tender document - Central Bank of Kenya

189
BANKI KUU YA KENYA CENTRAL BANK OF KENYA Haile Selassie Avenue P.O. Box 60000 - 00200 Nairobi Kenya Telephone: 2861000/2863000 Email: [email protected] TENDER DOCUMENT INTERNATIONAL TENDER FOR SUPPLY, DELIVERY, TESTING AND COMMISSIONING OF PORTFOLIO MANAGEMENT AND TRADE PROCESSING SYSTEM (PMTP)- LOT 1 and INVESTMENT RISK MANAGEMENT SYSTEM (IRMS)- LOT 2 (REF. NO. CBK/25/2020/2021) CLOSING DATE: 17 th JUNE, 2021 AT 10.30 A.M

Transcript of tender document - Central Bank of Kenya

BANKI

KUU YA

KENYA

CENTRAL BANK OF KENYA

Haile Selassie Avenue

P.O. Box 60000 - 00200 Nairobi Kenya

Telephone: 2861000/2863000

Email: [email protected]

TENDER DOCUMENT

INTERNATIONAL TENDER FOR SUPPLY, DELIVERY, TESTING

AND COMMISSIONING OF

PORTFOLIO MANAGEMENT AND TRADE PROCESSING

SYSTEM (PMTP)- LOT 1

and

INVESTMENT RISK MANAGEMENT SYSTEM (IRMS)- LOT 2

(REF. NO. CBK/25/2020/2021)

CLOSING DATE: 17th JUNE, 2021 AT 10.30 A.M

2

TABLE OF CONTENTS

PAGE

SECTION I INVITATION TO TENDER…………................………….5 SECTION II INSTRUCTIONS TO TENDERERS.……..............…….…6 Appendix to Instructions to tenderers……..........19 Evaluation Criteria……………………………… 21 SECTION III GENERAL CONDITIONS OF CONTRACT…………. 27 SECTION IV SPECIAL CONDITIONS OF CONTRACT………….... 31 SECTION V SCHEDULE OF REQUIREMENTS AND PRICE….…. 33 SECTION VI TECHNICAL DESCRIPTION OF SERVICE……….… 34 SECTION VII STANDARD FORMS ……………………………….…. 38 7.1 FORM OF TENDER ………………….…………………………. 39 7.2 CONTRACT AGREEMENT FORM ….…………………………… 40 7.3 TENDER SECURITY FORM ………….…………………………... 41 7.4 PERFORMANCE SECURITY FORM ……………………………… 42 7.5 CONFIDENTIAL BUSINESS QUESTIONNAIRE FORM……… 43 7.6 LETTER ON NOTIFICATION OF AWARD ……………………… 44 7.7 FORM RB 1 ..………………………………………………………….45 7.8 DECLARATION FORM…… …………….…………………………. 46

3

GUIDELINES IN PREPARATION OF BID DOCUMENT

In preparing the bid document in response to the tender, bidders are advised to note the

following:

1. Section I – Invitation to Tender. This section gives guidelines on how and where to

seek further clarification pertaining to the tender document; the form and amount of

Tender Security required; where and when the tenders should be submitted; and place

where tenders will be opened.

2. Section II – Instruction to Tenderers. This section guides tenderers basically on how

to prepare their bid and how the tendering process will be carried out up to the award

stage including notification of award to the successful bidder. “Appendix to Instruction

to Tenderers” customizes clauses under Section II. Wherever there is a conflict between

the provisions of the Instructions to Tenderers under Section II and the provisions of the

appendix, the provisions of the appendix prevail.

3. Evaluation Criteria: This gives information on how the tender will be evaluated.

Tenderers should be able to evaluate their bids before submission to determine in

advance whether they meet the requirement of the bid or not. Through the evaluation

criteria bidders will be able to note all the required documents that should be attached

to the bid document.

Checklist of Document Forming the Bid Document:

No. Documents forming part of the Proposal

1 The main sections of the Request for Tender document include: i) Section I – Invitation to Tender; ii) Section II – Instructions to Tenderers; iii) Section III – General Conditions of Contract; iv) Section IV - Special Conditions of Contract; v) Section V - Schedule of Requirements and Price vi) Section VI – Technical Description of service

These sections remain as they are in the bid document.

2 Documentary evidence of the company’s certificate of incorporation or other similar registration document confirming the bidder is a legal entity.

4 Provision of certificate of Tax compliance issued by the Tax authorities of the participating bidder.

5 Financial proposal containing completed price schedules and transferred to the form of Tender. Prices to be quoted to be inclusive of all the applicable taxes.

6 Duly filled and signed Financial Form in the format provided in the tender document.

4

7 Duly filled and signed Confidential Business Questionnaire in the form or format provided in the tender document.

8 Company profile. This should include: i) List of staff members that will be dedicated to the PMTP / IRMS Project with the

necessary qualification and experience (attach copies of CV); ii) List of technical team to manage the transition (attach copies of CV as per

sample CV provided in this document); iii) List of five (5) current clients who are using your system.

9 Duly filled and signed declaration form in the form provided in the Tender document.

10 Any other document in support of the bidder’s qualification.

5

SECTION I: INVITATION TO TENDER

1. The Central Bank of Kenya invites sealed tenders from eligible bidders for TENDER FOR

SUPPLY, DELIVERY, TESTING AND COMMISSIONING OF PORTFOLIO

MANAGEMENT AND TRADE PROCESSING SYSTEM (PMTP) AND INVESTMENT

RISK MANAGEMENT SYSTEM (IRMS)

2. Further information as pertains to this tender may be obtained during working hours (Monday to Friday) between 9:00 am and 5:00 pm using the following address: The Director, General Services Department (GSD), Tel: +254 20 2861000/2860000, 5th Floor, Central Bank of Kenya, Haile Selassie Avenue, Nairobi, Email: [email protected]

3. A complete set of tender documents containing detailed information can be downloaded from the Central Bank of Kenya website; www.centralbank.go.ke or the Public Procurement Information Portal (PPIP) website: www.tenders.go.ke. Bidders who download the tender documents from the websites should email their contact addresses to the email address: [email protected] for registration before the tender closing date.

4. Prices quoted should be inclusive of all taxes and delivery costs and must be expressed in Kenya shillings, USD, Euro or Sterling Pound and shall remain valid for a period of 120 days from the closing date of the tender.

5. Tenders must be accompanied by a Tender Security of USD 10,000.00, valid for 150 days

from the tender closing date issued by a reputable Bank or Financial Institution. Tender Security issued by Financial Institutions outside Kenya should be issued through correspondent Banks recognized by the Central Bank of Kenya. Failure to attach the Tender Security will lead to automatic rejection of the proposal.

6. A pre-bid meeting (conference) of the client (Central Bank of Kenya) and prospective bidders will be held on 3rd June 2021. Interested bidders are requested to register for participation in the tender and provide email addresses through which they will receive invitations for the pre-bid meeting.

7. Completed Tender Documents in plain sealed envelopes marked with the tender

number and title should be deposited in the Green Tender Box No. 3 located at the main

entrance to the CBK Building on Haile Selassie Avenue before 17th June 2021 at 10.30am.

Late bids will not be accepted and will be returned unopened.

8. Tenders will be opened immediately thereafter, i.e. on 17th June 2021 at 10.30am in the

presence of the tenderers representatives who may choose to attend the opening at the

Central Bank of Kenya Head Office, MICR Room, Mezzanine Floor.

9. Bidders are required to serialize all the pages of the bid documents submitted including

any addenda, appendices and attachments.

DIRECTOR, GENERAL SERVICES DEPARTMENT

21st May 2021

6

SECTION II: INSTRUCTIONS TO TENDERERS

TABLE OF CONTENTS Page

2.1 Eligible Tenderers ………………………………………….…….......... 7 2.2 Cost of tendering ……………………………………………............... 7 2.3 Contents of tender documents ………………………………….......... 7 2.4 Clarification of Tender documents …………………………..…......... 8 2.5 Amendment of tender documents ………………………................... 8 2.6 Language of tenders ……………………………………….…….......... 9 2.7 Documents comprising the tender ……………………….…….......... 9 2.8 Form of tender …………………………………………….…………… 9 2.9 Tender prices …………………………………………………….…….. 9 2.10 Tender currencies ……………………………………………………... 10 2.11 Tenderers eligibility and qualifications ……………….………......... 10 2.12 Tender security ………………………………………………….……. 10 2.13 Validity of tenders ……………………………………….…………… 11 2.14 Format and signing of tenders ………………………………….......... 11 2.15 Sealing and marking of tenders ………………………….................... 12 2.16 Deadline for submission of tenders …………………….………......... 12 2.17 Modification and withdrawal of tenders ………………………......... 13 2.18 Opening of tenders ………………………………………..…………… 13 2.19 Clarification of tenders …………………………………..………......... 14 2.20 Preliminary Examination ………………………………………..……. 14 2.21 Conversion to other currencies ………………………………………. 15 2.22 Evaluation and comparison of tenders …………………………........ 15 2.23 Contacting the Central Bank of Kenya …………………………….…. 16 2.24 Award of contract………………………………………………………. 16 2.25 Notification of award …………………………………………………. 17 2.26 Signing of Contract ……………………………………………………. 17 2.27 Performance security …………………………………………………. 18 2.28 Corrupt or fraudulent practices ………………………………..……. 18

7

SECTION II: INSTRUCTIONS TO TENDERERS

2.1 Eligible tenderers

2.1.1. This Invitation to tender is open to all tenderers eligible as described in the instructions to tenderers. Successful tenderers shall provide the services for the stipulated duration from the date of commencement (hereinafter referred to as the term) specified in the tender documents.

2.1.2. The Central Bank of Kenya’s employees, committee members, board members and their relatives (spouse and children) are not eligible to participate in the tender unless where specially allowed under section 131 of the Act.

2.1.3. Tenderers shall provide the qualification information statement that the tenderer (including all members of a joint venture and subcontractors) is not associated, or have been associated in the past, directly or indirectly, with a firm or any of its affiliates which have been engaged by the Central Bank of Kenya to provide consulting services for the preparation of the design, specifications, and other documents to be used for the procurement of the services under this Invitation for tenders.

2.1.4. Tenderers involved in corrupt or fraudulent practices or debarred from participating in public procurement shall not be eligible.

2.2 Cost of tendering

2.2.1 The Tenderer shall bear all costs associated with the preparation and submission of its tender, and the Central Bank of Kenya, will in no case be responsible or liable for those costs, regardless of the conduct or outcome of the tendering process.

2.2.2 The price to be charged for the tender document shall not exceed Kshs. 1,000.00

2.2.3 The Central Bank of Kenya shall allow the tenderer to review the tender document free of charge before purchase.

2.3 Contents of tender documents

2.3.1. The tender document comprises of the documents listed below and addenda issued in accordance with clause 6 of these instructions to tenderers

i) Instructions to tenderers ii) General Conditions of Contract iii) Special Conditions of Contract iv) Schedule of Requirements v) Details of service vi) Form of tender vii) Price schedules viii) Contract form

8

ix) Confidential business questionnaire form x) Tender security form xi) Performance security form xii) Principal’s or manufacturers authorization form xiii) Declaration form

2.3.2. The Tenderer is expected to examine all instructions, forms, terms, and specifications in the tender documents. Failure to furnish all information required by the tender documents or to submit a tender not substantially responsive to the tender documents in every respect will be at the tenderers risk and may result in the rejection of its tender.

TENDER SCHEDULE OF EVENTS

2.4 Schedule of Events

Event Time Date

1. Tender Issued May 21st th , 2021

2. Written “Questions & Clarifications” Deadline

June 11th , 2021

3. Tender Response Deadline 10.30 am Jun 17th, 2021

4. Tender Evaluation Commencement June 18th 2021

5. Duration of Tender Evaluation June 18th 2021 to July 17th 2021

2.5 Clarification of Documents

2.5.1. A prospective candidate making inquiries of the tender document may notify the Central Bank of Kenya in writing or by post, fax or email at the entity’s address indicated in the Invitation for tenders. The Central Bank of Kenya will respond in writing to any request for clarification of the tender documents, which it receives no later than seven (7) days prior to the deadline for the submission of tenders, prescribed by the Central Bank of Kenya. Written copies of the Procuring entities response (including an explanation of the query but without identifying the source of inquiry) will be sent to all prospective tenderers who have received the tender documents.”

2.5.2. The Central Bank of Kenya shall reply to any clarifications sought by the tenderer

within 3 days of receiving the request to enable the tenderer to make timely submission of its tender

2.6 Amendment of documents

9

2.6.1. At any time prior to the deadline for submission of tenders, the Central Bank of Kenya, for any reason, whether at its own initiative or in response to a clarification requested by a prospective tenderer, may modify the tender documents by issuing an addendum.

2.6.2. All prospective tenderers who have obtained the tender documents will be notified of the amendment by post, fax or email and such amendment will be binding on them.

2.6.3. In order to allow prospective tenderers reasonable time in which to take the amendment into account in preparing their tenders, the Central Bank of Kenya, at its discretion, may extend the deadline for the submission of tenders.

2.7 Language of tender

2.7.1. The tender prepared by the tenderer, as well as all correspondence and documents relating to the tender exchanged by the tenderer and the Central Bank of Kenya, shall be written in English language. Any printed literature furnished by the tenderer may be written in another language provided they are accompanied by an accurate English translation of the relevant passages in which case, for purposes of interpretation of the tender, the English translation shall govern.

2.7 Documents Comprising the Tender The tender prepared by the tenderer shall comprise the following components: a) A Tender Form and a Price Schedule completed in accordance with paragraph 9, 10

and 11 below.

b) Documentary evidence established in accordance with Clause 2.11 that the tenderer is eligible to tender and is qualified to perform the contract if its tender is accepted;

c) Tender security furnished is in accordance with Clause 2.12

d) Confidential business questionnaire

2.8 Form of Tender 2.8.1 The tenderers shall complete the Form of Tender and the appropriate Price Schedule

furnished in the tender documents, indicating the services to be performed.

2.9 Tender Prices

2.9.1 The tenderer shall indicate on the Price schedule the unit prices where applicable and total tender prices of the services it proposes to provide under the contract.

2.9.2 Prices indicated on the Price Schedule shall be the cost of the services quoted including all customs duties and VAT and other taxes payable:

2.9.3 Prices quoted by the tenderer shall remain fixed during the term of the contract unless otherwise agreed by the parties. A tender submitted with an adjustable price

10

quotation will be treated as non-responsive and will be rejected, pursuant to paragraph 2.22.

2.9.4 Contract price variations shall not be allowed for contracts not exceeding one year (12 months)

2.9.5 Where contract price variation is allowed, the variation shall not exceed 10% of the original contract price.

2.9.6 Price variation requests shall be processed by the Central Bank of Kenya within 30 days of receiving the request.

2.10 Tender Currencies 2.10.1 Prices shall be quoted in Kenya Shillings unless otherwise specified in the appendix

to in Instructions to Tenderers.

2.11 Tenderers Eligibility and Qualifications.

2.11.1 Pursuant to Clause 2.1 the tenderer shall furnish, as part of its tender, documents establishing the tenderers eligibility to tender and its qualifications to perform the contract if its tender is accepted.

2.11.2 The documentary evidence of the tenderers qualifications to perform the contract if its tender is accepted shall establish to the Central Bank of Kenya’s satisfaction that the tenderer has the financial and technical capability necessary to perform the contract.

2.12 Tender Security

2.12.1 The tenderer shall furnish, as part of its tender, a tender security for the amount and form specified in the Invitation to tender.

2.12.2 The tender security shall be in the amount not exceeding 2 per cent of the tender price.

2.12.2 The tender security is required to protect the Central Bank of Kenya against the risk of Tenderer’s conduct which would warrant the security’s forfeiture, pursuant to paragraph 2.12.7

2.12.3 The tender security shall be denominated in a Kenya Shillings or in another freely convertible currency and shall be in the form of:

a) A bank guarantee. b) Cash. c) Such insurance guarantee approved by the relevant Authority. d) Letter of credit

11

2.12.4 Any tender not secured in accordance with paragraph 2.12.1 and 2.12.3 will be rejected by the Central Bank of Kenya as non-responsive, pursuant to paragraph 2.20

2.12.5 Unsuccessful tenderer’s security will be discharged or returned as promptly as possible but not later than thirty (30) days after the expiration of the period of tender validity prescribed by the Central Bank of Kenya.

2.12.6 The successful tenderer’s tender security will be discharged upon the tenderer signing the contract, pursuant to paragraph 2.29, and furnishing the performance security, pursuant to paragraph 2.30.

2.12.7 The tender security may be forfeited:

(a) If a tenderer withdraws its tender during the period of tender validity specified by the Central Bank of Kenya on the Tender Form; or (b) In the case of a successful tenderer, if the tenderer fails: (i) to sign the contract in accordance with paragraph 30 or (ii) to furnish performance security in accordance with paragraph 31.

(c) If the tenderer rejects, correction of an error in the tender.

2.13 Validity of Tenders

2.13.1 Tenders shall remain valid for 120 days or as specified in the invitation to tender after date of tender opening prescribed by the Central Bank of Kenya, pursuant to paragraph 2.18. A tender valid for a shorter period shall be rejected by the Central Bank of Kenya as nonresponsive.

2.13.2 In exceptional circumstances, the Central Bank of Kenya may solicit the Tenderer’s consent to an extension of the period of validity. The request and the responses thereto shall be made in writing. The tender security provided under paragraph 2.12 shall also be suitably extended. A tenderer may refuse the request without forfeiting its tender security. A tenderer granting the request will not be required nor permitted to modify its tender.

2.14 Format and Signing of Tender

2.14.1 The tenderer shall prepare two (2) copies of the tender, clearly / marking each “ORIGINAL TENDER” and “COPY OF TENDER,” as appropriate. In the event of any discrepancy between them, the original shall govern.

2.14.2 The original and all copies of the tender shall be typed or written in indelible ink and shall be signed by the tenderer or a person or persons duly authorized to bind the

12

tenderer to the contract. All pages of the tender, except for unamended printed literature, shall be initialed by the person or persons signing the tender.

2.14.3 The tender shall have no interlineations, erasures, or overwriting except as necessary to correct errors made by the tenderer, in which case such corrections shall be initialed by the person or persons signing the tender.

2.15 Sealing and Marking of Tenders

2.15.1 The tenderer shall seal the original and each copy of the tender in separate envelopes, duly marking the envelopes as “ORIGINAL” and “COPY.” The envelopes shall then be sealed in an outer envelope. The inner and outer envelopes shall: (a) be addressed to the Central Bank of Kenya at the address given in the invitation to tender

(b) bear tender number and name in the invitation to tender and the words: “DO NOT OPEN BEFORE (day, date and time of closing),”

2.15.3 The inner envelopes shall also indicate the name and address of the tenderer to enable the tender to be returned unopened in case it is declared “late”. —

2.15.4 If the outer envelope is not sealed and marked as required by paragraph 2.15.2, the Central Bank of Kenya will assume no responsibility for the tender’s misplacement or premature opening.

2.16 Deadline for Submission of Tenders

2.16.1 Tenders must be received by the Central Bank of Kenya at the address

specified under appendix to instruction to tenderers.

2.16.2 The Central Bank of Kenya may, at its discretion, extend this deadline for the submission of tenders by amending the tender documents in accordance with paragraph 6, in which case all rights and obligations of the Central Bank of Kenya and candidates previously subject to the deadline will thereafter be subject to the deadline as extended.

2.16.3 Bulky tenders which will not fit in the tender box shall be received by the Central Bank of Kenya as provided for in the appendix.

2.17 Modification and withdrawal of tenders

2.17.1 The tenderer may modify or withdraw its tender after the tender’s submission, provided that written notice of the modification, including substitution or withdrawal of the tender’s is received by the Central Bank of Kenya prior to the deadline prescribed for the submission of tenders.

13

2.17.2 The Tenderer’s modification or withdrawal notice shall be prepared, sealed, marked, and dispatched in accordance with the provisions of paragraph 2.15. A withdrawal notice may also be sent by cable, but followed by a signed confirmation copy, postmarked not later than the deadline for submission of tenders.

2.17.3 No tender may be modified after the deadline for submission of tenders.

2.17.4 No tender may be withdrawn in the interval between the deadline for submission of tenders and the expiration of the period of tender validity specified by the tenderer on the Tender Form. Withdrawal of a tender during this interval may result in the Tenderer’s forfeiture of its tender security, pursuant to paragraph 2.12.7.

2.17.5 The Central Bank of Kenya may at any time terminate procurement proceedings before contract award and shall not be liable to any person for the termination.

2.17.6 The Central Bank of Kenya shall give prompt notice of the termination to the tenderers and on request give its reasons for termination within 14 days of receiving the request from any tenderer.

2.18 Opening of Tenders.

2.18.1 The Central Bank of Kenya will open all tenders in the presence of tenderers’ representatives who choose to attend, at the time and date and in the location specified in the invitation to tender. The tenderers’ representatives who are present shall sign a register evidencing their attendance.

2.18.3 The tenderers’ names, tender modifications or withdrawals, tender prices, discounts, and the presence or absence of requisite tender security and such other details as the Central Bank of Kenya, at its discretion, may consider appropriate, will be announced at the opening.

2.18.4 The Central Bank of Kenya will prepare minutes of the tender opening which will be submitted to the tenderers that signed the tender opening register and will have made the request.

2.19 Clarification of tenders

2.19.1 To assist in the examination, evaluation and comparison of tenders the Central Bank of Kenya may at its discretion, ask the tenderer for a clarification of its tender. The request for clarification and the response shall be in writing, and no change in the prices or substance shall be sought, offered, or permitted.

2.19.2 Any effort by the tenderer to influence the Central Bank of Kenya in the Central Bank of Kenya’s tender evaluation, tender comparison or contract award decisions may result in the rejection of the tenderers tender.

14

Comparison or contract award decisions may result in the rejection of the tenderers’ tender.

2.20 Preliminary Examination and Responsiveness

2.20.1 The Central Bank of Kenya will examine the tenders to determine whether they are complete, whether any computational errors have been made, whether required securities have been furnished whether the documents have been properly signed, and whether the tenders are generally in order.

2.20.2 Arithmetical errors will be rectified on the following basis. If there is a discrepancy between the unit price and the total price that is obtained by multiplying the unit price and quantity, the unit price shall prevail, and the total price shall be corrected. if the candidate does not accept the correction of the errors, its tender will be rejected, and its tender security may be forfeited. If there is a discrepancy between words and figures, the amount in words will prevail.

2.20.3 The Central Bank of Kenya may waive any minor informality or nonconformity or irregularity in a tender which does not constitute a material deviation, provided such waiver does not prejudice or affect the relative ranking of any tenderer.

2.20.4 Prior to the detailed evaluation, pursuant to paragraph 23, the Central Bank of Kenya will determine the substantial responsiveness of each tender to the tender documents. For purposes of these paragraphs, a substantially responsive tender is one which conforms to all the terms and conditions of the tender documents without material deviations. The Central Bank of Kenya’s determination of a tender’s responsiveness is to be based on the contents of the tender itself without recourse to extrinsic evidence.

2.20.5 If a tender is not substantially responsive, it will be rejected by the Central Bank of Kenya and may not subsequently be made responsive by the tenderer by correction of the nonconformity.

2.21 Conversion to a single currency

2.21.1 Where other currencies are used, the Central Bank of Kenya will convert those currencies to Kenya shillings using the selling exchange rate on the date of tender closing provided by the central bank of Kenya.

2.22 Evaluation and comparison of tenders.

2.22.1 The Central Bank of Kenya will evaluate and compare the tenders which have been determined to be substantially responsive, pursuant to paragraph 2.20

2.22.2 The comparison shall be of the price including all costs as well as duties and taxes payable on all the materials to be used in the provision of the services.

15

2.22.3 The Central Bank of Kenya’s evaluation of a tender will take into account, in addition to the tender price, the following factors, in the manner and to the extent indicated in paragraph 2.22.4 and in the technical specifications:

(a) Operational plan proposed in the tender; (b) Deviations in payment schedule from that specified in the Special Conditions of Contract;

2.22.4 Pursuant to paragraph 22.3 the following evaluation methods will be applied: (a) Operational Plan.

The Central Bank of Kenya requires that the services under the Invitation for Tenders shall be performed at the time specified in the Schedule of Requirements. Tenders offering to perform longer than the Central Bank of Kenya’s required delivery time will be treated as non-responsive and rejected.

(b) Deviation in payment schedule.

Tenderers shall state their tender price for the payment on a schedule outlined in the special conditions of contract. Tenders will be evaluated on the basis of this base price. Tenderers are, however, permitted to state an alternative payment schedule and indicate the reduction in tender price they wish to offer for such alternative payment schedule. The Central Bank of Kenya may consider the alternative payment schedule offered by the selected tenderer.

2.22.5 The tender evaluation committee shall evaluate the tender within 30 days from the date of opening the tender.

2.22.6 To qualify for contract awards, the tenderer shall have the following: -

(a) Necessary qualifications, capability experience, services, equipment and facilities to provide what is being procured.

(b) Legal capacity to enter into a contract for procurement.

(c) Shall not be insolvent, in receivership, bankrupt or in the process of being wound up and is not the subject of legal proceedings relating to the foregoing

(d) Shall not be debarred from participating in public procurement.

2.23. Contacting the Central Bank of Kenya

2.23.1 Subject to paragraph 2.19, no tenderer shall contact the Central Bank of Kenya on any matter relating to its tender, from the time of the tender opening to the time the contract is awarded.

16

2.23.2 Any effort by a tenderer to influence the Central Bank of Kenya in its decisions on tender evaluation tender comparison or contract award may result in the rejection of the tenderers tender.

2.24 Award of Contract

a) Post qualification

2.24.1 In the absence of pre-qualification, the Central Bank of Kenya will determine to its satisfaction whether the tenderer that is selected as having submitted the lowest evaluated responsive tender is qualified to perform the contract satisfactorily.

2.24.2 The determination will consider the Tenderer’s financial and technical capabilities. It will be based upon an examination of the documentary evidence of the tenderers qualifications submitted by the tenderer, pursuant to paragraph 2.1.2, as well as such other information as the Central Bank of Kenya deems necessary and appropriate.

2.24.3 An affirmative determination will be a prerequisite for award of the contract to the tenderer. A negative determination will result in rejection of the Tenderer’s tender, in which event the Central Bank of Kenya will proceed to the next lowest evaluated tender to make a similar determination of that Tenderer’s capabilities to perform satisfactorily.

b) Award Criteria

2.24.3 Subject to paragraph 2.24.1 the Central Bank of Kenya will award the contract to the successful tenderer whose tender has been determined to be substantially responsive and has been determined to be the lowest evaluated tender, provided further that the tenderer is determined to be qualified to perform the contract satisfactorily.

2.24.4 The Central Bank of Kenya reserves the right to accept or reject any tender and to annul the tendering process and reject all tenders at any time prior to contract award, without thereby incurring any liability to the affected tenderer or tenderers or any obligation to inform the affected tenderer or tenderers of the grounds for the Central Bank of Kenya’s action. If the Central Bank of Kenya determines that none of the tenderers is responsive; the Central Bank of Kenya shall notify each tenderer who submitted a tender.

2.24.5 A tenderer who gives false information in the tender document about its qualification or who refuses to enter into a contract after notification of contract award shall be considered for debarment from participating in future public procurement.

2.25 Notification of award

17

2.25.1 Prior to the expiration of the period of tender validity, the Central Bank of Kenya will notify the successful tenderer in writing that its tender has been accepted. 2.25.2 The notification of award will signify the formation of the Contract subject to the

signing of the contract between the tenderer and the Central Bank of Kenya pursuant to clause 2.29. Simultaneously the other tenderers shall be notified that their tenders have not been successful.

2.25.3 Upon the successful Tenderer’s furnishing of the performance security pursuant to paragraph 31, the Central Bank of Kenya will promptly notify each unsuccessful Tenderer and will discharge its tender security, pursuant to paragraph 2.12

2.26 Signing of Contract

2.26.1 At the same time as the Central Bank of Kenya notifies the successful tenderer that its tender has been accepted, the Central Bank of Kenya will simultaneously inform the other tenderers that their tenders have not been successful.

2.26.2 Within fourteen (14) days of receipt of the Contract Form, the successful tenderer shall sign and date the contract and return it to the Central Bank of Kenya.

2.26.3 The parties to the contract shall have it signed within 30 days from the date of notification of contract award unless there is an administrative review request.

2.27 Performance Security

2.27.1 Within thirty (30) days of the receipt of notification of award from the Central Bank of Kenya, the successful tenderer shall furnish the performance security in accordance with the Conditions of Contract, in the Performance Security Form provided in the tender documents, or in another form acceptable to the Central Bank of Kenya.

