Loading...
The URL can be used to link to this page
Your browser does not support the video tag.
Home
My WebLink
About
Contract 50108
--A- 6 7" 8 , ti6T SECRETARY K U1 �`4\ewe, ti *05\11E *05\11E 2� 2011 4 AGREEMENT O�(�FF�CR�PR�H BETWEEN `eo a,7 THE CITY OF FORT WORTH AND 9 of . LEXISNEXIS RISK SOLUTIONS FL INC. This AGREEMENT ("Agreement") is entered into by and between LEXIsNExis RISK SOLUTIONS FL INC., ("Seller") and the CITY OF FORT WORTH ("Purchaser"), collectively the "parties." The Contract documents shall include the following: 1. GSA Contract#GS-35F-0416W-BAIR ANALYTICS—contract end date 5/9/2020; 2. GSA-07F-0265X-LEXIS NEXIS—contract end date 1/31/2021; 3. LexisNexis Risk Solutions Government Application &Agreement; 4. ATAC Workstation License Terms Addendum; and 5. Schedule A — Accurint Crime Analysis via Accurint for Law Enforcement ATAC Workstation. 6. Accurint Crime Analysis and LexisNexis Community Crime Map Addendum Notwithstanding any language to the contrary in the Contract Documents, the Parties hereby stipulate by evidence of execution of this Agreement below by a representative of each party duly authorized to bind the parties hereto, that the parties hereby agree that the provisions in this Agreement below shall be applicable to the Contract Documents as follows: 1. Attorneys' Fees, Penalties, and Liquidated Damages. To the extent the attached Contract Documents requires the Purchaser to pay attorneys' fees for any action contemplated or taken, or penalties or liquidated damages in any amount, the Purchaser objects to these terms and any such terms are hereby deleted from the Contract Documents and shall have no force or effect. 2. Law and Venue. All of the Contract Documents and the rights and obligations of the parties hereto shall be governed by, and construed in accordance with the laws of the United States and state of Texas, exclusive of conflicts of laws and provisions. Venue for any suit brought under this Agreement shall be in a court of competent jurisdiction in Tarrant County, Texas. To the extent this Agreement is required to be governed by any state law other than Texas or venue in Tarrant County, the Purchaser objects to such terms and any such terms are hereby deleted from this Agreement and shall have no force or effect. 3. Sovereign Immunity_. Nothing herein constitutes a waiver of the Purchaser's sovereign immunity. To the extent any of the Contract Documents require the Purchaser to waive its rights or immunities as a government entity; such provisions are her ave no force or effect. OFFICIAL RECORD CITY SECRETARY El MRTH-TX Agreement between LexisNexis Risk Solutions FL,Inc.and City of Fort Worth Page of 3 4. No Debt. In compliance with Article 11 § 5 of the Texas Constitution, it is understood and agreed that all obligations of the Purchaser hereunder are subject to the availability of funds. If such funds are not appropriated or become unavailable, the Purchaser shall have the right to terminate any of the Contract Documents except for those portions of funds which have been appropriated prior to termination. 5. Confidential Information. The Purchaser is a government entity under the laws of the State of Texas and all documents held or maintained by the Purchaser are subject to disclosure under the Texas Public Information Act. To the extent the Contract Documents requires that the Purchaser maintain records in violation of the Act, the Purchaser hereby objects to such provisions and such provisions are hereby deleted from the Contract Documents and shall have no force or effect. In the event there is a request for information marked Confidential or Proprietary, the Purchaser shall promptly notify Seller. It will be the responsibility of Seller to submit reasons objecting to disclosure. A determination on whether such reasons are sufficient will not be decided by the Purchaser, but by the Office of the Attorney General of the State of Texas or by a court of competent jurisdiction. 6. No Boycott of Israel. Seller acknowledges that in accordance with Chapter 2270 of the Texas Government Code, the Purchaser is prohibited from entering into a contract with a company for goods or services unless the contract contains a written verification from the company that it: (1) does not boycott Israel; and(2)will not boycott Israel during the term of the contract. The terms "boycott Israel" and "company" shall have the meanings ascribed to those terms in Section 808.001 of the Texas Government Code. By signing this Amendment, Seller certifies that Seller's signature provides written verification to the Purchaser that Seller: (1) does not boycott Israel; and (2) will not boycott Israel during the term of the Contract Documents. 7. Agreement Controlling. If any provisions of the Contract Documents conflict with the terms herein, are prohibited by applicable law, conflict with any applicable rule, regulation or ordinance of the Purchaser, the terms in this Agreement shall control. 8. Fiscal Funding Limitation. In the event no funds or insufficient funds are appropriated and budgeted or are otherwise unavailable by any means whatsoever in any fiscal period for payments due under the Contract Documents, then the Purchaser will immediately notify Seller of such occurrence and the Contract Documents shall be terminated on the last day of the fiscal period for which appropriations were received without penalty or expense to the Purchaser of any kind whatsoever, except to the portions of annual payments herein agreed upon for which funds shall have been appropriated. 9. Right to Audit. Seller agrees that the Purchaser shall, until the expiration of three (3) years after final payment under the Contract Documents, have access to and the right to examine any directly pertinent books, documents, papers and records of Seller involving transactions relating to the Contract Documents. Seller agrees that Purchaser shall have access during normal working hours to all necessary Seller facilities and shall be provided adequate and Agreement between LexisNexis Risk Solutions FL,Inc.and City of Fort Worth Page 2 of 3 appropriate workspace in order to conduct audits in compliance with the provisions of this section. The Purchaser shall give Seller reasonable advance notice of intended audits. Executed this the&ftay of ';"7617. PURCHASER: CITY OF FORT WORTH CONTRACT COMPLIANCE MANAGER: By signing I acknowledge that I am the person responsible for the monitoring and administration of this contract,including ensuring all performance By: "" and reporting requirements. Name: Title: Assistant City Manage Date: 44 17'w 1BY: `I — Name: Wchek e APPROVAL RECOMMENDED: Title: ecti o 0 APPROVED AS TO FORM AND LEGALITY: By: �fNa e: , Title: BY: me: John B. Strong ATTEST: Q R T Title: Assistant City Attorney TRACT AUTHORIZATION: . NA By: NAName: Title: City Sedetary •7�XP SELLER: LEXISNEXIS RISK SOLUTIONS FL INC. By: Name: Haywood Talcove Title: Chief Executive Officer Date: October 18 2017 OFFICIAL RECORD CITY SECRETARY ff.WORTH,TX Agreement between LexisNexis Risk Solutions FL,Inc.and City of Fort Worth Page 3 of 3 BAIlZ Analytics Inc. AUTHORIZED INFORMATION TECHNOLOGY SCHEDULE PRICELIST GENERAL PURPOSE COMMERCIAL INFORMATION TECHNOLOGY EQUIPMENT,SOFTWARE AND SERVICES SPECIAL ITEM NUMBER 132-33-PERPETUAL SOFTWARE LICENSES FSC CLASS 7030 - INFORMATION TECHNOLOGY SOFTWARE Application Software for Large Scale Computers and Microcomputers SPECIAL ITEM NUMBER 132-34-MAINTENANCE OF SOFTWARE AS A SERVICE Note 1:All non-professional labor categories must be incidental to and used solely to support hardware,software and/or professional services,and cannot be purchased separately. Note 2:Offerors and Agencies are advised that the Group 70—Information Technology Schedule is not to be used as a means to procure services which properly fall under the Brooks Act.These services include,but are not limited to,architectural, engineering,mapping,cartographic production,remote sensing,geographic information systems,and related services.FAR 36.6 distinguishes between mapping services of an A/E nature and mapping services which are not connected nor incidental to the traditionally accepted A/E Services. Note 3:This solicitation is not intended to solicit for the reselling of IT Professional Services,except for the provision of implementation,maintenance,integration,or training services in direct support of a product.Under such circumstances the services must be performance by the publisher or manufacturer or one of their authorized agents. Bair Analytics Inc. 640 Plaza Drive,Suite 340 Highlands Ranch,Colorado 80129 (800)380-1138 www.bairanalytics.com Contract Number:GS-35F-0416W Period Covered by Contract: 10 May 2010—09 May 2020 General Services Administration Federal Acquisition Service Pricelist current through Modification PS-0021,dated August 31,2015. Products and ordering information in this Authorized FSS Information Technology Schedule Pricelist are also available on the GSA Advantage! System(http://www.gsaadvantage.gov) Page 1 of 13 BAIR AnW3qics Inc. Table of Contents INFORMATION FOR ORDERING ACTIVITIES APPLICABLE TO ALL SPECIAL ITEM NUMBERS. 3 &4 TERMS AND CONDITIONS APPLICABLE TO TERM SOFTWARE LICENSES(SPECIAL ITEM NUMBER 132-32),PERPETUAL SOFTWARE LICENSES(SPECIAL ITEM NUMBER 132-33)AND MAINTENANCE AS A SERVICE(SPECIAL ITEM NUMBER 132-34)OF GENERAL PURPOSE COMMERCIAL INFORMATION TECHNOLOGYSOFTWARE.......................................................................................................................5 -7 DESCRIPTION OF SOFTWARE PRODUCTS...............................................................................................8 SOFTWARE,MAINTENANCE AND TRAINING COST SCHEDULE.......................................................9-10 Termsof Use ................................................................................................................. 11-13 Page 2 of 13 BAM Anal ics Inc. Ia.Table of awarded special item number(s)with appropriate cross-reference to item descriptions and awarded price(s). See Pricelist lb.Identification of the lowest priced model number and lowest unit price for that model for each special item number awarded in the contract.This price is the Government price based on a unit of one, exclusive of any quantity/dollar volume,prompt payment,or any other concession affecting price. Those contracts that have unit prices based on the geographic location of the customer,should show the range of the lowest price,and cite the areas to which the prices apply. See Pricelist 1 c.If the Contractor is proposing hourly rates,a description of all corresponding commercial job titles, experience,functional responsibility and education for those types of employees or subcontractors who will perform services shall be provided. If hourly rates are not applicable,indicate"Not applicable"for this item.Not Applicable 2.Maximum order.$500,000 3.Minimum order.$100.00 4.Geographic coverage(delivery area). The Geographic Scope of Contract will be domestic delivery only. 5.Point(s)of production(city,county,and State or foreign country). Highlands Ranch,CO 80129 6.Discount from list prices or statement of net price. See pricing chart below 7.Quantity discounts.None 8.Prompt payment terms.Net 30 Days 9.Notification that Government purchase cards are accepted at or below the micro-purchase threshold.Yes 10.Foreign items(list items by country of origin).None I la.Time of delivery.(Contractor insert number of days.) 15 Days for Items Under SIN 132-32. l lb.Expedited Delivery.The Contractor will insert the sentence"Items available for expedited delivery are noted in this price list."under this heading.The Contractor may use a symbol of its choosing to highlight items in its price lists that have expedited delivery. Need to contact the Contractor directly. 11 c.Overnight and 2-day delivery.The Contractor will indicate whether overnight and 2-day delivery are available.Also,the Contractor will indicate that the schedule customer may contact the Contractor for rates for overnight and 2-day delivery.Need to contact the Contractor directly. 