be executed as first level of support and/or troubleshooting and remediation steps determined by the technician or engineer assigned. / If the SOPS fail to resolve the problem, the ticket will be updated and immediately escalated to the next level of NOC Engineers for further troubleshooting and remediation. Escalations outside of the scope of support which require escalation to a customer contact will be established and documented during the on -boarding period of the project. List of base SOPS executed, but not limited to: Please refer Appendix C 3.6. Troubleshooting and Full Remediation UDT NOC will remotely troubleshoot and fix issues for alerts that are generated from the existing configuration of your network infrastructure. Following are some of the tasks and activities performed, but not limited to this sampling: ► If the SOPS fail to resolve the problem, then the ticket will be updated and immediately escalated to the domain expert within the NOC team to troubleshoot the issue and remediate it in a comprehensive fashion ► If the problem involves a 3rd party vendor for any configuration issues with the applications and operating systems, then the UDT NOC will contact the vendor technical support for further troubleshooting and full remediation ► Root cause analysis of critical (PO) incidents are performed to identify underlying problem / If an incident is raised, then the UDT NOC will fix it within the predefined SLA ► If a remediation activity is performed, then it is logged into an ITIL based ticketing system and the ticket is updated with its complete chronology as well as the steps taken to remediate the incident. 3.7. Vendor Escalations 3.7.1. 3rd Party Vendor Escalations If the UDT services team determines a configuration issue that relates to a 3rd party vendor, then UDT will contact the vendor's technical support team to resolve any configuration issues with the applications and operating systems. Under these conditions the following requirements take effect: / The UDTSLA may be impacted by the terms of the SLA and contract that the customer has with the vendor's technical support organization ► UDT recommends that the customer maintain valid support contracts for the entire infrastructure managed by UDT / UDT requires that the customer authorize UDT to act on their behalf when it interacts with the vendor tech support organization. 3.7.2. ISP Vendor Escalations and Follow-ups UDT will drive ISP vendor escalations for internet, leased lines, or MPLS circuits for the following events (a) link down (b) high latency (c) high interface errors. UDT will create a ticket and escalate the issue according to the escalation matrix provided in the partner portal. Note: To avail of the ISP vendor escalations services, it is mandatory to subscribe to UDT services for the monitoring of internet and WAN links on the interfaces of managed devices. Deliverables: To deliver the SLAB, UDT will follow the process defined below as part of UDT delivery model: / UDT will monitor WAN connectivity and if there is a problem UDT will contact the ISP or create online ticket or both. / All ISP related issues, such as, internet or WAN links down will be escalated to the ISP either by phone call or online ticket or both. UDT will also escalate the issue to the solution provider following the standard escalation process / Summary of conversations with the ISP will be updated in the ticket ► UDT recommends the solution provider or customer to maintain valid support contracts with all ISPs they use / It is required that the customer and/or solution provider authorize UDT to act on their behalf during any escalation with the ISP, this is usually accomplished through a signed Letter of Authorization (LoA) with the carrier/ISP. / The response and resolution SLAB of UDT for any issue escalated by UDT to the ISP is now dependent on the response and resolution SLAB provided by the ISP. As a result, the response and resolution SLAB of UDT may be impacted negatively for this issue if the ISP is not responsive. 