2.27.2 Failure of the successful tenderer to comply with the requirement of paragraph 2.27.1 shall constitute sufficient grounds for the annulment of the award and forfeiture of the tender security, in which event the Central Bank of Kenya may make the award to the next lowest evaluated or call for new tenders.

2.28 Corrupt or Fraudulent Practices

2.28.1 The Central Bank of Kenya requires that tenderers observe the highest standard of ethics during the procurement process and execution of contracts. A tenderer shall sign a declaration that he has not and will not be involved in corrupt or fraudulent practices.

2.28.2 The Central Bank of Kenya will reject a proposal for award if it determines that the tenderer recommended for award has engaged in corrupt or fraudulent practices in

18

competing for the contract in question;

2.28.3 Further, a tenderer who is found to have indulged in corrupt or fraudulent practices risks being debarred from participating in public procurement in Kenya.

19

APPENDIX TO INSTRUCTIONS TO THE TENDERERS

The following information for procurement of services shall complement or amend the provisions of the instructions to tenderers. Wherever there is a conflict between the provisions of the instructions to tenderers and the provisions of the appendix, the provisions of the appendix herein shall prevail over those of the instructions to tenderers:

Instructions to tenderers

Particulars of appendix to Instructions to Tenderers

2.1.1 Eligible Tenderers shall be firms dealing in provision and maintenance of investment management systems. Tenderers can bid for one or both lots / systems: Lot 1: Portfolio Management and Trade Processing (PMTP) and Lot 2: Investment Risk Management System (IRMS). Tenders bids for each system will be evaluated independently.

2.2.2 The price to be charged for hard copy tender document shall be Kshs.

1,000.00 and free for downloading from the websites.

2.4.1 A prospective candidate may seek clarifications of the tender document not later than seven (7) days prior to the deadline for submission of tenders.

2.7 The tender prepared by the tenderer shall comprise in addition to documents specified under clause 2.7 all other documents described in clause 2.3.1 of this tender document and any other document required in determining qualification of the tenderer.

2.9.2 Price quoted shall be inclusive of all applicable taxes and delivery costs

2.10 Prices shall be quoted in either US Dollars, Euro or Sterling Pound

2.11.1 Proof of eligibility and qualifications documents of evidence required (See qualification criteria below).

2.12.2 Tenders must be accompanied by a Tender Security of US Dollars

10,000.00 and must be valid for 150 days from the date of tender closing/opening

2.13.1 The validity period of the Tender shall be 120 days from the closing date of Tenders.

2.14.1 Bidders to submit one original hard copy plus two (2) copies

1.16.1 Closing date of the Tender shall be 17th June, 2021 at 10:30 am

2,26.2 A draft of the contract document (Appendix C) that will be signed by the eventual successful bidder has been attached to the tender document for review by prospective bidders.

20

2.27 Within thirty (30) days of the receipt of notification of award from the Central Bank of Kenya, the successful tenderer shall furnish the performance security equal to 5% of the contract amount valid for the period of the contract from a commercial Bank operating in Kenya supervised by the Central Bank of Kenya

21

EVALUATION CRITERIA Evaluation Categories & Maximum Points The CBK will consider qualifications, experience, technical approach, and cost in the evaluation of responses and award points in each of the categories detailed below (up to the maximum evaluation points indicated) to each response deemed by the CBK to be responsive. Lot A: Portfolio Management and Trade Processing System (PMTP) EVALUATION CATEGORY MAXIMUM POINTS POSSIBLE

1. General Qualifications & Experience (refer to Annex A – Section A - Part II )

10

2. Technical Qualifications, Experience & Approach

a) Business Requirements (refer to Annex A – Section A - Part II)

60

b) Information Technology Requirements (refer to Annex A – Section B - Part II)

30

Total 100

Lot B: Investment Risk Management System (IRMS) EVALUATION CATEGORY MAXIMUM POINTS POSSIBLE

1. General Qualifications & Experience (refer to Annex B – Section B - Part II)

10

2. Technical Qualifications, Experience & Approach

c) Business Requirements (refer to Annex B – Section A - Part II)

60

d) Information Technology Requirements (refer to Annex B – Section B - Part II)

30

Total 100

Evaluation Process Evaluation will be carried out through six stages as follows: Stage1: Compliance with the Mandatory Requirements

Stage 2: Technical Evaluation on Compliance with the Technical Requirements

Stage 3: Technical Evaluation on capacity to deliver the contract

Stage 4: The Financial Evaluation

Stage 5: Due Diligence and Presentations

Stage 6: Recommendation of Award.

22

STAGE 1: MANDATORY REQUIREMENTS (MR) The following mandatory requirements must be met notwithstanding other requirements in the document.

Bidders will be required to meet all the Mandatory Requirements to qualify to proceed to the Technical Evaluation Stage.

STAGE 2: TECHNICAL EVALUATION

Annex A Lot 1: Portfolio Management and Trade Processing System (PMTP)

Besides the mandatory requirements in Stage 1 above, the bidders will also need to comply with all mandatory requirements in Annex A – Section A Part II (page 13) before the evaluation of technical requirements in Annex A – Section A Part II (page 18). Failure to comply with all the Mandatory Requirements at this stage will lead to dropping of the bid (Lot A) from further evaluation and eventual procurement.

The tenderer must demonstrate compliance to the technical specifications provided in Annex A – Section A Part II (page 18). The responses to each requirement must be accompanied by a detailed explanation and supported with relevant documentation. The tenderers are encouraged to attach supporting links or references in their responses. The bid will be

NO REQUIREMENTS TENDERER’S RESPONSE

MR 1 Provide copy of the company’s certificate of incorporation (or equivalent document confirming the legal structure of the company)

MR 2 Provide a copy of the company’s valid Certificate of Tax Compliance issued by the bidder’s country of origin tax authority, valid at least up to the tender closing date.

MR 3 Submit a completed Company’s profile using the Confidential Business Questionnaire Form as provided in the tender document.

MR 4 Provide an original Tender Security of US 10,000.00 and must be valid for 150 days in the format provided in this tender document.

MR 5 Provide confirmation that you are the developer and owner of the proposed system

MR 5 Provide three letters of reference from three (3) Central Banks or other institutions of a similar scale & size, where the same product was provided within the last five (5) years. A reference shall be valid if it is for the same proposed IT solution as described in the bidder’s response. Each of the three letters must be signed by a named contact.

MR6 Audited financials for the latest three (3) financial years (2018,2019, 2020)

23

considered responsive at this stage if the bidder scores a minimum of 75%. Failure to attain a seventy-five percent score at this stage will lead to dropping of bid (Lot A) from further evaluation and eventual procurement.

Annex B. Lot 2: Investment Risk Management System (IRMS)

Besides the mandatory requirements in Stage 1 above, the bidders will also need to comply with all mandatory requirements in Annex B – Section A Part II (page 8) before the evaluation of technical requirements in Annex B – Section A Part II (page 12). Failure to comply with all the Mandatory Requirements at this stage will lead to dropping of the bid (Lot B) from further evaluation and eventual procurement.

The tenderer must demonstrate compliance to the technical specifications provided in Annex B – Section A Part II (page 12). The responses to each requirement must be accompanied by a detailed explanation and supported with relevant documentation. The tenderers are encouraged to attach supporting links or references in their responses. The bid will be considered responsive at this stage if the bidder scores a minimum of 75%. Failure to attain a seventy-five percent score at this stage will lead to dropping of bid (Lot B) from further evaluation and eventual procurement.

STAGE 3: EVALUATION OF TECHNICAL CAPACITY TO DELIVER THE PROPOSED

SOLUTION

At this stage, bidders should demonstrate their capacity in terms of project planning, professional experience, and technical personnel to deliver the proposed solution. Only bidders that successfully demonstrate their capacity to deliver the proposed solution as per the criteria outlined in the sections below, will proceed to Stage 4 (Financial Evaluation). The evaluation criteria will include the sections outlined below:

1. Project plan: The bidder must submit a high-level project plan for the implementation of the proposed solution. The system implementation plan must have a well-defined project schedule with deliverables broken into tasks with trackable milestones and timelines.

2. Data migration strategy: The bidder should provide a detailed data migration

strategy, clearly outlining: a. The methodology that will be followed, b. The entire data sets that will be in scope for each of the business unit.

i. Note: Any data migration scope limitations should be clearly mentioned in the response for the evaluators to review.

c. Assurance steps that will be invoked to double check data movement to detect errors, omissions, duplicates, etc. including who exactly will carry out this work stream and how it will be reported.

3. Bidder Competency: The bidder must describe the competencies, roles and responsibilities of the proposed project team members, and support their response by attaching their curriculum vitaes (CV’s) and academic certificates. These must be relevant and skilled resources who:

a. Are qualified to implement the proposed solution.

24

b. Have prior experience (at least three years’ experience) deploying similar solutions in Central Banks and in other organizations of a similar scale and size to Central Bank of Kenya.

c. Will be accessible, committed, engaged, and tied to the project for the entire duration of the project implementation cycle.

d. Cut across (but not necessarily limited to) the following domains: i. Steering Committee Members

ii. Project Manager iii. IT Technical Leads iv. Functional Analysts v. Business consultants (SME for each business area which includes Trading,

Accounting, Portfolio Management, Risk Management and Technical Support Lead)

vi. Cyber Security subject matter experts

The table below outlines the requirements to be used when the bidder provides their response in the curriculum vitaes (CV’s).

DOMAIN No. of Relevant (CV’s)

Minimum Years Of Experience

Front Office – Trading and Portfolio Management

2 At least 3 years

Middle Office – Performance Measurement, Risk Management and Compliance Monitoring

2 At least 3 years

Back Office – Settlements, Accounting 2 At least 3 years

Information Technology (IT) Consultants: 1. Apps developer / Integrations Lead 2. System Administrator 3. Database Administrator (DBA) 4. Security Leads

2 1 1 1

At least 3 years

Tenderers fully complying with technical specifications will be subjected to technical evaluation on capacity to deliver the contract based on the technical parameters given below:

Evaluation Attribute Tenderer’s Response

Weighting Score Max Score %

T1 Number of years the product / solution has been in the market

• 5 Years and above: 30%

• Others prorated at: Number of years x 30 5

30

25

T2 Provide a list of all Major clients where the company has provided similar services in the last 5 years.

• 5 or more clients: 30%

• Others prorated at: Number of clients x 30 5

30

T3 Number of qualified consultants / officers specialized in investment management systems (Must provide evidence using CV and certificates)

• 5 or more qualified staff: 20%

• Others prorated at: Number of staff x 20 5

20

T4 Financial Stability: a) Profitability Margin**

A margin above 10% will score 10 marks; 5-9 % - 5 marks and 1-4% - 3 marks; below 1% No mark

10

b) Liquidity Ratio***

Above 1:1 – 10 marks; 1:1 – 5 marks; 0.5:1- 2 marks less than 0.5 no mark

10

Total 100 **Profitability Margin = ______EBIT___ Gross Revenue/Sales ***Current Ratio = Current Assets Current Liabilities

✓ EBIT = Earnings Before Interest and Taxes

Only tenderers that score 75% and above on the above capacity to deliver will qualify for Financial Evaluation. STAGE 4: FINANCIAL EVALUATION.

Financial Evaluation involves checking for completeness of the Bidders’ schedule of pricing to ensure all the Bills of Materials, Terms of References, Software, Support and Services have been priced and quotations are accurate. Bidders whose price schedules are not complete i.e. where the bidder fails to price for all materials, terms of references, software (all required modules) and services are disqualified from further evaluation.

In providing the response for the commercials/pricing, the bidder must consider and include provisions for post-production support and warranty period of at least one (1) year after deployment of the solution. Thereafter, the bidder must also provide a comprehensive maintenance and support plan for the deployed solution for at least three (3) years. These post-go live maintenance and support plans must be in accordance to the bidder’s response on the roles and responsibilities as outlined in the technical specifications schedule.

At this stage, Tenderers that score 75 % and above under Technical Evaluation on Capacity to deliver the contract will be ranked and the lowest financial bidder recommended for due diligence and presentations.

26

Stage 5: Due diligence and Oral presentation The bidder with the lowest financial bid whose technical score is above 75% will be subjected to due diligence. The exercise will involve verification of the bidder’s qualification information submitted in compliance with the mandatory requirements, technical requirements, to confirm the bidder’s ability and capability to provide the services. The Central Bank of Kenya team may also visit at least two organizations where the bidder is offering/has offered similar services in the last three years. The respective bidder will be required to secure appointment with the respective organizations on behalf of the Central Bank of Kenya team. The feed-back from the firms/clients visited on the quality of the services provided by the respective bidder will be used to assess the bidder’s ability to execute the Bank’s prospective contract. Due diligence will also involve oral presentations by the lowest evaluated bidder. Representatives of the Bank will also hold discussions with the vendor’s representative on the Technical Requirements/Terms of References (TORS) and any other suggestions made by the prospective Vendor to improve the Terms of References. The Central Bank of Kenya and the lowest evaluated tenderer undergoing due diligence will then work out final Terms of References, Technical specifications, etc. The agreed final Terms of Reference will then be incorporated in the “Statement of Work” and form part of the Contract. Special attention will be paid to getting the most of what the prospective provider can offer within the available budget and time. In the event that the vendor with lowest evaluated bid is found to have provided false information in regard to the bidder’s qualifications or adverse report is provided by the bidder’s clients on the quality of services provided to the clients, then the bidder will be disqualified at this stage. Consequently, the second lowest evaluated bidder who submitted the tender that, according to the evaluation would have been successful had the lowest evaluated bid not been submitted will be subjected to due diligence for consideration of award Stage 6: Recommendation of Award The bidder which complies with all the Mandatory Requirements, with technical requirements complying with the all the requirements as contained in the tender document, scores 75% or above, emerges with lowest bid at the financial evaluation stage and passes the due diligence will then be recommended for award upon successful negotiation.

27

SECTION III: GENERAL CONDITIONS OF CONTRACT

3.1 Definitions

In this contract the following terms shall be interpreted as indicated:

a) “The contract” means the agreement entered into between the Central Bank of Kenya and the tenderer as recorded in the Contract Form signed by the parties, including all attachments and appendices thereto and all documents incorporated by reference therein.

b) “The Contract Price” means the price payable to the tenderer under the Contract for the full and proper performance of its contractual obligations.

c) “The services” means services to be provided by the contractor including materials and incidentals which the tenderer is required to provide to the Central Bank of Kenya under the Contract.

d) “The Central Bank of Kenya” means the organization sourcing for the services under this Contract.

e) “The contractor means the individual or firm providing the services under this Contract.

f) “GCC” means general conditions of contract contained in this section

g) “SCC” means the special conditions of contract

h) “Day” means calendar day

3.2 Application These General Conditions shall apply to the extent that they are not superseded by provisions of other part of contract.

3.3 Standards

3.3.1 The services provided under this Contract shall conform to the standards mentioned in the Schedule of requirements

3.5 Patent Right’s The tenderer shall indemnify the Central Bank of Kenya against all third-party claims of infringement of patent, trademark, or industrial design rights arising from use of the services under the contract or any part thereof .

3.6 Performance Security Within twenty eight (28) days of receipt of the notification of Contract award, the successful tenderer shall furnish to the Central Bank of Kenya the performance security where applicable in the amount specified in Special Conditions of Contract.

28

3.6.2 The proceeds of the performance security shall be payable to the Central Bank of Kenya as compensation for any loss resulting from the Tenderer’s failure to complete its obligations under the Contract.

3.6.3 The performance security shall be denominated in the currency of the Contract, or in a freely convertible currency acceptable to the Central Bank of Kenya and shall be in the form of:

a) Cash. b) A bank guarantee. c) Letter of credit.

3.6.4 The performance security will be discharged by the Central Bank of Kenya and returned to the candidate not later than thirty (30) days following the date of completion of the tenderer’s performance of obligations under the contract, including any warranty obligations under the contract.

3.7 Inspections and Tests

3.7.1 The Central Bank of Kenya or its representative shall have the right to inspect And/or to test the services to confirm their conformity to the Contract specifications. The Central Bank of Kenya shall notify the tenderer in writing, in a timely manner, of the identity of any representatives retained for these purposes.

3.7.2 The inspections and tests may be conducted on the premises of the tenderer or its subcontractor(s). If conducted on the premises of the tenderer or its subcontractor(s), all reasonable facilities and assistance, including access to drawings and production data, shall be furnished to the inspectors at no charge to the Central Bank of Kenya.

3.7.3 Should any inspected or tested services fail to conform to the Specifications, the Central Bank of Kenya may reject the services, and the tenderer shall either replace the rejected services or make alterations necessary to meet specification requirements free of cost to the Central Bank of Kenya.

3.7.4 Nothing in paragraph 3.7 shall in any way release the tenderer from any warranty or other obligations under this Contract.

3.8 Payment

3.8.1 The method and conditions of payment to be made to the tenderer under this Contract shall be specified in SCC

3.9 Prices

Prices charged by the contractor for services performed under the Contract shall not, with the exception of any Price adjustments authorized in SCC, vary from the prices by the tenderer in its tender or in the Central Bank of Kenya’s request for tender validity extension as the case may be. No variation in or modification to the terms of the contract shall be made except by written amendment signed by the parties.

29

3.10 Assignment

The tenderer shall not assign, in whole or in part, its obligations to perform under this contract, except with the Central Bank of Kenya’s prior written consent.

3.10 Termination for Default The Central Bank of Kenya may, without prejudice to any other remedy for breach of Contract, by written notice of default sent to the tenderer, terminate this Contract in whole or in part:

a) if the tenderer fails to provide any or all of the services within the period(s) specified in the Contract, or within any extension thereof granted by the Central Bank of Kenya.

b) if the tenderer fails to perform any other obligation(s) under the Contract.

c) if the tenderer, in the judgment of the Central Bank of Kenya has engaged in corrupt or fraudulent practices in competing for or in executing the Contract.

In the event the Central Bank of Kenya terminates the Contract in whole or in part, it may procure, upon such terms and in such manner as it deems appropriate, services similar to those undelivered, and the tenderer shall be liable to the Central Bank of Kenya for any excess costs for such similar services.

3.12 Termination of insolvency The Central Bank of Kenya may at the anytime terminate the contract by giving written notice to the contractor if the contractor becomes bankrupt or otherwise insolvent. In this event, termination will be without compensation to the contractor, provided that such termination will not produce or affect any right of action or remedy, which has accrued or will accrue thereafter to the Central Bank of Kenya.

3.13 Termination for convenience

3.13.1 The Central Bank of Kenya by written notice sent to the contractor may terminate the contract in whole or in part, at any time for its convenience. The notice of termination shall specify that the termination is for the Central Bank of Kenya convenience, the extent to which performance of the contractor of the contract is terminated and the date on which such termination becomes effective.

3.13.2 For the remaining part of the contract after termination the Central Bank of Kenya may elect to cancel the services and pay to the contractor on agreed amount for partially completed services.

3.14 Resolution of disputes

The Central Bank of Kenya’s and the contractor shall make every effort to resolve amicably by direct informal negotiations any disagreement or dispute arising between them under or in connection with the contract.

30

If after thirty (30) days from the commencement of such informal negotiations both parties have been unable to resolve amicably a contract dispute either party may require that the dispute be referred for resolution to the formal mechanisms specified in the SCC.

3.15 Governing Language

The contract shall be written in the English language. All correspondence and other documents pertaining to the contract, which are exchanged by the parties, shall be written in the same language.

3.16 Force Majeure The contractor shall not be liable for forfeiture of its performance security, or termination for default if and to the extent that its delay in performance or other failure to perform its obligations under the Contract is the result of an event of Force Majeure.

3.17 Applicable Law. The contract shall be interpreted in accordance with the laws of Kenya unless otherwise specified in the SCC

3.18 Notices Any notices given by one party to the other pursuant to this contract shall be sent to the other party by post or by fax or E-mail and confirmed in writing to the other party’s address specified in the SCC. A notice shall be effective when delivered or on the notices effective date, whichever is later.

31

SECTION IV: SPECIAL CONDITIONS OF CONTRACT (SCC) 4.1 Special conditions of contract shall supplement the general conditions of contract,

wherever there is a conflict between the GCC and the SCC, the provisions of the SCC herein shall prevail over those in the GCC.

4.2 Special conditions of contract with reference to the general conditions of contract.

General conditions of contract reference

Special conditions of contract

3.1 (b) The contract price will be in US Dollars.

3.1 (C) The project to be undertaken is for TENDER FOR SUPPLY,

DELIVERY, TESTING AND COMMISSIONING OF

PORTFOLIO MANAGEMENT AND TRADE PROCESSING

SYSTEM (PMTP) and INVESTMENT RISK MANAGEMENT

SYSTEM (IRMS) (REF. NO.CBK/25/2020/2021)

3.1 (d) The Central Bank of Kenya is Central Bank of Kenya, P. O. Box 60000 – 00200, Nairobi

3.6 The successful tenderer shall furnish to the Central Bank of Kenya the performance security equivalent to 5% of the contract sum from a commercial Bank operating in Kenya supervised by the Central Bank of Kenya.

3.7 The supervisor of the service under the contract is the Office of the Director, Financial Markets/Information Technology Department.

3.8 Payment will be made after the installation and testing of the system and upon submission of invoice and signing of certificate of Services issued by a representative of the Office of the Director, Financial Markets Department.

3.9 No price adjustments will be allowed unless under exceptional. circumstances and upon approval by the Bank

3.13.1 Termination of the contract shall be done by either party giving the other 30 days notice.

3.14 If both parties have been unable to resolve amicably a contract dispute either party may require that the dispute be referred for resolution to an Arbitrator or to a court of law.

3.17 The laws of Kenya shall apply

3.18 The address to be used for purposes of notices will be: The Director, General Services Department, P. O. Box 60000 – 00200, Nairobi. Email: [email protected]

32

1. Penalty for non-performance

In the event of non-performance of the service provider, the Bank will give the service provider a one-month notice giving details of the shortcomings that the service provider is expected to rectify. If the service provider fails to show improvement in his/her performance during the one-month notice, then the Bank will terminate the contract and call up the Bank Guarantee provided by the service provider.

33

SECTION V – SCHEDULE OF REQUIREMENTS AND PRICE SCHEDULE

LOT 1: Portfolio Management and Trade Processing System (PMTP)

Cost Items Amount (USD)

1. On-Premise Perpetual Software License for Portfolio Management and Trade Processing System (PMTP)

Provide the licensing cost by module where the system is made up of modules

2. Third - Party Components Licenses

3. Integration Costs

4. Implementation Costs

5. Training Costs

6. One Year Warranty ( starting three (3) months after Go-Live)

Free

7. Annual Maintenance Cost (3 years)

Total Costs

LOT 2: Investment Risk Management System (IRMS)

Cost Items Amount (USD)

1. On-Premise Perpetual Software License – Investment Risk Management System Provide the licensing cost by module where the system is made up of modules

2. Third - Party Components Licenses

3. Integration Costs

4. Implementation Costs

5. Training Costs

6. One Year Warranty ( starting three (3) months after Go-Live)

Free

7. Annual Maintenance Cost (3 years)

Total Costs

34

SECTION VI: TECHNICAL REQUIREMENTS, SERVICES AND DELIVERABLES

A. BACKGROUND

The Central Bank of Kenya (CBK) was established by an Act of Parliament of March 24, 1966 and

opened its doors to the public on September 14, 1966. The Bank is now anchored in the Constitution

under Article 231. The Bank is responsible for formulating monetary policy to achieve and maintain

price stability and issuing currency.

Pursuant to the Central Bank of Kenya Act, the Central Bank promotes financial stability through

regulation, supervision and licensing of financial institutions under its mandate. The Bank also

provides oversight of payment, clearing and settlement systems. All these efforts are geared

towards fostering liquidity, solvency and proper functioning of the financial system. The Bank also

formulates and implements foreign exchange policy and manages foreign exchange reserves. CBK

is the banker for, adviser to, and fiscal agent of the Government.

In discharging its mandate, the Central Bank contributes to the country’s economic development

and growth and promotes the interest of the public. The Bank strives to carry out its statutory

mandate effectively and efficiently guided by the principles of integrity and transparency

Business Objectives of the Purchaser

The Central Bank of Kenya (CBK) is responsible for the management of foreign exchange reserves.

The objectives of holding foreign exchange reserves include:

a) To provide policy option to cushion the country from possible foreign currency net imbalances

in the balance of payments and protect the country’s wellbeing in the event of national calamity

or external shocks;

b) To provide foreign currency liquidity and flexibility to finance government forex obligations;

c) To enhance market confidence in the Kenya’s economy; and

d) To facilitate policy actions to smoothen excessive volatility in the foreign exchange market and

support monetary policy framework.

The Portfolio Management and Transaction Processing System (PMTP) and Investment Risk

Management System (IRMS) will support the investment management process for foreign currency

reserves and enable users in the portfolio management (front office), risk and analytics (middle

office) and operations (back office) areas to achieve the following:

a) Portfolio Management and Trade Execution

b) Portfolio Risk and Scenario Analysis;

c) Portfolio Performance Measurement and Attribution;

d) Compliance Monitoring;

e) Accounting and Settlement;

f) Reporting;

g) Interface to Trading and Messaging Platforms – SWIFT, Bloomberg, Reuters;

h) Maintenance of audit trails of all changes made in the system.

35

B. SCOPE OF SERVICES AND DELIVERABLES

I. PORTFOLIO MANAGEMENT AND TRADE PROCESSING SYSTEM (PMTP)

SCOPE OF SERVICES

The Bank is seeking not only a supplier(s) of the software but also partnership with the provider

to help the Bank in leveraging this solution through a sound implementation approach and

proven organizational adoption tools. Based on this, the scope will include the following:

a) Supply, install, configure, customize and maintain Portfolio Management and Trade

Processing System (PMTP) that will meet the functional and technical requirements as

specified in this RFP (see Annex A).

b) Provide system that will be able to accommodate 50 users and shall be hosted in the

Bank premises and shall be compatible and integrated into the Banks’s IT infrastructure.

c) Develop and propose an implementation methodology with roadmap/schedule with

monitoring targets and risks towards the desired target Portfolio Management and

Trade Processing System (PMTP) from the installation through deployment of the

solution.

d) Carry out implementation services of the solution as stated in the proposed roadmap

from installation, configuration, customization and final deployment of the solution

system.

e) Provide maintenance service for the solution including software version upgrade.

f) Provide support and assistance including both remote and local/onsite assistance for

resolution of major technical problems or technical issues.

g) Provide a flexible open solution for expansion to cover other asset types that may not be

included in the initial version

DELIVERABLES

Vendors should provide comfort to the Central Bank of Kenya that the solution meets the

requirements specified in the Terms of Reference. Upon the completion of the project, the

solution vendor shall provide a comprehensive report with details of completed implementation

of project. The Bank expects to receive from Vendor the following outputs:

a) A fully installed, well configured, integrated, customized and functioning PORTFOLIO

MANAGEMENT AND TRADE PROCESSING SYSTEM (PMTP) that meets the need of

Central Bank of Kenya business requirements as specified in the scope of the services.

b) A proposal for the implementation of gaps that would have been identified by

Management during the live demonstration of the solution implemented.

c) A detailed description of completed implementation work.

d) An executive summary report validating the implementation process and the various

functionalities specified in the TOR.

e) Training services for the solution before and during the implementation to end-users

and technical staff for knowledge transfer both on the functional and technical aspects

36

f) Full documentation of the solution from the installation, configuration and

customization to deployment. The documentation shall include the user manual.