11 d.Urgent Requirements.The Contractor will note in its price list the"Urgent Requirements"clause of its contract and advise agencies that they can also contact the Contractor's representative to effect a faster delivery. Need to contact the Contractor directly 12.F.O.B.point(s). Destination 13a.Ordering address(es).640 Plaza Drive,Suite 340,Highlands Ranch,Colorado 80129 Authorized Dealer: Page 3 of 13 LexisNexis Gaurang Dave Contracts Manager 9393 Springboro,OH 45342 Miamisburg,OH 45342 Tel:202-378-1018 Gaurane.Dave(&LNSSI.com 13b.Ordering procedures:For supplies and services,the ordering procedures, information on Blanket Purchase Agreements(BPA's)are found in Federal Acquisition Regulation(FAR)8.405-3. 14.Payment address(es). 640 Plaza Drive,Suite 340,Highlands Ranch,Colorado 80129 Authorized Dealer: LexisNexis Gaurang Dave Contracts Manager 9393 Springboro,OH 45342 Miamisburg,OH 45342 Tel: 202-378-1018 Gaurana.Dave(&LNSSI.com 15.Warranty provision. See Submitted Warranty 16.Export packing charges,if applicable.Not Applicable 17.Terms and conditions of Government purchase card acceptance(any thresholds above the micro- purchase level).No conditions to the Government P Card 18.Terms and conditions of rental,maintenance,and repair(if applicable). Not Applicable 19.Terms and conditions of installation(if applicable). Not Applicable 20a.Terms and conditions of repair parts indicating date of parts price lists and any discounts from list prices(if applicable).Not Applicable 20b.Terms and conditions for any other services(if applicable).Not Applicable 21.List of service and distribution points(if applicable). Not Applicable 22.List of participating dealers(if applicable).None 23.Preventive maintenance(if applicable). Not Applicable 24a. Special attributes such as environmental attributes(e.g.,recycled content, energy efficiency,and/or reduced pollutants).Not Applicable 24b.If applicable,indicate that Section 508 compliance information is available on Electronic and Information Technology(EIT)supplies and services and show where full details can be found (e.g. contractor's website or other location.)The EIT standards can be found at:www.Section508.gov/. 25.Data Universal Number System(DUNS)number. 787038160 26.Notification regarding registration in Systems for Award Management(SAM)database. Bair Analytics is registered. Page 4of13 BAIR Anal. ics Inc. TERMS AND CONDITIONS APPLICABLE TO TERM SOFTWARE LICENSES (SPECIAL ITEM NUMBER 132-32),PERPETUAL SOFTWARE LICENSES(SPECIAL ITEM NUMBER 132-33)AND MAINTENANCE AS A SERVICE(SPECIAL ITEM NUMBER 132-34)OF GENERAL PURPOSE COMMERCIAL INFORMATION TECHNOLOGY SOFTWARE 1.INSPECTION/ACCEPTANCE The Contractor shall only tender for acceptance those items that conform to the requirements of this contract. The ordering activity reserves the right to inspect or test any software that has been tendered for acceptance. The ordering activity may require repair or replacement of nonconforming software at no increase in contract price. The ordering activity must exercise its post acceptance rights(1)within a reasonable time after the defect was discovered or should have been discovered;and(2)before any substantial change occurs in the condition of the software, unless the change is due to the defect in the software. 2.ENTERPRISE USER LICENSE AGREEMENTS REQUIREMENTS(EULA) The Contractor shall provide all Enterprise User License Agreements. 3.GUARANTEE/WARRANTY a.Unless specified otherwise in this contract,the Contractor's standard commercial guarantee/warranty as stated in the contract's commercial pricelist will apply to this contract. **Warranty information is provided in the EULA** b.The Contractor warrants and implies that the items delivered hereunder are merchantable and fit for use for the particular purpose described in this contract. c.Limitation of Liability. Except as otherwise provided by an express or implied warranty,the Contractor will not be liable to the ordering activity for consequential damages resulting from any defect or deficiencies in accepted items. 4.TECHNICAL SERVICES The Contractor,without additional charge to the ordering activity,shall provide a hot line technical support number 800-380-1138 for the purpose of providing user assistance and guidance in the implementation of the software. The technical support number is available from Monday through Friday,9:00 AM(MST)to 5:00 PM(MST) excluding holidays. 5.SOFTWARE MAINTENANCE a.Software maintenance as it is defined:(select software maintenance type): 1.Software Maintenance as a Product(SIN 132-32 or SIN 132-33) Software maintenance as a product includes the publishing of bug/defect fixes via patches and updates/upgrades in function and technology to maintain the operability and usability of the software product.It may also include other no charge support that are included in the purchase price of the product in the commercial marketplace.No charge support includes items such as user blogs,discussion forums,on-line help libraries and FAQs(Frequently Asked Questions),hosted chat rooms,and limited telephone,email and/or web-based general technical support for user's self-diagnostics. Software maintenance as a product does NOT include the creation,design,implementation,integration,etc.of a software package.These examples are considered software maintenance as a service. Software Maintenance as a product is billed at the time of purchase. X 2.Software Maintenance as a Service(SIN 132-34) Software maintenance as a service creates,designs,implements,and/or integrates customized changes to software that solve one or more problems and is not included with the price of the software. Software maintenance as a service includes person-to-person communications regardless of the medium used to communicate:telephone support,on-line technical support, customized support,and/or technical expertise which are charged commercially. Software maintenance as a service is billed arrears in accordance with 31 U.S.C.3324. Page 5of13 b. Invoices for maintenance service shall be submitted by the Contractor on a quarterly or monthly basis,after the completion of such period. Maintenance charges must be paid in arrears(31 U.S.C.3324). PROMPT PAYMENT DISCOUNT,IF APPLICABLE,SHALL BE SHOWN ON THE INVOICE. 6.PERIODS OF TERM LICENSES(SIN 132-32)AND MAINTENANCE(SIN 132-34) a. The Contractor shall honor orders for periods for the duration of the contract period or a lessor period of time. b. Term licenses and/or maintenance may be discontinued by the ordering activity thirty(30)calendar days written notice to the Contractor. c. Annual Funding.When annually appropriated funds are cited on an order for term licenses and/or maintenance,the period of the term licenses and/or maintenance shall automatically expire 30 Sep. Renewal of the term licenses and/or maintenance is to be continued during any remainder of the contract period.Notwithstanding c6 above,the ordering activity may choose to issue a delivery order date for maintenance or Annual Software Term License which extends beyond the end of the fiscal year,under the authority of FAR 37.106 and/or DFAR 237.106(2). d. Cross-Year Funding Within Contract Period. Where an ordering activity's specific appropriation authority provides for funds in excess of a 12 month (fiscal year) period, the ordering activity may place an order under this schedule contract for a period up to the expiration of the contract period, notwithstanding the intervening fiscal years. For Annual Term Software Licenses, orders for periods in excess of twelve months will be calculated by pro rating the appropriate Annual Term Software License fee over the period covered by the order. e. Ordering activities should notify the Contractor in writing thirty(30)calendar days prior to the expiration of an order,if the term licenses and/or maintenance is to be terminated at that time. Orders for the continuation of term licenses and/or maintenance will be required if the term licenses and/or maintenance is to be continued during the subsequent period. 7.CONVERSION FROM TERM LICENSE TO PERPETUAL LICENSE a. The ordering activity may convert term licenses to perpetual licenses for any or all software at any time following acceptance of software. At the request of the ordering activity the Contractor shall furnish, within ten (10) calendar days, for each software product that is contemplated for conversion, the total amount of conversion credits which have accrued while the software was on a term license and the date of the last update or enhancement. b. Conversion credits which are provided shall,within the limits specified,continue to accrue from one contract period to the next,provided the software remains on a term license within the ordering activity. C. The term license for each software product shall be discontinued on the day immediately preceding the effective date of conversion from a term license to a perpetual license. d. The price the ordering activity shall pay will be the perpetual license price that prevailed at the time such software was initially ordered under a term license,or the perpetual license price prevailing at the time of conversion from a term license to a perpetual license,whichever is the less,minus an amount equal to %of all term license payments during the period that the software was under a term license within the ordering activity. 8.TERM LICENSE CESSATION a.After a software product has been on a continuous term license for a period of *months,a fully paid-up, non-exclusive, perpetual license for the software product shall automatically accrue to the ordering activity. The period of continuous term license for automatic accrual of a fully paid-up perpetual license does not have to be achieved during a particular fiscal year; it is a written Contractor commitment which continues to be available for software that is initially ordered under this contract, until a fully paid-up perpetual license accrues to the ordering activity.However,should the term license of the software be discontinued before the specified period of the continuous term license has been satisfied,the perpetual license accrual shall be forfeited. b.The Contractor agrees to provide updates and maintenance service for the software after a perpetual license has accrued, at the prices and terms of Special Item Number 132-34, if the licensee elects to order such services.Title to the software shall remain with the Contractor. 9.UTILIZATION LIMITATIONS-(SIN 132-32,SIN 132-33,AND SIN 132-34) Page 6 of 13 a. Software acquisition is limited to commercial computer software defined in FAR Part 2.101. b.When acquired by the ordering activity,commercial computer software and related documentation shall be subject to the following: 1.Title to and ownership of the software and documentation shall remain with the Contractor, unless otherwise specified. 2.Software licenses are by site and by ordering activity. An ordering activity is defined as a cabinet level or independent ordering activity.The software may be used by any subdivision of the ordering activity(service,bureau, division,command,etc.)that has access to the site the software is placed at,even if the subdivision did not participate in the acquisition of the software. Further, the software may be used on a sharing basis where multiple agencies have joint projects that can be satisfied by the use of the software placed at one ordering activity's site. This would allow other agencies access to one ordering activity's database. For ordering activity public domain databases, user agencies and third parties may use the computer program to enter, retrieve, analyze and present data. The user ordering activity will take appropriate action by instruction, agreement, or otherwise, to protect the Contractor's proprietary property with any third parties that are permitted access to the computer programs and documentation in connection with the user ordering activity's permitted use of the computer programs and documentation. For purposes of this section,all such permitted third parties shall be deemed agents of the user ordering activity. 