3.8. Administrative Activities UDT NOC team will perform administrative activities as part of the Move, Add and Changes (MACs). 3.8.1. Move, Add and Changes (MACs) Your IT team can create a ticket and assign it to the NOC for executing MAC requests: For Details please refer Appendix C 3.8.2. Windows Patch Management UDT will scan servers for missing patches every Wednesday or as per the customer's patch policy/schedule and publishing of the results of the patch scan and actions to be taken for partner approval in the portal. ► If installation of the patch fails, UDT will take corrective action and the failed patches will be re -installed during the next scheduled patch maintenance window or during the current patch maintenance window if time allows. Failed patches will be communicated to the customer and reflected on the Patch Status portal. Based on severity of Patch UDT will recommend opening an additional maintenance window to immediately address and install failed patches. / Windows server patches have to be approved by end customer or by UDTteam based on agreed upon Patch Approval Process (PAP). ► The installation of security patches on servers that have been approved will be scheduled as defined by the solution customer. ► Windows security patches and critical only patches are tested by UDT using known IT standard best practices — UDT then rates the patches as Whitelisted or Blacklisted. Supported Operating Systems and Applications Operating Systems Windows, Linux ,Windows Server 2003 and upwards _ Application (Default) ( MS Office Application (On Request) Active Directory, Microsoft Exchange Blackberry, Virtual Hosts(VMware, Xen Server and Hyper-V), Backup application, webservers, Citrix, MS SQL, and Microsoft SharePoint Patch Configuration and Policy Default patch approval configuration Y Manual Approve for Servers' Auto Approve: Optional (customers choice) How does Auto patch Approval" ► "Auto approve' policy in the portal will approve Security and Critical Operating works? System patches only ► Customer can approve application patches from the UDT Portal Sanity Checks (Servers Only): After Windows Patch Installation and Server Reboot UDT conducts sanity checks on Windows servers after a patch installation and server reboot. Sanity checks include the following: / Windows services: Check for services where "Start-up" type is "Automatic" and "Status" is "Started". UDT will re -start the Windows service if "Start-up" type is "Automatic" and "Status" is "Stopped". Standard Operating Procedures for servers that have checks and needs outside of those in scope will be developed during the on -boarding process. Post OB requests to adjust recorded sanity checks can be submitted for review and approval to the UDT via a Request Ticket. / Event logs: Application and system event logs that show "Severity Level" as "Error" will be checked. Note: / Default Windows patch management includes installation of security patches and critical patches. It is the responsibility of the customer to hold a genuine Windows license for the server. ► It is important to note that a device will be rebooted following any patch installation that requires rebooting. Therefore, customer's approval of the patching time window should take into consideration the possibility of a device reboot. / Windows Patch Testing: Windows security patches are tested by UDT using known IT standard best practices. Windows security patches released by Microsoft are first installed in a restricted test environment (that supports standard applications & tools). It is then tested for installation issues, standard application compatibility, and malfunction. UDT personnel will also periodically review forums on patch testing to understand other known issues. UDT testing procedures are best effort in a limited testing environment. After installation of whitelisted Windows security and critical patches, UDT does not accept any liability resulting from crashes or malfunction of devices and applications, should they occur, but will work with customer, vendors and all parties needed to arrive at a solution. 