II. INVESTMENT RISK MANAGEMENT SYSTEM (IRMS)

SCOPE OF SERVICES

The Bank is seeking not only a supplier(s) of the software but also partnership with the provider

to help the Bank in leveraging this solution through a sound implementation approach and

proven organizational adoption tools. Based on this, the scope will include the following:

a) Supply, install, configure, customize and maintain Investment Risk Management System

(IRMS) that will meet the functional and technical requirements as specified in this RFP (see

Annex B).

b) Provide system that will be able to accommodate 20 users and shall be hosted in the Bank

premises and shall be compatible and integrated into the Banks’s IT infrastructure.

c) Develop and propose an implementation methodology with roadmap/schedule with

monitoring targets and risks towards the desired target Investment Risk Management

System (IRMS) from the installation through deployment of the solution.

d) Carry out implementation services of the solution as stated in the proposed roadmap from

installation, configuration, customization and final deployment of the solution system.

e) Provide maintenance service for the solution including software version upgrade.

f) Provide support and assistance including both remote and local/onsite assistance for

resolution of major technical problems or technical issues.

g) Provide a flexible open solution for expansion to cover other asset types that may not be

included in the initial version

DELIVERABLES

Vendors should provide comfort to the Central Bank of Kenya that the solution meets the

requirements specified in the Terms of Reference. Upon the completion of the project, the

solution vendor shall provide a comprehensive report with details of completed implementation

of project. The Bank expects to receive from Vendor the following outputs:

a) A fully installed, well configured, integrated, customized and functioning INVESTMENT

RISK MANAGEMENT SYSTEM (IRMS) that meets the need of Central Bank of Kenya

business requirements as specified in the scope of the services.

b) A proposal for the implementation of gaps that would have been identified by

Management during the live demonstration of the solution implemented.

c) A detailed description of completed implementation work.

d) An executive summary report validating the implementation process and the various

functionalities specified in the TOR.

e) Training services for the solution during the implementation to technical staff for

knowledge transfer both on the functional and technical aspects and to users on

functional aspects.

f) Full documentation of the solution from the installation, configuration and

customization to deployment. The documentation shall include the user manual.

37

C. TECHNICAL SPECIFICATIONS

1) Technical Specifications for Management and Trade Processing System (PMTP)

Refer to Annex A: Business and Technology Requirements for Portfolio Management and Trade

Processing System (PMTP)

2) Technical Specifications for Investment Risk Management System (IRMS)

Refer to Annex B: Business and Technology Requirements for Investment Risk Management

System (IRMS)

38

SECTION VII- STANDARD FORMS

7.1 Form of tender

7.2 Contract Agreement Form

7.3 Form of Tender Security

7.4 Performance Security Form

7.5 Confidential Questionnaire Form

7.6 Letter of Notification of Award

7.7 Form RB1

7.8 Declaration Form

39

7.1 FORM OF TENDER

Date____________________________ Tender No._______________________

To……………………..

…………………………..

[Name and address of Central Bank of Kenya]

Gentlemen and/or Ladies:

1. Having examined the tender documents including Addenda Nos.. [insert numbers, the of which is hereby duly acknowledged, we, the undersigned, offer to provide. [description of services] in conformity with the said tender documents for the sum of . [total tender amount in words and figures] or such other sums as may be ascertained in accordance with the Schedule of Prices attached herewith and made part of this Tender.

2. We undertake, if our Tender is accepted, to provide the services in accordance with the services schedule specified in the Schedule of Requirements.

3. If our Tender is accepted, we will obtain the tender guarantee in a sum equivalent to _____ percent of the Contract Price for the due performance of the Contract, in the form prescribed by (Central Bank of Kenya).

4. We agree to abide by this Tender for a period of [number] days from the date fixed for tender opening of the Instructions to tenderers, and it shall remain binding upon us and may be accepted at any time before the expiration of that period.

5. Until a formal Contract is prepared and executed, this Tender, together with your written acceptance thereof and your notification of award, shall constitute a binding Contract between us.

Dated this _________________ day of_________________ 20 [signature] [In the capacity of] Duly authorized to sign tender for and on behalf of___________

40

7.2 CONTRACT AGREEMENT FORM

THIS AGREEMENT made the ___day of _____20____between…………[name of procurement entity] of ……………….[country of Procurement entity](hereinafter called “the Central Bank of Kenya”) of the one part and ……………………[name of tenderer] of ……….[city and country of tenderer](hereinafter called “the tenderer”) of the other part. WHEREAS the Central Bank of Kenya invited tenders for software and services. Viz……………………..[brief description of software and services] and has accepted a tender by the tenderer for the supply of those software and services in the sum of ………………………………………[contract price in words and figures]

NOW THIS AGREEMENT WITNESSETH AS FOLLOWS: 1. In this Agreement words and expressions shall have the same meanings as are

respectively assigned to them in the Conditions of Contract referred to.

2. The following documents shall be deemed to form and be read and construed as part of this Agreement, viz.:

(a) the Tender Form and the Price Schedule submitted by the tenderer; (b) the Schedule of Requirements; (c) the Technical Specifications; (d) the General Conditions of Contract; (e) the Special Conditions of Contract; and (f) the Central Bank of Kenya’s Notification of Award.

3. In consideration of the payments to be made by the Central Bank of Kenya to the tenderer as hereinafter mentioned, the tenderer hereby covenants with the Central Bank of Kenya to provide the software and services and to remedy defects therein in conformity in all respects with the provisions of the Contract

4. The Central Bank of Kenya hereby covenants to pay the tenderer in consideration of the provision of the software and services and the remedying of defects therein, the Contract Price or such other sum as may become payable under the provisions of the contract at the times and in the manner prescribed by the contract.

IN WITNESS whereof the parties hereto have caused this Agreement to be executed in accordance with their respective laws the day and year first above written.

Signed, sealed, delivered by___________the _________(for the Central Bank of Kenya)

Signed, sealed, delivered by___________the __________(for the tenderer)

in the presence of_______________.

41

7.3 FORM OF TENDER SECURITY

WHEREAS………………………………………………………………………… (hereinafter called “the Tenderer”) has submitted his tender dated……………….for Supply, Installation, Testing and commissioning of the Reserves Investment Management System for Central Bank of Kenya.

KNOW ALL PEOPLE by these presents that WE,…………………………………..….…… ……………………………………………………………………………………………….....….. having our registered office at …………………………...…………………………………..… (Hereinafter called “the Bank”), are bound unto CENTRAL BANK OF KENYA (hereinafter called “the Employer”) in the sum of USD 10,000.00 for which payment well and truly to be made to the said Employer, the Bank binds itself, its successors and assigns by these presents, sealed with the Common Seal of the said Bank this……………………..day of …………………….2014 THE CONDITIONS of this obligation are: 1. If after tender opening the Tenderer withdraws his tender during the period of

tender validity specified in the instructions to Tenderers OR 2. If the Tenderer, having been notified of the acceptance of his tender by the Employer

during the period of tender validity:

a) fails or refuses to execute the form of Agreement in accordance with the Instructions to Tenderers, if required; or

b) fails or refuses to furnish the Performance Security, in accordance with the Instructions to Tenderers;

We undertake to pay to the Employer up to the above amount upon receipt of his first written demand, without the Employer having to substantiate his demand, provided that in his demand the Employer will note that the amount claimed by him is due to him, owing to the occurrence of one or both of the two conditions, specifying the occurred condition or conditions. This guarantee will remain in force up to and including thirty (30) days after the period of tender validity, and any demand in respect thereof should reach the Bank not later than the said date.

___________________ ________________ (Date) Signature of the Bank) ___________________(Witness) _________________(Seal)

42

7.4 PERFORMANCE SECURITY FORM To …………………………………………. [name of Central Bank of Kenya] WHEREAS …………………………………… [name of tenderer] (hereinafter called “the tenderer”) has undertaken , in pursuance of Contract No. [reference number of the contract] dated 20 to supply ……………………………………………… [description of goods] (hereinafter called “the Contract”). AND WHEREAS it has been stipulated by you in the said Contract that the tenderer shall furnish you with a bank guarantee by a reputable bank for the sum specified therein as security for compliance with the Tenderer’s performance obligations in accordance with the Contract. AND WHEREAS we have agreed to give the tenderer a guarantee: THEREFORE WE hereby affirm that we are Guarantors and responsible to you, on behalf of the tenderer, up to a total of ………………………. [amount of the guarantee in words and figure] and we undertake to pay you, upon your first written demand declaring the tenderer to be in default under the Contract and without cavil or argument, any sum or sums within the limits of …………………….. [amount of guarantee] as aforesaid, without you needing to prove or to show grounds or reasons for your demand or the sum specified therein. This guarantee is valid until the day of 20 Signed and seal of the Guarantors [name of bank or financial institution] [address] [date]

43

7.5 CONFIDENTIAL BUSINESS QUESTIONNAIRE FORM

You are requested to give the particulars indicated in Part 1 and either Part 2(a), 2(b) or 2 (c ) whichever applied to your type of business. You are advised that it is a serious offence to give false information on this form

Part 1 – General:

Business Name ………………………………………………………………………………………………

Location of business premises. ………………………………………………………………………………

Plot No………………………………………………… Street/Road ………………………………………..

Postal Address ……………………….. Tel No. …………………. Fax ………………. E mail …………….

Nature of Business …………………………………………………………………………………………..

Registration Certificate No. …………………………………………………………………………………

Maximum value of business which you can handle at any one time – Kshs. …………………………

Name of your bankers ……………………………………….. Branch ……………………………………

Part 2 (a) – Sole Proprietor

Your name in full …………………………………………………….. Age ………………………..

Nationality ………………………………… Country of origin…………………………………….

Citizenship details …………………………………………………….

Part 2 (b) Partnership

Given details of partners as follows:

Name Nationality Citizenship Details Shares

1. ………………………………………………………………………………………….…… 2. …………………………………………………………………………………………….… 3. …………………………………………………………………………………………..…..

Part 2 (c ) – Registered Company

Private or Public …………………………………………………………………………………….

State the nominal and issued capital of company-

Nominal Kshs. ………………………………

Issued Kshs. …………………………………

Given details of all directors as follows

Name Nationality Citizenship Details Shares

1…………………………………………………………………………………………………………

2. ………………………………………………………………………………………………………..

3. ………………………………………………………………………………………………………

4. ………………………………………………………………………………………………………

Date ………………………………………………….. Signature of Candidate ………………………………..

If a Kenya Citizen, indicate under “Citizenship Details” whether by Birth, Naturalization or registration.

44

7.6. LETTER OF NOTIFICATION OF AWARD

Address of Central Bank of Kenya

_____________________ _____________________ To: RE: Tender No. Tender Name This is to notify that the contract/s stated below under the above mentioned tender have been awarded to you.

1. Please acknowledge receipt of this letter of notification signifying your acceptance. 2. The contract/contracts shall be signed by the parties within 30 days of the date of

this letter but not earlier than 14 days from the date of the letter.

3. You may contact the officer(s) whose particulars appear below on the subject matter

of this letter of notification of award. (FULL PARTICULARS)

SIGNED FOR ACCOUNTING OFFICER

45

7.7. FORM RB 1 REPUBLIC OF KENYA PUBLIC PROCUREMENT ADMINISTRATIVE REVIEW BOARD APPLICATION NO…………….OF……….….20……... BETWEEN …………………………………………….APPLICANT AND …………………………………RESPONDENT (Central Bank of Kenya) Request for review of the decision of the…………… (Name of the Central Bank of Kenya) of ……………dated the…day of ………….20……….in the matter of Tender No………..…of …………..20… REQUEST FOR REVIEW I/We……………………………,the above named Applicant(s), of address: Physical address…………….Fax No……Tel. No……..Email ……………, hereby request the Public Procurement Administrative Review Board to review the whole/part of the above mentioned decision on the following grounds , namely:- 1. 2. …. By this memorandum, the Applicant requests the Board for an order/orders that: - 1. 2. …. SIGNED ……………….(Applicant) Dated on…………….day of ……………/…20…

FOR OFFICIAL USE ONLY Lodged with the Secretary Public Procurement Administrative Review Board on ………… day of ………....20….……… SIGNED Board Secretary

46

7.8 DECLARATION FORM

Date To The tenderer i.e. (name and address) declare the following:

a) Has not been debarred from participating in public procurement.

b) Has not been involved in and will not be involved in corrupt and fraudulent practices regarding public procurement.

Title Signature Date (To be signed by authorized representative and officially stamped)

ANNEX A

INTERNATIONAL TENDER FOR SUPPLY, DELIVERY, TESTING

AND COMMISSIONING OF PORTFOLIO MANAGEMENT AND TRADE PROCESSING SYSTEM (PMTP)

REF. NO. CBK/25/2020/2021

BUSINESS AND INFORMATION TECHNOLOGY (IT) REQUIREMENTS

2

TABLE OF CONTENTS

PAGE

SECTION A BUSINESS REQUIREMENTS ………................…………...3 PART 1 - STATEMENT OF WORK……………………………………………………..….3

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE………….13

SECTION B INFORMATION TECHNOLOGY REQUIREMENTS …35

PART 1 - STATEMENT OF WORK………………………………………………………...35

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE…………...59

APPENDIX A LIST OF INVESTMENT INSTRUMENTS…………….…74

APPENDIX B LIST OF SWIFT MESSAGE TYPES ………………………75

APPENDIX C SYSTEM INTERFACES ………………………………….…80

APPENDIX D TYPES OF PAYMENTS AND RECEIPTS …………….....82

3

Section A: Business Requirements

PART 1 – STATEMENT OF WORK

Background

The Central Bank of Kenya (herein referred to as “CBK” or “the Bank”) is established under article 231 of the Constitution of Kenya 2010 and governed by the Central Bank of Kenya Act Cap 491 laws of Kenya (the CBK Act) and has its Head office in Nairobi and three branches in Mombasa, Kisumu and Eldoret. The principal object of the Bank is to formulate and implement monetary policy directed to achieving and maintaining stability in the general level of prices. In fulfilling this mandate, the Bank fosters the liquidity, solvency, and proper functioning of a stable market-based financial system. Amongst its other objects, the Bank is also required by statute to hold and manage the country’s foreign exchange reserves. Overview of CBK’s Forex Reserves Management

Foreign Exchange Reserves play a key role in ensuring that Kenya will be able to maintain confidence in its monetary, financial stability and exchange rate policies and protect the economic well-being of the country in the event of external shocks. In accordance with its role as a central bank and as provided in the Central Bank of Kenya Act 2015 (CBK Act), the official foreign exchange reserves of the Republic of Kenya are held and managed by the Central Bank of Kenya (CBK). The CBK Act requires the Bank to at all times endeavor to maintain a reserve of external assets at an aggregate amount of not less than the value of four months’ imports as recorded and averaged in the last three preceding years. The objectives of the management of the foreign exchange reserves are:

1. Safety: Investments will be undertaken with the aim of preserving the capital of the overall portfolio over the investment horizon, subject to the approved risk tolerance;

2. Liquidity: Investment management will seek to ensure that adequate reserves are available to meet a defined range of objectives. In order to maintain sufficient liquidity, the foreign reserves will as much as possible be invested in instruments or securities with an active secondary market;

3. Returns: Foreign exchange reserves will be invested in order to achieve a reasonable rate of return consistent with the investment objectives and risk constraints, after taking into consideration the two principles of Safety and Liquidity.

Statement of Need

The Central Bank of Kenya wishes to procure a Portfolio Management and Trade Processing

System for managing its foreign currency reserves. The system is expected to automate the

front and back-office operations. Specifically, the system should enable position keeping and

reporting, management of static data, valuation of assets, simulation of trade impacts,

4

calculation of performance and attribution, benchmark analysis and trade processing (from

execution to accounting).

In addition, a strong compliance monitoring capability should be provided to ensure

management of the reserves in accordance with the Investment Policy and Guidelines. A

robust trade workflow from Front to Back offices should be provided to ensure enforcement

of all required controls and reduce operational risk by eliminating duplicate data entry.

The CBK invests its forex reserves in fixed income and money market instruments (list of

instruments is provided in Appendix A). The system should at the minimum have the

following features or capabilities:

1) Trading

a) Order creation and trade entry capability including manual entry interfaces to accept

trades from trading platforms such as Bloomberg and Reuters (Refinitiv).

b) Pre-Trade analytics such as what-if analysis to evaluate different trading strategies by

assessing the impact of potential trades on P&L (return) and risk in order to manage a

bond portfolio versus its benchmark

c) Provide pre-trade and post-trade compliance checks such as counterparty exposure

versus the limit, concentration risk, value at risk (VAR), Stop loss levels to ensure

compliance with guidelines before trades are executed.

2. Portfolio Management

2.1 Position Management

a) View investible and non-investible cash and forecast future cash positions including

transactions and events that impact cash accounts.

b) Provide valuation and pricing for all instruments (see Appendix A)

c) Manage and monitor positions for all instruments (see Appendix A) on a real-time as

well as on historical basis by parameters such as: dealer, portfolio, counterparty,

product type, issuer, currency and also consolidated global risk position.

d) Provide Investment Book of Record (IBOR) that supports all functions – from the front

office, risk, through to compliance, and accounting for investments.

e) Capability to support portfolio look-through (drill-down/aggregate)

2.2 Portfolio Tranching and Optimization

The system should:

a) Support at least four (4) levels of portfolio hierarchy (see figure 2)

b) Allow assignment of appropriate benchmarks at lowest level of hierarchy (sub-

portfolio level) and aggregation of benchmarks upwards on the hierarchy.

5

c) Maintain various benchmarks (composed of a single or multiple indices) including the

index compositions and have the capability to aggregate benchmarks to match the

portfolio Tranching structure.

d) Have ability to set currency compositions and target sizes for the tranches (portfolios)

e) Allow inter-portfolio transfers of cash and positions.

f) Allow setting of upper and lower limits of tranche / portfolio in percentage or

absolute terms

g) Allow multi-currency transactions in a subportfolio

h) Enable aggregation of investments holdings by portfolio, issuer, sector, asset class etc

i) Enable classification of assets in each subportfolio according to IFRS 9 for accounting

purposes

j) Be capable of producing scenario analysis based on historical and user-defined

scenarios for historical and hypothetical scenarios.

k) Have capability of performing portfolio optimization.

Figure 2

6

2.3 Benchmark Maintenance

The system should:

a) Support the definition and maintenance of different benchmarks including custom

(modified composition of existing benchmark) and blended / composite

(benchmark with multiple asset classes) benchmarks.

b) Support the upload of index compositions and returns

c) Allow multiple portfolios to be benchmarked to a single benchmark.

d) Support multi-currency bond indices

2.4 Strategic Asset Allocation

The system should:

a) Produce scenario analysis based on historical and user-defined scenarios for historical

events and hypothetical scenarios

b) Simulate asset returns based on the defined scenarios (risk factors).

c) Perform portfolio optimization

2.5 Cashflow and Liquidity Management

The system should:

a) Show the investible cashflow by portfolio and bank accounts for portfolio managers and

accountants

b) Allow for the input of non-investment related cashflows manually or via an automated

interface from other internal systems, and update the accounts.

c) Allow for input of special cashflows to be used in generating special reports with no

impact on both accounting and portfolio performance.

d) Able to generate cashflow forecasts based on defined periods / buckets

e) Allow for upload of a schedule of non-investment payments / cashflows from file, and

produce forecasts by combining these payments and cashflows from investments to

produce holistic cashflow forecasts / projections.

2.6 External Managers

The system should be able to:

a) Provide capability to combine external manager data with internal portfolio data

(positions and cash) to monitor compliance, risk and performance of the total

reserves.

b) Provide for upload of external manager data, for accounting purposes, at both at

summarised and granular (detailed) level.

7

2.7 Pricing and Valuation

The system should be able to:

a) Support the manual upload of market data from files (CSV, Spreadsheets etc) and

direct interface to pricing sources such as Bloomberg, Refinitiv (Reuters), IDC, Markit

etc

b) Provide valuation and pricing for all instruments, including over the counter

derivatives (see Appendix A)

c) Support the construction of yield curve from market data uploaded to the system

d) Support the valuation of financial instruments off a yield curve, volatility surface, and

other valuation methods necessary to derive the fair value of a financial instrument,

including over the counter derivatives (see Appendix D)

e) Provide facility to create and maintain prices and exchange rates.

f) Provide facility to maintain a price hierarchy for the securities, i.e. the priority of price

sources within the system for portfolio valuations and allow for selection of price

types (mid, bid, ask, close).

g) Provide facility to flag pricing exceptions (i.e. missing prices, stale prices, significant

price movements, etc.) as per user defined parameters.

h) Support CSA (Credit Support Annex) discounting.

2.8 Static and Reference Data

The system should be able to:

a) Support maintenance (capture and editing) of holiday calendar by country and

currency including the functional currency (Kenya Shilling).

b) Support the maintenance of Counterparties and respective Standard Settlement

Instructions (SSIs)

c) Provide facility to maintain bank accounts and SSIs

d) Provide facility to maintain the following reference datasets: Currencies, Countries,

Issuers, Issuer Types, and Security Master.

e) System should be capable of adjusting settlements because of change in the holidays

on normal & sudden basis.

3 Trade Processing and Accounting

3.1 Accounting

The Reserves Investment Management system should be able to:

a) Maintain a chart of accounts at required granular level to assist in accounting of FX

reserves.

8

b) Support generation of accounting entries for all instrument life cycle events (trade,

settlement, coupon, maturity, interest accrual, MTM, etc.)

c) Support the mark to market of all positions; calculate gains and losses at predefined

closing rates and posting of the results.

d) Support the revaluation of Nostro Account balances at user defined frequencies and

post the resulting gains or losses.

e) Support incremental posting, manual postings and reversals.

f) Support manual adjustments via file uploads or direct input

g) Support the different instrument classifications in IFRS 9 - fair value through other

comprehensive income (FVTOCI), fair value through profit or loss (FVTPL) and

amortised cost (AC).

h) Support both straight line and effective interest rate amortization methods

i) Support file uploads of accounting transactions from fund managers and custodians.

j) Support multiple and parallel accounting frameworks such as IFRS 9 and the US

Generally Accepted Accounting Principles (US GAAP) – each framework with its own

posting rules and account mapping

k) Maintain a sub ledger and generate accounting entries for all trade lifecycle events

(trade, coupon, maturity, amortization etc) .

l) Interface the PMTP sub ledger with the CBK’s general ledger.

m) Support creation, modification and customization of accounting rules for application

to specific financial instruments, currency and product. Meanwhile, provide out of

box accounting rules as per IFRS for all required instruments

n) Support both trade date and settlement date accounting options.

o) Support institution’s compliance to International Financial Reporting Standard IFRS

9 accounting reporting standards.

p) Provide comprehensive accounting reports such as Balances in transaction currency,

Balances in reporting currency, Valuation reports per currency, Valuation reports per

product, and Valuation reports per account.

q) Provide functions for users to inquire accounting entries, as per user defined

parameters and for users to export such data out to Excel, PDF or CSV formats.

r) Support different cost basis methods: First In First Out (FIFO), and Weighted Average

Cost (WAC)

9

s) Support the valuation of all financial instruments (e.g. fixed income securities and

derivatives) as per defined rules and the posting of results (see Appendix A for the

full list of instruments).

t) Support different accrual conventions e.g. Last Not First (LNF), First Not Last (FNL).

u) Support end of accounting period in sync with the general ledger.

v) Provide support for the foreign currency translation as provided for under IAS 21.

3.2 Post-Trade Operations

The system should be able to:

a) Provide functionality for trade processing, that is, straight through trade

confirmations, matching and settlement workflows.

b) Provide for dashboard style, real-time monitoring all post-trade activities.

c) Provide alerts on new trades, outstanding actions, and errors during the trade

lifecycle.

d) Generate SWIFT confirmation, Settlement, and payment messages (MT 300, MT320,

MT541, MT543, MT 545, MT 547, MT548, MT 202, MT200 and MT210).

e) Support resubmission for trades that did not settle because of some incorrect

information between the counterparty and trade ticket.

f) Support processing of all corporate actions: coupon payments, dividends, Bonus

issues, rights issues, Mergers & acquisitions, stock splits and maturities.

3.3 Reconciliations

The system should be able to:

a) Provide functionality to accept the SWIFT (940/950 / 535) statements, and reconcile

them with ledger and positions.

b) Provide functionality to identify and match trade and payment transactions generated

in the ledger (CBK books) with related transactional messages received from

correspondent banks and counterparties through SWIFT.

c) Create and maintain reconciliation rules through parameterization.

d) Generate reconciliation reports including exception reports for appropriate

investigations.

e) Reconcile settled positions with custody.

f) Reconcile traded positions with custody.

g) Reconcile cash positions with custody.

10

h) Carry out a three-way reconciliation between accounting, custody, and the master

record keeper.

i) Load and store custody security positions for reconciliation activities.

j) Load and store custody cash positions for reconciliation activities.

k) Maintain exceptions through time including aging and run it by schedule.

l) Interface/connect with Global Custodian systems

4 Performance, Risk Management and Compliance

4.1 Performance Measurement and Attribution

The system should:

a) Produce accurate daily, weekly, monthly, quarterly, calendar and fiscal year-to-date,

rolling periods, and since inception performance reporting.

b) Calculate performance using the Global Investment Performance Standards (GIPS).

c) Calculate the following risk-adjusted performance measures: Sharpe ratio, Jensen

Alpha, Treynor ratio, Beta (ex post), Information Ratio and Sortino Ratio.

d) Show portfolio performance by a classification of choice (i.e., country, region, asset

class, sub-asset class, credit ratings, currency, Global Industry Classification Standard

(GICS) sector, manager.

e) Provide ex-post performance attribution analysis into yield, spread, currency, time

return (carry), asset allocation and selection effect.

f) Provide detailed view of the performance contribution of each the component

securities to the portfolio’s performance over time.

g) The system should be able to calculate performance based on both money-weighted

and time-weighted measures of performance.

h) Provide performance for all investment instruments in Appendix A.

i) The system should be able to incorporate accruals in the valuation of investment

instruments.

j) The system should provide performance analytics such as attribution and risk-

adjusted performance measures covering all instruments listed in Appendix A

k) Support calculation of performance in both reporting (with FX) and trade currency.

4.2 Compliance Monitoring

The system should:

11

a) Maintain compliance rules to reflect Investment Guidelines and monitor portfolio

compliance versus the rules and limits.

b) Allow the testing of the compliance rules before applying to portfolio.

c) Have a library of predefined compliance rules, and also enable creation of user-

defined rules.

d) Compliance rules should be able to run on all portfolios.

e) Be capable of defining compliance rules based on specific attributes of the security

master (i.e., credit ratings, security type, sector, country, counterparty, issuer, region,

and market of issue).

f) Be capable of defining effective from/start and effective to/end dates for all

compliance rules and maintain the history.

g) Have capability of setting up early warnings for potential compliance breaches and to

assign severity levels to those warnings.

h) Allow viewing of compliance exceptions and overrides and store a record of all

compliance violations and compliance overrides for audit purposes

i) Be able to measure various exposures, monitor counterparties' credit exposure against

authorized limits on a real-time basis: Issuer limit, portfolio manager, country limits

and counterparty limits.

5 Reporting

a) Ability to display and modify the screen set up by individual user to view positions

/ reports in different perspectives.

b) Ability to customize dashboards by user roles/groups.

c) The solution should allow reports to be exported in different formats (MS Excel, MS

word, PDF, HTML)

d) The solution should provide for report-writer tool with user-friendly capabilities of

parameterizing generating reports.

e) The solution should include a facility to enable a user to define the sorting, grouping,

and drill-down.

f) The solution should provide ability to generate reports per trading currency,

reporting currency, base currency, and local currency.

12

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE

The Tenderer must respond to every stated request or requirement and indicate that they

confirm acceptance of and understand the CBK’s stated requirements. The deferral of a

response to a question or issue to the contract negotiation stage is not acceptable. Any

item not specifically addressed in the Vendor’s proposal will be deemed as accepted by

the Vendor.

PART 2.A: MANDATORY REQUIREMENTS

The Tenderer must address all items detailed below and provide, in sequence, the

information and documentation as required.

Item Ref.

Mandatory Requirement Items Response (Yes / No)

Comments

A. 1. Provide statement indicating that the vendor’s system provides facility to construct and maintain portfolios as per investment policy and guidelines

A. 2. Provide a statement indicating that the vendor’s system provides facility to view real-time positions and cash for all portfolios

A. 3. Provide statement indicating that the vendor’s product can trade and process multiple asset classes (see appendix A)

A. 4. Provide a statement indicating that the vendor’s system has capability to model portfolio impacts of one or more stress factors: interest rate and FX shifts, credit spread changes, inflation shocks, yield curve changes etc

A. 5. Provide a statement that the vendor’s product automates the entire post-trade process: confirmation, trade matching, settlement, reconciliation, and accounting

A. 6. Provide statement indicating that the vendor’s product has

an automated interface to the SWIFTNet network to send

and receives settlement messages.

A. 7. Provide statement indicating that the Vendor’s product has capability to monitor compliance at every stage of the investment lifecycle: pre-trade, in-trade and post-trade

A. 8. Provide a statement indicating that the vendor product, at a minimum, can perform the following return attribution analysis on both a portfolio and aggregate basis: a. Excess return (curve change and carry)

b. Excess return (allocation vs. selection)

13

c. Groupings (credit ratings, sub-industry types, coupon,

etc.); and

d. Ability to incorporate derivative holdings in

performance and attribution calculations.