3.Except as is provided in paragraph 8.b(2) above, the ordering activity shall not provide or otherwise make available the software or documentation, or any portion thereof, in any form, to any third party without the prior written approval of the Contractor. Third parties do not include prime Contractors, subcontractors and agents of the ordering activity who have the ordering activity's permission to use the licensed software and documentation at the facility, and who have agreed to use the licensed software and documentation only in accordance with these restrictions. This provision does not limit the right of the ordering activity to use software, documentation, or information therein, which the ordering activity may already have or obtains without restrictions.(The ordering activity shall have the right to use the computer software and documentation with the computer for which it is acquired at any other facility to which that computer may be transferred,or in cases of Disaster Recovery,the ordering activity has the right to transfer the software to another site if the ordering activity site for which it is acquired is deemed to be unsafe for ordering activity personnel; to use the computer software and documentation with a backup computer when the primary computer is inoperative;to copy computer programs for safekeeping(archives)or backup purposes;to transfer a copy of the software to another site for purposes of benchmarking new hardware and/or software;and to modify the software and documentation or combine it with other software,provided that the unmodified portions shall remain subject to these restrictions. 4."Commercial Computer Software"may be marked with the Contractor's standard commercial restricted rights legend, but the schedule contract and schedule pricelist, including this clause, "Utilization Limitations" are the only governing terms and conditions, and shall take precedence and supersede any different or additional terms and conditions included in the standard commercial legend. 10. SOFTWARE CONVERSIONS-(SIN 132-32 AND SIN 132-33) Full monetary credit will be allowed to the ordering activity when conversion from one version of the software to another is made as the result of a change in operating system, or from one computer system to another. Under a perpetual license (132-33), the purchase price of the new software shall be reduced by the amount that was paid to purchase the earlier version. Under a term license (132-32), conversion credits which accrued while the earlier version was under a term license shall carry forward and remain available as conversion credits which may be applied towards the perpetual license price of the new version. 11. DESCRIPTIONS AND EQUIPMENT COMPATIBILITY The Contractor shall include,in the schedule pricelist,a complete description of each software product and a list of equipment on which the software can be used.Also,included shall be a brief,introductory explanation of the modules and documentation which are offered. 12. RIGHT-TO-COPY PRICING The ordering activity may copy the Products solely for backup,archival or disaster recovery purposes.Any copy which the ordering activity makes of the Software and/or Products in whole or in part,is the property of the Contractor.The ordering activity agrees to reproduce and include in their entirety and without alteration the Contractor's copyright,trademark and other proprietary rights notices on any copy of the Software and/or Products. Page 7 of 13 BAIR Anal, ics Inc. DESCRIPTION OF SOFTWARE PRODUCTS ATAC ATAC is the world's most comprehensive crime analysis software,providing the most powerful analytical tools,data integration, mapping and reporting capabilities to crime investigations and intelligence analyses.With its easy-to-use interface,powerful analytical and automated modules and ability to work with any type of database,ATAC assists analysts in pattern identification, data mining,analysis and prediction of serial events In addition,ATACOs COMPSTAT module contains hundreds of reports which can be individualized to fit an agency's needs to communicate vital information quickly and efficiently.ATAC is proven to save time and resources for law enforcement,public safety and defense agencies while providing the means to analyze,identify, predict and resolve crimes and serial events worldwide. Data Juggler Working in conjunction with ATAC or other databases,this automated software performs scheduled extracts and processes data from records management systems or data warehouses to create robust data ready for analysis.Data Juggler saves time by eliminating redundant data entry,automatically populating specified fields in analytical databases. ATACRAIDS ATACRAIDS builds upon BAIR Analytics'existing ATAC desktop version by incorporating detailed crime data in a secure online interface for law enforcement use only.Users can view data from any participating agency as well as map,analyze and download data from other jurisdictions for further analysis with powerful desktop analysis tools like ATAC and ArcGIS.ATACRAIDS works to make data analysis more efficient by geocoding and automatically analyzing information as users filter through the data in real time,spatially displays detailed incident,MO and persons data as well as performs tabular,temporal and spatial queries.In addition, analysts can download data to a variety of formats for further analysis. Page 8 of 13 BAIR Analytics Inc. SOFTWARE, MAINTENANCE AND TRAINING COST SCHEDULE Software and Maintenance ATAC(Automated Tactical Analysis of Crime): ATAC is the world's most comprehensive crime analysis software,providing the most powerful analytical tools,data integration,mapping and reporting capabilities to crime investigations and intelligence analyses.With its easy-to-use interface and ability to work with any type of database,powerful analytical and automated modules and comprehensive COMPSTAT reports,ATAC assists analysts in pattern identification,data mining,analysis and prediction of serial events,and communicating vital information efficiently.ATAC has been proven to save time and resources for law enforcement,private sector and defense agencies while providing the means to analyze,identify,predict and resolve crimes and serial events worldwide. Price Per Workstation SIN CODE ITEM 1-49 50-99 100+ 11 orkNt:t(ions NVorkstations Workstations SIN 132-33 ATACWKST ATAC Workstation $2.,728 $2,455 $2.455 ATAC---Workstation Upgrade and Technical SIN 132-34 ATACWKSTUTSP Support Plan(Maintenance)Annual Fee $813 $813 $813 Data Juggler: Working in conjunction with ATAC or other databases,this automated software performs scheduled extracts and processes data from records management systems or data warehouses to create robust data ready for analysis.Data Juggler saves time by eliminating redundant data entry,automatically populating specified fields in analytical databases. SIN Order No. Product License Price SIN 132-33 Data Juggler---Single License $2,344 SIN 132-34 DJSLUTSP Data Juggler--- $813 Single License Maintenance Annual Fee ATACRAIDS: ATACRAIDS builds upon Bair Analytics existing ATAC desktop crime analysis application by incorporating detailed crime data in a secure online interface.Users can view crime data from any other participating agency,map and analyze data,and download data from other jurisdictions for further analysis with powerful desktop analysis tools like ATAC and ArcGIS.ATACRAIDS works to make event data analysis more efficient by geocoding and automatically analyzing crime,IED or event information as users filter through the data in real time,spatially displays detailed incident,MO and persons data as well as performs tabular, temporal and spatial queries.In addition,analysts can download data to a variety of formats for further analysis. ATACRAIDS Private Network: ATACRAIDS Private Network is setup to operate in a private networked environment.It provides for unlimited use and distribution for anyone possessing a related private network email address.ATACRAIDS Private Network provides for two system integrators who integrate and support ATACRAIDS in the private network environment. SIN Order No. Product Annual Fee SIN 132-33 ATACRDSTI ATACRAIDS Tier 1(1-20 sworn officers) $1,089 SIN 132-33 ATACRDST2 ATACRAIDS Tier 2(21-40 sworn officers) $2,723 SIN 132-33 ATACRDST3 ATACRAIDS Tier 3(41-75 sworn officers) $3,812 SIN 132-33 ATACRDST4 ATACRAIDS Tier 4(76-125 sworn officers) $5,082 SIN 132-33 ATACRDST5 ATACRAIDS Tier 5(126-200 swom officers) $6,166.25 SIN 132-33 ATACRDST6 ATACRAIDS Tier 6(201-300 sworn officers) $7,254.41 SIN 132-33 ATACRDST7 ATACRAIDS Tier 7(301-400 swom officers) $8342.57 SIN 132-33 ATACRDST8 ATACRAIDS Tier 8(401-500 sworn officers) $9,521.41 Page 9 of 13 SIN 132-33 ATACRDST9 ATACRAIDS Tier 9(501-750 sworn officers) $10,881.61 SIN 132-33 ATACRDSTIO ATACRAIDS Tier 10(751-1,000 sworn officers) $13,602.02 SIN 132-33 ATACRDSTI I ATACRAIDS Tier 11(1,001-2,500 sworn officers) $18,136.02 SIN 132-33 ATACRDST12 ATACRAIDS Tier 12(2,501-5,000 sworn officers) $22,670.03 SIN 132-33 ATACRDST13 ATACRAIDS Tier 13(5001+sworn officers) $27,204.03 SIN 132-33 ATACRDSTP ATACRAIDS Private Network(unlimited use) $902,963 Page 10 of 13 BAIR Anal, ics Inc. Terms of Use With respect to your access and use of raidsonline.com and/or atacraids.com(the"Site"),BAIR Analytics,Inc.("BAIR") provides its services to you,subject to the following Terms of Use("TOU"). You agree to be bound by these TOU. If you do not agree to these TOU,do not access and use the Site. 1.PERMITTED USE. Subject to these TOU,BAIR hereby grants you the right to access and use the Site solely for the following purposes:(i)if you are accessing the Site as an individual,then any and all use of the Site is for your personal,non-commercial use only;or(ii)if you are accessing the Site on behalf of a business entity,then any and all use of the Site must be for such business entity's. You shall not(iii)send or otherwise post unauthorized commercial communications(such as spam)on the Site; (iv)collect content or information,or otherwise access the Site,using automated means(such as harvesting bots,robots,spiders, or scrapers)or by bypassing the Site's user interface without our permission;(v)upload viruses or other malicious code to the Site;(vi)do anything that could disable,overburden,or impair the proper working of the Site,such as a denial of service attack;or (vii)facilitate or encourage any violations of this Agreement.BAIR retains all rights with respect to the Site except those expressly granted to you in this Agreement.You agree not to frame,or assist third parties in framing,any of the web pages contained in the Site.Such framing is strictly prohibited under this Agreement.The content and software on the Site are the proprietary property of BAIR and/or its suppliers and Partners and are protected by U.S.and international copyright and other intellectual property laws. The provision of the Section 1 notwithstanding,it is not applicable to United States Government users. 