3.8.3. Linux Patch Management UDT will scan servers for missing patches every Wednesday or as per the customer's patch policy/schedule and publishing of the results of the patch scan and actions to be taken for partner approval in the portal. / If installation of the patch fails, UDT will take corrective action and the failed patches will be re -installed during the next scheduled patch maintenance window or during the current patch maintenance window if time allows. Failed patches will be communicated to the customer and reflected on the Patch Status portal. Based on severity of Patch UDT will recommend opening an additional maintenance window to immediately address and install failed patches. / Linux server patches have to be approved by end customer or by UDT team based on agreed upon Patch Approval Process (PAP). / The installation of security patches on servers that have been approved will be scheduled as defined by the solution provider or end customer Sanity Checks (Servers Only): After Linux Patch Installation and Server Reboot UDT conducts sanity checks on Linux servers after a patch installation and server reboot. Sanity check includes the following: / Check for running Linux services. UDT will restart the Linux service if stopped. ► Check for application & system logs. / Post OB requests to adjust recorded sanity checks can be submitted for review and approval to the UDT via a Request Ticket. Note: / Default Linux patch management includes security patches. It is the responsibility of the customer to hold a genuine Linux license for the server. ► It is important to note that a device will be rebooted following any patch installation that requires rebooting. Therefore, customer's approval of the patching time window should take into consideration the possibility of a device reboot. 3.8.4. Antivirus Definition Updates This activity includes checking the anti -virus definitions on the windows server and updates to those definitions on a scheduled basis. Additionally, the following is done: ► Anti -virus or anti-malware definitions will be updated on a daily basis by default, monitor sets are in place to monitor supported AV/MW software. / The customer will be alerted if any major issue such as corruption or license expiry is observed either with the anti -virus or anti-malware application or with its definition update, followed by necessary steps taken to resolve alerted issue. ► If the anti -virus or anti-malware update event fails in its regular schedule, then UDT will validate and run the definition updates once again. If the definition updates fail two consecutive times or if the definition versions are older than two days, then UDT will remedy the issues as per the SLA under effect. / All issues arising out of anti -virus definition updates are categorized at a "P3 Priority" unless otherwise agreed upon with customer. / If the anti -virus or anti-malware update event causes system related issues, then the UDT Services team will engage as per the SLA under effect. Supported Anti -Virus Products Symantec, McAfee, Trend Micro, Kaspersky, ESET NOD32, Microsoft Security Essentials, and VIPRE. 3.8.5. Bundled Anti -Virus and Malware (Optional) UDT bundles VIPRE Business Premium with its services and will be provided to customers who opt for it. The UDT NOC team will make available a copy of the VIPRE Business Premium MSI package to the customer if needed. The customer may perform a self - install of the software, or request UDT to install it on its servers and/or workstations during the on -boarding process. For these environments, the following apply: ► The VIPRE client configuration is updated every 4 hours, and managed by UDT from a central VIPRE console / The VIPRE clients will periodically download definition file updates from the local update server, or from the VIPRE update site over the internet ► Scheduled anti -virus scans run every Friday at 4PM on all the managed clients or as needed by customer policies and procedures. ► The UDT team checks virus infection logs every 8 hours / UDT accepts no liability if systems are infected by a virus not caught by the VIPRE software, or if the VIPRE software cannot catch new or existing viruses on servers and/or workstations. 