A. 9. Provide statement indicating that vendor’s system be installed / maintained on CBK’s own servers

14

PART 2.B: GENERAL QUALIFICATIONS & EXPERIENCE

The tenderer must address all items detailed below and provide, in sequence, the

information and documentation as required (referenced with the associated item

references). Evaluation Team members will independently evaluate and assign one score

for all responses to Section B— General Qualifications & Experience Items.

Item Ref.

General Qualifications & Experience Items

B. 1. Detail the name, e-mail address, mailing address, telephone number, and facsimile number of the person the Central Bank of Kenya should contact regarding the response.

B. 2. Describe your form of business (i.e., individual, sole proprietor, corporation, non-

profit corporation, partnership, limited liability company) and business location

(physical location or domicile).

B. 3. Briefly describe how long you have been providing the goods or services required

by this RFP.

B. 4. Provide information on your number of employees, client base (specify the

number of central banks who are part of your clients), and location of offices.

B. 5. Provide a statement of whether there have been any mergers, acquisitions, or

change of control of the Tenderer within the last ten (10) years. If so, include an

explanation providing relevant details.

B. 6. Provide a statement of whether the Tenderer or, to the Tenderer ‘s knowledge, any

of the Tenderer’s employees, agents, independent contractors, or subcontractors,

involved in the delivery of goods or performance of services on a contract

pursuant to this RFP, have been convicted of, pled guilty to, or pled nolo

contendere to any felony. If so, include an explanation providing relevant details.

B. 7. Provide a statement of whether, in the last ten (10) years, the Tenderer has filed (or

had filed against it) any bankruptcy or insolvency proceeding, whether voluntary

or involuntary, or undergone the appointment of a receiver, trustee, or assignee

for the benefit of creditors. If so, include an explanation providing relevant details.

B. 8. Provide a statement of whether there is any material, pending litigation against

the Tenderer that the Tenderer should reasonably believe could adversely affect

its ability to meet contract requirements pursuant to this RFP or is likely to have a

material adverse effect on the Tenderer ‘s financial condition. If such exists, list

each separately, explain the relevant details, and attach the opinion of counsel

addressing whether and to what extent it would impair the Tenderer’s

performance in a contract pursuant to this RFP.

15

B. 9. Provide a brief, descriptive statement detailing evidence of the Respondent’s

ability to deliver the goods or services sought under this RFP (e.g., prior

experience, training, certifications, resources, program and quality management

systems).

B. 10. Provide a personnel roster listing the names of key people who the Tenderer will

assign to meet the Tenderer’s requirements under this RFP. Follow the personnel

roster with a resume for each of the people listed. The resumes must detail the

individual’s title, education, current position with the Tenderer, and employment

history.

B. 11. Provide a statement of whether the Tenderer intends to use subcontractors to meet

the Tenderer ’s requirements of any contract awarded pursuant to this RFP, and if

so, detail:

a) the names of the subcontractors along with the contact person, mailing

address, telephone number, and e-mail address for each;

b) a description of the scope and portions of the goods each subcontractor

involved in the delivery of goods or performance of the services each

subcontractor will perform; and

c) a statement specifying that each proposed subcontractor has expressly

assented to being proposed as a subcontractor in the Respondent’s

response to this RFP.

B. 12. Provide a statement and any relevant details addressing whether the Tenderer is

any of the following:

a) is presently debarred, suspended, proposed for debarment, or voluntarily

excluded from covered transactions by any government or agency;

b) has within the past three (3) years, been convicted of, or had a civil

judgment rendered against the contracting party from commission of

fraud, or a criminal offence in connection with obtaining, attempting to

obtain, or performing a public (state, or local) transaction or grant under a

public transaction; violation of antitrust statutes or commission of

embezzlement, theft, forgery, bribery, falsification, or destruction of

records, making false statements, or receiving stolen property;

c) is presently indicted or otherwise criminally or civilly charged by a

government entity (federal, state, or local) with commission of any of the

offenses detailed above; and

d) has within a three (3) year period preceding the contract had one or more

public transactions (federal, state, or local) terminated for cause or default.

16

PART 2.C: TECHNICAL QUALIFICATIONS, EXPERIENCE & APPROACH.

The Vendor must address all items (below) and provide, in sequence, the information and

documentation as required (referenced with the associated item references). The

The evaluators will independently evaluate and score the response to each item. Each

evaluator will use the following whole number, raw point scale for scoring each item:

0 = little value 1 = poor 2 = fair 3 = satisfactory 4 = good 5 = excellent

Responding to the List of Requirements

Vendor must respond to each requirement contained within this tender document using the

following criteria. Vendor’s responses must be in the same order in which the questions

appear and must use the same numbering scheme as outlined below:

FP Fully Provided (Out-of-the-box), Solution currently includes this capability in its current general software release.

TP Third Party Software Required Third party solutions is required to deliver this capability

M Modification to existing software Minimal modification is required to provide the requirement

C Custom Development Required Custom development required for the requirement

NA Not Available Functionality is not available (Out of the box)

O Other Other

For any specifications to which the Vendor answers other than FP (Fully Provided),

Bidder must describe:

• Whether the CBK will incur any additional cost for the feature, function, product,

or service once it becomes available other than the cost of maintaining a valid

software maintenance agreement for the current modules/system proposed by the

Bidder as part of the initial installation (i.e. a new module, replacement or upgrade

to an existing module, new hardware required, etc.)

• If the feature, function product or service falls under the category as Not Available

(N), the Bidder may provide; (a) an explanation of how the specification might be

met using alternative methods within the system or (b) if it is available from a third

party partner. Either explanation must include availability dates and additional

costs, either direct or indirect.

17

Item Ref.

Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

C. 1. Portfolio Management 12

a) Does the system have capability to show positions and portfolio exposure by a classification of choice (i.e., country, asset class, currency, GICS sector, manager etc.)?

b) Does the system have a trade blotter functionality - record of each trade, status of each trade that transacted for a given period?

c) Can the system support at least four (4) levels of portfolio hierarchy i.e., Subportfolio, portfolio and tranche (portfolio groups)? Refer to the portfolio structure diagram ( page 6 )

d) Does the system have capability to: (i). Compare benchmark vs portfolio holdings?

(ii). Transfer of positions from one portfolio to another? (iii). Calculate unrealized/realized gains and losses. (iv). Mark to market of the securities and cash positions.

e) Does the system have capability to show amortization by position and aggregate by portfolio, or any other classification?

f) Does the system support portfolio-look-through (drilldown and aggregation)?

18

g) Does system have capability to show exposure by respective trade currencies and by the reporting currency?

C. 2. Performance Measurement and Attribution 10

a) Does the system have the capability to calculate performance for the asset classes specified in appendix A?

b) Do the performance calculations comply with the Global Investment Performance Standards (GIPS)?

c) Does the system have capability to show portfolio performance by a classification of choice (i.e., country, region, asset class, sub-asset class, credit ratings, currency, Global Industry Classification Standard (GICS) sector, manager

d) Is the performance calculation generated and stored during the daily end-of-day batch process, or generated in real-time?

e) Does the system have capability to calculate the following risk-adjusted performance measures: Sharpe ratio, Jensen Alpha, Treynor ratio, Beta (ex post), Information Ratio and Sortino Ratio?

f) Does the system support calculation of performance in both reporting (with FX) and trading currency?

19

g) Are the performance calculations created at the security level or account level and then rolled up to portfolio and/or group level?

h) Is the accounting data and performance data housed in one area or in separate areas? If it is housed in two different areas, how well do the two areas interface, and is there an automated reconciliation tool that the client can use to reconcile the two sets of data?

i) Does the system have capability to handle inter-portfolio transfers? Briefly describe the impact in relation to performance measurement?

j) If the client enters transactions from a prior accounting period, does it have an adverse impact on the performance?

k) Is your system capable of calculating performance on a custom / blended benchmark?

l) Please describe your system’s capability to calculate attribution daily, monthly, quarterly, yearly, and cumulatively between any two dates including any system limitations and/or issues.

20

m) Does the system support fixed-income portfolio performance attribution based on Campisi and Brinson models for the following security types listed below? (i). Futures (Bonds and Interest Rate) (ii). Vanilla Bonds (iii). Money Market Instruments (iv). Forwards (v). Swaps (vi). Callable corporate and agency bonds (vii). U.S. ABS and CMBS (viii). Agency MBS and agency CMO

n) Does system have capability to show attribution results graphically?

o) What procedures do you use to back test and/or audit the performance of the product you propose?

C. 3. Scenario Analysis & Stress Testing 6

a) Does the system have capability to perform what-if analysis to assess impact of the intended trade(s) on the risk, performance, compliance, etc. of the portfolio in absolute terms and relative to benchmarks / targets?

b) Does the system have capability to do stress testing (i.e., how the portfolio would look through a 2008 crisis or other historical crises, a 20% drop or interest rate spike of 200 basis points) along with any system limitations and/or issues.

21

c) Does the system have capability to setup custom scenarios and generate impact of these scenarios for both simulated and actual portfolio?

d) Does the system have capability to model portfolio impacts of one or more stress factors: interest rate and FX shifts, credit spread changes, inflation shocks, yield curve changes etc.

C. 4. Trading 10

a) Does the system have capability to interface with FIX providers / Trading Platforms (Bloomberg, Refinitiv) and counterparties (brokers)?

b) Does the system have capability to automatically receive and process new trades, amendment, and cancellation messages from FIX providers / trading platforms such as Bloomberg, Refinitiv(Reuters) etc.?

c) Does the system have facility for manual trade entry and upload from files for new trades?

d) Does the system have capability to show limit balances for portfolios, counterparties, securities, and other trading activities?

e) Does the system have capability to customize a trade workflow by asset class?

22

f) Does the system support trade enrichment - attachment to a trade of relevant information (bank accounts, SSIs, Counterparties, etc.) necessary to complete trade workflow?

g) Does the system support modification of trades before and after settlement, such as amend, replace or cancellation, for all trade types listed in appendix A, by authorized user?

h) Does the system provide for early termination of deposits (money market deposit placements)?

i) When an early termination of a money market deposit (via change of maturity date) is undertaken, Is the performance and accounting recalculated from trade date?

j) Does the system generate modification and cancellation messages (SWIFT or FIX) for all trade types (as provided in Appendix A) according to international requirements?

k) Does the system support cash transactions such as charges, payments, commissions, interest adjustments, cash injections/ withdrawals?

l) Does the system support rollover (principal only, partial principal, and interest only) of money market deposits?

m) Does the system support the following market conventions for day count (30/360, 30 / 365, actual / 360, actual / 365, and actual / actual)

23

n) Does the system support the following holiday conventions - Actual, following business day, modified following business day, Previous business day, modified previous business day, and Modified Rolling business day etc. and un-adjusted and adjusted?

C. 5. Cashflow Management 7

a) Does the system have an inbuilt a cashflow and/or liquidity management module?

b) Does the system have functionality to show investible cash by portfolio and bank account?

c) Does the system have capability to capture non-investment related cashflows (external cashflows) manually and via an automated interface from other internal systems (Core Banking System etc..), and update accounting?

d) Does the system have capability to upload a schedule of payments / cashflows from file, and produce forecasts by combing these payments and cashflows from investments to produce holistic cashflow forecasts / projections?

e) Does the system have the capability to capture / record special cashflows to be used only in generating reports with no impact on both accounting and portfolio performance?

f) Does the system have capability to forecast future cash positions based on transactions and events that impact positions?

24

g) Does the system have capability to produce cashflow forecasts based on user defined buckets (weekly, quarterly etc)?

h) Does the system have capability to record non-investment related cash flows? e.g., penalties, cash injections, fees, Government Payments?

C. 6. Benchmark Maintenance 7

a) Does the system have capability to define benchmarks at the lowest level of the portfolio hierarchy (subportfolio) and then aggregate up to the top-level (tranche) for single or multiple indices?

b) Does the system support the upload of index compositions and returns from file or directly import from Bloomberg or other platforms?

c) Does the system allow for multiple portfolios to be benchmarked to the same index?

d) Does the system have the facility to change the assigned benchmark for a particular portfolio without impacting the historical performance of the portfolio?

e) Does the system support the definition and maintenance of custom (modified composition of existing benchmark) and blended / composite (benchmark with multiple asset classes) benchmarks?

25

f) Does the system support Benchmark scaling when there is capital injection/withdrawal?

g) Can benchmarks be rebalanced to fixed weights or based on market value?

h) Does the system have capability combine internal and external manager investment positions for risk, compliance, accounting, and performance reporting purposes?

C. 7. Pricing and Valuation 7

a) Does the system have capability to maintain a pricing hierarchy (i.e., levels, sources, validation, etc. )

b) Does the system have capability to download market data (FX rates, security prices, yield curves etc.) from pricing sources (e.g. Bloomberg, Reuters (Refinitiv), index providers, custodian)?

c) Does the system have capability to set security price change tolerance limits and have drill-down capabilities to show source of the variations?

d) Does the system have consistent pricing between the accounting and performance measurement data?

e) Does the system provide facility for user to specify what prices to be used in valuation? i.e. closing, mid, opening prices etc

26

f) Does the system have the capability to value all instruments in Appendix A

g) Does the system have the ability to:

(i). Flag stale pricing, zero pricing, and price movements based on a tolerance level set by the client?

(ii). Price a security from yield curve data?

C. 8. Compliance Monitoring 7

a) Does the system have an inbuilt compliance monitoring tool / engine?

b) Are the compliance rules input by the user or by the vendor? If input by the vendor, how are the rules updated when investment policy specifications changes?

c) Does the system have capability to define compliance rules based on specific attributes of the security master (i.e. security type, sector, country)?

d) Does the system have capability to set limits at asset type, issuer, region, country of risk, counterparty, portfolio, tranche (portfolio group) etc in nominal value or percentage of portfolio?

27

e) Does the system possess capability to set up and trigger early warnings to assigned users for potential compliance breaches and to assign severity levels to those warnings?

f) Can rules be tested before being applied to a portfolio or portfolio groups?

g) When a rule is tested, does the system display all of the exceptions for the tested rule based on the most recent data available in the system?

h) Can compliance rules be run on a single portfolio or portfolio groups?

i) Does the system have capability to define effective from/start and effective to/end dates for all compliance rules?

j) Does the system have capability to store a record of all compliance violations and compliance overrides for audit purposes?

k) Describe the system’s rule approval workflow process. When a new rule is created or an existing rule is modified, does the system notify users of errors (if any) in the newly created/updated rule?

C. 9. Accounting 12

a) Does the system have inbuilt accounting module that has capacity to support setting up and maintaining of chart of accounts, transaction codes and products?

28

b) Does the system have capability to generate accounting entries all trade lifecycle events (trade, settlement, coupon accrual and payment, interest accrual, valuation, and maturity etc.) for assets types defined in Appendix A

c) Does the system support mark to market for all positions (cash and securities) for revaluation purposes

d) Does the system support manual posting, adjustments, and reversals?

e) Does the system support the following accounting standard or conventions: (i). effective and straight-line interest rate method of

amortizations? (ii). trade and settlement date accounting

(iii). support flexible settlement dates (T+0,T+2, T+5, etc.) (iv). support FIFO, LIFO and AVCO methods of valuing

securities? (v). accrual conventions - Last not first (LNF) and first not

last (FNL)?

f) Does the system support IFRS 9

g) Does the system have capability to capture multi-currency transactions and to translate to local currency using daily FX rates as per IAS 21?

h) Does the system support inter-portfolio cash transfer (funding)?

29

i) Does the system have the capability of supporting backdated accounting adjustments and related reports?

j) Does the system have capability to set the number of days (or period) for when the last accounting period remains open after financial year-end for posting adjustments?

k) Does your system maintain audit trails of all changes to the chart of accounts, reporting templates, amortization methods, day count conversion, accounting dates, pricing methods, and any other administrative changes that would affect the calculation or reporting of investment transactions?

l) Are there any manual processes within your accounting system?

m) Does your system have the ability to view positions At cost, with unrealized gain/ loss, market value, accrued income and NAV?

n) Does the system have capability to accept aggregate accounting entries (NAV) from external fund managers and/or global custodian for accounting purposes?

o) Does your system have the capability to generate month-end journal entries as well as other user-defined reporting periods?

p) Does the system have capability to interface with General Ledger (Oracle GL)?

C. 10. Settlement 6

30

a) Does the system support generation and processing of standard SWIFT messages outlined in Appendix B

b) Does the system have capability to match outgoing with incoming trade confirmation messages?

c) Does the system have capability to generate exception reports showing which fields in both outgoing and incoming confirmation messages are not matching?

d) If automatic matching fails, does the system provide for manual matching such as attaching email confirmation to a trade?

e) Does the system have capability of showing status of trades – settled trades and unsettled trades?

f) Does the system have a facility for setup and maintenance of Standing Settlement Instructions (SSI) without any limitations?

g) Does the system have a Post-Trade Settlement blotter to view and monitor trades in settlement and identify settlement fails

C. 11. Reconciliation 6

a) Does your system support automatic matching of transactions between the Sub ledger and Nostro accounts?

b) If (a) above fails, does your system support manual matching of transactions for reconciliation purposes.

31

c) Does the reconciliation module allow for creation and maintenance of custom reconciliation rules?

d) Does the system have capability to reconcile custodian positions holding (MT 535) to the internal positions for securities and cash balances?

e) Does the system retain historical records for reconciliation purposes?

f) Does your system provide a three-way reconciliation function between accounting, custody, and master record keeper?

C. 12. Reporting 10

a) Does the system have capability to compute and run

reports for any user-defined reporting period for all types of reporting

b) Does the system have capability to drill-down to position

level for all types of reporting

c) Does the system produce dynamic customizable

reporting? If so, is it easy for an end-user to create a custom report or, does an IT Developer have to create the reporting?

d) Does the system allow the end-user the ability to export

files in formats that can be uploaded to other systems?

32

e) Does the system provide multiple reporting formats such

as: xls, pdf, csv, txt, and mobile formats

f) Please provide evidence that report delivery is flexible

and deliverable through multiple channels (i.e., e-mail, print, file drop, and on-schedule’s). Please describe any limitations with the reporting.

g) Does the system provide for report-writer tool with user-

friendly capabilities of parameterizing generating reports.

Total Score 100

Total Raw Weighted Score: (sum of Raw Weighted Scores above)

𝑻𝒐𝒕𝒂𝒍 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆

𝑴𝒂𝒙𝒊𝒎𝒖𝒎 𝑷𝒐𝒔𝒔𝒊𝒃𝒍𝒆 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆 𝑿 𝟔𝟎 = 𝑺𝒄𝒐𝒓𝒆

Section B: Information Technology Requirements

PART 1 – STATEMENT OF WORK

Introduction

The section contains the technology requirements for the Portfolio Management and Trade Processing System (PMTP) which will be run by the Central Bank of Kenya (CBK). The CBK wishes to ensure that the PMTP system provides a leading edge to the Central Bank. The main purpose of this document is to provide a clear understanding of the meaning and scope of the information technology (IT) requirements. The IT requirements encompass all basic functionalities of a standard PMTP, with mapping to the existing IT environment of the CBK.

Project Scope

The scope of the project is for the supply and implementation, of system and their related linkages, and proposals are invited from qualified companies for:

a) Supply, installation and configuration of PMTP application software package

on the existing environment in Central Bank of Kenya;

b) Integration/linkage of the PMTP with other systems as specified in the

Appendix B

c) The complete range of required services including at least the following:

(i). Project management;

(ii). Business-level advice and consultancy to CBK concerning the

establishment and operation of the system;

(iii). Customizations/parameterization of software package(s);

(iv). Installation of all software items;

(v). Implementation of all required interfaces;

(vi). Acceptance testing;

(vii). Training;

(viii). Documentation;

(ix). Support and Helpdesk;

(x). Migration of Data

(xi). Support during Going-Live

(xii). Maintenance and on-going support.

General Technical Requirements

a) Language Support: The system must provide support for English.

b) Specifically, all display technologies and software must support the ISO 8859-15,

ISO 8859-6 and Windows-1256 (if appropriate) character sets

34

Specific Information Technology Requirements

1 General Requirements

As applicable, the system should: a) The system should support three (3) site deployment (primary, backup and Data

recovery site) for high availability.

b) Have a high level of usability with a common “look and feel” achieved through

a standard graphical user interface (GUI);

c) Comply with industry standard conventions and interfaces which allow the

system to be interfaced easily with other systems, and/or expanded by either

functional module or capacity.

d) Provide full audit trails for all activities within the system, including system

accesses and messages sent and received.

e) Have high levels of trustworthiness with particular emphasis on data integrity

and security, particularly preventing unauthorized access and assuring 100%

data accuracy; support for multifactor authentication is preferred.

f) Possess high levels of service availability which will be assured through

demonstration, rigorous testing and a robust Service Level Agreement.

g) The system should be designed in 3-tier application architecture at minimum

(Database, Business layer and presentation layer)

h) The system should be designed in a modular structure, the bidder is required to

provide a list of available modules of the system to CBK, with explanation of

recommended modules, and to other modules that are not part of the proposal.

Integrity

The system should provide:

a) Financial integrity checks that ensure that all transactions are processed and are

reconcilable at the end of each business day.

b) Message processing integrity checks to ensure that the total nominal value of all

instruments in all recorded portfolios is matched and reconciles with the control

totals for all issues registered.

c) Consistent and regular reporting for financial processing, security logs,

calculated settlement positions, gross and net settlement values, batch and file

numbers processed etc. which can be reported to prove system integrity and

complete system-wide reconciliation.

d) Security of messages with a high level of message authentication, data integrity,

and confidentiality.

e) Guarantee of no data loss either in transmission or after a failure; system should

be able to recover gracefully in the event of unplanned/unforeseen outages

35

Security, Authentication, Access, and Audit

Security

a) Exchange of data between PMTP and other systems inside CBK should be hashed

and / or encrypted.

b) The System must be based on accepted, widely used and recognized technical and

security solutions.

c) The System’s databases must be protected against undesired changes.

d) Users and Administrators must not be able to change the transactions history in

the System

Operating System (OS) and Platform Configurations

a) All system components (OS, Database, applications, network devices) will be

hardened according to specific Central Bank of Kenya cyber security guidelines

as well as specifications provided by the product manufacturer.

b) All applications placed in the DMZ (or other equivalent secure zone) must be

configured to run in a restricted server environment (such as chroot for UNIX)

c) All software (OS, application, database) packages and modules not required for

this system must be deactivated and removed (where possible) from the system

d) The vendor must provide a list of all the minimum required software (OS,

application, databases) and service ports required for the system to function.

e) The most recent version of the software in use, with the latest security patches /

service packs must be applied across all components.

f) The supplier/vendor must have a mechanism to inform Central bank of Kenya

regularly about relevant security updates and patches that may affect smooth and

secure operations of the system.

System Security Architecture

1.1.1 System Design & Documentation

Detailed security design documentation of the system must be provided by vendor

covering, as a minimum, descriptions of:

a) system architecture

b) interfaces

c) all installed and uninstalled/disabled components or application modules

d) supplier related Operations & Maintenance Procedures (where relevant)

e) remote maintenance and support procedures and mechanisms, if any

f) all implemented and available authentication and authorization mechanisms

g) exhaustive list of all security updates and modification

h) controls against manipulation, misuse or disclosure of personal or sensitive data

36

i) password parameters and how they can be configured

j) user role matrix and its configuration

1.1.2 System Security

Detailed documentation must be provided with regard to security mechanisms to

protect connections to public networks.

Authentication

a) CBK expects multi-factor authentication to be used for user management. It is

assumed that this will be based on either use of hardware or software tokens (or

equivalent), each containing a unique digital certificate identifying its owner.

Bidder should provide full details of the proposed approach, including the

hardware and software required and the way in which the PMTP implements

multi-factor authentication.

b) The System must only allow access to identified, authenticated, and authorized

users.

c) Authentication data must not be shown, stored, transported, or recorded in clear

text.

d) The strength of passwords used with operation and maintenance accounts

system must be enforced as per leading international standards. This system

capability must also be configurable to meet changing password policy control

requirements (for example, but not limited to, a change in the password length &

complexity policy requirement).

e) The system must provide a configurable mechanism:

• to detect and block simple passwords (e.g. 123456, abcdef, identical username

& password, etc.)

• check that the password does not contain more than two successive identical

characters

• to allow only the administrator to reset the passwords

• Not to allow hard-coded passwords (i.e. no service/application user

passwords displayed in source code)

f) The system must provide a password change confirmation procedure

g) The System must be able to limit (and report on) the number of unsuccessful

logon attempts through a “lockout” mechanism

h) The system must provide the capability to detect (and report on) multiple logons

from the same user ID and restrict users to one session at a time

i) The system must provide the capability to lock/deactivate/suspend or delete

certain accounts/user IDs either manually or automatically

37

j) The system must provide the capability to print a list of all possible access

privileges, a specific user's access privileges and comparison tables between

different user IDs

User Access

a) System access, named for this document as an Access Control System (ACS),

must be based on a documented security and system access model and

architecture, including a policy for interacting with different security and access

models at operating system and database level.

b) The ACS must be based on the “least privilege principle”.

c) The ACS must have a role-based access model.

d) The ACS must be able to set privileges and access rights to objects and subjects.

e) The ACS must categorize users into groups and define access levels on both user

level and group level.

f) CBK must be able to use the ACS in a corresponding manner to

• register groups for access rights for different categories of users of the System

• register, cancel and update access rights

g) For each registration in the ACS, it must be possible to require that the duality

principle is used when registering data (the “four eyes" or “six eyes” principle) if

this is prescribed in the access rights profiles for the users.

h) This must be done in such a way that verification of the registration will be

required by another user or that full registration will require two different users.

i) The ACS must be able to manage the following types of privileges:

• Read-only rights

• Read/write rights

• Administrator rights (the right to assign access rights)

• Master rights (complete access rights)

• No privileges permitted

j) The ACS must enforce the generation and use of strong two factor (incl. support

for biometric) authentication/high quality passwords and PINs

k) All remote operation and maintenance tasks must only be performed via

encrypted protocols (e.g. ssh, ssl) and unencrypted accesses deactivated

l) There should be a possibility of the ACS to interface to Directory Services e.g.

Active Directory for user authentication

Audit Trail

a) A log must be kept of all logon attempts on all Systems delivered by the bidder.

b) The System must maintain detailed audit trails to enable investigation of:

• attempted frauds

• disputed transactions

• suspicions of errors

38

• suspicions of fraud

• other abuses or attempted abuses of the System

• communication transmission attempts, whether successful or not

c) The System must maintain:

• a log of all errors occurring in the system including preparation of a message

• access control over the audit records

d) The system should provide audit trails on all software layers (OS, database,

application) allowing a tight control of accessed functions and information

e) The security log files & audit trail must be protected against manual modification

even by the super user and methods applied documented.

f) The system must have a configurable automated process implemented to send log

files or defined logged events to a security log server.

g) The system must be able to interface with other third-party Enterprise Log

Management System, e.g. SIEM for centralized logging

Operational requirements

General Requirements

As applicable, the system should:

a) Allow for easy customization through on-screen parameters to accommodate

new, changed or modified rules that will govern various functions e.g. create a

new message type, create a new instrument type, etc.;

b) Allow authorized personnel to change the business process flow through the

setting of parameters in process control tables.

c) Provide online access to and reporting of historical records – covering a period

of at least seven (7) years plus the current year – without compromising response

times;

d) Provide online, context sensitive help for all user and operator functions.

e) Enable automation of daily processing including initiating links to directly

interfaced systems with appropriate security procedures and exception and

summary control reports;

f) Be operationally resilient, with high levels of local recovery supported by an

appropriately configured High-availability and Disaster Recovery (DR)

installation and a smooth cut-over between the primary, secondary and DR sites,

and back again to the primary site when service is recovered.

System availability

a) The System must be accessible at least 20 hours a day, every day of the

month except for about four days for maintenance (planned shutdown,

non-working days for maintenance).

39

b) The System must have a Service Availability of 99.95% during the hours

when the System is open.

System capacity

a) Despite the current numbers shown in the table 1, system capacity is expected to

be as mentioned in the text after the table.

Table 1: PMTP TRANSACTIONS AND VOLUMES.

Transaction Type Number Per month

1 Bond Trades 600

2 FX Trades 300

3 Payments (includes external cashflows) 1,000

4 Money Market Placements 300

5 SWIFT Messages 10,000

b) The System must have the capacity at least:

(i). to process and settle at least 3,000 transactions a day, and at the same time

allow use of the System’s other functions.

(ii). to have 50 users logged on and making enquiries through the System

concurrently.