2.LINKS TO THIRD PARTY SITES.The Site may contain links or produce search results that reference links to third party websites("Linked Sites").BAIR has no control over these Linked Sites or the content within them.BAIR cannot and does not guarantee,represent,or warrant that the content contained in the Linked Sites,including,without limitation other links,is accurate, legal,and/or inoffensive.BAIR does not endorse the content of any Linked Site,nor does it warrant that a Linked Site will not contain computer viruses or other harmful code that can impact your computer or other web access device.By using the Site to search for or link to another Site,you agree and understand that such use is entirely at your own risk,and that you may not make any claim against BAIR for any damages or losses whatsoever resulting from such use. 3.NO UNLAWFUL OR PROHIBITED USE.As a condition of your use of the Site,you warrant to BAIR that you will not use the Site for any purpose that is unlawful or prohibited by these TOU.You agree not to use the Site in any manner which could damage,disable,overburden,or impair the Site or interfere with any other party's use and enjoyment of the Site. 4.PRIVACY AND DISCLOSURE OF INFORMATION.Your privacy is important to us.BAIR is providing this notice to describe and explain our online information practices and the choices you can make about the way your information is collected and used. a.THE INFORMATION WE COLLECT AND HOW WE COLLECT IT.In general,you can visit this Site without telling us who you are or revealing any personal information about yourself.There are times,however,when we may need information from you.Personal information like your name,postal address and e-mail address is obtained only when voluntarily submitted.BAIR collects this information in several ways: (i)Through the user signing up to receive crime alerts,crime information,news,scheduling product demonstrations, entering contests and/or completing surveys. (ii)Through registration,surveys and other online forms. (iii)As part of an ongoing sales process. (iv)While providing technical support,consultation,or product information. (v)Through the process of maintaining and upgrading our products. (vi)Through automated means such as communications protocols,e-mail,communications and cookies. To provide you with timely,high-quality information,we may also ask you to provide us with information regarding your professional interests and experiences with our products or services.Providing us with this information is optional. Personal data collected online may also be combined with information you provide to us through other sources such as product registration,call centers,or in conjunction with events such as trade shows,training seminars and conferences. Information that you supply will relate to the relationship that BAIR has with you or your organization. b.WEB SERVER LOGS.In the process of administering this Site,we maintain and track usage through Web server logs.Web server logs provide information such as what types of browsers are accessing our Site,what pages receive high traffic,and the times of day our servers experience significant load.We use this information to improve the content and navigation features of our Site.Anonymized or aggregated forms of this data may be used to identify future features and functions to develop for the Site and to provide better customer service. c.COOKIES.There are various technologies,including one called"cookies"which can be used to provide tailored information Page 11 of 13 from a website.A cookie is an element of data that a website can send to your browser,which may then store it on your system. Some BAIR pages use cookies or other technologies so that we can better serve you when you return to our Site.You can set your browser to notify you when you receive a cookie,giving you the chance to decide whether to accept it.For more information,please refer to user information provided with your Web browser. d.WEB BEACONS.Some of our Web pages and HTML-formatted e-mail use Web beacons in conjunction with cookies to compile aggregate statistics about website usage.A Web beacon is an electronic image,called a single-pixel(1 x 1)or clear GIF.Web beacons can recognize certain types of information on a visitor's computer,such as a visitor's cookie number,time and date of a page view and a description of the page where the Web beacon is placed.You may render some Web beacons unusable by rejecting their associated cookies. e.PERSONALIZED URL LINKS AND PERSONALIZED MESSAGE CONTENT.Occasionally,we may create a unique web URL link for certain visitors.If you visit one of these Sites,you may find forms that are already filled out with your name, or other types of information you have previously indicated an interest in,based on information you have given us before.We may also personalize the content of newsletters,e-mail offers or invitations based on topics in which you have previously indicated an interest.We collect information about how you consume this type of personalized information in order to help us provide you with other information that is better tailored to your interests.If you choose to visit one of these personalized web URL links,you are agreeing to allow BAIR to collect information about your visits and also to associate that information with other information about you and your relationship with BAIR.If you do not wish your information to be used in this way,do not accept the invitation to visit these Sites. f.HOW WE USE YOUR INFORMATION.BAIR may use your personal information to: (i)Fulfill subscription requests,orders for software and services made online and to provide other information you request. (ii)Make the Site easier for you to use. (iii)Help us customize content most relevant to your interests. (iv)Notify you about important news concerning BAIR. (v)Notify you of new products and services,product updates,technical support issues,events and special offers we think you may be interested in. We do analyze some of our Web services such as registrations,demos,downloads,and e-mail responses at the individual level in order to improve the quality of those offerings and to better tailor our marketing to our customers'needs. g.HOW WE SHARE YOUR INFORMATION.We may share the personal data you provide with other BAIR entities and/or business partners for purposes related to those described above.We will not sell,rent or lease to others your personally identifiable information.BAIR reserves the right to disclose any and all pertinent information to law enforcement or other governmental officials as we,in our sole discretion,believe necessary or appropriate. h.CHOICE/OPT-OUT.BAIR offers you the choice of receiving different types of communication and information related to our company,products and services.You may subscribe to e-newsletters or other publications;you may also elect to receive marketing communications and other special offers from us via e-mail.If at any time you would like to change your communication preferences,we provide unsubscribe links and an opt-out mechanism for your convenience. i.OUR COMMITMENT TO DATA SECURITY.BAIR is concerned about the security of your information.To prevent unauthorized access or disclosure,to maintain data accuracy,and to ensure the appropriate use of information,we have put in place reasonable physical,electronic,and managerial procedures to safeguard and secure the information we collect online. We use encryption technology when collecting or transferring sensitive data such as credit card information.Credit card numbers are used only for processing payment and are not used for other purposes. j.CHANGES TO THIS PRIVACY POLICY.If there are updates to the terms of BAIR's online Privacy Policy,we will post those changes here and update the revision date in this document so that you will always know what information we collect online,how we use it,and what choices you have. 5.OWNERSHIP OF USER SUBMITTED CONTENT. You represent and warrant that you are the owner of any and all information and content you provided to the. 6.OWNERSHIP OF LAW ENFORCEMENT AGENCY SUBMITTED CONTENT.All information provided by a law enforcement agency is offered and owned by that law enforcement agency.Unless otherwise indicated by the law enforcement agency,all data will be retained by BAIR Analytics,Inc.and remain accessible by the general public and/or other law enforcement agencies in accordance with the provisions of this Agreement.However,the law enforcement agency shall have the right to cause BAIR Analytics,Inc.to archive(remove from view)and purge(remove from database)all of its agency data at the agency's request.Any law enforcement agency submitting information to BAIR Analytics,Inc.represents and warrants that its disclosure of such information does not violate any applicable federal,state or local statute or regulation concerning such disclosure. Page 12 of 13 7.WARRANTY DISCLAIMER.BAIR does not promise that the Site will be error-free,uninterrupted,nor that the Site will provide specific results from your use of any content,search or link on them.BAIR does not warrant or represent that files you download from the Site will be free of viruses or other harmful features. 8.DESIGNATED AGENT FOR ALLEGED COPYRIGHT INFRINGEMENT.BAIR respects the intellectual property of others,and we ask you to do the same.If you believe some content on the Site has been copied in such as way to constitute copyright infringement,please contact us at: BAIR Analytics,Inc. 640 Plaza Drive,Suite 340 Highlands Ranch,Colorado 80129 9.GENERAL.This Agreement shall be governed in all respects by the laws of the United States. If any provision of this Agreement is held to be invalid or unenforceable,such provision shall be struck and the remaining provisions shall be enforced.Headings are for reference purposes only and in no way define,limit,construe or describe the scope or extent of such section.BAIR's failure to act with respect to a breach by you or others does not waive its right to act with respect to subsequent or similar breaches. 10.INFORMATIONAL ONLY.The information displayed in this Site is susceptible to some degree of error due to the collection, entry,and geoprocessing of the data.No warranty,representation,or guarantee whatsoever is made or implied regarding the content,accuracy(including,without limitation,geographic accuracy),timeliness,completeness,or sequence of any of the information contained in this Site.Neither you,nor any other person,should rely on the data provided herein for any reason;the owners and operators of this Site as well as all directors,officers,employees,agents,and affiliates of BAIR Analytics,Inc.shall not be held responsible for any errors or omissions in this Site or produced by any secondary dissemination of this information. The owners and operators of this Site have not assessed any specific risk that any convicted sex offender will commit another offense or the nature of any future crime that may be committed.Persons should not rely on the sex offender information in this Site,if any,as a safeguard against perpetrators of sexual assault in their communities.The information is provided strictly as a courtesy to the public. 11.NOTICE OF ERRORS.If you believe that any information on this Site is in error,please be advised that we receive all of our information from state or local authorities,and you should therefore contact your local police or sheriffs department;such authorities will be able to assist you directly or refer you to another appropriate authority. 12.CONDITION OF USE.You understand and agree to each and every provision contained in this disclaimer. 13.MINORS.The Site is not intended for use by anyone under the age of 13 years old.By using the Site,you are representing to BAIR that you are at least 13 years old. 14.CHILD ONLINE PROTECTION ACT NOTIFICATION.Pursuant to 47 U.S.C. Section 230(d)as amended,BAIR hereby notifies you that parental control protections(such as computer hardware,software,or filtering services)are commercially available that may assist you in limiting access to material that is harmful to minors. 