3.8.6. Preventive Maintenance Schedules Servers/Workstations -..... ___ _..._-....._....-..._.._..__.._._.__......._.............__---------- _.._....._......_................................... ... ---------- _._._........... .......... ._...___..._....... ___-_.................... -.............. Maintenance Activity Frequency Schedule Anti -virus or Anti-malware Daily or Weekly 2 PM if daily; definition updates Patch Scan Wednesdav 1 PM Patch Management (Install) Monthly One weekend in the month (Sat. or Sun.) _._...._._...__._...--._.._.__.---.-.--.--_.__.___._..._._______.__—_.___.--.—._..___.____._—,.-.. —. NOTE: These Maintenance Schedules are standard UDT NOC schedules if customer has preset standards and/or policies UDT will adhere to customers published schedules. 3.9. Configuration Backup of Network Devices Network Device configurations are periodically backed up. UDT performs a backup of the network device configuration every 7 days. The configuration backup will be stored in the cloud and managed by the UDT ITOP Platform. NOTE: Configuration backup is an automated process and is supported only on supported device types. If an automated process is not supported by the device, then UDT will not be able to backup network device configuration. Deliverables: / If the backup configuration event triggers other issues on the device, then the UDT team will be engaged to resolve the issue if it is within the scope of the defined SLA. 3.10. Storage Maintenance 3.10.1. Monthly Storage Reclamation Monthly once storage reclamation will take place on need basis/on customer request and after a review of active, inactive LUNs by UDT. Migration and reclamation of storage will be provided after the approval from customer. The following are the steps in the monthly storage reclamation process. Scope: All storage (LUNs) within the storage array(s) in the customer environment which are agreed upon in the engagement. UDT responsibility: - Review active/inactive LUNs, capacity used and preparing the overview report - Following Change management process for raising the change request for kicking off storage reclamation - Starting storage reclamation via migration of data to/from LUNs - Re -assign LUNs to storage ports/Servers Customer responsibility: - Approving the change request for optimizing storage - Providing 'window' for reclamation to take place and communication to affected parties Deliverables: - Generating updated LUN/data/Server(s) assignment report for Storage array(s). 3.10.2. Storage Array Firmware Update and Deployment Storage array OS version updates are performed on need basis/on customer request and only after the approval from customer. This procedure is only included for in -place / non-destructive updates. Scope: All the storage arrays in the customer environment which are agreed upon in the engagement. UDT responsibility: - Verification of availability and requirements of firmware update/upgrade - Following Change management process for raising the change request for deploying the updates. Confirm operational window for service delivery. - Update/upgrade the storage array(s) controllers. - Validate controllers have rebooted and operational. - Execute CIFS and NFS mounts 4.Customer Visibility and Auditability 4.1.1. Auditability All remote activities performed by UDT NOC engineers are recorded and available for the customer to replay and review via the session recordings capability in the UDT ITOP Platform. 