(iii). be scalable to handle a growth rate of 50% per annum with scalability for 8

years.

c) Bidder must provide examples of capacities of the provided Systems in other

live environments, with scales higher than specified here, indicating the

hardware size.

Response Times

The actual response time is measured from the point where the transaction is received

by the System. The following list of requirements must be met:

a) For 95% of transactions and simple queries in real time, the response time must not

exceed 1 second during the peak hour.

b) For 95% of complex queries in real time, the response time must not exceed 2

seconds during the peak hour.

c) The maximum response time for system log-in is 7 seconds. (Response means full

login and display of next screen)

d) The maximum response time for message arrival acknowledgement is 5 seconds.

40

Parameter Management

a) It must be possible to make system parameters changes, like Date changes, while

a System is open and these changes should have immediate effect.

b) Please list what system parameters can be changed or updated while a system is

open. And what changes take effect on next business day.

Infrastructure requirements

Environments

The PMTP will run on CBK equipment. As a mandatory requirement, the bidder will be required to implement the system in three sites, a primary processing site (data centre) at CBK’s head office, at high availability site that is not far from head office, and in a business recovery centre (DRC):

a) The equipment at the primary site is designed to have comprehensive resilience

features to ensure that, in normal operation, a failure of any single element such as

a server or blade (for example) will have no effect on the operation of the system.

b) Under normal operation the primary site will host the live version of the system.

c) The live system will be installed on servers at the three (3) sites. Responses must

contain the Bidders response as to how all sites will be installed and coupled to

enable the highest level of availability.

d) Responses must also contain details of how suitable failover procedures will be

developed and tested to allow for situations of multiple failures or complete

unavailability of one site.

e) A reference environment must be available at all times to carry copy of the live

environment to be refreshed daily for troubleshooting. Before going Live, this

environment will be considered a ‘pre-production’ version of the system that must

be installed at the primary site for use in parallel running in the period between

user acceptance and load testing and cut-over to live operation.

f) A training environment must be available at all times to allow for training of CBK

staff and new users.

g) A user acceptance testing environment must be available at all times to allow for

testing of system features, integration, performance, planned system changes, and

participant interface testing.

h) Bidders must describe how they will accomplish the following main tasks:

- Management of changes involving operating systems, system software,

middleware, databases, and application software, covering all participants

where applicable;

- Operation of the above system components;

- Testing of parameter-level changes made by the system operator.

41

- Testing of system performance.

i) Bidder must give full details of all hardware, system software, middleware and

any other products and equipment necessary to run the system.

Infrastructure – Hardware & Software

a) The following are current CBK hardware and software configurations:

• The CBK installed server hardware is IBM POWER9 Server

• The CBK installed server operating system is AIX 8.1

• The CBK middleware used to communicate between existing systems /

applications is IBM WebSphere MQ (JMS).

• Application Server IBM WebSphere Application Server (WAS)

• The CBK installed database servers is Oracle 12c and above.

b) Preferably, the system should be able to operate within the above configuration of

hardware, software, and middleware.

Data Retention Requirements

Backing up data standard is:

a) Full backups will be performed over weekends

b) Incremental (only changes) backups must be performed during each business

day

c) 25 business day cycles of the daily backups must be kept (each cycle to keep the

pre and post backup of the database)

d) The System must not compromise the integrity or security of confidential stored

information in any way.

e) The Bidder must provide a definition of the back-up plan according to the

following four types of data:

o System (Operating System and Applications) data

o User Data (the data specific to each part of the system that is susceptible to

being modified frequently)

o Confidential Information (relating to the architecture of the network

belonging to Central Bank of Kenya or its stakeholders)

o Log (the set of traces on what is made on/from each part of the system).

f) All backup actions must be traceable

g) Data must be retained in the System for at least 15 years. 10 years available online

and offline as backups for 15 years

42

h) When media used by the system is to be disposed of or reused, necessary

measures must be taken to prevent any subsequent retrieval of personal data and

other information stored.

High availability requirements

High Availability

Please indicate how these mandatory requirements will be met:

a) All production Systems are deployed as highly available and in redundant pairs,

in high availability site, as well as in a disaster recovery environment.

b) Replication on three active sites with real-time synchronization of application

and database. Replication of primary, secondary and disaster recovery is

mandatory for any system installed in the bank

c) Please indicate if your System can be installed and operate with this

configuration

d) There must be no loss of trades/orders/data when failing over to a highly

available environment.

e) In the event of a system failure at the Live Site, the System must re-start from the

last valid transaction without duplication of any transactions or loss of any

transactions.

f) The System components must support Storage Area Networks (SAN), or similar

and not require local storage with locally attached hard drive(s).

g) High availability must be ensured on all System components

h) The System must ensure “no single loss” of a message due to failure of any

component of the System.

Disaster recovery

Please indicate how these mandatory requirements will be met:

a) The Bidder must provide a documented Business Continuity Plan for the

service.

b) The Bidder must provide a detailed scenario of fail over between Systems in

the production site; and between production, high availability, and DRC sites.

c) The System must be able to be run at one site with production and backup

servers and with automatic fail-over within the site, while having a high

availability site with failover to this other site.

d) The Bidder must define a down time for the fail over to the backup System

within the production site of 0 to 10 minutes.

43

e) The Bidder must define a max time required to fail back the service from the

high availability site to the production site of 30 mins or less (during time

assigned for maintenance)

f) Hot standby or disaster recovery site can be up to 300 KM far from the active

site.

System Interfaces

All interfaces should meet the bank’s security standards, the System will have the

following interfaces. More details on interfaces provided in Appendix C.

Direct Access to the system

The System’s users must be able to enter data to the system by the following ways:

• opening a pre-defined form for data entry – controlled data entry

• uploading a data file in a pre-defined format

Any interchange of data between the PMTP and other systems, must be performed

through the following methods:

• A SWIFT message format: The system must support SWIFT standard MTnnn

formats and other which correspond to the ISO20022

• An XML message in ISO20022 format

• A file in FIX (Financial Information Exchange), XSL, or flat file (character

delimited format).

• As an option, the system should provide for open standards architecture by

allowing exchange through web service, API, JMS, open for integration

• Bidder should provide information on all message standards that their systems

follow, particularly their forward development plans in this area.

• Bidder should work to fulfill integration with existing trading and messaging

platforms: SWIFT, Bloomberg, Refinitiv (Reuters)

Any report extracted from the system must be produced in, at least, the following

formats:

• XSL, XML, or comma delimited format

• PDF format

• XLS or XLXS

Core Banking System (Currently Temenos T24)

It is expected that there will be interface between PMTP and Core Banking System

(CBS), as government forex payments will originate from the CBS where the

government local currency accounts are domiciled.

44

Investment Risk Management System (IRMS)

It is expected that there will be interface between PMTP and the Investment Risk

Management System (IRMS). The IRMS will download positions, cash balances and

market data from the PMTP.

SWIFT:

Settlement / Custody Messages exchanged between PMTP and Counterparties and

Global Custodian shall be in the form of SWIFT messages. While communicating to

SWIFT, the system will observe all security protocols applied by SWIFT including

authentication and encryption.

CBK has a direct connection to SWIFT. Connection to SWIFT is via the IBM

WebSphere MQ middleware.

Bloomberg

The Bloomberg platform is used for execution of Fixed Income, FX and Money Market

(deposit placements) transactions. Market data – Security prices, CDS, security

definitions, FX rates – is also downloaded from Bloomberg. The new PMTP system

should therefore have capability to interface to Bloomberg for the following:

a) Fixed Income Trades,

b) FX Trades

c) Money Market Trades (Deposit Placements

d) Security definitions

e) Security Prices

Refinitiv (formerly Reuters)

The Refinitiv platform is used for execution of FX and Money Market (deposit

placements) transactions. Foreign Exchange rate data is also extracted from the

platform. The new PMTP system should therefore have capability to interface to

Refinitiv for FX and Money Market transactions, and market data.

Global Custodian

The settlement and custody transactions with the Global Custodian will be vide the

SWIFT Message platform.

The Global Custodian sends periodic performance / risk, valuation, and Balance Sheet

& P&L for externally managed funds. The Balance Sheet and P&L of externally

managed funds is uploaded to the General Ledger at the end of the month.

Oracle GL

The sub-ledger in the PMTP will be integrated to the main General Ledger in Oracle

GL system. This will be through defined flat file upload to the Oracle GL

45

Index Providers – Intercontinental Exchange

Currently, at the end of each day, the index (G1QA) composition file is received via

email from Intercontinental Exchange (ICE). The security prices are extracted from

this file and uploaded to the system. At the end of the month, the composition is

uploaded to the system for portfolio rebalancing and simulation.

Report Generation

In order to generate customized reports, the system must either

• provide a report generation module, where system admin, will be able to develop

customized reports bringing data from multiple areas in the system and putting

them together, including customizing page format, developing SQL queries,

formatting the output results in a customized way, and inserting static

information, graphs and other tools. This option is a preferred option, Or

• Allowing an external report generation system from accessing the PMTP system

directly, including access to read data from the system. This will imply the bidder

will provide the PMTP data structure in the form of tables or views.

Data Warehouse and Business Intelligence Platform (DWH):

a) At the end of the business day, a selective set of data (i.e. positions, account balances)

will be transferred to the CBK data warehouse.

b) The process of generating daily reports to be sent to DWH must be automatic, in a

pre-defined file format.

Microsoft Active Directory

The PMTP systems should have capability to interface to Microsoft Active Directory

for user creation and authentication. Role assignment should be provided for in PMTP

46

Implementation and Support This part specifies the service requirements that must be satisfied to ensure successful

implementation of the entire system.

1 Business Level Consulting

CBK expects that the Bidder must provide a high level of business consulting and

advice – in addition to technical support – throughout the project period, drawing on

its international experience in financial market infrastructure implementation.

Bidders are required to provide documentation including system rules, certificate

policy, e-token management procedures, user acceptance tests scenario, operating

procedures and charging policies.

Project Plan and Implementation Schedule

Project Plan

Bidder must provide Preliminary Project Plans showing how they intend to carry out

all aspects of the project. Project plans must address at least the following subjects:

a) Project organization and management plan (covering both the Bidder’s team and

expectations of the Purchaser’s involvement);

b) The Bidder’s proposed project team.

c) Phases of the project execution showing sequencing, activities and deliverables

for each phase;

d) Task, time and resource schedules showing the estimated duration, sequence,

resource allocation and interrelationship of all key activities and resources needed

to complete the Contract, and including

e) a project plan in Gantt chart format;

f) System requirements analysis, design, development and delivery;

g) A detailed installation plan – site preparation, hardware installation and testing;

h) System integration plan;

i) Training plan;

j) Change management plan;

k) Documentation plan;

l) Change management plan;

m) Acceptance testing plan;

n) Warranty and post-warranty service plan;

o) Data Migration Plan

47

Implementation Schedule

CBK expects the project implementation to comprise of at least the activities listed

below. The project will follow Agile Methodology in its implementation.

Identify the Project Scope

a) Business analysis (scoping study) to establish and document the detailed

functional, technical and integration requirements of the system.

b) Customization and integration of the application software to meet the detailed

requirements documented as described in both Business and IT Requirements;

c) Installation, configuration, testing and commissioning of the technical

components (hardware and software) of the system, including integration with

the existing ICT environment as necessary;

d) Installation and testing of the application software, and third party software in all

in four (4) environments, including Development (DEV), Test (TST), Production

(PRD) and Disaster Recovery (DR):

e) Implementation of all required system interfaces (refer to Appendix A);

f) Training – includes business and technical training.;

g) User Acceptance Testing (UAT);

h) Pilot operation (parallel running).

i) Migration of data from old environments to PMTP

j) Go Live.

k) Post-Implementation Maintenance and Support

Bidder should include any additional activities that they feel are required.

Bidder’s Project Team

a) The Bidder must describe the competences, roles and responsibilities of their

proposed team members, including resume for all proposed team members.

b) To ensure maximum knowledge transfer, the Bidder’s project team must be

structured to work with counterparts within CBK, and Bidder must therefore

show their expectations of CBK’s team structure and management, together

with roles and responsibilities.

c) The Bidder’s assigned project staff that should not change during the project

and bidder should describe how they will ensure that the resources working

on the project will continue to be available throughout the project. If there

should be any changes in resources, bidders should describe the process for

48

identifying contingency resources. Replacement of the key personnel will

require prior written consent from CBK.

d) A detailed staff deployment schedule must also be provided showing the

planned engagement in person/days of each team member at each stage of the

project, both on-site in Kenya, offsite and offshore location(s).

The project team must include key specialists and alternates in at least the following areas: a. Project Management;

b. Business Experts (PMTP);

c. Systems Integration

d. Change Management

e. Training

f. Application testing

Each key specialist must have at least ten years of relevant experience, with the

last five years in his/her specialist area, and at least three years of industry

experience in a team leader position.

Project Management

The following section give CBK’s expectations as regards overall project

management. Bidder are invited to comment on them and to propose any variations

or modifications as they see fit.

Steering Committee

a) CBK will appoint an internal steering committee which will have oversight of

the project and will have final responsibility for all aspects. The steering

committee will liaise as required with the responsible implementation teams or

staffs.

b) CBK’s project manager will act as secretary to the steering committee.

c) The steering committee will meet regularly during the project to consider the

minutes of the previous progress meeting, review progress and approve any

actions proposed by the project managers.

d) Both project managers must attend steering committee meetings.

Project Managers

CBK and the Bidder must each appoint a project manager who will have overall

responsibility for ensuring the successful and full discharge of their respective

parties’ obligations under the contract. To this end the two project managers must

work closely together at all stages of the contract.

49

Progress Monitoring

Throughout the project execution, the Bidder’s project manager must submit to

CBK’s project manager a weekly progress report covering:

a) results accomplished during the prior period;

b) cumulative deviations to date from schedule of progress milestones as

specified in the

c) Agreed and Finalized Project Plan;

d) corrective actions to be taken to return to planned schedule of progress

and/or proposed revisions to planned schedule;

e) other issues and outstanding problems and proposed actions to be taken to

resolve them;

f) resources that the Bidder expects to be provided by the Purchaser and/or

actions to be taken by the Purchaser in the next reporting period;

g) other issues or potential problems the Bidder foresees that could have an

impact on project progress and/or effectiveness;

h) (as applicable) training participant test results;

i) log of service calls and problem resolutions during the preceding month.

The two project managers must hold regular formal progress meetings at a frequency

to be agreed, but no less than monthly. These meetings will be used to consider

progress to date (including the Bidder’s monthly progress reports), agree actions to

be taken to resolve problems, and update the project plan as necessary.

The project managers must invite other project team members to take part in the

progress meetings as necessary.

Written minutes of all meetings and agreed actions must be taken by CBK’s project

manager and circulated to all affected parties as applicable, including the steering

committee.

User Group Meetings

The membership of this Working Group comprises representatives of all involved

CBK departments. CBK’s project manager will convene regular meetings of the

Working Group, at which the two project managers will report on progress and

consult on any project aspects requiring user involvement.

CBK Consultancy Firm

CBK may appoint a specialized consultancy firm to support CBK in different aspects

of the PMTP implementation, including business aspects, legal aspects, and others.

50

CBK consultancy firm will act as a CBK staff, and It is expected that the bidder will

provide full support to the operation of the firm.

Testing and Acceptance

The full system must not be finally accepted (i.e. achieve Operational Acceptance)

until all functionality has been fully tested and shown to be working correctly at all

locations, including all users, and with full integration of all systems defined in the

SOW.

General

The installation and testing process must demonstrate (for all system components):

a. Ease of installation and system start up;

b. Operation of the system platform;

c. Operation and management of the systems by both business and technical teams;

d. Reliable and efficient automated communications interfaces;

e. High reliability and fast recovery in case of failures;

f. Ability to handle expected and peak workloads for a minimum period of five years’ after

g. Operational Acceptance;

h. Clear and effective documentation and other support materials;

i. Effective education and training;

j. Effective organizational arrangements for full scale operation;

k. Effective support organization;

l. Effective problem reporting, tracking and resolution procedures.

Acceptance Testing

a) Successful completion of the contract must be attained through a series of formal

acceptance tests performed on all aspects of both systems. Payment will be

directly related to successful completion of agreed milestones.

b) The acceptance tests will demonstrate that the Bidder has met each requirement

specified and agreed in the contract and has delivered all required reports and

documentation and an effective operational system.

c) Each step of the acceptance tests must be fully documented and signed-off by CBK

to signify acceptance of each element.

Sequence of User Acceptance Tests (UAT)

a. Initial acceptance tests must be performed using the system installed at the

primary site at CBK. These tests will confirm general functioning of each element

of the entire system.

b. Functional acceptance tests must be conducted across the fully installed systems

in both the primary and DR processing sites. These will entail testing every

detailed aspect of system functionality, including a full range of error checking.

51

c. Operational acceptance tests must involve full load (stress) testing of the system

to confirm the ability of the hardware and software (as sized by the Bidder) to

handle the maximum expected peak workload. They will include the full range of

failover procedures specified by the Bidder for handling failures at either site.

d. Interface acceptance tests must involve full testing of the system to confirm the

proper functioning of the major interfaces which include:

• the interface to SWIFT.

• the interface to BLOOMBERG.

• the interface to REFINITIV (REUTERS).

• Interface to T24

• Interface to GL

• Interface to RTGS

Acceptance Test Design and Execution

The Bidder must propose the contents of all acceptance tests for CBK’s approval and

planning, and modification as necessary. CBK will develop its own acceptance tests

as well, to represent its work flow and practices. All acceptance tests will be carried

out by CBK operations and technical staff, and will be monitored and supported by

the Bidder at each step. CBK will make management personnel and staff available to

the Bidder to participate actively in the acceptance test process as an integral part of

the training and knowledge transfer and eventual handover of the system to CBK.

Evaluation of Acceptance Test Results

CBK’s project manager will be responsible for the final rating of all acceptance test

results. At the end of each test phase, CBK’s project manager will provide to the

Bidder either a formal letter of acceptance if the Bidder has met its contractual

obligations, or a statement specifying which obligations have not been met and must

be met before acceptance can be granted.

Operational Acceptance will be achieved only after successful completion of all tests

and formal acceptance of all project deliverables.

Fault Correction

The Bidder must be responsible for correcting all faults (i.e. instances where any

element of the systems does not perform in accordance with the signed-off

specification) found during acceptance testing in a timely manner so that the overall

project schedule is not affected.

Training and Knowledge Transfer

Knowledge Transfer

CBK considers training and knowledge transfer to be among the most important

factors for the success of the project. An important objective is therefore to ensure

effective transfer of PMTP and related technological knowledge. The bidder must

52

prepare targeted technical and business-based knowledge transfer to the relevant

teams. This is viewed as critical for all parties to become self-sufficient in the

operation and maintenance of the new services and related technologies. The Bidder

must describe in detail how they intend to achieve a high degree of knowledge

transfer.

Training

a) The Bidder must provide training plans showing, for each system element to be

supplied, and for the project overall, all proposed training programs, the

recommended number and (if applicable) prior knowledge of people to be

trained in each institution, the duration of each training module and the

proposed number of times each module is proposed to be delivered. The training

programs will include:

(i). Functional Training - Class room sessions on all required modules for the

Project Core Team (business super users, business analysts)

(ii). Technical Training - Class room sessions on all technical aspects of the system

e.g. data organization, customization, interfacing with other standard

software like Bloomberg, Refinitiv (Reuters), SWIFT, legacy systems

installation, and maintenance aspects of the system.

(iii). End User Training (Functional & technical) - Class room sessions for End

Users. This should be given just before QA environment and User Acceptance

testing, so the team is ready for the Acceptance testing.

(iv). Operations Training – computer operations requirements, security operations,

backup, disaster recovery and business continuity operations

b) Qualified personnel who hold relevant certificates as applicable must carry out

all training. The Curriculum Vitae and copy/ies of certificate/s must be supplied

for each trainer proposed.

c) Training plans should specify any prerequisites that must be satisfied prior to the

commencement of training. They should cover not only CBK but all involved

organizations as applicable to each component/module of the PMTP.

d) Any other relevant training that will enable optimal usage of the system

Documentation

Preliminary project plans must contain detailed specifications of the documentation,

which the bidder will provide, indicating for each item: (i) on which medium or

media it will be supplied; and (ii) whether it is a standard document or it will be

tailored to the specific context of the CBK system.

CBK expects that the supplied documentation must include at least the following:

53

a) Product Literature, describing the different system components that address the

business and technical requirements of this procurement;

b) End-user Documentation, tailored as applicable, covering operations guides,

operating manuals, and standard user manuals. On-line help must be provided

in all system modules;

c) Technical Documentation that CBK will need to use for the safe and effective

running of the processing environment. This should include ‘as-built’ and final

design documentation that includes the selected options and configuration

settings, and all operating instructions and procedures. This must include:

i. Utility software functional specifications and descriptions;

ii. Application software functional specifications and descriptions;

iii. Documentation covering the testing environment;

iv. Instructions for backup, restore and selective restore;

v. Instructions for switch-over of processing to and from the Hi-Availability

and DRC sites;

vi. As-Built and Final Design documentation that includes the selected

options and configuration settings;

vii. Any other technical documentation that the CBK will need to use for the

safe and effective running of the processing environment.

d) Detailed Documentation of Operational Processes. This must include:

i. Standard batch scripts;

ii. Recommended scheduling of batch jobs (background and foreground);

iii. Details of all background and foreground tasks;

iv. Dependencies of all programs within each batch;

v. Dependencies between batches;

vi. Details of all standard reports;

vii. Internal integrity controls performed by the system;

viii. Relationships between programs and data;

ix. Relationship between application and operating system;

x. Relationship between application and database manager.

Migration of Data

Data migration must follow the following approach:

a) The Bidder must provide clear guidelines detailing data to be migrated from

legacy system. All necessary datasets required in PMTP from the legacy system

must be documented in detail.

b) A process to validate the migrated data must be put in place to audit the data. This

must include reconciliation reports to show statistics and checksums for the data

migrated vs the legacy system.

54

c) Just before the first day of going live, to migrate opening balances of all accounts,

positions, static data, custodians, plus history of transactions, allowing for printing

of account statements, calculating of taxes, and other functions depending on

historical data.

d) The migration process must be planned very well, and there must be an automated

batch that handles all data coming from T24 for migration, restructure it, and

inserts them in the PMTP database.

e) There will be need to have parallel (pilot) runs to ensure that the migrated data is

valid and system is reporting at par as the production system.

Go-Live, Warranty and Support Services

Go-Live Support

The Bidder must provide on-site support for the system during the Go-Live process

to ensure smooth and timely switch to the new system. The support should cover

both production and disaster recovery sites.

Warranty Period

The Bidder must provide operational support for the system on-site at the primary

and alternate processing sites for a period of three (3) months after Go-Live. During

this time, the Bidder’s support personnel must be available on an immediate on-call

basis during normal business hours at CBK’s head office.

Support and Maintenance Period

Bidder must provide support for the entire system at no charge for a period of 24

months after Go-Live. The Bidder will establish a single point of contact for all

software or support related problems. The contact point will be available throughout

the system operational day, which will be agreed between CBK and the Bidder

during implementation.

During this maintenance period, any new releases and upgrades of the system will

be installed at no additional charge. The Bidder and CBK will agree on the pricing

and period of maintenance after expiry of this initial maintenance period.

The Bidder will establish a single point of contact for all software or support related

problems. The contact point will be available throughout the system operational day,

which will be agreed between CBK and the Bidder during implementation.

Terms for out of hours support must also be agreed upon during this period. The

support services must include at least the following:

a) Software support, including:

i. Problem response, management and resolution as detailed below;

ii. Error correction (patches) for the application software.

55

iii. General advice and guidance for all software products including

application packages, system software, DBMS, middleware etc.

iv. The Bidder shall ensure that sufficient resources (with respect to the

number of personnel and such personnel's training, competence, and

experience) are available to provide the software support services at all

times. The resource available shall be of an appropriate skill level to

minimize any impacts to the levels of service required by CBK, covering

knowledge of CBK’s business operations as well as expertise in the

application software.

v. Provision of all patches and corrective, new and updated

vi. versions of all supplied software products which become available,

including change management support for introducing them. Bidder

should contain details of the methodology for supplying and

implementing software upgrades during the life of the system,

including measures to ensure that full training is provided on changes

and enhancements as needed, and that business continuity is

guaranteed during upgrades, additions or changes.

On-going implementation of changes if required/requested by CBK. Bids must

include the Bidder’s proposed procedures for processing and implementing Change

Requests, including the costs per person/hour or person/day for all categories of

personnel who may be involved in the Change Request process. Such costs shall be

fixed for the duration of the Warranty Period

Service Level Agreement (SLA)

The bidder will provide a draft SLA agreement detailing the service hours, system

availability, and the business impact levels for CBK review.

Extreme Situations

Bidders are requested to suggest procedures that can invoked in the event of extreme

emergency situations, extreme event which affects both the main IT processing center

at CBK’s head office and alternative centers.

Problem Management

The Bidder’s support center must answer incoming telephone calls within one

minute and will check email not less frequently than every ten minutes.

All problems notified to the Bidder must have a priority assigned by CBK that will

define the severity and impact to CBK’s service levels with a resolution target and

escalation framework to make sure the effects of the problems are restrained or

minimized.

Priority levels will be as follows:

a) Priority 1: A system component has failed in such a way that one or more critical

elements of the system are unusable. The Bidder must provide appropriate

56

support within fifteen minutes and provide a work-around or fix within two

hours of receiving notification.

b) Priority 2: The service is severely impacted and performance is restricted. The

Bidder must provide appropriate support within two hours and provide a work-

around or fix within four hours of receiving notification.

c) Priority 3: The service is impacted and performance is reduced. The Bidder must

supply a work around or fix within 24 hours of receiving notification.

d) Priority 4: The service may be impacted and performance can be reduced. Priority

4 problems must be supported during the Bidder’s and CBK’s normal hours of

business.

Details of problems logged with the Bidder, whether during the project, the System Warranty Period or under an on-going Service Level Agreement, must be easy for CBK to follow up. Regular reporting must be a standard feature of the service, provided by the bidder on on-line basis, and must include:

a) The number of service-disrupting incidents over any selected period by source of

disruption and in total;

b) The number of non-services disrupting incidents reported over any selected

period;

c) The time taken to restore normal service after each recorded service disruption.

d) Bidder should also explain how CBK staff can monitor reported problems on a

regular basis.

Performance Expectations

CBK expects a very high level of reliability and availability of all its systems and the

system will be particularly crucial in this respect.

CBK’s expectations of overall system performance include:

a) There will be no more than a total of three software failures per annum, and no

more than one in any single month. A software failure is defined as an event

where a component of the application fails to respond to operator instructions

and fails to perform its normal function, and requires to be manually restarted or

fails to restart. In every case the time to recover from a failure shall be no more

than 30 minutes.

b) In a situation where the system performance is degraded, this must not delay

end of day processing by more than 30 minutes. There will be no more than one

such incident per month or three per year.

c) CBK’s general availability expectation for this system is 99.95% (where

downtime is defined as total unavailability of the service). Bidder are requested

to give details of expected reliability and availability figures for the actual

configuration (hardware, software etc.) they are proposing.

57

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE

The Tenderer must respond to every stated request or requirement and indicate

that they confirm acceptance of and understand the CBK’s stated requirements.

The deferral of a response to a question or issue to the contract negotiation stage is

not acceptable. Any item not specifically addressed in the Vendor’s proposal will

be deemed as accepted by the Vendor.

Responding to the List of Requirements

Tenderer must respond to each requirement contained within this RFP using the

following criteria. Vendor’s responses must be in the same order in which the

questions appear and must use the same numbering scheme as outlined below:

FP Fully Provided (Out-of-the-box), Solution currently includes this capability in its current general software release.

TP Third Party Software Required Third party solutions is required to deliver this capability

M Modification to existing software Minimal modification is required to provide the requirement

C Custom Development Required Custom development required for the requirement

NA Not Available Functionality is not available (Out of the box)

O Other Other

For any specifications to which the Vendor answers other than FP (Fully Provided),

Bidder must describe:

• Whether the CBK will incur any additional cost for the feature, function, product,

or service once it becomes available other than the cost of maintaining a valid

software maintenance agreement for the current modules/system proposed by

the Bidder as part of the initial installation (i.e. a new module, replacement or

upgrade to an existing module, new hardware required, etc.)

• If the feature, function product or service falls under the category as Not

Available (N), the Bidder may provide; (a) an explanation of how the

specification might be met using alternative methods within the system or (b) if

it is available from a third party partner. Either explanation must include

availability dates and additional costs, either direct or indirect.