15.EXPORT CONTROL INFORMATION.Unless otherwise specified,the materials on the Site are presented solely to provide information regarding and to promote BAIR's services and other products available in the United States,its territories,possessions and protectorates.The Site is controlled and operated by BAIR from its offices within the United States of America.BAIR makes no representation that materials on the Site are appropriate or available for use outside the United States.Those who choose to access the Site from outside the United States do so on their own initiative and are responsible for compliance with local laws,if and to the extent that local laws are applicable.If you access the Site from outside the United States and are located in a county embargoed by the United States or are on the United States Treasury Department's list of Specially Designated Nationals,you will not engage in commercial activities or operate a platform application or Site in connection with the Site.Further,no software from the Site may be downloaded or otherwise exported or re-exported(A)into(or to a national or resident of)Cuba,Iraq,Libya,North Korea,Iran,Syria,or any other country to which the U.S.has embargoed goods,or(B)to anyone on the U.S.Treasury Department list of Specially Designated Nationals or the U.S.Commerce Department's Table of Deny Orders.By using the Site, you represent and warrant that you are not located in,under the control of,or a national or resident of any such country or on any such list. Page 13 of 13 LexisNexis, SPECIAL SERVICES INC. Federal Supply Service AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICELIST Total Solutions for Law Enforcement, Security, Facilities Management, Fire, Rescue, Special Purpose Clothing, Marine Craft, and Emergency/Disaster Response SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICELIST On-line access to contract ordering information, terms and conditions,up-to-date pricing, and the option to create an electronic delivery order are available through GSA Advantage! hllps://www.lzsaadvantage.fzov TOTAL SOLUTIONS FOR LAW ENFORCEMENT, SECURITY, FACILITIES MANAGEMENT, FIRE, RESCUE, SPECIAL PURPOSE CLOTHING, MARINE CRAFT, AND EMERGENCY/DISASTER RESPONSE FEDERAL SUPPLY SCHEDULE 84 Product Service Code: R414 Professional Services Contract Number: GS-07F-0265X For more information on ordering from Federal Supply Schedules please visit www. s�a.gov Period Covered by Contract: Effective date: February 1, 2011 —January 31, 2021 Pricelist current through Modification PS-0016, dated January 13,2016. LexisNexis Special Services Inc. 1150 18th Street,NW, Suite 250 Washington, D.C. 20036 Phone: 202-378-1018 Fax: 202-378-1750 http://lexisnexisspecialservices.com BUSINESS SIZE: Large LNSSI Page 1 of 18 LexisNexis SPECIAL SERVICES INC. CUSTOMER INFORMATION 1 a. Awarded Special Item Numbers: SPECIAL ITEM NUMBER 426-6 Law Enforcement and Security Training FSC/PSC Code R414;NAICS Code 611699 SPECIAL ITEM NUMBER 426-7 Professional Law Enforcement Services FSC/PSC Code R414;NAICS Code 541990 lb. Please see Appendix A for course training descriptions and Appendix B for training costs. 1 c. Please see Appendix C for Labor Category Descriptions and Appendix D for Labor Rates. 2. Maximum order: $200,000. 3. Minimum order. $0.00. 4. Geographic coverage (delivery area): All 48 contiguous states, Alaska, Hawaii, Puerto Rico, all US Territories. 5. Point(s) of production:None(Professional Training and Labor Services only). 6. Discount from list prices or statement of net price. The basic discount of 2% (426-6 training Courses) and 5% (426-7 Professional Labor Services) will be deducted from LNSSI Price List effective December 2015. SIN GSA Disc. NIFC Disc. 1)iscotmt Relationship 426-6 (Training Courses) 2% 0% -11 greater than 426-7 (Prof. Labor Service) 5% 0% 5% greater ' 7. Quantity discounts: +1% >$50,000.00/order. 8. Prompt payment terms:Net 30 days. Information for Ordering Offices: Prompt payment terms cannot be negotiated out of the contractual agreement in exchange for other concessions. 9a. Notification that Government purchase cards are accepted at or below the micro-purchase threshold: Yes. 9b.Notification whether Government purchase cards are accepted or not accepted above the micro-purchase threshold: Yes. 10. Foreign items: Not applicable. 11 a. Time of delivery: 30 days ARO (426-3A) LNSSI Page 2 of 18 LexisNexis, SPECIAL SERVICES INC. 11 b. Expedited Delivery. Not applicable. 11 c. Overnight and 2-day delivery. Not applicable. 1 Id. Urgent Requirements: Not applicable. 12. F.O.B. point(s): Destination. (This includes all training materials for SIN 426-6 Training Courses). *Travel costs will be in compliance with the Federal Travel Regulation (FTR) or the Joint Travel Regulation (JTR). 13a. Ordering address: Same as contractor address. 13b. Ordering procedures: For supplies and services, the ordering procedures, information on Blanket Purchase Agreements (BPA's) are found in Federal Acquisition Regulation (FAR) 8.405-3. 14. Payment address: LexisNexis Special Services Inc. Attn: John Mescher 3497 Newmark Drive Miamisburg, OH 45342 Payment Instructions for ACH Payments: ABA Routing#: 021000089 Account#: 3054 0358 Bank Name: Citibank,N.A. Bank Address: 399 Park Avenue, New York,NY Account Type: Checking 15. Warranty provision: None. Restocking/cancellation policy: None/3weeks cancellation notice for 100% refund (SIN 426-6 Training Courses only). 16. Export packing charges: Not applicable. 17. Terms and conditions of Government purchase card acceptance (any thresholds below the micro-purchase level): Government commercial credit cards will be accepted for payment up to $50,000. 18. Terms and conditions of rental, maintenance, and repair: Not applicable. 19. Terms and conditions of installation: Not applicable. LNSSI Page 3 of 18 LexisNexis-, SPECIAL SERVICES INC. 20. Terms and conditions of repair parts indicating date of parts price lists and any discounts from list prices: Not applicable. 20a. Terms and conditions for any other services: Not applicable. 21. List of service and distribution points: Not applicable. 22. List of participating dealers: Not applicable. 23. Preventive maintenance: Not applicable. 24a. Special attributes such as environmental attributes (e.g., recycled content, energy efficiency, and/or reduced pollutants): Not applicable. 24b. If applicable, Section 508 compliance information is available on Electronic and Information Technology (EIT) supplies and services and will be addressed on a task order basis. The EIT standards can be found at: www.Section508.2ov/ 25. Data Universal Number System(DUNS) number: 13-672-3967. 26. Commercial and Government Entity (CAGE)Code: 3HV62 27. System for Award Management (SAM) database: LexisNexis Special Services Inc. is registered in the System for Award Management(http://www.SAM.gov) database. 28. Travel: Travel in the performance of the contract shall be priced in accordance with the Federal Travel Regulations and FAR 31. LexisNexis Special Services Inc. may include DCAA—approved indirect burdens in accordance with our standard accounting procedures. LNSSI Page 4 of 18 LexisNexis,& SPECIAL SERVICES INC. APPENDIX A TRAINING COURSES FOR SCHEDULE 84 SPECIAL ITEM NUMBER 426-6 Law Enforcement and Security Training— SUBJECT TO COOPERATIVE PURCHASING Including but not limited to all types of range safety and operations training, all types of high performance and defensive/offensive driving training, all types of weapons training, force protection training, surveillance and surveillance detection training, maritime security training, all types of close quarters defense (CQD)training, special response team training, chemical/biological and weapons of mass destruction(WMD) detection training,terrorism awareness training, survival training, explosive ordnance detonation(EOD)training, and tactical training in realistic physical environments. Also includes all types of products required to support the training. DESCRIPTION OF TRAINING COURSES Fundamentals of Crime Analysis DESCRIPTION: This course focuses on the basic terms, concepts, and techniques of crime analysis as a means to assist in developing a crime analysis program. (Course Level: 101/ Difficulty: Basic). OBJECTIVES: Upon completion of this course, students will have a solid base of knowledge on which to further a career in crime analysis. PREREQUISITES: Students must have a basic understanding of Microsoft® Office applications (Word, Excel, and Access). METHODOLOGIES: This course uses a variety of methodologies including lecture, instructor- led discussions and visual aids. Hands-on exercises and group discussions reinforce newly learned concepts. COURSE MATERIALS: Each attendee will receive and retain for later use appropriate instructional materials (handouts and/or workbooks) at the course instructor's discretion. COURSE LENGTH: 5 days CLASSROOM: The classroom will be equipped with all hardware and software necessary for the course. COURSE SCHEDULES: Contact the Contractor by telephone, fax or by email at support ,LNSSI.com for the current publicly scheduled dates and locations. Contact the Contractor to order a course taught at the ordering activity's location. LNSSI Page 5 of 18 LexisNexis- SPECIAL SERVICES INC. Data Management DESCRIPTION: This course will provide students with an in-depth look at various data types and tools used by analysts to create, manage, manipulate and query data. Students will master methods for searching, retrieving, mining, and manipulating data from public safety Computer Aided Dispatch(CAD) and Record Management System(RMS)repositories. (Course Level: 102/Difficulty: Moderate). OBJECTIVES: Upon completion of this course, the student will be able to 1) Identify and utilize tools and procedures to create, evaluate, manage, and manipulate data in a law enforcement environment; 2) Construct SQL statements to query, create and manipulate data; 3) Create Regular Expressions to perform searches; 4) Create and use Concepts to perform sophisticated data mining; 5)Use Microsoft Access, Excel and various other applications to perform data translations, mapping and cleaning. PREREQUISITES: Students must have a basic understanding of Microsoft® Office applications (Word, Excel, and Access). METHODOLOGIES: This course uses a variety of methodologies including lecture, instructor- led discussions and visual aids. Hands-on exercises and group discussions reinforce newly learned concepts. COURSE MATERIALS: Each attendee will receive and retain for later use appropriate instructional materials (handouts and/or workbooks) at the course instructor's discretion. COURSE LENGTH: 5 days. CLASSROOM: The classroom will be equipped with all hardware and software necessary for the course. COURSE SCHEDULES: Contact the Contractor by telephone, fax or by email at support@LNSSI.com for the current publicly scheduled dates and locations. Contact the Contractor to order a course taught at the ordering activity's location. Criminal Intelligence Analysis DESCRIPTION: This hands-on course will introduce students to the basic principles and techniques of intelligence analysis as applied to the world of professional law enforcement. Students will learn the legal and logical context of intelligence in policing, as well as the types of intelligence,process models, analytical thinking, and reasoning methods. Geographic mapping of intelligence-related data and timeline-plots will demonstrate how to analyze and forecast activity spatiotemporally. Students will learn how to perform Red Team assessments and will practice in an interactive environment. Upon completion of this comprehensive course, students will be well-versed in the fundamentals of intelligence analysis as applied in the context of law enforcement, corrections, and counterterrorism. (Course Level: 203/Difficulty: Moderate). LNSSI Page 6 of 18 LexisNexis SPECIAL SERVICES INC. OBJECTIVES: Upon completion of this course, the student will be able to 1) Understand process models related to criminal intelligence; 2) Understand legal issues involved in the criminal intelligence field; 3) Manage data including scanning,pattern detection and manipulation within databases; 4)Analyze data for content and links using spatial and temporal network analysis methods; 5) Understand decision models as related to the criminal intelligence unit; 6) Create and manage red teams; 7) Disseminate information appropriately. PREREQUISITES: Students must have a basic understanding of Microsoft® Office applications (Word, Excel, and Access)plus Fundamentals of Crime Analysis. METHODOLOGIES: This course uses a variety of methodologies including lecture, instructor led discussions and visual aids. Hands-on exercises and group discussions reinforce newly learned concepts. COURSE MATERIALS: Each attendee will receive and retain for later use appropriate instructional materials (handouts and/or workbooks) at the course instructor's discretion. COURSE LENGTH: 5 days CLASSROOM: The classroom will be equipped with all hardware and software necessary for the course. COURSE SCHEDULES: Contact the Contractor by telephone, fax or by email at support cgLNSSI.com for the current