4.1.2. Infrastructure Visibility Portal UDT MITaaS Solutions provide visibility into your IT infrastructure via the UDT ITOP Platform. This provides access to current status of the devices across different locations, while providing useful trending reports for advanced analysis. 4.1.3. Reports UDT MITaaS Solutions also include reports that offer a comprehensive view of performance and availability of the customer's infrastructure. You can generate on -demand and/or schedule reports from the UDT ITOP that include the following: / Inventory reports ► Problem & incident management reports Additionally, monthly reports are available which includes: ► Executive summary reports, Executive reports Dashboard and Portal Sample Screenshots: #1 - SLA Priority Dashboard Minutes Days 228 bt 46 zuamo-me w,omm.o4w.. d ttrzars 0.05 120 HGt^5 7.59 rt #2 — SLA Resoonse Time Dashboard aaa Report #3 - SLA Resolution Time Dashboard Report #3 — Patch Compliance Dashboard 5. Financial Investment .. • • Solution List Monthly Recurring Description Cost UDT Infrastructure Remote Monitoring and Management - 24 x 7 x 365 Remote Monitoring and Management $19,975.32 - Patch Management and Configurations Backups as applicable - Client Success, Service Delivery, and Account Management Description Non -Recurring Cost Managed IT as a Service Solution On -Boarding and Project Management - Service On -Boarding and Documentation $191975.32 - Standard Operation Procedures (SOP) and Workflow Build - UDT Management Tool Implementation, Configuration, and Agent rollout - Project Management *Based on 59-month term GSA Service Category- 5415S — IT Professional Services: Network Administrator $113.26 GSA Service Category- 5415S — IT Professional Services: Project Manager $143.20 SERVICES PROVIDED UNDER THIS SOW ARE SUBJECT TO THE TERMS AND CONDITIONS OF GSA SCHEDULE #GS-35F-538-GA UNDER PDA. 5.1. Device Inventory 6 Server-VMWare ESXi Hypervisor 71300 Mobile Device - Android 2174 Endpoints — Workstations, Laptops, Surface Tablets2 Mobile Device - iPad 1 Cisco Unified Computing System 13 Network Device - Routers 21 Network Device - Switches 2 Network Access Control — Cisco ISE 37 Wireless Access Point - Meraki 1 Network Access Control — Forescout LIZ MIAMI POLICE DEPARTMENT Tracking JD/ PURCHASE / SERVICE REQUEST FORM ro ' UNIT: ,traffic Enforcement Unit SECTION: Specialized Operations Section CONTACT PERSON: Sgt. Mario Dell Amico PHONE NUMBER: 305-603-6540 CONTRACT #: DATE DELIVERY REQUIRED 30 Days TYPE OF FUNDS TYPE OF PURCHASES ® GENERAL FUND ® REGULAR PURCHASE ❑ L.E.T.F. ® EXPEDITE ❑ GRANT (SPECIFY): ❑ SOLE SOURCE PURCHASE ❑ OTHER (SPECIFY): ❑ OTHER (IF NECESSARY, FINAL DETERMINATION OF FUNDING WILL BE MADE BY BUDGET UNIT) BUDGETED ❑YES ® NO Budget Line # J �9 Account Code # (If not, please attach transfer of funds request indicating how you (For Budget Unit Use) wish to accommodate this request or identify other funding source) pp �r • ■ • ■ ■ • • • ■ • ■ • • ■ • • • ■ • • • • ■ ■ ■ ■ • ■SUGGESTED SOURCE (CANNY LIST MORL: ! / lONE) ■ • • ■ ■ ■ • • '1 Rr.%0 E NAME: CMI, Inc. II JI i i 9(l91 ATTENTION: —Pamela J. Hagan ;. SSfST a NT a ft tEF ADDRESS: 316 East Ninth Street Owensboro, KY 42303 ar�x,rri.ttern PHONE #: 866-835-0690 FAX: 270-685-6678 ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE) Intoxilyzer 8000 UNIT OF ESTIMATED SHIPPING ESTIMATED QTY: 2 MEASURE:— UNIT PRICE: $7501.00 CHARGES: 0.00 TOTAL: $15002.00 MANUFACTURER: CMI, Inc. MODEL: I8000 STYLE: SIZE: 4.5"Lx10"Wx8.4"D COLOR: GREY ASSEMBLY / SET-UP REQUIRED: ❑ YES ® NO JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION.'