58

Item Ref. Information Technology Requirements, Project Management etc.

Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

C. 1. General Requirements 10

a) Can your product be maintained on a client’s own

server? What database system (i.e., SQL, Oracle,

etc.) does your system use?

b) Identify the most current version of the software.

Detail the percentage of live customers that are

utilizing the proposed version of the software.

Please provide a breakdown of customers (by

percentage) for each version of the software

currently in use.

c) Please describe any modules or add-ons that you

offer for your software.

d) Describe how often a client should upgrade the

software including what the trigger or decision

point is for upgrading/changing the system, and

if there is an associated cost.

e) How many environments are supported in the

basic offering for a client? Is a development

59

version of the system available to clients for

testing?

f) Are the error messages produced by your system

in plain English, and do they contain a specific

reason for the occurrence of error?

g) Does the system have capability to define

workflow processes and business rules, including

approval levels, and to modify workflow (e.g.,

assigning a proxy approving authority)?

h) Does the system have capability to send out

emails and SMS out to Users? Please give detail on

what service is used and how it is integrated for

On-premise solutions.

i) Does the system provide an API for extracting

data to the Enterprise Data Warehouse?

j) Does the system support addition of more

features or modules without affecting

performance of other functioning modules

k) Does the system provide for STP in trade

processing?

60

l) Does the system provide a dashboard style real

time monitoring of post trade activities?

m) Does the system provide alerts for all trade

transactions queuing for approval?

n) In the event of SWIFT failure, what alternative

confirmation methods are available from the

system? Does the system support resubmission of

same message with amendments?

o) Does the system have an aging report which

shows how long an outstanding item has

remained in the system? Can this be customised to

define the red CBK preferred line?

p) Describe the End of Day process.

C. 2. Integrity 3

a) Does the system have capability to encrypt or

digitally sign data flows and transactions? Explain

any limitations

b) Describe features of system that guarantee zero

data loss especially during recovery from

unplanned outage

61

c) What privacy methods used to ensure that

confidential Data and sensitive communications

are kept private?

d) If multiple databases are employed, what extra

procedures are employed to ensure

synchronization among databases?

C. 3. Security, authentication, access and audit 7

a) Does the system provide capability to administer

user and group security permissions for access to

software solution

b) Does the system support integration with

Microsoft Active Directory? List other directory

servers supported.

c) Does the system support multifactor

authentication? Provide description.

d) Does the system restrict multiple logins by same

user?

e) Does the system support role-based access?

62

f) Does the system support complex passwords? Can

the administrator set / change the level of

password complexity required?

g) Does the system provide facility to disable / enable

a user account?

h) Does the system have capability to provide audit

trails, logs, history tracking and reports for user

activity such as authentication, data access inserts,

updates and deletions etc.

i) Describe your web-based session management

(time out, configuration, etc.)

j) Does the system have capability to set the idle

session timeout for automatic logout

k) Provide detailed solution architecture for the

proposed system highlighting the required

interfaces and technology platforms

l) Does the system provide classification of log events

into following classes: Errors, Warning,

Information, Debug and Trace?

m) Does the system restrict access to system logs to

only authorized users?

63

n) Does the system support both HTTP and HTTPS

with encryption of internal communication using

latest version TLS (Transport Layer Security)?

o) Does the system apply measure such as “Captcha”

at the time login by the user to determine whether

user is human or not?

p) Does the system have capability to ensure edited

and deleted records are traceable and copy of

records stored in the system for MIS reporting?

C. 4. Operational Requirements 6

a) Describe the system features for meeting workload

processing demands

b) Describe the scalability features of the system

c) Does the system send alerts when resource (CPU,

Memory, network etc) / performance thresholds

are reached?

d) Does the system support definition of working

profiles – normal, short, end month, and end of

year days

64

e) Please quantify a typical system response time for

operational activities such as security master set-

up, trade entry, position query, and cash query.

f) Does your system provide the client with the

ability to use third party software to schedule and

control processing times? Please provide a list of

preferred third-party job scheduling software

partners.

g) Does your system provide the client with the

ability to use monitoring statistics to verify that

functionality is available? Please provide a list of

monitoring software partners.

C. 5. Infrastructure Requirements 10

a) Is server virtualization supported for both a web

application and a database application? Please

describe any issues and/or support of

virtualization.

b) Can your product be maintained on a client’s own

server?

c) Please describe the technical resources which

support the platform and their physical locations

and time zones supported.

65

d) Identify the operating system required by the

proposed applications software and database

management system. In the event there is more

than one suitable operating system, list all options

indicating the relative strengths and drawbacks (if

any) of each.

e) Is your system able to be installed on server that

runs IBM AIX 8.1 server operating system?

f) Is the Oracle 12c Database Platform supported?

g) Is the system supported on three (3) site

configuration – primary, backup and disaster

recovery – where is replicated to all sites. CBK uses

two or three application environments. Generally,

these are Production, Test and Development. These

are used for, testing application patches, testing

configuration changes, testing security patches,

user acceptance of new functionality, isolated fault

finding analysis, user training, other application

integration testing i.e.

C. 6. High Availability Requirements and Business Continuity 5

a) Does the system support clustering and high

availability?

66

b) Describe systems backup process for the proposed

system.

c) Describe the disaster recovery features for the

proposed system

d) What is the maximum time required to fail back to

production site?

e) What is the estimated down time for the fail over

to the backup or disaster recovery system?

f) Is the system able to run in load balanced

environment?

C. 7. System Interfaces 10

a) Is the system fully integrated across modules and

functional areas?

b) Does the system have an pre-built capability to

send / receive SWIFT messages via middleware

platforms (including IBM WebSphere MQ)?

c) Is your company a SWIFTReady label provider?

d) Is your proposed product a SWIFTReady

application (certified by Swift)?

67

e) Provide a list of standard messages that are pre-

built (i.e., MT541, MT543, etc.).

f) Describe any incompatibilities / issues with

SWIFT integration

g) Does your system have pre-built data feeds into

Bloomberg for market data, security definitions

and trade tickets? If so, please describe including

any system limitations and/or issues with the

process.

h) Does your system have pre-built data feeds into

Refinitiv (Reuters) Platform for market data and

trade tickets? If so, please describe including any

system limitations and/or issues with the process.

i) Does your system have pre-built data feeds into

Oracle GL? If so, please describe including any

system limitations and/or issues with the process.

j) Does your system have pre-built capability to

upload custodian data (positions and cash) for

reconciliation purposes? Explain any limitations

k) Does the system have capability to consume

RESTful and SOAP web services?

68

l) Does the system have capability to interface with

SMS gateway and Email Serve for SMS and email

notifications respectively?

C. 8. Implementation, Maintenance and Support 15

Implementation

a) Provide the standard timeframe for a fully

implemented system per the scope of this RFP. If

the proposal contains a phased approach, provide

typical duration(s) for each phase and a listing of

the modules proposed for each phase. The phases

include: Scope review, Business Analysis,

Installation and Configuration, User Acceptance

Testing, Data Migration, Go-Live, etc.

b) What implementation methodology do you

typically use for system implementations? Agile

or SDLC

c) Do you have a standard implementation contract?

d) What approach do use for conducting the

business analysis / scoping?

e) Describe the implementation methodology /

lifecycle / activity sequence for a typical

69

implementation of the package from project

initiation through to warranty.

Customizations, Upgrades and Release Management

f) What is the process of identifying and

implementing system customizations / change

requests?

g) Describe the release process that is followed

including the frequency of releases and versioning

h) Describe the release nomenclature (i.e. minor,

major releases)

i) Describe the methodology for issue and problem

management. What tools are used to support this

process.

j) If a client encounters system issues that must be

resolved with a software patch, are software

patches supplied by you or does a client have to

wait until the next software release?

C. 9. Project Team --

a) Describe your project organization structure and

assigned project staff. Describe the skills,

experience, and roles and responsibilities for each

70

project team member and their location (on-site,

offsite, offshore).

b) Describe the resource requirements (include

onsite, off site and offshore resources) for the

typical implementation of the base package.

Provide the estimated time of the resources on the

project.

c) Describe the process of identifying contingency

resources when the primary are unavailable for

the project implementation

d) Describe your expectation of the structure and

composition of the CBK project team

C. 10. Training 6

e) Describe your technical, functional and end-user

training program(s) you provide. Indicate the

delivery location (onsite or offsite) and duration of

training

f) Do you provide both end-user and technical

documentation?

71

g) Do you provide custom training tailored for

specific needs or group of users?

C. 11. Support 6

h) Describe the customer service/support that you

provide. What is the typical response time for

client requests?

i) Which locations is support is available (local,

EMEA and/or global)?

j) Describe your levels of support programs. Does

your company provide guarantees on software

performance or support Service Level Agreements

(SLAs).

k) Please list the number and type of personnel

resources that are necessary to support ongoing

operations of your system and/or system

modules as dictated by system design.

C. 12. Project Management 10

a) Provide / describe your project management

methodology / plan

72

b) Provide a matrix of “roles and responsibilities” for

each major activity and task contained within the

proposed implementation plan.

C. 13. Licensing 4

a) What is the licensing metric used for the system –

per user, per Server, per module?

b) Is the licence perpetual or periodically (annual)

renewed?

c) Do the testing and development instances require

a separate license?

d) Is the disaster recovery instance licensed

separately?

e) Do you have third party products or tools that

need to be licensed separately? Provide the list?

f) Describe how you ensure that third-party

products are licensed?

C. 14. Data Backup 5

73

a) Does the system have capability to archive data

based on user defined parameters such as date

range?

b) Does the system have capability to schedule

backup or manually initiate back up process?

c) Does the system have ability to automatically

synchronise data with disaster recovery site (or

system)?

d) Does the system have capability to restore backups

to a point in time?

e) Does the system generate report for each backup or

restore activity?

f) Does the system have ability to run multiple

backup tasks in parallel?

C. 15. Document Management System 3

a) Does the system have an internal document

management module?

b) Does the system have capability to interface to

external document management systems

74

c) Does system have capability to attached

documents (documents, images ) to transactions?

Total Score 100

Total Raw Weighted Score: (sum of Raw Weighted Scores above)

𝑻𝒐𝒕𝒂𝒍 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆

𝑴𝒂𝒙𝒊𝒎𝒖𝒎 𝑷𝒐𝒔𝒔𝒊𝒃𝒍𝒆 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆 𝑿 𝟑𝟎 = 𝑺𝒄𝒐𝒓𝒆

APPENDIX A: LIST OF INVESTMENT INSTRUMENTS

1. Money Market

1.1. Time Deposits

1.2. Certificate of Deposits

1.3. REPOs, Reverse REPOs & Securities Lending

1.4. Commercial Paper

1.5. Treasury bills

1.6. Cash / Demand Deposit

2. Fixed Income

2.1. Sovereign Notes / Bonds – Fixed and Floating

2.2. Sovereign Agency Notes/ Bonds – Fixed and Floating

2.3. Corporate Bonds

2.4. Emerging Market Bonds

2.5. Local / Regional Government Bonds

2.6. Ex-Div Bonds

2.7. MBS

2.8. ABS

2.9. SOFR Linked Bonds

3. Gold

4. Derivatives

4.1. FX Forward Outright

4.2. FX Swaps

4.3. Dual Currency Deposits

4.4. Futures

4.4.1. Interest Rate Futures

4.4.2. Bond Futures

5. Special Drawing Rights (SDR)

6. Equities

76

APPENDIX B: LIST OF SWIFT MESSAGE TYPES

MESSAGE TYPE PURPOSE

Category 1 Messages

MT 101 Requests to debit a customer's account held at the receiver or at another institution.

MT 102 Conveys multiple payment instructions between financial institutions.

MT 102+(STP) Conveys multiple payment instructions between financial institutions (Straight-Through Processing).

MT 103 Instructs a funds transfer.

MT 103+ (REMIT) Instructs a funds transfer with Extended Remittance Information.

MT 103+ (STP) Instructs a funds transfer (Straight-Through Processing).

MT 190 Advises an account owner of charges, interest, and other adjustments.

MT 192 Requests the receiver to consider cancellation of the message identified in the request.

MT 199 Contains information for which no other message type has been defined.

Category 2 Messages

MT 200 Requests the movement of the sender's funds to its account at another financial institution.

MT 201 Multiple of the MT 200.

MT 202 Requests the movement of funds between financial institutions except if the transfer is related to an underlying customer credit transfer that was sent with the cover method, in which case the MT 202 COV must be used.

MT 202 COV Requests the movement of funds between financial institutions, related to an underlying customer credit transfer that was sent with the cover method.

MT 204 Claims funds from SWIFT member banks.

MT 205 Further transmits a transfer request domestically except if the transfer is related to an underlying customer credit transfer that was sent with the cover method, in which case the MT 205 COV must be used.

MT 205 COV Further transmits a transfer request domestically, related to an underlying customer credit transfer that was sent with the cover method.

77

MT 210 Notifies the receiver that it will receive funds for the sender's account.

MT 290 Advises an account owner of charges, interest, and other adjustments.

MT 291 Requests payment of charges, interest, or other expenses.

MT 292 Requests the receiver to consider cancellation of the message identified in the request.

MT 295 Requests information relating to a previous message or amendment to a previous message.

MT 299 Contains information for which no other message type has been defined.

Category 3 Messages

MT 300 Confirms information agreed to in the buying/selling of two currencies.

MT 304 Advises of or instructs settlement of a third party foreign exchange deal.

MT 305 Confirms information agreed to in the buying and selling of vanilla options on currencies.

MT 306 Confirms information agreed to in the buying and selling of exotic options on currencies.

MT 320 Confirms the terms of a contract relative to a fixed loan/deposit transaction.

MT 340 Confirms the details of a forward rate agreement.

MT 341 Confirms the settlement details of a forward rate agreement.

MT 360 Confirms the details of a single currency interest rate derivative swap, cap, collar or floor.

MT 361 Confirms the details of a cross currency interest rate swap transaction.

MT 391 Requests payment of charges, interest, or other expenses.

MT 392 Requests the receiver to consider cancellation of the message identified in the request.

MT 395 Requests information relating to a previous message or amendment to a previous message.

MT 396 Responds to an MT 195 Query or MT 192 Request for Cancellation or other message where no specific message type has been provided for a response.

MT 399 Contains information for which no other message type has been defined.

Category 5 Messages

MT 502 Instructs the purchase or sale of a given quantity of a specified financial instrument under specified conditions.

78

MT 509 Provides information about the status of a previously executed trade.

MT 515 Provides a detailed accounting of financial instruments purchased or sold by the sender on behalf of the receiver or its client. It may also convey the payment details of the purchase or sale. It may also be sent by, or via an ETC service provider.

MT 515 (FUNDS)

MT 517 Positively affirms the details of a previously received confirmation/contract note.

MT 518 Confirms the details of a trade and, where necessary, its settlement to a trading counterparty.

MT 535 Reports at a specified time, the quantity and identification of securities and other holdings which the account servicer holds for the account owner.

MT 541 Instructs a receipt of financial instruments against payment. It may also be used to request a cancellation or pre-advise an instruction.

MT 543 Instructs a delivery of financial instruments against payment. It may also be used to request a cancellation or pre-advise an instruction.

MT 545 Confirms a receipt of financial instruments against payment. It may also be used to cancel or reverse a confirmation.

MT 547 Confirms a delivery of financial instruments against payment. It may also be used to cancel or reverse a confirmation.

MT 548 Advises the status of a settlement instruction or replies to a cancellation request.

Category 9 Messages

MT 900 Advises an account owner of a debit to its account.

MT 910 Advises an account owner of a credit to its account.

MT 940 Provides balance and transaction details of an account to a financial institution on behalf of the account owner.

MT 950 Provides balance and transaction details of an account to the account owner.

MT 999 Contains information for which no other message type has been defined.

79

Appendix C: Application Interfaces

Interface Name Direction Interface Technology (Middleware)

Interface Data and Descriptions

1. Bloomberg 2-way Fix Messages Bloomberg to PMTP a) Security Prices b) Exchange Rates c) Fixed Income Trades d) FX Trades e) Money Market Trades f) Index Compositions g) Index Returns h) Security Definitions

PMTP to Bloomberg The following datasets will be periodically uploaded to

Bloomberg PORT for risk and performance analytics: a) Security positions b) Money Market Positions c) Cash

2. Refinitiv (Reuters) 1-way Reuters API Refinitiv to PMTP a) Security Prices b) Exchange Rates c) FX Trades d) Money Market Trades

3. Temenos T24 Core Banking System

1-way IBM WebSphere MQ

T24 to PMTP a) Government Payments b) Aggregate DFCC balances c) Aggregate Special Projects Account Balances

80

4. Investment Risk Management System (IRMS)

1-Way Database Connection / Middleware

Portfolio Management & Transaction Processing (PMTP) to IRMS a) Positions and cash balances b) Market /pricing data c) Securities master

5. SWIFT 2-way IBM WebSphere MQ

Portfolio Management & Transaction Processing (PMTP) to / From SWIFT a) Account statements – MT940/950 b) Message Confirmations c) Counterparty Messages d) Trade settlement messages

6. Oracle GL 1-way IBM WebSphere MQ

PMTP to Oracle GL Accounting Journals / Trial Balance

7. Enterprise Data Warehouse

1-way Database Connection

PMTP to Data Warehouse a) Positions b) Security Prices c) Trades (MM, Securities, Cash, FX) d) Performance & Risk Statistics e) Security Definitions (security master)

8. Global Custodian 1-way csv/xml files Global Custodian to PMTP a) Positions b) Security Prices c) External Fund Manager Data d) Performance & Risk Statistics e) NAV and Accounting Data

9. External Fund Managers 1-way Web Service External Fund Manager to PMTP a) Positions b) Transactions

10. Enterprise Directory Server ( Microsoft Active Directory)

1-way TCP Port PMTP to Active Directory a) User Authentication Request b) User Creation Request

APPENDIX D: TYPES OF PAYMENTS AND RECEIPTS (EXTERNAL CASHFLOWS)

1) Government Foreign Debt Payments – debt payments on

behalf of Kenya government. These cashflows reduce the forex

reserves.

2) Other Government Foreign Payments – Other payments on

behalf of government for other purposes (non – debt

payments).

3) Government Forex Receipts – Forex receipts on behalf of

Kenya governments. These receipts are acquired by central

bank in exchange of local currency. They increase the

investible reserves.

4) CBK Foreign Payments – Payments made for central bank’s

own account / expenses.

5) Special Project Payments—Direct Payments

Payments made on behalf of the Government out of special

projects accounts. Special projects accounts are not part of the

investible funds for CBK. They are owned and controlled by

Government and donor agencies.

6) Special Project Payments – Payments in Local Currency -

Occasionally, CBK acquires forex from special project

accounts in exchange for local currency in cases when

government needs to pay local currency out of the funds in

special projects accounts.

ANNEX B

INTERNATIONAL TENDER FOR SUPPLY, DELIVERY, TESTING AND COMMISSIONING OF INVESTMENT RISK

MANAGEMENT SYSTEM (IRMS)

REF. NO. CBK/25/2020-21

BUSINESS AND INFORMATION TECHNOLOGY (IT) REQUIREMENTS

TABLE OF CONTENTS

PAGE

SECTION A BUSINESS REQUIREMENTS ………................…..……….3 PART 1 - STATEMENT OF WORK……………………………………...……….…3

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE………….8

SECTION B INFORMATION TECHNOLOGY REQUIREMENTS…19

PART 1 – STATEMENT OF WORK…………………………………………….….19

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE…………40

APPENDIX A LIST OF INVESTMENT INSTRUMENTS………………51

APPENDIX B SYSTEM INTERFACES…………………………….………52

3

Section A: Business Requirements

Part 1 – Statement of Work

Background

The Central Bank of Kenya (herein referred to as “CBK” or “the Bank”) is established

under article 231 of the Constitution of Kenya 2010 and governed by the Central Bank

of Kenya Act Cap 491 laws of Kenya (the CBK Act) and has its Head office in Nairobi

and three branches in Mombasa, Kisumu and Eldoret.

The principal object of the Bank is to formulate and implement monetary policy

directed to achieving and maintaining stability in the general level of prices. In

fulfilling this mandate, the Bank shall foster the liquidity, solvency, and proper

functioning of a stable market-based financial system. Amongst its other objects, the

Bank is also required by statute to hold and manage the country’s foreign exchange

reserves.

Overview of CBK’s Forex Reserves Management

Foreign Exchange Reserves play a key role in ensuring that Kenya will be able to

maintain confidence in its monetary, financial stability and exchange rate policies and

protect the economic well-being of the country in the event of external shocks. In

accordance with its role as a central bank and as provided in the Central Bank of

Kenya Act 2015 (CBK Act), the official foreign exchange reserves of the Republic of

Kenya are held and managed by the Central Bank of Kenya (CBK). The CBK Act

requires the Bank to at all times endeavor to maintain a reserve of external assets at

an aggregate amount of not less than the value of four months’ imports as recorded

and averaged in the last three preceding years.

The objectives of the management of the foreign exchange reserves are:

1. Safety: Investments will be undertaken with the aim of preserving the capital of

the overall portfolio over the investment horizon, subject to the approved risk

tolerance;

2. Liquidity: Investment management will seek to ensure that adequate reserves are

available to meet a defined range of objectives. In order to maintain sufficient

4

liquidity, the foreign reserves will as much as possible be invested in instruments

or securities with an active secondary market;

3. Returns: Foreign exchange reserves will be invested in order to achieve a

reasonable rate of return consistent with the investment objectives and risk

constraints, after taking into consideration the two principles of Safety and

Liquidity.

Statement of Need

The Central Bank of Kenya seeks to procure an Investment Risk Management

System that will model and assess risk in detail with respect to both the aggregate

portfolio and individual securities, allowing staff to automate risk measurement and

reporting. In addition, a compliance monitoring capability should be provided to

ensure management of the reserves in accordance with the Investment Policy and

Guidelines.

The CBK invests its forex reserves in fixed income and money market instruments

(list of instruments is provided in Appendix A). The system should have the following

features or capabilities:

6 Risk Management and Attribution

6.1 Scenario Analysis

The system should:

l) Be capable of producing scenario analysis based on historical and user-defined

scenarios.

m) Support ability to perform what-if analysis in order to assess impact of the intended

trade(s) on the market risk, credit compliance, etc. of the portfolio in absolute terms

and relative to benchmarks / targets.

n) Calculate the impact of common market stress scenarios such as global financial crisis,

Libyan oil crisis, US financial crisis, Tequila crisis, Asian crisis for both simulated and

actual portfolios.

o) Ability to perform sensitivity analysis at every level of the portfolio – aggregate level

down to the security or risk factor levels.

5

6.2 Market risk

The system should:

a) Calculate standard risk measures (i.e. Volatility, Value at Risk (VaR),

Correlation, modified duration, Tracking error etc.) for assets outlined in

Appendix A.

b) Drill down risk exposures from the group level (portfolio) to the individual

security level.

c) Provide risk measures at security-level and aggregated at portfolio level on a

daily, weekly, monthly, quarterly, yearly, and custom period.

d) calculate risk measures on both absolute and relative (to the benchmark) basis

e) Provide risk contribution breakdown at user-defined levels such as asset class,

sector, country, region, and individual security level.

f) Have its own internal credit ratings model and provide capability of comparing

the credit ratings of assets/ counterparties generated with internal model with

those provided by the rating agencies

g) Compute Ex-ante factor risks and attribute the risks into factor and non-factor

components.

h) Generate incremental VaR and marginal VaR for portfolio ex-ante risk

attribution at different portfolio levels.

i) Be capable of computing Value at Risk (VaR) using the following methods:

Historical Simulation, Parametric, and Monte Carlo Simulation methodologies.

j) Provide user defined (custom) confidence levels and horizons for the

calculation of Value at Risk (VaR), Conditional Value at Risk (CVaR).

k) Provide capability to set market risk limits such as scenario limits and stop-loss

limits.

6.3 Credit risk

The system should:

a) Compute credit exposure at security, asset class, portfolio, portfolio manager,

tranche, issuer, counterparty, country, region, sector, credit rating.

6

b) Be able to calculate exposure limits at different levels such as security, asset

class, portfolio manager, issuer, counterparty, country, region, sector, credit

rating.

c) Show exposure deviations (under or over exposure) against the set limits at

security, asset class, issuer, counterparty, country, region, sector and credit

rating levels.

d) Provide credit exposure by par, clean and dirty market valuation.

e) Provide credit exposure by different maturity buckets

f) Have a provision to define a counterparty’s capital structure such as parent,

branch, or subsidiary with total exposure to the counterparty (branch and

subsidiary) being aggregated to the parent.

g) Compute Ex-ante factor risks and attribute the risks into factor and non-factor

components?

h) Have a provision to compute Expected Credit Loss (ECL) from user-defined

(custom) Probabilities of Default (PD), Loss Given Default (LGD) at security

level.

i) Have a provision to perform predictive risk modelling and compute Credit

VaR at security level over different time horizons (daily, weekly, monthly,

quarterly, yearly, and custom timelines) expressed at different levels of

statistical confidence.

j) Have the provision to upload static and real-time data from other systems.

7 Compliance Monitoring

The system should:

j) Maintain compliance rules to reflect Investment Guidelines and monitor

portfolio compliance versus the rules and limits.

k) Allow the testing of the compliance rules before applying to portfolio.

l) Have a library of predefined compliance rules, and also enable creation of user-

defined rules.

m) Compliance rules should be able to run on all portfolios and positions

n) Be able to provide notification on limit on both simulation and executed trade

level.

7

o) Allow viewing of compliance exceptions and overrides and store a record of

all compliance violations and compliance overrides for audit purposes

p) Be able to measure various exposures, monitor counterparties' credit exposure

against authorized limits on a real-time basis: Issuer limit, portfolio manager,

country limits and counterparty limits.

8 Pricing and Valuation

The system should be able to:

i) Support the manual upload of market data and automatic interface to pricing

sources such as Bloomberg, Refinitiv (Reuters), IDC, Markit, web sites,

spreadsheets, and text files.

j) Support the construction of yield curve from market data uploaded to the

system

k) Support the valuation of financial instruments off a yield curve, volatility

surface, and other valuation methods necessary to derive the fair value of a

financial instrument, including over the counter derivatives (see Appendix A)

l) Provide facility to define and maintain prices and exchange rates.

9 Reporting

The system should:

g) Have the ability to display and modify the screen set up by individual user

to view positions / reports in different perspectives.

h) Have the ability to customize dashboards by user roles/groups.

i) Have the ability to allow reports to be exported in different formats (MS

Excel, MS word, PDF, HTML)

j) Provide for report-writer tool with user-friendly capabilities of

parameterizing generating reports.

k) Include a facility to enable a user to define the sorting, grouping, and drill-

down.

l) Provide ability to generate reports per trading currency, reporting currency,

base currency, and local currency.

m) Support uploads from other systems for reporting purposes.

8

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE

The tenderer must respond to every stated request or requirement and indicate that

they confirm acceptance of and understand the CBK’s stated requirements. The

deferral of a response to a question or issue to the contract negotiation stage is not

acceptable. Any item not specifically addressed in the tenderer’s proposal will be

deemed as accepted by the tenderer.

PART 2.A: MANDATORY REQUIREMENTS

The tenderer must address all items detailed below and provide, in sequence, the

information and documentation as required.

Item Ref.

Mandatory Requirement Items Response (Yes / No)

Comments

A.1. Provide statement indicating that vendor’s product is able to calculate standard risk measures (i.e. Volatility, Value at Risk (VaR), Correlation, modified duration, Tracking error) for assets outlined in Annex A

A.2. Provide a statement indicating that the Respondent’s product can perform the following functions: a. Drill down risk exposures from the group level to the

individual holdings level.

b. Analyse risk factors on both a standalone basis and a

relative to a specified benchmark.

c. Create and customize risk reports.

A.3. Provide a statement indicating that the vendor’s product can incorporate derivatives into their risk models.

A.4. Provide statement indicating that vendor’s system can provide a risk contribution breakdown at user-defined levels

such as asset class, sector, country, region, and individual security level.

A.5. Provide a statement indicating that the vendor’s system can be

installed / maintained in CBK’s own servers

9

PART 2.B: GENERAL QUALIFICATIONS & EXPERIENCE

The vendor must address all items detailed below and provide, in sequence, the

information and documentation as required (referenced with the associated item

references). Evaluation Team members will independently evaluate and assign one

score for all responses to Section B— General Qualifications & Experience Items.

Item Ref.

General Qualifications & Experience Items

B. 1. Detail the name, e-mail address, mailing address, telephone number, and facsimile number of the person the Central Bank of Kenya should contact regarding the response.