publicly scheduled dates and locations. Contact the Contractor to order a course taught at the ordering activity's location. Crime Mapping and Analysis using ArcGIS DESCRIPTION: This course will provide students with a complete understanding of the fundamentals of crime mapping. Using the Watch-Follow-Do adult learning method, and expanding on the award-winning Department of Justice CMAP curriculum, students will use their own data in addition to training data as they actually master the techniques they are shown during this comprehensive course. (Course Level: 201/Difficulty: Moderate) OBJECTIVES: Upon completion of this course, the student will be able to 1) Use ESRI's ArcGIS desktop applications; 2) Understand and manage data; 3) Geocode addresses; 4) Create maps using mapping techniques such as choropleth, graduated symbols and pin mapping; 5) Formulate spatial &tabular queries; 6) Understand and use symbology and buffering; 7) Produce, analyze and present information using variety of data maps. PREREQUISITES: Students must have a basic understanding of Microsoft® Office applications (Word, Excel, and Access)plus Fundamentals of Crime Analysis and Tactical Crime Analysis. LNSSI Page 7 of 18 LexisNexise SPECIAL SERVICES INC. METHODOLOGIES: This course uses a variety of methodologies including lecture, instructor- led discussions and visual aids. Hands-on exercises and group discussions reinforce newly learned concepts. COURSE MATERIALS: Each attendee will receive and retain for later use appropriate instructional materials (handouts and/or workbooks) at the course instructor's discretion. COURSE LENGTH: 5 days. CLASSROOM: The classroom will be equipped with all hardware and software necessary for the course. COURSE SCHEDULES: Contact the Contractor by telephone, fax or by email at supportkLNSSI.com for the current publicly scheduled dates and locations. Contact the Contractor to order a course taught at the ordering activity's location. Forecasting Serial Events DESCRIPTION: This course significantly expands on the US Department of Justice CMAP curriculum developed by the same instructors by incorporating numerous free tools and resources including SPACE and Google Earth to take Forecasting to the next level. Using their own data in addition to data from several well-known serial events, students master advanced spatial, temporal and statistical techniques to resolve serial events. (Course Level: 301/ Difficulty: Advanced) OBJECTIVES: Upon completion of this course,the student will be able to 1) Create advanced crime maps using ArcGIS; 2) Use SPACE to analyze data and forecast events; 3) Perform a variety of spatial and temporal analyses; 4) Synthesize a variety of intervention strategies and forecasts in order to develop competent task forces and successful action plans on an operational level. PREREQUISITES: Students must have a basic understanding of Microsoft® Office applications(Word, Excel,Access)plus Fundamentals of Crime Analysis OR Data Management plus Tactical Crime Analysis OR Criminal Intelligence Analysis plus Crime Mapping and Analysis. METHODOLOGIES: This course uses a variety of methodologies including lecture, instructor led discussions and visual aids. Hands-on exercises and group discussions reinforce newly learned concepts. COURSE MATERIALS: Each attendee will receive and retain for later use appropriate instructional materials (handouts and/or workbooks) at the course instructor's discretion. COURSE LENGTH: 5 days LNSSI Page 8 of 18 LexisNexis- SPECIAL SERVICES INC. CLASSROOM: The classroom will be equipped with all hardware and software necessary for the course. COURSE SCHEDULES: Contact the Contractor by telephone, fax or by email at supportkLNSSI.com for the current publicly scheduled dates and locations. Contact the Contractor to order a course taught at the ordering activity's location. Tactical Crime Analvsis DESCRIPTION: In this intermediate level course, students learn the theoretical and practical aspects of tactical crime analysis. Highly interactive and taught by crime analysts with more than 20 years of combined total experience, this class covers topics from behavioral theories of the criminal mind to understanding data to developing and measuring the success of specific action plans based on analytical results. (Course Level: 202/Difficulty: Basic) OBJECTIVES: Upon completion of this course, the student will be able to 1) Understand the significance and use of crime data and a variety of analytical tools; 2) Set realistic goals based on integrating data and human resources; 3) Understand the components of behavioral decision making related to crime events; 4) Understand the various processes of tactical crime analysis; 5) Understand the investigatory process including temporal and spatial analysis ; 6)Develop action plans based on analysis results; 7) Develop means to measure results of action plans. PREREQUISITES: Students must have a basic understanding of Microsoft® Office applications (Word, Excel, and Access)plus Fundamentals of Crime Analysis OR Data Management. METHODOLOGIES: This course uses a variety of methodologies including lecture, instructor led discussions and visual aids. Hands-on exercises and group discussions reinforce newly learned concepts. COURSE MATERIALS: Each attendee will receive and retain for later use appropriate instructional materials (handouts and/or workbooks) at the course instructor's discretion. COURSE LENGTH: 5 days CLASSROOM: The classroom will be equipped with all hardware and software necessary for the course. COURSE SCHEDULES: Contact the Contractor by telephone, fax or by email at support2LNSSI.com for the current publicly scheduled dates and locations. Contact the Contractor to order a course taught at the ordering activity's location. LNSSI Page 9 of 18 LexisNexis® SPECIAL SERVICES INC. Applied Research Methods and Statistics in Crime Analvsis DESCRIPTION: This course introduces students to the quantitative and qualitative research methods used by crime and intelligence analysts. Topics such as measuring variables, assessing the reliability and validity of acquired intelligence, designing questionnaires, data preparation and coding, sampling and statistical analysis of quantitative data are covered. (Course Level: 201/Difficulty: Moderate) OBJECTIVES: Upon completion of this course, the student will be able to 1) Examine the various research designs and methods available to crime and intelligence analysts; 2)Explain, with examples, the differences between qualitative and quantitative research ; 3) Explain the role of applied research methods and statistics in tactical crime analysis; 4) Define elements of crime statistics and sources of data available for analysis; 5) Solve case studies in crime analysis using standard research methods and analysis within the scope of the intelligence cycle; 6) Interpret the results of statistical crime research using tools; 7) Create charts and diagrams used within crime and intelligence analysis; 8) Interpret charts and diagrams used within crime and intelligence analysis; 9) Discuss the ethical issues and dilemmas that arise from research methods and data analysis in the area of crime analysis; 10) Present research findings. PREREQUISITES: Students must have a basic understanding of Microsoft® Office applications (Word, Excel, and Access)plus Fundamentals of Crime Analysis. METHODOLOGIES: This course uses a variety of methodologies including lecture, instructor led discussions and visual aids. Hands-on exercises and group discussions reinforce newly learned concepts. COURSE MATERIALS: Each attendee will receive and retain for later use appropriate instructional materials (handouts and/or workbooks) at the course instructor's discretion. COURSE LENGTH: 5 days CLASSROOM: The classroom will be equipped with all hardware and software necessary for the course. COURSE SCHEDULES: Contact the Contractor by telephone, fax or by email at support(c,LNSSI.com for the current publicly scheduled dates and locations. Contact the Contractor to order a course taught at the ordering activity's location. LNSSI Page 10 of 18 LexisNexis� SPECIAL SERVICES INC. APPENDIX B TRAINING COSTS FOR SCHEDULE 84 SPECIAL ITEM NUMBER 426-6 Law Enforcement and Security Training— SUBJECT TO COOPERATIVE PURCHASING Pricing Unit Pricing Unit SIN Category (ver course (Der student 426-6 Fundamentals of Crime Analysis *$3924.94 $937.05 426-6 *S'.924.94 $937.05 426-6 Criminal Irntelli cricc Aiialvsis *5.�.Q24.94 $937.05 426-6 Crime kl,,ippiiiQ .� sis Lzsing ArcGIS *$ 24.94 $937.05 426-6 Tactical C: A1)41\5is *$ .�) '4.94 $937.05 426-6 Forecasting Serial 7 ( clv ajice Crime) *$3,924.94 $937.05 426-6 Applied research Mett and Statistics in Crime *$3,924.94 $937.05 Analysis *NOTE: Does not include instructor travel expenses and per diem Federal rates. LNSSI Page 11 of 18 t to LexisNexise SPECIAL SERVICES INC. APPENDIX C LABOR CATEGORIES FOR SCHEDULE 84 SPECIAL ITEM NUMBER 426-7 Professional Law Enforcement Services— SUBJECT TO COOPERATIVE PURCHASING DESCRIPTION OF PROFESSIONAL LAW ENFORCEMENT SERVICES Title: Crime Analvst Technician Minimum /General Experience: 1 —3 years (see qualifications below). Functional Responsibility: Ability to perform duties related to collecting and compiling statistical data from Police Department computer systems and performing basic statistical analysis on the data. Requires the ability to efficiently collect,analyze, and interpret data and statistics using quantitative and qualitative methodology; prepare and present complex and detailed statistical reports; apply the principles and techniques of deductive and inductive reasoning to analyze the significance of collected data, and to learn and adapt to and use changing computer technology. Receive supervision from higher-level management staff. Compile, organize, and review raw data from crime reports, Records Management System (RMS) and Computer Aided Dispatch(CAD) data sources, and other law enforcement documents; enter raw data into appropriate databases; and generates statistical reports. Analyze police reports and identify crime series or patterns, create tactical bulletins, forecast hits and days between hits, and provide synopsis for the series. Develop crime mapping and analysis of spatially referenced data such as police reports, calls for service, sex registrants, etc.; manipulate data and geo-code address layers; create and update layers and queries attribute data as appropriate. Minimum Education/Qualifications/Experience: Must possess a High School diploma or GED and,EITHER: (A) Three (3)years administrative clerical experience including two (2) years' experience with a law enforcement agency performing statistical research, crime analysis activities and analysis using automated systems/records, OR: (B)Associates Degree from an accredited College or University including basic crime analysis and intelligence certificates, computer coursework and one (1)year administrative clerical experience. Special requirements: must complete a pre-employment polygraph and psychological examination and have a valid driver's license. Title:Junior Pattern Analyst Minimum/General Experience: 3 years Functional Responsibility: Ability to operate under general supervision to assist in the development of dynamic and complex analytical solutions to critical and hazardous problem sets faced by front-line operational personnel. Responsible for performing Tactical, Strategic, Administrative and Operational analysis relating to behavioral, spatial and temporal patterns involved in predicting specific predatory activity. Possess knowledge of and technical aptitude in working with data systems such as Microsoft Access, LNSSI Page 12 of 18 LexisNexise SPECIAL SERVICES INC. Excel, and ArcGIS. Has a minimum of 1 year working with the ATAC software. Will assist in analyzing and develop understandings of criminal and other forms of predatory behaviors. Understand the principles of and has shown aptitude in statistical analysis. Display proficiency in written and verbal communication, and is capable of operating with confidence and