=GIY;ETIISTORY, EXPAND -ON NEED, ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE). This CMI Intoxilyzer 8000 will be mainly utilized to process Impaired drivers. j .: , i Computer Support Approval Date (Required on computer related items only) APPROVALS: Lieutenant P.I.N. �(��� Date: Q%/?t�y24 Captain P.I.N. Date: Commander P.I.N. Date: Major P.I.N. %:�o Date: Z Division Chief •�� P.I.N. 7 Date: Deputy Chief P.I.N. 74NP(— Date: 1 �� Business Management Sect. P.I.N. LL ' ' Date: ` 7i�%�` 21iyt Administration Asst. Chief HP.I.N. Date: 3 biPD RF # 704 ( Budget Unit) Revised 10-13-16 ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE) UNIT OF ESTIMATED SHIPPING ESTIMATED QTY: _ MEASURE: UNIT PRICE: _ CHARGES: 0.00 TOTAL: $ MANUFACTURER: MODEL: STYLE: SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO map..........................■............................................................� JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. -GIVE HISTORY, EXPAND ON NEED, ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE). ITEM DESCRIPTION (BE AS DESCRIPTIVE AS POSSIBLE) UNIT OF ESTIMATED SHIPPING ESTIMATED QTY: _ MEASURE: UNIT PRICE: $ CHARGES: 0.00 TOTAL $ MANUFACTURER: MODEL: STYLE: SIZE: COLOR: ASSEMBLY / SET-UP REQUIRED: ❑ YES ❑ NO JUSTIFICATION (BE THOROUGH. THIS INFORMATION MAY BE UTILIZED TO PREPARE LEGISLATION. -GIVE HISTORY, EXPAND ON NEED, ETC. UTILIZE BACK OF THE FORM IF SPACE GIVEN IS NOT ADEQUATE). GRAND TOTAL: $15002.00 G Approved Art Acevedo Chief of Police CITY OF MIAM FLORIDAFL INTER-OFFICE MEMORANDUM TO: ArtAcevedo Chief of Police (Through Channels) jCFPause.��3� FROM: Cherise Assistant Chief of Police Administration Division DATE: AUG 12 2021 SUBJECT: Procurement Director's Approval FILE LEG 7-2 REFERENCES : Purchase of Intoxilyzer 8000 ENCLOSURES: The Traffic Enforcement Unit is requesting a sole source finding for the purchase of two (2) Intoxilyzer 8000 to include its software and required components, to equip the Traffic Enforcement Unit officers, from CMI, Inc., in the amount of $15,002.00; allocating funds from the Police General Fund Account Code No. 00001.190101.664000.0.0. Based upon the attached, we are requesting the Procurement Department to take the necessary steps to verify that CMI, Inc., located at 316 East Ninth Street, Owensboro, KY 42303 is the sole provider of this purchase. The Traffic Enforcement Unit is expanding and is in dire need of these added resources to be utilized mainly to process impaired drivers. CMI, Inc. affirms that the software that is being used in the Intoxilyzer 8000 is, in fact, a proprietary product of their incorporation. We strongly feel that this added purchase will equip more Traffic Enforcement officers with these needed breath testing tools, that will allow them to be more effective in serving and protecting the City of Miami. Please sign the appropriate documents and return the entire package to the Business Management Section, for proper distribution. Should you have any questions, or require additional information, please contact me at extension 6130. CGG/JAB/jms Attachments .y� ore`, RECEIVED AUG 16 2021 LEGISLATION DETAIL j t. AUG 12 2021 OFFICE c� PSEF i= P0LI CMI Inc 316 E 9th Street Owensboro KY 42303 USA Phone:866-835-0690 Fax: 270-685-6268 Date: 1 /5/2022 Expires: 3/6/2022 Reference: Terms: NET 30 DAYS QUOTE: 18858 AC"V/INC. Sales Person: Pamela Hagan Phone: 270-685-6294 Fax: 270-685-6678 Email: pjhagan@alcoholtest.com Quote To: Jose F. Pastor Ship To: Fort Myers Regional Operations Center Miami Police Department 4700 Terminal Drive, Suite 3 2200 W Flagler St FDLE Alcohol Testing Program Miami FL 33135 Fort Myers, FL 33907 USA USA Phone: 305-603-6537 Fax: Phone #: Fax #: Email: 5533@miami-police.org Ship Via: Best Way GND Customer #: 331350 Purchase order required. Price includes ground transportation. Shipment 4 - 12 weeks ARO. Sales tax may apply. Please forward a copy of your tax exemption certificate. If instrument is to be used for e vidential breath testing under Florida Administrative Code, instrument must ship to FDLEA TP - Tallahassee or Fort /Ayers (depending upon agency location) for registration and inspection before e vidential use. All other items ordered - printer, paper, printer cable, gas