B. 2. Describe your form of business (i.e., individual, sole proprietor, corporation, non-

profit corporation, partnership, limited liability company) and business location

(physical location or domicile).

B. 3. Briefly describe how long you have been providing the goods or services required

by this RFP.

B. 4. Provide information on your number of employees, client base (specify the

number of central banks who are part of your clients), and location of offices.

B. 5. Provide a statement of whether there have been any mergers, acquisitions, or

change of control of the Tenderer within the last ten (10) years. If so, include an

explanation providing relevant details.

B. 6. Provide a statement of whether the Tenderer or, to the Tenderer ‘s knowledge, any

of the Tenderer’s employees, agents, independent contractors, or subcontractors,

involved in the delivery of goods or performance of services on a contract

pursuant to this RFP, have been convicted of, pled guilty to, or pled nolo

contendere to any felony. If so, include an explanation providing relevant details.

B. 7. Provide a statement of whether, in the last ten (10) years, the Tenderer has filed (or

had filed against it) any bankruptcy or insolvency proceeding, whether voluntary

or involuntary, or undergone the appointment of a receiver, trustee, or assignee

for the benefit of creditors. If so, include an explanation providing relevant details.

B. 8. Provide a statement of whether there is any material, pending litigation against

the Tenderer that the Tenderer should reasonably believe could adversely affect

its ability to meet contract requirements pursuant to this RFP or is likely to have a

material adverse effect on the Tenderer ‘s financial condition. If such exists, list

10

each separately, explain the relevant details, and attach the opinion of counsel

addressing whether and to what extent it would impair the Tenderer’s

performance in a contract pursuant to this RFP.

B. 9. Provide a brief, descriptive statement detailing evidence of the Respondent’s

ability to deliver the goods or services sought under this RFP (e.g., prior

experience, training, certifications, resources, program and quality management

systems).

B. 10. Provide a personnel roster listing the names of key people who the Tenderer will

assign to meet the Tenderer’s requirements under this RFP. Follow the personnel

roster with a resume for each of the people listed. The resumes must detail the

individual’s title, education, current position with the Tenderer, and employment

history.

B. 11. Provide a statement of whether the Tenderer intends to use subcontractors to meet

the Tenderer ’s requirements of any contract awarded pursuant to this RFP, and if

so, detail:

d) the names of the subcontractors along with the contact person, mailing

address, telephone number, and e-mail address for each;

e) a description of the scope and portions of the goods each subcontractor

involved in the delivery of goods or performance of the services each

subcontractor will perform; and

f) a statement specifying that each proposed subcontractor has expressly

assented to being proposed as a subcontractor in the Respondent’s

response to this RFP.

B. 12. Provide a statement and any relevant details addressing whether the Tenderer is

any of the following:

e) is presently debarred, suspended, proposed for debarment, or voluntarily

excluded from covered transactions by any government or agency;

f) has within the past three (3) years, been convicted of, or had a civil

judgment rendered against the contracting party from commission of

fraud, or a criminal offence in connection with obtaining, attempting to

obtain, or performing a public (state, or local) transaction or grant under a

public transaction; violation of antitrust statutes or commission of

embezzlement, theft, forgery, bribery, falsification, or destruction of

records, making false statements, or receiving stolen property;

11

g) is presently indicted or otherwise criminally or civilly charged by a

government entity (federal, state, or local) with commission of any of the

offenses detailed above; and

h) has within a three (3) year period preceding the contract had one or more

public transactions (federal, state, or local) terminated for cause or default.

12

PART 2.C: TECHNICAL QUALIFICATIONS, EXPERIENCE & APPROACH.

The tenderer must address all items (below) and provide, in sequence, the information

and documentation as required (referenced with the associated item references). The

The evaluators will independently evaluate and score the response to each item. Each

evaluator will use the following whole number, raw point scale for scoring each item:

0 = little value 1 = poor 2 = fair 3 = satisfactory 4 = good 5 = excellent

Responding to the List of Requirements

Tenderer must respond to each requirement contained within this tender document

using the following criteria. Vendor’s responses must be in the same order in which the

questions appear and must use the same numbering scheme as outlined below:

FP Fully Provided (Out-of-the-box), Solution currently includes this capability in its current general software release.

TP Third Party Software Required Third party solutions is required to deliver this capability

M Modification to existing software Minimal modification is required to provide the requirement

C Custom Development Required Custom development required for the requirement

NA Not Available Functionality is not available (Out of the box)

O Other Other

For any specifications to which the Vendor answers other than FP (Fully Provided),

Bidder must describe:

• Whether the CBK will incur any additional cost for the feature, function, product, or

service once it becomes available other than the cost of maintaining a valid software

maintenance agreement for the current modules/system proposed by the Bidder as

part of the initial installation (i.e. a new module, replacement or upgrade to an

existing module, new hardware required, etc.)

• If the feature, function product or service falls under the category as Not Available

(N), the Bidder may provide; (a) an explanation of how the specification might be

met using alternative methods within the system or (b) if it is available from a third

party partner. Either explanation must include availability dates and additional

costs, either direct or indirect.

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

C. 1. Does the system have capability to calculate and analyze the risk

measures below both on standalone and relative-to-benchmark basis

with aggregation at both portfolio and group levels. Please provide a

separate answer for each measure listed below:

• Yield to maturity

• Modified duration

• Option-adjusted duration

• Contribution to duration

• Option-adjusted spread

• Key rates duration

• PV01

• DV01

• G-Spread

• I-Spread

• Z-Spread

• Option-adjusted convexity

• Tracking error

• Value-at-Risk

15

14

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

C. 2.

Does the system have ability to load CBK’s historical portfolio holdings and/or transactional data for historical risk analysis?

8

C. 3. Does the system have the ability to calculate risk contribution and

attribution for the following security types of investments listed

below?

a) Futures (Bonds and Interest Rate)

b) Plain Vanilla Bonds

c) Money Market Instruments

d) Inflation-Linked notes and bonds

e) Forwards

f) Swaps

g) Callable corporate and agency bonds

h) U.S. ABS and CMBS

i) Agency MBS and agency CMO

12

C. 4. Scenario Analysis and Stress Testing 10

15

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

a) Does the system have capability to perform what-if analysis

to assess impact of one or more stress factors, including

interest rate and FX shifts, credit spread changes, inflation

shocks, volatility shifts, and prepayment shifts on risk,

performance, and compliance of the portfolio in absolute

terms and relative to benchmarks / targets?

b) Does the system have capability to do stress testing (i.e., how

the portfolio would look through a 2008 crisis or other

historical crises, a 20% drop or interest rate spike of 200 basis

points) along with any system limitations and/or issues.

c) Does the system have capability to setup custom scenarios

and generate impact of these scenarios for both simulated

and actual portfolio?

C. 5. Value at Risk (VaR)

10

16

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

a) Does the system have capability to compute the following ex-ante

risk measures: Value at Risk (VaR). Conditional VaR and

Component VaR?

b) Does the system have capability to produce the above measures for

the following periods: one-day, one-month, one-quarter, one (1)

year, three (3) year and five (5) year periods?

c) Does system have capability to set user-defined (custom)

confidence levels and horizons for the calculation of Value at Risk

(VaR) and Conditional Value at Risk (CVaR)?

d) Does the system support historical, Monte Carlo and Parametric

methods for VaR calculation?

e) Describe your system’s VaR back testing capabilities

C. 6. Credit Risk 15

a) Does the system have capability to show credit risk exposures

by a classification of choice (i.e., country, country of risk, asset

class, sub-asset class, currency, portfolio manager, tranche,

issuer, counterparty, Global Industry Classification Standard

(GICS) sectors, region, industry portfolio)?

b) Does your system have the capability to track changes in the

credit rating of different counterparties?

17

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

c) Does your system have capability to utilize or integrate

market-based credit risk measures such as Market CDS

spreads data from external platforms such as Markit or

Bloomberg?

d) Does your system have a provision to compute Expected

Credit Loss (ECL), Probabilities of Default (PD) and Loss

Given Default (LGD) for counterparties, issuers and

sovereigns?

e) Does your system have an inbuilt credit rating mechanism for

counterparties, issuers and sovereigns?

f) Does the system allow calculation of a composite rating based

on ratings from rating agencies and/or internal

methodology?

g) Does the system support simulation of changes in ratings so

that the user is able to tell how the average ratings have been

affected prior to and after the ratings change?

h) Does the system keep track and report the history of changes

in ratings for counterparts and issuers, etc.?

18

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

i) Does the system have capability to compute Credit VaR for

counterparties and issuers?

C. 7. Compliance Monitoring 15

a) Does the system have features that can configure and report

concentration limits by, and not limited to, sector, country,

region, asset class, ratings?

b) Does the system allow setup of limits in notional value

and/or percentage of the portfolio size?

c) Is your system able to show exposure deviations (under or

over exposure) against the set limits at security, asset class,

issuer, counterparty, country, region, sector and credit rating

levels.

d) Does the system possess capability to set up and trigger early

warnings to assigned users for potential compliance breaches

and to assign severity levels to those warnings?

e) Does the system support viewing the compliance status by

specific attributes (exposure, ratings, sector etc.) for

counterparties and issuers, etc.?

19

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

f) Does your system have the capability to set market risk limits

such as scenario limits and stop-loss limits?

C. 6. Reporting 15

h) Does the system have capability to compute and run reports

for any user-defined reporting period for all types of

reporting

i) Does the system have capability to drill-down to position

level for all types of reporting

j) Does the system produce dynamic customizable reporting? If

so, is it easy for an end-user to create a custom report or, does

an IT Developer have to create the reporting?

k) Does the system allow the end-user the ability to export files

in formats that can be uploaded to other systems?

l) Does the system provide multiple reporting formats such as:

xls, pdf, csv, txt, and mobile formats

m) Please provide evidence that report delivery is flexible and

deliverable through multiple channels (i.e., e-mail, print, file

drop, and on-schedule’s). Please describe any limitations with

the reporting.

20

Item Ref. Technical Qualifications, Experience & Approach Items Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

n) Does the system provide for report-writer tool with user-

friendly capabilities of parameterizing generating reports.

Total Score

Total Raw Weighted Score: (sum of Raw Weighted Scores above)

𝑻𝒐𝒕𝒂𝒍 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆

𝑴𝒂𝒙𝒊𝒎𝒖𝒎 𝑷𝒐𝒔𝒔𝒊𝒃𝒍𝒆 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆 𝑿 𝟔𝟎 = 𝑺𝒄𝒐𝒓𝒆

Section B: Information Technology Requirements

PART 1 – STATEMENT OF WORK

Introduction

The section contains the technology requirements for the Investment Risk Management System (IRMS) which will be run by the Central Bank of Kenya (CBK). The CBK wishes to ensure that the IRMS system provides a leading edge to the Central Bank. The main purpose of this document is to provide a clear understanding of the meaning and scope of the information technology (IT) requirements. The IT requirements encompass all basic functionalities of a standard IRMS, with mapping to the existing IT environment of the CBK.

Project Scope

The scope of the project is for the supply and implementation, of system and their related linkages, and proposals are invited from qualified companies for:

a) Supply, installation and configuration of IRMS application software package on the

existing environment in Central Bank of Kenya;

b) Integration/linkage of the IRMS with other systems as specified in the Appendix B

c) The complete range of required services including at least the following:

(i).Project management;

(ii).Business-level advice and consultancy to CBK concerning the establishment

and operation of the system;

(iii).Customizations/parameterization of software package(s);

(iv).Installation of all software items;

(v).Implementation of all required interfaces;

(vi).Acceptance testing;

(vii).Training;

(viii).Documentation;

(ix).Support and Helpdesk;

(x).Migration of Data

(xi).Support during Going-Live

(xii).Maintenance and on-going support.

General Technical Requirements

c) Language Support: The system must provide support for English.

d) Specifically, all display technologies and software must support the ISO 8859-15,

ISO 8859-6 and Windows-1256 (if appropriate) character sets

22

Specific Information Technology Requirements

2 General Requirements

As applicable, the system should:

a) The system should support three (3) site deployment (primary, backup and

Data recovery site) for high availability.

b) Have a high level of usability with a common “look and feel” achieved

through a standard graphical user interface (GUI);

c) Comply with industry standard conventions and interfaces which allow the

system to be interfaced easily with other systems, and/or expanded by either

functional module or capacity.

d) Provide full audit trails for all activities within the system, including system

accesses and messages sent and received.

e) Have high levels of trustworthiness with particular emphasis on data

integrity and security, particularly preventing unauthorized access and assuring

100% data accuracy; support for multifactor authentication is preferred.

f) Possess high levels of service availability which will be assured through

demonstration, rigorous testing and a robust Service Level Agreement.

Integrity

The system should provide:

f) Message processing integrity checks to ensure that the total nominal value of all

instruments in all recorded portfolios is matched and reconciles with the control

totals for all issues registered.

g) Security of messages with a high level of message authentication, data integrity, and

confidentiality.

h) Guarantee of no data loss either in transmission or after a failure; system should be

able to recover gracefully in the event of unplanned/unforeseen outages

Security, Authentication, Access, and Audit

Security

e) Exchange of data between IRMS and other systems inside CBK should be hashed and

/ or encrypted.

f) The System must be based on accepted, widely used and recognized technical and

security solutions.

23

g) The System’s databases must be protected against undesired changes.

h) Users and Administrators must not be able to change the transactions history in the

System

Operating System (OS) and Platform Configurations

g) All system components (OS, Database, applications, network devices) will be

hardened according to specific Central Bank of Kenya cyber security guidelines as

well as specifications provided by the product manufacturer.

h) All software (OS, application, database) packages and modules not required for this

system must be deactivated and removed (where possible) from the system

i) The vendor must provide a list of all the minimum required software (OS,

application, databases) and service ports required for the system to function.

j) The most recent version of the software in use, with the latest security patches /

service packs must be applied across all components.

k) The supplier/vendor must have a mechanism to inform Central bank of Kenya

regularly about relevant security updates and patches that may affect smooth and

secure operations of the system.

System Security Architecture

2.1.1 System Design & Documentation

Detailed security design documentation of the system must be provided by vendor

covering, as a minimum, descriptions of:

k) system architecture

l) interfaces

m) all installed and uninstalled/disabled components or application modules

n) supplier related Operations & Maintenance Procedures (where relevant)

o) exhaustive list of all security updates and modification

p) controls against manipulation, misuse or disclosure of personal or sensitive data

q) password parameters and how they can be configured

r) user role matrix and its configuration

2.1.2 System Security

Detailed documentation must be provided with regard to security mechanisms to protect

connections to public networks.

Authentication

k) The System must only allow access to identified, authenticated, and authorized

users.

24

l) Authentication data must not be shown, stored, transported, or recorded in clear

text.

m) The strength of passwords used with operation and maintenance accounts system

must be enforced as per leading international standards. This system capability

must also be configurable to meet changing password policy control requirements

(for example, but not limited to, a change in the password length & complexity

policy requirement).

n) The system must provide a configurable mechanism:

• to detect and block simple passwords (e.g. 123456, abcdef, identical username &

password, etc.)

• check that the password does not contain more than two successive identical

characters

• to allow only the administrator to reset the passwords

• Not to allow hard-coded passwords (i.e. no service/application user passwords

displayed in source code)

o) The system must provide a password change confirmation procedure

p) The system must provide the capability to print a list of all possible access

privileges, a specific user's access privileges and comparison tables between

different user IDs

User Access

m) System access, named for this document as an Access Control System (ACS), must

be based on a documented security and system access model and architecture,

including a policy for interacting with different security and access models at

operating system and database level.

n) The ACS must be based on the “least privilege principle”.

o) The ACS must have a role-based access model.

p) The ACS must be able to set privileges and access rights to objects and subjects.

q) The ACS must categorize users into groups and define access levels on both user

level and group level.

r) This must be done in such a way that verification of the registration will be

required by another user or that full registration will require two different users.

s) The ACS must enforce the generation and use of strong two factor (incl. support for

biometric) authentication/high quality passwords and PINs

t) All remote operation and maintenance tasks must only be performed via encrypted

protocols (e.g. ssh, ssl) and unencrypted accesses deactivated

25

u) There should be a possibility of the ACS to interface to Directory Services e.g.

Active Directory for user authentication

Audit Trail

h) A log must be kept of all logon attempts on all Systems delivered by the bidder.

i) The System must maintain detailed audit trails to enable investigation of:

• suspicions of errors

• other abuses or attempted abuses of the System

• communication transmission attempts, whether successful or not

j) The System must maintain:

• a log of all errors occurring in the system including preparation of a message

• access control over the audit records

k) The system should provide audit trails on all software layers (OS, database,

application) allowing a tight control of accessed functions and information

l) The security log files & audit trail must be protected against manual modification

even by the super user and methods applied documented.

m) The system must have a configurable automated process implemented to send log

files or defined logged events to a security log server.

n) The system must be able to interface with other third-party Enterprise Log

Management System, e.g. SIEM for centralized logging

Operational requirements

General Requirements

As applicable, the system should:

g) Allow for easy customization through on-screen parameters to

accommodate new, changed or modified rules that will govern various functions

e.g. create a new message type, create a new instrument type, etc.;

h) Allow authorized personnel to change the business process flow through

the setting of parameters in process control tables.

i) Provide online access to and reporting of historical records – covering a

period of at least seven (7) years plus the current year – without compromising

response times;

j) Provide online, context sensitive help for all user and operator functions.

k) Enable automation of daily processing including initiating links to directly

interfaced systems with appropriate security procedures and exception and

summary control reports;

26

l) Be operationally resilient, with high levels of local recovery supported by

an appropriately configured High-availability and Disaster Recovery (DR)

installation and a smooth cut-over between the primary, secondary and DR sites,

and back again to the primary site when service is recovered.

System availability

c) The System must be accessible at least 20 hours a day, every day of the month

except for about four days for maintenance (planned shutdown, non-working

days for maintenance).

d) The System must have a Service Availability of 99.95% during the hours

when the System is open.

System capacity

The System must have the capacity at least: (iv). to process and settle 2,000 transactions a day, and at the same time allow use

of the System’s other functions.

(v). to have 20 users logged on and providing requests to the System concurrently.

(vi). be scalable to handle a growth rate of 50% per annum with scalability for 8

years.

Response Times

The actual response time is measured from the point where the transaction is received by

the System. The following list of requirements must be met:

e) For 95% of transactions and simple queries in real time, the response time must not

exceed 1 second during the peak hour.

f) For 95% of complex queries in real time, the response time must not exceed 2 seconds

during the peak hour.

g) The maximum response time for system log-in is 7 seconds. (Response means full

login and display of next screen)

h) The maximum response time for message arrival acknowledgement is 5 seconds.

Parameter Management

c) It must be possible to make system parameters changes, like Date changes, while a

System is open and these changes should have immediate effect.

d) Please list what system parameters can be changed or updated while a system is

open. And what changes take effect on next business day.

27

Infrastructure requirements

Environments

The IRMS will run on CBK equipment. As a mandatory requirement, the bidder will be required to implement the system in three sites, a primary processing site (data centre) at CBK’s head office, at high availability site that is not far from head office, and in a business recovery centre (DRC):

j) The equipment at the primary site is designed to have comprehensive resilience

features to ensure that, in normal operation, a failure of any single element such as a

server or blade (for example) will have no effect on the operation of the system.

k) Under normal operation the primary site will host the live version of the system.

l) The live system will be installed on servers at the three (3) sites. Responses must

contain the Bidders response as to how all sites will be installed and coupled to enable

the highest level of availability.

m) Responses must also contain details of how suitable failover procedures will be

developed and tested to allow for situations of multiple failures or complete

unavailability of one site.

n) A reference environment must be available at all times to carry copy of the live

environment to be refreshed daily for troubleshooting. Before going Live, this

environment will be considered a ‘pre-production’ version of the system that must be

installed at the primary site for use in parallel running in the period between user

acceptance and load testing and cut-over to live operation.

o) A training environment must be available at all times to allow for training of CBK

staff and new users.

p) A user acceptance testing environment must be available at all times to allow for

testing of system features, integration, performance, planned system changes, and

participant interface testing.

q) Bidders must describe how they will accomplish the following main tasks:

- Management of changes involving operating systems, system software,

middleware, databases, and application software, covering all participants where

applicable;

- Operation of the above system components;

- Testing of parameter-level changes made by the system operator.

- Testing of system performance.

r) Bidder must give full details of all hardware, system software, middleware and any

other products and equipment necessary to run the system.

28

Infrastructure – Hardware & Software

c) The following are current CBK hardware and software configurations:

• The CBK installed server hardware is IBM POWER9 Server and Windows Intel

Server Blades

• The CBK installed server operating system is AIX 8.1 and Windows Server OS

• The CBK installed database servers is Oracle 12c and above.

d) Preferably, the system should be able to operate within the above configuration of

hardware, software, and middleware.

Data Retention Requirements

Backing up data standard is:

i) Full backups will be performed over weekends

j) Incremental (only changes) backups must be performed during each business day

k) 25 business day cycles of the daily backups must be kept (each cycle to keep the pre

and post backup of the database)

l) The System must not compromise the integrity or security of confidential stored

information in any way.

m) The Bidder must provide a definition of the back-up plan according to the following

four types of data:

o System (Operating System and Applications) data

o User Data (the data specific to each part of the system that is susceptible to being

modified frequently)

o Confidential Information (relating to the architecture of the network belonging

to Central Bank of Kenya or its stakeholders)

o Log (the set of traces on what is made on/from each part of the system).

n) All backup actions must be traceable

o) Data must be retained in the System for at least 15 years. 10 years available online

and offline as backups for 15 years

p) When media used by the system is to be disposed of or reused, necessary measures

must be taken to prevent any subsequent retrieval of personal data and other

information stored.

29

High availability requirements

High Availability

Please indicate how these mandatory requirements will be met:

i) All production Systems are deployed as highly available and in redundant pairs,

in high availability site, as well as in a disaster recovery environment.

j) Replication on three active sites with real-time synchronization of application and

database. Replication of primary, secondary and disaster recovery is mandatory

for any system installed in the bank

k) Please indicate if your System can be installed and operate with this configuration

l) High availability must be ensured on all System components

m) The System must ensure “no single loss” of a message due to failure of any

component of the System.

Disaster recovery

Please indicate how these mandatory requirements will be met:

g) The Bidder must provide a documented Business Continuity Plan for the service.

h) The Bidder must provide a detailed scenario of fail over between Systems in the

production site; and between production, high availability, and DRC sites.

i) The System must be able to be run at one site with production and backup servers

and with automatic fail-over within the site, while having a high availability site

with failover to this other site.

j) The Bidder must define a down time for the fail over to the backup System within

the production site of 0 to 10 minutes.

k) The Bidder must define a max time required to fail back the service from the high

availability site to the production site of 30 mins or less (during time assigned for

maintenance)

l) Hot standby or disaster recovery site can be up to 300 KM far from the active site.

System Interfaces

All interfaces should meet the bank’s security standards, the System will have the

following interfaces. More details on interfaces provided in Appendix A.

Direct Access to the system:

The System’s users must be able to enter data to the system by the following ways:

• opening a pre-defined form for data entry – controlled data entry

30

• uploading a data file in a pre-defined format

Any interchange of data between the IRMS and other systems, must be performed

through the following methods:

• An XML message in ISO20022 format

• As an option, the system should provide for open standards architecture by allowing

exchange through web service, API, JMS, open for integration

• Bidder should provide information on all message standards that their systems

follow, particularly their forward development plans in this area.

Any report extracted from the system must be produced in, at least, the following

formats:

• XSL, XML, or comma delimited format

• PDF format

• XLS or XLXS

Portfolio Management and Transaction Processing (PMTP)

It is expected that there will be interconnection between IRMS and PMTP to download

positions, transactions and market data.

Bloomberg

The Bloomberg platform is used for execution of Fixed Income, FX and Money Market

(deposit placements) transactions. Market data – Security prices, CDS, security

definitions, FX rates – is also downloaded from Bloomberg. The new IRMS system

should therefore have capability to interface to Bloomberg for the following:

f) Fixed Income Trades,

g) FX Trades

h) Money Market Trades (Deposit Placements

i) Security definitions

j) Security Prices

Index Providers – Intercontinental Exchange

Currently, at the end of each day, the index (G1QA) composition file is received via email

from Intercontinental Exchange (ICE). The security prices are extracted from this file and

uploaded to the system. At the end of the month, the composition is uploaded to the

system for portfolio rebalancing and simulation.

Report Generation

In order to generate customized reports, the system must either

31

• provide a report generation module, where system admin, will be able to develop

customized reports bringing data from multiple areas in the system and putting them

together, including customizing page format, developing SQL queries, formatting the

output results in a customized way, and inserting static information, graphs and other

tools. This option is a preferred option, Or

• Allowing an external report generation system from accessing the IRMS system

directly, including access to read data from the system. This will imply the bidder will

provide the IRMS data structure in the form of tables or views.

Data Warehouse and Business Intelligence Platform (DWH):

c) At the end of the business day, a selective set of data (i.e. positions, limit balances)

will be transferred to the CBK data warehouse.

d) The process of generating daily reports to be sent to DWH must be automatic, in a

pre-defined file format.

Microsoft Active Directory

The IRMS systems should have capability to interface to Microsoft Active Directory for

user creation and authentication. Role assignment should be provided for in IRMS

Implementation and Support This part specifies the service requirements that must be satisfied to ensure successful

implementation of the entire system.

3 Business Level Consulting

CBK expects that the Bidder must provide a high level of business consulting and

advice – in addition to technical support – throughout the project period, drawing on

its international experience in financial market infrastructure implementation. Bidders

are required to provide documentation including system rules, certificate policy, e-

token management procedures, user acceptance tests scenario, operating procedures

and charging policies.

Project Plan and Implementation Schedule

Project Plan

Bidder must provide Preliminary Project Plans showing how they intend to carry out

all aspects of the project. Project plans must address at least the following subjects:

p) Project organization and management plan (covering both the Bidder’s team and

expectations of the Purchaser’s involvement);

q) The Bidder’s proposed project team.

32

r) Phases of the project execution showing sequencing, activities and deliverables for

each phase;

s) Task, time and resource schedules showing the estimated duration, sequence,

resource allocation and interrelationship of all key activities and resources needed

to complete the Contract, and including

t) a project plan in Gantt chart format;

u) System requirements analysis, design, development and delivery;

v) A detailed installation plan – site preparation, hardware installation and testing;

w) System integration plan;

x) Training plan;

y) Change management plan;

z) Documentation plan;

aa) Change management plan;

bb) Acceptance testing plan;

cc) Warranty and post-warranty service plan;

dd) Data Migration Plan

Implementation Schedule

CBK expects the project implementation to comprise of at least the activities listed

below. The project will follow Agile Methodology in its implementation.

Identify the Project Scope

l) Business analysis (scoping study) to establish and document the detailed

functional, technical and integration requirements of the system.

m) Customization and integration of the application software to meet the detailed

requirements documented as described in both Business and IT Requirements;

n) Installation, configuration, testing and commissioning of the technical components

(hardware and software) of the system, including integration with the existing ICT

environment as necessary;

o) Installation and testing of the application software, and third party software in all

in four (4) environments, including Development (DEV), Test (TST), Production

(PRD) and Disaster Recovery (DR):

33

p) Implementation of all required system interfaces (refer to Appendix A);

q) Training – includes business and technical training.;

r) User Acceptance Testing (UAT);

s) Pilot operation (parallel running).

t) Migration of data from old environments to IRMS

u) Go Live.

v) Post-Implementation Maintenance and Support

Bidder should include any additional activities that they feel are required.

Bidder’s Project Team

e) The Bidder must describe the competences, roles and responsibilities of their

proposed team members, including resume for all proposed team members.

f) To ensure maximum knowledge transfer, the Bidder’s project team must be

structured to work with counterparts within CBK, and Bidder must therefore

show their expectations of CBK’s team structure and management, together

with roles and responsibilities.

g) The Bidder’s assigned project staff that should not change during the project

and bidder should describe how they will ensure that the resources working on

the project will continue to be available throughout the project. If there should

be any changes in resources, bidders should describe the process for identifying

contingency resources. Replacement of the key personnel will require prior

written consent from CBK.

h) A detailed staff deployment schedule must also be provided showing the

planned engagement in person/days of each team member at each stage of the

project, both on-site in Kenya, offsite and offshore location(s).

The project team must include key specialists and alternates in at least the following areas: g. Project Management;

h. Business Experts (IRMS);

i. Systems Integration

j. Change Management

k. Training

l. Application testing

34

Each key specialist must have at least ten years of relevant experience, with the last

five years in his/her specialist area, and at least three years of industry experience

in a team leader position.