initiative in a high stress working environment. Support and assist SME II and SME I positions in all necessary analytical functions, data processes, operational integration and administrative functions. Requires understanding of and ability to operate within the dynamic of U.S. military protocol. Minimum Education: BS in Operations Research,Applied Mathematics, Statistics, Criminology/Psychology, Geographic Information Systems, Technical or Social Sciences or related field. Title:Pattern Analyst Subiect Matter Expert I Minimum/General Experience: 7 years Functional Responsibility: Ability to operate under minimal direction to develop and implement complex analytical software solutions to critical and hazardous problem sets faced by front-line operational personnel. Extract and manipulate data, using a broad range of techniques, design functional reporting methods to communicate technical findings into direct, actionable messages to senior decision makers. Possess extensive experience in relational database system management using Microsoft Access, SQL Server, and Oracle. Ability to design, implement and troubleshoot software program using programming languages such as SQL JAVA, PERL. Extensive knowledge of extracting and manipulating large—scale data efforts relating to Geographic Information Systems. Ability to design reports implementing ArcGIS and Google Earth. The ability to derive precise and accurate findings from a broad range of techniques and perspectives, then translate highly technical findings into coherent and direct actionable message to senior decision-makers. Utilize varied and unique skill sets to perform advanced Tactical, Strategic, Administrative and Operational analysis relating to behavioral, spatial and temporal patterns involved in predicting specific predatory activity. Possess extensive experience in relational database system management, to include use and manipulation of Microsoft Access, SQL Server, and Oracle. Proficiency in and ability to leverage programming languages such as SQL, JAVA, PERL. Extensive understanding of and ability to operate and manipulate large- scale data efforts relating to Geographic Information Systems, with particular emphasis on ArcGIS and Google Earth systems. Has a minimum of 2 years working with,managing and training others in the use of the ATAC software. Extensive work in the understanding of criminal and other forms of predatory behaviors. Demonstrate knowledge and ab of spatial statistics, time series techniques and mathematical principles to aid in the scientific modeling of spatio-temporal behaviors. Highly developed written and verbal presentation skills are required, as are strong interpersonal skills and the ability to relate well with diverse perspectives in a high-stress working environment. Requires experience with and in-depth understanding of law enforcement and U.S. military. Ability to operate on own initiative as well as under direction of SME II and provides assistance and mentorship towards Junior Analysts. LNSSI Page 13 of 18 A- LexisNexis- W SPECIAL SERVICES INC. Minimum Education: BS (MS preferred) in Operations Research, Applied Mathematics, Statistics, Criminology/Psychology, Geographic Information Systems, Technical or Social Sciences or related field. Special requirement: current TS with polygraph. Title:Pattern Analyst Subject Matter Expert II Minimum/General Experience: 12 years (5 years in supervisory role) Functional Responsibility: Ability to operate proactively in managerial role that encompasses the development of dynamic and complex analytical solutions to critical and hazardous problem sets faced by front-line operational personnel. Requires the ability to create synergy between multiple skill sets to derive precise and accurate findings from a broad range of techniques and perspectives, and then translate highly technical findings into coherent and direct actionable message to senior decision-makers. Coordinate efforts necessary to achieve advanced Tactical, Strategic,Administrative and Operational analysis relating to behavioral, spatial and temporal patterns involved in predicting specific predatory activity. Possesses extensive experience in relational database system management, to include use and manipulation of Microsoft Access, SQL Server, and Oracle. Proficiency in and ability to leverage programming languages such as SQL, JAVA, PERL. Extensive understanding of and ability to operate, manipulate and manage large-scale data efforts relating to Geographic Information Systems, with particular emphasis on ArcGIS and Google Earth systems. Has a minimum of 5 years working with,managing and training others in the use of the ATAC software. Extensive work in the understanding of criminal and other forms of predatory behaviors. Advanced knowledge of the spatial statistics,time series techniques and mathematical principles required for developing, implementing and explaining scientific modeling of spatio-temporal behaviors. Highly developed written and verbal presentation skills are required, as are strong interpersonal skills and the ability to relate well with diverse perspectives in a high-stress working environment. Support all of the above functions as both a hands-on analyst as well as manager of others, and is responsible for planning, developing and instructing curriculum to advance and expand the necessary analytical skills amongst various workgroups. Requires experience with and in-depth understanding of law enforcement and U.S. military. Responsible for directing and supervising the work of SME I and Junior Analysts. Minimum Education: MS/Ph.D. in Operations Research, Applied Mathematics, Statistics, Criminology/Psychology, Geographic Information Systems, Technical or Social Sciences. Special requirements: current TS/SCI with polygraph. Title:Intelligence Analyst Minimum/General Experience: 4+years related experience Functional Responsibility: Responsible for intelligence analysis (i.e. IMINT, SIGINT, HUMINT,MASINT, or all-source.) Work directly with customers and team members to determine project scope and specifications. Provide research and analysis to support intelligence organizations. May support development and analysis of intelligence products. Present analysis LNSSI Page 14 of 18 AAA LexisNexise SPECIAL SERVICES INC. or products to customers. May support policy and procedure development for agency, interagency, or community-wide support. May interact with outside customers and functional peer groups. Designs and implements automated data retrieval/extraction and data cleaning services. Evaluates current data quality and structure and develops databases to improve data integrity and usability. Provides programming services to improve the automated retrieval and cleaning of complex data sets. Minimum Education: Associate's degree in Liberal Arts/Sciences or related field and/or equivalent formal military training. Special requirements: current TS. Title:Senior Intelligence Analyst Minimum/General Experience: 9+years related experience Functional Responsibility: Responsible for intelligence analysis (i.e. IMINT, SIGINT, HUMINT, MASINT, or all-source). Work directly with customers and team members to determine project scope and specifications. Provide research and analysis to support intelligence organizations. May support development and analysis of intelligence products. Present analysis or products to customers. May support policy and procedure development for agency, interagency, or community-wide support. Work on complex problems. Establish and recommend changes to policies which affect subordinate organizations. May determine methods and procedures to be used on new assignments and may provide guidance to nonexempt personnel and train others. Frequently interact with customers and/or functional peer group managers. May interaction with senior management; however interactions normally involve matters between functional areas, other company divisions/units, customers and the company. Minimum Education: Bachelor's degree in Liberal Arts/Sciences (or related field) or applicable experience. Special requirements: current TS/SCI with polygraph. Title:Senior Database Engineer Minimum/General Experience: 5+years' experience (3+years of demonstrated senior level database administrator experience with Oracle and SQL). Knowledge of security requirements for databases plus developing, documenting, and implementing backup and recovery. Experience configuring, managing and maintaining the operation of complex relational databases Functional Responsibility: Ability to be flexible and seek innovative technical solutions to the challenges of deploying information technology within a classified environment. Provide support to a critical program that facilitates information sharing between intelligence analysts. Ability to perform database analysis and design, extraction,transform, and load (ETL), administration, and development using RDBMS tools. Develop and execute data transformation software, evaluate results, manage data for archival and other purposes,program, design, and maintain Oracle, MS SQL Server and other database systems. Minimum Education: Bachelor's or equivalent plus experience. LNSSI Page 15 of 18 LexisNexis� SPECIAL SERVICES INC. APPENDIX D LABOR RATES FOR SCHEDULE 84 SPEC14L ITEM NUMBER 42 6-7 Professional Law Enforcement Services— SUBJECT TO COOPERATIVE PURCHASING SIN C'atct►ory Client Site Rate LNSSI Site Rate 426-7 Crimc An,,dN,i echd _ $87.55 $112.06 426-7 Junior Pallcm Aird st x'.21.91 $156.05 426-7 Patten. .lnakNt Suhjeet Matter Expert ' w .60.94 $206.00 426-7 Pattern An,ilt t hject Matter I_.j\?ert II $168.96 $216.27 426-7 111l<IIiL,�:nce anal St $106.21 $135.95 426-7 Senior I11t�:l11, cItcC 1n,11vst 51.23.41 $157.97 426-7 Senior Datallase I n 1110 r S157.97 $202.52 LNSSI Page 16 of 18 LexisNexis® SPECIAL SERVICES INC. Attachment 05 426-6–Law Enforcement and Security Training 426-7–Professional Law Enforcement Services 1. The Contractor shall provide all qualified personnel, materials, equipment, facilities and services as specified herein and as required by individual orders to perform these services. Services specified in an order may be performed at the contractor's facility,the ordering agency's facility or other sites, as designated in the order, as appropriate. 2. The Contractor shall maintain current and adequate insurance and bond coverage and in sufficient amounts as may be required by applicable Local, State and Federal regulations and/or laws for the duration of contract performance. 3. The Contractor shall have current certification, accreditation or license to provide the services as described and maintain certification, accreditation or license requirements for the duration of contract performance as required by applicable Local, State and Federal regulations and/or laws. 4. The Contractor shall provide all safety equipment and processes required in performance of the contract. All work shall be conducted in a safe manner and shall comply with all applicable Occupational Safety and Health Administration(OSHA)requirements and other applicable Local, State and Federal regulations and/or laws. The Contractor shall demonstrate the required safety practices on a continual basis throughout the contract period. 5. Travel costs shall be negotiated individually on an as needed basis. Prices for services in this contract will not include the cost of travel or reimbursement of travel expenses. Reference Clause C- FSS-370. 6. Davis Bacon wage rates, when applicable, will be incorporated at the task order level. Additional costs incurred due to unique Government requirements not priced on this contract will be addressed at the task order level as open market items. These items must be identified as —Open Market Items in all quotes, orders and invoices. 