cylinder, and mouthpieces will ship directly to the ordering agency. Notwithstanding any provisions or terms set forth in other contracts or agency purchasing web sites. the software contained in the Intoxilyzer 8000 is, in its entirety. a proprietary product of CMI, Inc. All intellectual property rights in and to software are retained by CMI,. Inc., regardless of whether such software ("or any portion thereoo was created prior to or in connection with any purchase. Placement and/or payment of a purchase order based upon this pricing proposal constitutes acceptance of this condition, which shall supersede any other agreements or understandings relating to the purchase of the Intoxi/yzer 8000 and the use of its software and components. L1ne Part 1 002480FL Lead 4 - 12 weeks ARO Quantity Line Part 2 011148 Line Part 3 015111 Line Part 4 015088 Line Part 5 340234 Quantity Quantity Quantity Quantity Description UNIT ASSY,I8000 USD Rev ND 2 EA Unit Price 7,501.00 Ext Price: 15,002.00 Description Rev GAS SYSTEM,MOBILE FLORIDA C 2 EA Unit Price Ext Price: Description Rev MOUTHPIECES,VALVED,BAG OF 100 - 2 EA Unit Price Ext Price: Description Rev PAPER, ROLL,THERMAL,58MM X ND 25MM 6 EA Unit Price Ext Price: Description . Rev CYL,EGS,.080g/210L,105L,ST ND 2 EA Unit Price Ext Price: Total: 15,002.00 Plus shipping and any applicable taxes Please include a copy of this quote with your order 15% Restocking Fee for Returned Items unless noted otherwise ouolFornr:sov-PROO.ue�i.3�2�11-os-os� For detail Terms of Sale, please go to http://mpdinc.com/cos.htm Page: 1 of 1 CITY OF MIAMI, FLORIDA INTER -OFFICE MEMORANDUM Arthur Noriega V DATE: JAN 21 2022 City Manager SUBJECT. Prior Period Invoices Manuel A. Morales REFERENCES: Interim Chief of Police ENCLOSURES: i-11 F Pursuant to Resolution No. 21-0408, I am requesting to transfer budgeted General Fund dollars from minor object code (546000) Repair and Maintenance Services to Other Current Charges and Obligations (549000). The funds will be utilized to cover meal expenses incurred during the Civil Unrest period which were originally entered under the Coronavirus project. Should you have any questions or concerns, please do not hesitate to contact Jorge A. Blanco, Police Budget and Finance anager at (305) 603-6198. Approved Date Art Noriega V, Cit' nager MAM/jab �1 �k M .......... ......... enUtkw:.,.m.,N xa>manm:>.:wm�mmaoN-a>avN:,z. �kna.n owroa er I 'a �� �.-___._ 4 __ .vrR..:_. a,wmn w�coa i >t«Nnrr:CrlNex 0.11m: ............: 9ae[traaselufm,: tMvrP n:aw l4W!rauirw mAetaeyaWlunikw'YatM Iaal tlnnnrvy 1pAnm:i I:va'xA«t (ntMM.9.(.Yk'IInm D-aa^ rs 9hdtr >Polatm i,. � w,,we.�. "Hflr.."; 'vf:. 5"n'W.SC IMi11 os.•. P ,•.55:: 1 i Nat...:w. �;ix'J, 9.an ' J:a'.5rn.:.,:,A,: r.,1�n'.'1w'Yi."Ji4+:et�:".^py�.kC&iYllLLiiKflLXSffifJSs%NSf4Y:i!"w=4G':G`iRll.Fdff31T[i.SYi:tll&K.ri+`1L`1 9.411.Y.IVW 'Y; l5a 0 :[. ,.tnn CUFsn Sa.,cm t:: JE, tlIS:91tltl:y+i�,.� .. z�@1'.:..,a-Ne.ini4'"'.'.a"ri.:.i�YffircAkub..AAfCS.'1'urtAf l4 ii�.:xr.k.m:.li13.2_-ift.:MM. :3.Si'T.9p.:1:.CF:t�.:A:1 :4aTt xo nwl :It:> Gw ,; ttx .; to SCN,Ia-tn-V.epkutttl."�RS�taan�u,x•sx..«u: ma �. tiet^t«•to>'lnae'.'.1k1a.:.➢.N:.otkeak..: ":>«mPn:v�a•:c-u. tlea.^5uW :romtrw: t•. nm ,:,�utxs xn Wpaal.fal%ewcl�ae awoauss sx »o D aesat- :a�.:;ttrat�_la6sfse.:tt�xts.:w!!S!?s:t z.,.DD•w.ea, ,k.�. t«:a :,, rt IrM9-9,tkn;lz aumr:xt.:lau�tvi:a�,,;wv;:. tsas.a ,+n:,�,urs,9srtr,ar.Ncwaza�a ur..a:ro ,. 15P P uwnnrn vn.ca.z,u zcma,�smt..:to.�irm<.. •"'mac awa ,..., n. Wgoi, fah Na%l: !,N 9.15Exirn SSE S5P P D3SIXt SU Yk9a'Da':agl.WR41.4R1:tW:<W an iw is t-.,4M'a D#+elax ,� A'.: .S'4!.:iuR„xi.�?Yi.'IY.�i{f9C L9C11x tPn.Bi ?'.'r.NRi r.`J...N!.:•rlSh'i.�ti" 5�.t�ld'U SIP': SIP ti a2r Y3ulilw.SS.la':�Yi.e59a.dPX2Nst^>'�*k'9'SZW«I:L 43fa. '.Cxvua 1Si:FJfM'.snfi.U�,rcslmWu.a:INL,d;..M<ti!!.ila(�.PaFLtct.+kttt..M1ccax?3 t3c.0P:no K:P' 6.So o eFan- la:ieufm rn#'kh.4'�ue swam t:: Nb'a ' AIM W.Alks`..:.AiNP.',rK±'AT IP,aeP suss+ o'n: BPO a .tYm.zt: IktP:el +uP,R.aA71Tsm..4a=k`nx4f qA'a ,.. :151k5J :'L48kFi',VL Ai'Nt Saafn,.a,:xx^:xuayreen..w-^rs:�f-_.;.t.