Project Management

The following section give CBK’s expectations as regards overall project management.

Bidder are invited to comment on them and to propose any variations or modifications

as they see fit.

Steering Committee

e) CBK will appoint an internal steering committee which will have oversight of the

project and will have final responsibility for all aspects. The steering committee

will liaise as required with the responsible implementation teams or staffs.

f) CBK’s project manager will act as secretary to the steering committee.

g) The steering committee will meet regularly during the project to consider the

minutes of the previous progress meeting, review progress and approve any

actions proposed by the project managers.

h) Both project managers must attend steering committee meetings.

Project Managers

CBK and the Bidder must each appoint a project manager who will have overall

responsibility for ensuring the successful and full discharge of their respective parties’

obligations under the contract. To this end the two project managers must work closely

together at all stages of the contract.

Progress Monitoring

Throughout the project execution, the Bidder’s project manager must submit to CBK’s

project manager a weekly progress report covering:

j) results accomplished during the prior period;

k) cumulative deviations to date from schedule of progress milestones as

specified in the

l) Agreed and Finalized Project Plan;

m) corrective actions to be taken to return to planned schedule of progress

and/or proposed revisions to planned schedule;

n) other issues and outstanding problems and proposed actions to be taken to

resolve them;

35

o) resources that the Bidder expects to be provided by the Purchaser and/or

actions to be taken by the Purchaser in the next reporting period;

p) other issues or potential problems the Bidder foresees that could have an

impact on project progress and/or effectiveness;

q) (as applicable) training participant test results;

r) log of service calls and problem resolutions during the preceding month.

The two project managers must hold regular formal progress meetings at a frequency

to be agreed, but no less than monthly. These meetings will be used to consider

progress to date (including the Bidder’s monthly progress reports), agree actions to be

taken to resolve problems, and update the project plan as necessary.

The project managers must invite other project team members to take part in the

progress meetings as necessary.

Written minutes of all meetings and agreed actions must be taken by CBK’s project

manager and circulated to all affected parties as applicable, including the steering

committee.

User Group Meetings

The membership of this Working Group comprises representatives of all involved CBK

departments. CBK’s project manager will convene regular meetings of the Working

Group, at which the two project managers will report on progress and consult on any

project aspects requiring user involvement.

CBK Consultancy Firm

CBK may appoint a specialized consultancy firm to support CBK in different aspects of

the IRMS implementation, including business aspects, legal aspects, and others. CBK

consultancy firm will act as a CBK staff, and It is expected that the bidder will provide

full support to the operation of the firm.

Testing and Acceptance

The full system must not be finally accepted (i.e. achieve Operational Acceptance) until

all functionality has been fully tested and shown to be working correctly at all

locations, including all users, and with full integration of all systems defined in the

SOW.

36

General

The installation and testing process must demonstrate (for all system components):

m. Ease of installation and system start up;

n. Operation of the system platform;

o. Operation and management of the systems by both business and technical teams;

p. Reliable and efficient automated communications interfaces;

q. High reliability and fast recovery in case of failures;

r. Ability to handle expected and peak workloads for a minimum period of five years’

after

s. Operational Acceptance;

t. Clear and effective documentation and other support materials;

u. Effective education and training;

v. Effective organizational arrangements for full scale operation;

w. Effective support organization;

x. Effective problem reporting, tracking and resolution procedures.

Acceptance Testing

d) Successful completion of the contract must be attained through a series of formal

acceptance tests performed on all aspects of both systems. Payment will be directly

related to successful completion of agreed milestones.

e) The acceptance tests will demonstrate that the Bidder has met each requirement

specified and agreed in the contract and has delivered all required reports and

documentation and an effective operational system.

f) Each step of the acceptance tests must be fully documented and signed-off by CBK

to signify acceptance of each element.

Sequence of User Acceptance Tests (UAT)

e. Initial acceptance tests must be performed using the system installed at the

primary site at CBK. These tests will confirm general functioning of each element of

the entire system.

f. Functional acceptance tests must be conducted across the fully installed systems in

both the primary and DR processing sites. These will entail testing every detailed

aspect of system functionality, including a full range of error checking.

g. Operational acceptance tests must involve full load (stress) testing of the system to

confirm the ability of the hardware and software (as sized by the Bidder) to handle

the maximum expected peak workload. They will include the full range of failover

procedures specified by the Bidder for handling failures at either site.

h. Interface acceptance tests must involve full testing of the system to confirm the

proper functioning of the major interfaces which include:

37

• the interface to BLOOMBERG.

• the interface to Portfolio Management and Transaction Processing System

(PMTP)

Acceptance Test Design and Execution

The Bidder must propose the contents of all acceptance tests for CBK’s approval and

planning, and modification as necessary. CBK will develop its own acceptance tests as

well, to represent its work flow and practices. All acceptance tests will be carried out

by CBK operations and technical staff, and will be monitored and supported by the

Bidder at each step. CBK will make management personnel and staff available to the

Bidder to participate actively in the acceptance test process as an integral part of the

training and knowledge transfer and eventual handover of the system to CBK.

Evaluation of Acceptance Test Results

CBK’s project manager will be responsible for the final rating of all acceptance test

results. At the end of each test phase, CBK’s project manager will provide to the Bidder

either a formal letter of acceptance if the Bidder has met its contractual obligations, or a

statement specifying which obligations have not been met and must be met before

acceptance can be granted.

Operational Acceptance will be achieved only after successful completion of all tests

and formal acceptance of all project deliverables.

Fault Correction

The Bidder must be responsible for correcting all faults (i.e. instances where any

element of the systems does not perform in accordance with the signed-off

specification) found during acceptance testing in a timely manner so that the overall

project schedule is not affected.

Training and Knowledge Transfer

Knowledge Transfer

CBK considers training and knowledge transfer to be among the most important

factors for the success of the project. An important objective is therefore to ensure

effective transfer of IRMS and related technological knowledge. The bidder must

prepare targeted technical and business-based knowledge transfer to the relevant

teams. This is viewed as critical for all parties to become self-sufficient in the operation

and maintenance of the new services and related technologies. The Bidder must

describe in detail how they intend to achieve a high degree of knowledge transfer.

38

Training

e) The Bidder must provide training plans showing, for each system element to be

supplied, and for the project overall, all proposed training programs, the

recommended number and (if applicable) prior knowledge of people to be trained

in each institution, the duration of each training module and the proposed number

of times each module is proposed to be delivered. The training programs will

include:

(v). Functional Training - Class room sessions on all required modules for the

Project Core Team (business super users, business analysts)

(vi). Technical Training - Class room sessions on all technical aspects of the system

e.g. data organization, customization, interfacing with other standard software

like Bloomberg, Reuters, SWIFT, legacy systems installation, and maintenance

aspects of the system.

(vii). End User Training (Functional & technical) - Class room sessions for End Users.

This should be given just before QA environment and User Acceptance testing,

so the team is ready for the Acceptance testing.

(viii). Operations Training – computer operations requirements, security operations,

backup, disaster recovery and business continuity operations

f) Qualified personnel who hold relevant certificates as applicable must carry out all

training. The Curriculum Vitae and copy/ies of certificate/s must be supplied for

each trainer proposed.

g) Training plans should specify any prerequisites that must be satisfied prior to the

commencement of training. They should cover not only CBK but all involved

organizations as applicable to each component/module of the IRMS.

h) Any other relevant training that will enable optimal usage of the system

Documentation

Preliminary project plans must contain detailed specifications of the documentation,

which the bidder will provide, indicating for each item: (i) on which medium or media

it will be supplied; and (ii) whether it is a standard document or it will be tailored to

the specific context of the CBK system.

CBK expects that the supplied documentation must include at least the following:

e) Product Literature, describing the different system components that address the

business and technical requirements of this procurement;

39

f) End-user Documentation, tailored as applicable, covering operations guides,

operating manuals, and standard user manuals. On-line help must be provided in

all system modules;

g) Technical Documentation that CBK will need to use for the safe and effective

running of the processing environment. This should include ‘as-built’ and final

design documentation that includes the selected options and configuration settings,

and all operating instructions and procedures. This must include:

viii. Utility software functional specifications and descriptions;

ix. Application software functional specifications and descriptions;

x. Documentation covering the testing environment;

xi. Instructions for backup, restore and selective restore;

xii. Instructions for switch-over of processing to and from the Hi-Availability

and DRC sites;

xiii. As-Built and Final Design documentation that includes the selected

options and configuration settings;

xiv. Any other technical documentation that the CBK will need to use for the

safe and effective running of the processing environment.

h) Detailed Documentation of Operational Processes. This must include:

xi. Standard batch scripts;

xii. Recommended scheduling of batch jobs (background and foreground);

xiii. Details of all background and foreground tasks;

xiv. Dependencies of all programs within each batch;

xv. Dependencies between batches;

xvi. Details of all standard reports;

xvii. Internal integrity controls performed by the system;

xviii. Relationships between programs and data;

xix. Relationship between application and operating system;

xx. Relationship between application and database manager.

Migration of Data

Data migration must follow the following approach:

f) The Bidder must provide clear guidelines detailing data to be migrated from legacy

system. All necessary datasets required in IRMS from the legacy system must be

documented in detail.

g) A process to validate the migrated data must be put in place to audit the data. This

must include reconciliation reports to show statistics and checksums for the data

migrated vs the legacy system.

40

h) Just before the first day of going live, to migrate opening balances of all accounts,

positions, static data, custodians, plus history of transactions, allowing for printing

of account statements, calculating of taxes, and other functions depending on

historical data.

i) The migration process must be planned very well, and there must be an automated

batch that handles all data coming from T24 for migration, restructure it, and inserts

them in the IRMS database.

j) There will be need to have parallel (pilot) runs to ensure that the migrated data is

valid and system is reporting at par as the production system.

Go-Live, Warranty and Support Services

Go-Live Support

The Bidder must provide on-site support for the system during the Go-Live process to

ensure smooth and timely switch to the new system. The support should cover both

production and disaster recovery sites.

Warranty Period

The Bidder must provide operational support for the system on-site at the primary and

alternate processing sites for a period of three (3) months after Go-Live. During this

time, the Bidder’s support personnel must be available on an immediate on-call basis

during normal business hours at CBK’s head office.

Support and Maintenance Period

Bidder must provide support for the entire system at no charge for a period of 24

months after Go-Live. The Bidder will establish a single point of contact for all

software or support related problems. The contact point will be available throughout

the system operational day, which will be agreed between CBK and the Bidder during

implementation.

During this maintenance period, any new releases and upgrades of the system will be

installed at no additional charge. The Bidder and CBK will agree on the pricing and

period of maintenance after expiry of this initial maintenance period.

The Bidder will establish a single point of contact for all software or support related

problems. The contact point will be available throughout the system operational day,

which will be agreed between CBK and the Bidder during implementation.

Terms for out of hours support must also be agreed upon during this period. The

support services must include at least the following:

b) Software support, including:

41

vii. Problem response, management and resolution as detailed below;

viii. Error correction (patches) for the application software.

ix. General advice and guidance for all software products including

application packages, system software, DBMS, middleware etc.

x. The Bidder shall ensure that sufficient resources (with respect to the

number of personnel and such personnel's training, competence, and

experience) are available to provide the software support services at all

times. The resource available shall be of an appropriate skill level to

minimize any impacts to the levels of service required by CBK, covering

knowledge of CBK’s business operations as well as expertise in the

application software.

xi. Provision of all patches and corrective, new and updated

xii. versions of all supplied software products which become available,

including change management support for introducing them. Bidder

should contain details of the methodology for supplying and

implementing software upgrades during the life of the system, including

measures to ensure that full training is provided on changes and

enhancements as needed, and that business continuity is guaranteed

during upgrades, additions or changes.

On-going implementation of changes if required/requested by CBK. Bids must include

the Bidder’s proposed procedures for processing and implementing Change Requests,

including the costs per person/hour or person/day for all categories of personnel who

may be involved in the Change Request process. Such costs shall be fixed for the

duration of the Warranty Period

Service Level Agreement (SLA)

The bidder will provide a draft SLA agreement detailing the service hours, system

availability, and the business impact levels for CBK review.

Extreme Situations

Bidders are requested to suggest procedures that can invoked in the event of extreme

emergency situations, extreme event which affects both the main IT processing center

at CBK’s head office and alternative centers.

Problem Management

The Bidder’s support center must answer incoming telephone calls within one minute

and will check email not less frequently than every ten minutes.

All problems notified to the Bidder must have a priority assigned by CBK that will

define the severity and impact to CBK’s service levels with a resolution target and

42

escalation framework to make sure the effects of the problems are restrained or

minimized.

Priority levels will be as follows:

e) Priority 1: A system component has failed in such a way that one or more critical

elements of the system are unusable. The Bidder must provide appropriate support

within fifteen minutes and provide a work-around or fix within two hours of

receiving notification.

f) Priority 2: The service is severely impacted and performance is restricted. The

Bidder must provide appropriate support within two hours and provide a work-

around or fix within four hours of receiving notification.

g) Priority 3: The service is impacted and performance is reduced. The Bidder must

supply a work around or fix within 24 hours of receiving notification.

h) Priority 4: The service may be impacted and performance can be reduced. Priority 4

problems must be supported during the Bidder’s and CBK’s normal hours of

business.

Details of problems logged with the Bidder, whether during the project, the System

Warranty Period or under an on-going Service Level Agreement, must be easy for CBK

to follow up. Regular reporting must be a standard feature of the service, provided by

the bidder on on-line basis, and must include:

e) The number of service-disrupting incidents over any selected period by source of

disruption and in total;

f) The number of non-services disrupting incidents reported over any selected period;

g) The time taken to restore normal service after each recorded service disruption.

h) Bidder should also explain how CBK staff can monitor reported problems on a

regular basis.

Performance Expectations

CBK expects a very high level of reliability and availability of all its systems and the

system will be particularly crucial in this respect.

CBK’s expectations of overall system performance include:

d) There will be no more than a total of three software failures per annum, and no

more than one in any single month. A software failure is defined as an event where

a component of the application fails to respond to operator instructions and fails to

perform its normal function, and requires to be manually restarted or fails to

43

restart. In every case the time to recover from a failure shall be no more than 30

minutes.

e) In a situation where the system performance is degraded, this must not delay end

of day processing by more than 30 minutes. There will be no more than one such

incident per month or three per year.

f) CBK’s general availability expectation for this system is 99.95% (where downtime

is defined as total unavailability of the service). Bidder are requested to give details

of expected reliability and availability figures for the actual configuration

(hardware, software etc.) they are proposing.

44

PART 2 – REQUIREMENTS MATRIX AND EVALUATION GUIDE

The tenderer must respond to every stated request or requirement and indicate that

they confirm acceptance of and understand the CBK’s stated requirements. The

deferral of a response to a question or issue to the contract negotiation stage is not

acceptable. Any item not specifically addressed in the Vendor’s proposal will be

deemed as accepted by the Vendor.

Responding to the List of Requirements

Tenderer must respond to each requirement contained within this RFP using the

following criteria. Tenderer’s responses must be in the same order in which the

questions appear and must use the same numbering scheme as outlined below:

FP Fully Provided (Out-of-the-box), Solution currently includes this capability in its current general software release.

TP Third Party Software Required Third party solutions is required to deliver this capability

M Modification to existing software Minimal modification is required to provide the requirement

C Custom Development Required Custom development required for the requirement

NA Not Available Functionality is not available (Out of the box)

O Other Other

For any specifications to which the Vendor answers other than FP (Fully Provided),

Bidder must describe:

• Whether the CBK will incur any additional cost for the feature, function, product, or

service once it becomes available other than the cost of maintaining a valid software

maintenance agreement for the current modules/system proposed by the Bidder as

part of the initial installation (i.e. a new module, replacement or upgrade to an

existing module, new hardware required, etc.)

• If the feature, function product or service falls under the category as Not Available

(N), the Bidder may provide; (a) an explanation of how the specification might be

met using alternative methods within the system or (b) if it is available from a third

party partner. Either explanation must include availability dates and additional

costs, either direct or indirect.

45

Item Ref. Information Technology Requirements, Project Management etc

Item Score

Evaluation Factor

Weighted Score

Response (FP, TP, M, C, NA, O)

C. 1. General Requirements 10

q) Can your product be maintained on a client’s own

server? What database system (i.e., SQL, Oracle,

etc.) does your system use?

r) Identify the most current version of the software.

Detail the percentage of live customers that are

utilizing the proposed version of the software.

Please provide a breakdown of customers (by

percentage) for each version of the software

currently in use.

s) Please describe any modules or add-ons that you

offer for your software.

t) Describe how often a client should upgrade the

software including what the trigger or decision

point is for upgrading/changing the system, and

if there is an associated cost.

u) How many environments are supported in the

basic offering for a client? Is a development

46

version of the system available to clients for

testing?

v) Are the error messages produced by your system

in plain English, and do they contain a specific

reason for the occurrence of error?

w) Does the system have an aging report which

shows how long an outstanding item has

remained in the system? Can this be customised to

define the red CBK preferred line?

x) Describe the End of Day process.

C. 2. Integrity 3

e) Describe features of system that guarantee zero

data loss especially during recovery from

unplanned outage

f) What privacy methods used to ensure that

confidential Data and sensitive communications

are kept private?

C. 3. Security, authentication, access and audit 7

q) What security tools are included with the software?

How does your application restrict access to the

following: administrative tool access, application

47

access, menu access, record access, field access and

querying/reporting access?

r) Does your system maintain audit trails of all

changes to pricing methods, risk models and any

other administrative changes that would affect the

calculation or reporting of investment transactions?

s) Does the system provide capability to administer

user and group security permissions for access to

software solution

t) Does the system support integration with

Microsoft Active Directory? List other directory

servers supported.

u) Does the system support role-based access?

v) Does the system support complex passwords? Can

the administrator set / change the level of

password complexity required?

w) Does the system provide facility to disable / enable

a user account?

x) Does the system have capability to provide audit

trails, logs, history tracking and reports for user

48

activity such as authentication, data access inserts,

updates and deletions etc.

y) Provide detailed solution architecture for the

proposed system highlighting the required

interfaces and technology platforms

z) Does the system provide classification of log events

into following classes: Errors, Warning,

Information, Debug and Trace?

aa) Does the system restrict access to system logs to

only authorized users?

C. 4. Operational Requirements 5

h) Describe the system features for meeting workload

processing demands

i) Describe the scalability features of the system

j) Does your system provide the client with the

ability to use monitoring statistics to verify that

functionality is available? Please provide a list of

monitoring software partners.

C. 5. Infrastructure Requirements 7

49

h) Please describe the technical resources which

support the platform and their physical locations

and time zones supported.

i) Identify the operating system required by the

proposed applications software and database

management system. In the event there is more

than one suitable operating system, list all options

indicating the relative strengths and drawbacks (if

any) of each.

j) Provide the ideal database platform choices for the

proposed software. In the event that there is more

than one suitable database platform, please list all

options.

k) Is the Oracle 12c Database Platform supported?

l) Is the system supported on three (3) site

configuration – primary, backup and disaster

recovery – where is replicated to all sites. CBK uses

two or three application environments. Generally,

these are Production, Test and Development. These

are used for, testing application patches, testing

configuration changes, testing security patches,

user acceptance of new functionality, isolated fault

finding analysis, user training, other application

integration testing i.e.

50

C. 6. Business Continuity 10

g) Does the system support clustering and high

availability?

h) Describe systems backup process for the proposed

system.

i) Describe the disaster recovery features for the

proposed system

j) What is the estimated down time for the fail over

to the backup or disaster recovery system?

k) Is the system able to run in load balanced

environment?

C. 7. System Interfaces and Customizations 10

m) Does your system have pre-built data feeds into

Bloomberg for market data, security definitions

and market data?

n) Does your system have pre-built data feeds into

Refinitiv (Reuters) Platform for market data and

trade tickets? If so, please describe including any

system limitations and/or issues with the process.

o) Does the system have capability to consume

RESTful and SOAP web services?

51

p) Does the system have capability to interface to

common Portfolio Management Systems?

C. 8. Implementation, Maintenance and Support 15

k) Provide the standard timeframe for a fully

implemented system per the scope of this RFP. If

the proposal contains a phased approach, provide

typical duration(s) for each phase and a listing of

the modules proposed for each phase. The phases

include: Scope review, Business Analysis,

Installation and Configuration, User Acceptance

Testing, Data Migration, Go-Live, etc.

l) What implementation methodology do you

typically use for system implementations? Agile

or SDLC

m) What approach do use for conducting the business

analysis / scoping?

n) Describe the implementation methodology /

lifecycle / activity sequence for a typical

implementation of the package from project

initiation through to warranty.

Customizations, Upgrades and Release Management

52

o) What is the process of identifying and

implementing system customizations / change

requests?

p) Describe the release process that is followed

including the frequency of releases and versioning

q) Describe the release nomenclature (i.e. minor,

major releases)

r) Describe the methodology for issue and problem

management. What tools are used to support this

process.

s) If a client encounters system issues that must be

resolved with a software patch, are software

patches supplied by you or does a client have to

wait until the next software release?

C. 9. Project Team 8

l) Describe your project organization structure and

assigned project staff. Describe the skills,

experience, and roles and responsibilities for each

project team member and their location (on-site,

offsite, offshore).

53

m) Describe the resource requirements (include

onsite, off site and offshore resources) for the

typical implementation of the base package.

Provide the estimated time of the resources on the

project.

n) Describe the process of identifying contingency

resources when the primary are unavailable for

the project implementation

o) Describe your expectation of the structure and

composition of the CBK project team

Training

10

p) Describe your technical, functional and end-user

training program(s) you provide. Indicate the

delivery location (onsite or offsite) and duration of

training

q) Do you provide both end-user and technical

documentation?

r) Do you provide custom training tailored for

specific needs or group of users?

Support

54

s) Describe the customer service/support that you

provide. What is the typical response time for

client requests?

t) Which locations is support is available (local,

EMEA and/or global)?

u) Describe your levels of support programs. Does

your company provide guarantees on software

performance or support Service Level Agreements

(SLAs).

v) Please list the number and type of personnel

resources that are necessary to support ongoing

operations of your system and/or system modules

as dictated by system design.

C. 10. Project Management 15

c) Provide / describe your project management

methodology / plan

d) Provide a matrix of “roles and responsibilities” for

each major activity and task contained within the

proposed implementation plan.

C. 11. Licensing 5

g) What is the licensing metric used for the system –

per user, per Server, per module?

55

h) Is the licence perpetual or periodically (annual)

renewed?

i) Do the testing and development instances require

a separate license?

j) Is the disaster recovery instance licensed

separately?

k) Do you have third party products or tools that

need to be licensed separately? Provide the list?

l) Describe how you ensure that third-party

products are licensed?

C. 12. Data Backup 5

g) Does the system have capability to archive data

based on user defined parameters such as date

range?

h) Does the system have capability to schedule

backup or manually initiate back up process?

i) Does the system have ability to automatically

synchronise data with disaster recovery site (or

system)?

56

j) Does the system have capability to restore backups

to a point in time?

Total Score

Total Raw Weighted Score: (sum of Raw Weighted Scores above)

𝑻𝒐𝒕𝒂𝒍 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆

𝑴𝒂𝒙𝒊𝒎𝒖𝒎 𝑷𝒐𝒔𝒔𝒊𝒃𝒍𝒆 𝑹𝒂𝒘 𝑾𝒆𝒊𝒈𝒉𝒕𝒆𝒅 𝑺𝒄𝒐𝒓𝒆 𝑿 𝟑𝟎 = 𝑺𝒄𝒐𝒓𝒆

APPENDIX A: LIST OF INVESTMENT INSTRUMENTS

7. Money Market

7.1. Time Deposits

7.2. Certificate of Deposits

7.3. REPOs, Reverse REPOs & Securities Lending

7.4. Commercial Paper

7.5. Treasury bills

7.6. Cash / Demand Deposit

8. Fixed Income

8.1. Sovereign Notes / Bonds – Fixed and Floating

8.2. Sovereign Agency Notes/ Bonds – Fixed and Floating

8.3. Corporate Bonds

8.4. Emerging Market Bonds

8.5. Local / Regional Government Bonds

8.6. Ex-Div Bonds

8.7. MBS

8.8. ABS

8.9. SOFR Linked Bonds

9. Gold

10. Derivatives

10.1. FX Forward Outright

10.2. FX Swaps

10.3. Dual Currency Deposits

10.4. Futures

10.4.1. Interest Rate Futures

10.4.2. Bond Futures

11. Equities

Appendix B: Application Interfaces

Interface Name Direction Interface Technology (Middleware)

Interface Data and Descriptions

11. Bloomberg 2-way Fix Messages / API

Bloomberg to IRMS

i) Security Prices j) Exchange Rates k) Fixed Income Trades l) FX Trades m) Money Market Trades n) Index Compositions o) Index Returns p) Security Definitions

12. Portfolio Management and Transaction Processing (PMTP)

1-way API / Database PMTP to IRMS

e) Positions f) Cash g) Reference data

13. Enterprise Directory Server ( Microsoft Active Directory)

2-way TCP Port IRMS to Active Directory

c) User Authentication Request d) User Creation Request

ANNEX C

INTERNATIONAL TENDER FOR SUPPLY, DELIVERY, TESTING AND COMMISSIONING OF PORTFOLIO

MANAGEMENT AND TRADE PROCESSING SYSTEM (PMTP) AND INVESTMENT RISK MANAGEMENT SYSTEM

(IRMS)

REF. NO. CBK/25/2020/2021

CONTRACT FORM The Central Bank of Kenya (CBK) expects the Offeror to submit its proposed reserves management system contract terms and conditions as well as the support and maintenance services contract terms and conditions along with its technical proposal for review and acceptability by the CBK. It is expected that the proposed reserves management system contract and the support and maintenance service contract of the selected Offeror will be subject to discussion and negotiation prior to the contract award and execution. It is expected that the signatories and parties executing the resulting reserves management system contract will be the Offeror and the CBK. With respect to the contractual elements in the matrix below, the bidder is required to provide a response to each of the items. The Bank is open to negotiating all the contractual terms in the RMS Agreement. However, due to legal and regulatory constraints, the Bank will hold some contractual provisions as non-negotiable. The non-negotiable provisions are indicated as such in the matrix. As part of the discussions on the proposed system agreement, the CBK will expect the service provider to address within its provisions the following items including, but not limited to:

2

No. Provision / issue Proposed minimum standard / proposed discussion

Is the offeror willing to negotiate (tick applicable column)

YES NO

1. Warranty/standard of goods and services

The Service Provider will provide a warranty that the procured goods and services are fit for use in keeping with international best practice and provide a warranty

2. Sovereign Immunities The CBK will preserve its sovereign immunities – Non-Negotiable

3. Dispute Resolution We would prefer to allow for non-exclusive jurisdiction of courts

4. Applicable/Governing Law

Kenyan law or the law of England and wales

5. Limitation of liability The service provider will not limit liability for loss due to intention, fraud or negligence of the service provider or its agents.

6. Indemnities Indemnity obligations will apply equally to both parties

7. Consequential Damages No party will be liable for consequential damages

8. Termination Notice The Service Provider will give notice of not less than 180 days of its intention to terminate the contract – except for termination due to a force majeure event

3

No. Provision / issue Proposed minimum standard / proposed discussion

Is the offeror willing to negotiate (tick applicable column)

YES NO

9. Software held in Escrow The service provider will consent to surrender the software to be held in escrow by a party to be agreed upon by both parties

10. Assignment /sub-contracting

The Service provider will not assign or subcontract its rights and obligations under the contract in any manner whatsoever without the Bank’s express written consent

11. Advertising Restrictions (Sovereign’s Name/Logo, etc.)

Neither party will advertise or announce the contractual relationship without the others’ written consent, which consent will not be unreasonably withheld

12. Insurance Requirements The Service provider will

have in place adequate

relevant insurance

including professional

indemnity for its personnel

to ensure uninterrupted

delivery of its obligations

under the contract

13. Force Majeure Whatever force majeure events as may be defined under the contract will apply equally to both parties

14. Technical and financial Proposal

The procurement laws in Kenya stipulate that the

4

No. Provision / issue Proposed minimum standard / proposed discussion

Is the offeror willing to negotiate (tick applicable column)

YES NO

bidder’s technical and financial proposal automatically form part of the contract. We will therefore require the contract to specifically mention that the technical and financial proposal are part of the contract

15. Annual maintenance and support Services

Please confirm that you are also willing to enter into an annual support and maintenance service contract with the Bank for the RMS