+xme xT.x:alrmx a.�>-�ttitc;ti..axaaar,.a.ta.:uwekDPx::,: a.:w<a.<, 'xx.�!. i2S 725z. wls9.tc �.nu wt» �alw D olr s. z>u Y:o: xo wo�we.. ,n k�nww.�.Wx craw. ;� .tW::S 2. 'G,rta'6L:,'iPJ.:TalA:Y'.Y :L:�FYtxW..6Yi-�-:Yfi-.N.'.aax ccv:u!7,>di'.1eaYa'r.f^rlxuxarW'.hmwa�.:-.x.:'atMwv^x.:I.-9..:5. :IaMa.Y tlsli ItFSa! I:SW P PIa;RMt)Ik03Nt,VCCIX11lR::i'.i.'4�sar� Seca LC,1'b'a 1aAkeaaimNc -. (MTa.Gmt <anW lPmaaMYm ; 9:Nwgn ,nary Services/DeliverLean / DL Grab-n- McKinley Street Bay 2 ,lywood, FL 33020 US :61) 287-7900 accounting@deliverlean.com www.deliverlean.com BILL TO Yadissa A Calderon CITY OF MIAMI PROCUREMENT DEPARTMENT 444 SW 2 Ave, 6th FL MIAMI, FL 33160 INVOICE n DATE TOTAL DUE 15787 06/04/2020 $6,050.00 SHIP DATE 06/04/2020 AC71VIT( 851218008827 Turkey Caprese Wrap 851218008698 Italian Hoagie 851218008834 Chicken Caesar Wrap POLICE DEPARTMENT Invoice SHIP TO Yadissa A Calderon CITY OF MIAMI PROCUREMENT DEPARTMENT 444 SW 2 Ave, 6th FL MIAMI, FL 33160 DUE DATE TERMS ENCLOSED 07/04/2020 Net 30 P.O. NUMBER Yadissa A Calderon QTY RATE AMOUNT 233 8.50' 1,980.50 233 8.50 : 1,980.50 234 8.50 1,989.00 SUBTOTAL 5,950.00 SHIPPING 100.00 TOTAL 6,050.00 BALANCE DUE $6,050 00 Lean Culinary Services/DeliverLean / DL Grab-n- Invoice go, LLC 2050 McKinley Street Bay 2 Hollywood, FL 33020 US (561) 287-7900 accountingCa deliverlean.com www.delivedean.com BILL, T(7 Yadissa A Calderon CITY OF MIAMI PROCUREMENT DEPARTMENT 444 SW 2 Ave, 6th FL MIAMI, FL 33160 INVOICE 9 DATE TOTAL DkI[ 27517 05/31 /2020 $21,012.50 SHIP DATE 05/31 /2020 SHIP TO 710 SW 12th AVE, MIAMI, FL 33130 DUE DATE TFRMS 06/07/2020 Net 7 days P.O. NUMBER Yadissa A Calderon EN.GIt?SEi} ACTIVItY QTY gA-fE AMOUNT PORTIONED MEALS 900 11.95 10,755.00 LUNCH PORTIONED MEALS 850 11.95 10,157.50 DINNER SUBTOTAL 20,912.50 SHIPPING 100.00 TOTAL 21,012.50 BALANCE DUE $21,012.50 Lean Culinary Services/DeliverLean / DL Gnab-n- go, LLC 2050 McKinley Street Bay 2 Hollywood, FL 33020 US (561) 287-7900 accounting@deliverlean.com www.deliverlean.com SiLL T Yadissa A Calderon CITY OF MIAMI PROCUREMENT DEPARTMENT 444 SW 2 Ave, 6th FL MIAMI, FL 33160 TOTAL DUE 27518 06/01 /2020 $5,477.50 SKIP DATE 06/01 /2020 4CTIVIT`, PORTIONED MEALS BREAKFAST Invoice 4 am MIAMI POLICE DEPARTMENT 400 NW 2nd Avenue, MIAMI, FL 33128 DUE GATE 06/08/2020 Net 7 days P.O. NUMBER Yadissa A Calderon 450 SUBTOTAL SHIPPING TOTAL BALANCE DUE RATE AMOUNT 11.95 5,377.50 5,377.50 100.00 5,477.50 $5,477.50 _aan Culinary Services/DeliverLean / DL Grab-n- go, LLC 2050 McKinley Street Bay 2 Hollywood, FL 33020 US (561) 287-7900 accounting@deliverlean.com www.deliverfean.com BILL TO Yadissa A Calderon CITY OF MIAMI PROCUREMENT DEPARTMENT 444 SW 2 Ave, 6th FL MIAMI, FL 33160 27519 06/01/2020 $11,452.50 SHIP DATE 06/01 /2020 PORTIONED MEALS LUNCH 5yk Invoice SHIP TO MIAMI POLICE DEPARTMENT 400 NW 2nd Avenue, MIAMI, FL 33128 E DATE ENCLOSED 06/08/2020 Net 7 days P.O. NUMBER Yadissa A Calderon AMOUNT 950 11.95 11, 352.50 SUBTOTAL 11,352.50 SHIPPING 100.00 TOTAL 11.452.50 BALANCE DUE $1 1 9452.50 Lean Culinary Services/DeliverLean / DL Grab-n- Invoice goy LLC 2050 McKinley Street Bay 2 Hollywood, FL 33020 US ; '} (561) 287-7900 v accounting@deliverlean.com www.deliverlean.com OiLC:70 SHIP TO Yadissa A Calderon 4 am CITY OF MIAMI PROCUREMENT MIAMI POLICE DEPARTMENT DEPARTMENT 400 NW 2nd Avenue, 444 SW 2 Ave, 6th FL MIAMI, FL 33128 MIAMI, FL 33160 INVOICEDATE:` TOTALDUE DUE DATE TERMS ENCLOSED !. 27526 06/04/2020 $6,050.OQ 06/11 /2020 Net 7 days SHIP DATE P.O. NUMBER 06/04/2020 Yadissa A Calderon _. ACTIVITY '. OTY -RATE,.:.AMOUNT; Wholesale Menu:WS - Turkey Caprese Wrap 233 8.50 1,980.50' Turkey Caprese Wrap Wholesale Menu:855842007638 233 8.50 1,980.50 Italian Hoagie 855842007607-1 234 8.50 1,989.00; Chicken Caesar Wrap - - SUBTOTAL 5,950.00 SHIPPING 100.00 TOTAL 6, 050.00 BALANCE DUE $6,050 00 �2�5�j