7. Any Ancillary services offered must be related to and ordered in conjunction with products purchased under your schedule contract. No standalone services will be awarded under Ancillary Service SINs. 8. All Ancillary Service SINS exclude construction as defined under FAR 2.101. All Installation Requiring Construction SINs exclude architectural or engineering services as defined by the Brooks Architect- Engineer Act under FAR 36. Standalone services applicable to the Service Contract Act are excluded from all service SINs. LNSSI Page 17 of 18 LexisNexise SPECIAL SERVICES INC. 9. In accordance with FAR 8.404(a) supplies offered on schedule are listed at fix prices. Services offered on schedule are priced either at hourly rates or at a fixed price for performance of a specific task, i.e. installation of a product. 10. Pricing submitted should be in accordance with commercial practices (e.g., labor rates or fixed unit prices). If pricing is based on labor rates, the contractor shall supply and clearly define each labor category provided in this section. Each labor category definition must include experience, minimum training, level of education, and certifications/licenses, if applicable. If pricing is based on fixed unit prices then provide a detailed breakdown of what functions are within the fixed unit price. LNSSI Page 18 of 18 LexisNexis Risk Solutions Government Application &Agreement The information submitted on this Application will be used to determine the applicant's eligibility for accessing the services and products of LexisNexis Risk Solutions FL Inc.and its affiliates(hereinafter"LN"). To avoid delay,please provide all information requested. By submitting this Application,the applicant hereby authorizes LN to independently verify the information submitted and perform research about the individuals identified. Acceptance of this Application does not automatically create a business relationship between LN and the applicant. LN reserves the right to reject this Application with or without cause and to request additional information. Applicant acknowledges and understands that LN will only allow applicant access to the LN Services if applicant's credentials can be verified in accordance with LN's internal credentialing procedures. /) — Agency . please . . not use abbreviations Full legal name of agency: Main phone number for address*: Ford r lac C �" l .L) *If this is a cell,additional documents may be required If this application is for an additional account, Parent account number: Fax number: 0 Physical Address where LN services will be accessed— Previous address if at the current address less than 6 mos: P.O.Box/Mail Drops cannot be accepted(street,city,state,zip): ,iC7) It, FC'li - F1.1Wod TX 6i! 5 Websi a address: External Agency IP Address(https://www.whatismylP.com): External Agency IP Range—From: External Agency IP Range—To: Agency information: ❑ Federal Government ❑ Federal Law Enforcement ❑ Local/Municipal Government ❑ State Government ❑ State Law Enforcement Local/Municipal Law Enforcement ❑ Other(please explain): Section 11-Administrator and Main Contact Information (for additional administrators,please .• additional Product Administrator or Main Contact(first&last name): Title: P-1 ( C /I a 6, ilvqka d a 7e C 1, P)o 16 rj ees a(?e)- E-Mail Address: Admin IP Address: Required for local and municipat agencies: Administrator Home Address(street,city,state,zip): Administrator Date of Birth: Section III—Billing information Billing Contact(first&last name): check here if same as Administrator ❑ Title: Billing Address(street,city,state,zip): Telephone: E-Mail Address: �^+ Sales Tax Exempt: m ' . TCS fie 1" Cv f 0 i'� I i)61�"��1 { I XCts (5 V ❑ No &Yes—please provide proof of exemption Do you require a PO number on invoice: ❑ No Yes If Yes, provide PO Number: . . Required for local and municipal agencies: Company Name: Contact: Business Address(street,city, state,zip): Contact Phone Number: E-mail Address: Account Number(if applicable): LNRS Application Agreement Govt(Q1.15.v2) Confidential Page 1 of 2 Section V—Site Visits Site visits may be required to assure Applicant eligibility for LN products or services. By submitting this Application,Applicant agrees to authorize a site visit by LN or its approved third-party,and agrees to cooperate in its completion. If the contact for coordinating the site visit is not identified above as the Administrator, please provide the site visit contact's information below: Contact Name: Contact Phone: Contact Email Address: Section Vill—Terms and Conditions Terms and conditions governing the use of the LN Services are available online at http://www.lexisnexis.com/risk/masterterrns/govemment and are incorporated into this Application&Agreement by reference as if stated in full herein. By signing below Applicant expressly certifies it has read the additional terms and conditions and agrees to be bound by them. Signature I HEREBY CERTIFY that I am authorized to execute this Application&Agreement on behalf of the Agency listed above and that I have direct knowledge of the facts stated above. Applicant Signat re: Date Sip gned; Zol 7 Applicant Name: Title: i til u vt_ —mc I6Ac)iG e rV i MM apla E- LNRS Application Agreement Govt(Q1.15.v2) Confidential Page 2 of 2 NON-FCRA PERMISSIBLE USE CERTIFICATION—GOVERNMENT Customer(Agency) Name: _ Fc)r+W C`rll) Po I , c,,-- be. DBA: Address: 5-05 w Fe 1 1 X 5-f7e-e+ City, State,Zip: F%✓-I`Lt�,0 r-4A , 'TX '](o 11,5 Contact Name: (til 161 Q e, 1 f L1 LI-11 c{ 0-V Phone: 1. . 3 j Z-• c f 2-6-3 REOUIRED Please describe your purpose of use: Definitions. Gramm-Leach-Bliley Act, (15 U.S.C. § 6801, et seq.)and related state laws(collectively,the"GLBA'� Drivers Privacy Protection Act, (18 U.S.C. § 2721 et seq.)and related state laws(collectively,the"DPPA' Law Enforcement Agencies Only: Review and, if appropriate, certify to the following: Customer represents and warrants that it will use the LN Services solely for law enforcement purposes, which comply with applicable privacy laws including, but not limited to the GLBA and the DPPA.To certify, check here: ❑ Proceed to SECTION 3.QUALIFIED ACCESS SECTION 1. GLBA EXCEPTION/PERMISSIBLE PURPOSE - NOT APPLICABLE TO LAW ENFORCEMENT Some LN Services use and/or display nonpublic personal information that is governed by the privacy provisions of the GLBA. Customer certifies it has the permissible purposes under the GLBA to use and/or obtain such information, as marked below, and Customer further certifies it will use such information obtained from LN Services only for such purpose(s) selected below or, if applicable, for the purpose(s) indicated by Customer electronically while using the LN Services, which purpose(s) will apply to searches performed during such electronic session: X No applicable GLBA exception/permissible use. Proceed to SECTION 2. DPPA PERMISSIBLE USES (At least one (1) must be checked to be permitted access to GLBA data) ❑ As necessary to effect administer,or enforce a transaction requested or authorized by the consumer. ❑ As necessary to effect, administer, or enforce a transaction requested or authorized by the consumer by verifying the identification information contained in applications. ❑ To protect against or prevent actual or potential fraud, unauthorized transactions, claims or other liability. ❑ In required institutional risk control programs. ❑ In resolving consumer dis)utes or inquiries. ❑ Use by persons, or tl,eir representatives holdinga legal or beneficial interest relatingto the consumer. El Use b persons acting in a fiducia or representative capacity on behalf of the consumer. ❑ In complying with federal state or local laws rules and other applicable legal requirements, ❑ To the extent specifically permitted or required under other provisions of law and in accordance with the Right to Financial Privacy Act of 1978, to law enforcement agencies (including a Federal functional regulator, the Secretary of Treasury, a State insurance authority, or the Federal Trade Commission), self-regulatory organizations, or for an investigation on a matter related to public safety. SECTION 2. DPPA PERMISSIBLE USES- NOT APPLICABLE TO LAW ENFORCEMENT Some LN Services use and/or display personal information, the use of which is governed by the DPPA. Customer certifies it has a permissible use under the DPPA to use and/or obtain such information and Customer further certifies it will use such information obtained from LN Services only for one (1) or more of the purposes selected below or for the purpose(s) indicated by Customer electronically while using the LN Services,which purpose(s)will apply to searches performed during such electronic session: X No permissible use. Proceed to SECTION 3. QUALIFIED ACCESS (At least one (1) must be checked to be permitted access to DPPA data) ❑ For use in connection with any civil, criminal, administrative, or arbitral proceeding in any federal, state, or local court or agency or before any self-regulatory body, including the service of process, investigation in anticipation of litigation, and the execution or enforcement of judgments and orders or pursuant to an order of a federal state or local court. LNRS Non-FCRA Perm Purp Cert-Govt(Q3.15.v1) Confidential Page 1 of 5 ❑ For use in the normal course of business by a legitimate business or its agents,employees, or contractors, but only— (A) to verify the accuracy of personal information submitted by the individual to the business or its agents, employees, or contractors; and (B) if such information as so submitted is not correct or is no longer correct, to obtain the correct information, but only for the purposes of preventing fraud by, pursuing legal remedies against, or recovering on a debt or security interest against,the individual. ❑ Use by a government aciencyybut only in carrying out its fun<',ons. ❑ Use by any person acting on behalf of a government agency, UUL WIV , carrying out the agency's functions. ❑ Use by an insurer(or its agent) in connection with claims investigatic;r activities or antifraud activities. ❑ In connection with motor vehicle safety or theft,or driver safe.t, ,�ceE r , or rotor vehicle manufacturer). –1 e —— ❑ Use by an employer or Its agents or insurer to obtain e elating to a holder of a commercial driver's license that is required under Chapter 313 of Title 49 of tl-c- Ur t i F,!�i:c.s Code. ❑ For use in providingnotice to the owners of towed or impoud<.,d vcliic. s. ❑ For use in connection with the operation of private toll trans ortatio!7 raci,!ties. With regard to the information that is subject to the DPPA, some state laws' permissible uses may vary from the permissible uses identified above. In such cases, some state information may not be available under each permissible use listed above and/or Customer may be asked to certify to a permissible use permitted by applicable state law to obtain information from a specific state. Customer agrees and certifies it will use the information described above only in accordance with the permissible uses selected above or those selected subsequently in connection with a specific information request. SECTION 3. QUALIFIED ACCESS Certain users ('Authorized Users'l may be able to obtain full social security numbers (nine (9) digits) and driver's license numbers (collectively, "QA Data', when appropriate, through some LN Services. Only those users that are within the Authorized User List below, and that use QA Data for an Authorized Use identified below, may qualify. To potentially qualify as an Authorized User, Customer must certify that its business is within the Authorized User List below and its use of QA Data is within the Authorized Use List below. ❑ Customer is NOT requesting access to QA Data. Proceed to SECTION 4. DEATH MASTER FILE E4 Customer is requesting access to QA Data. Complete the sections below. What department will be using QA Data? SOCIAL SECURITY NUMBERS ❑ Not an authorized user. Proceed to DRIVER'S LICENSE NUMBERS 1.AUTHORIZED USER(At least one (1) must be checked to receive Social Security Numbers) © Federal state or local qovernment agency with law enforcement responsibilities. ❑ Special investigative unit, subrogation department and claims department of a private or public insurance company for the ur cses of detecting investigating or preventing fraud. ❑ Financial instututionr for the purposes of(a)detecting, investigating or preventing fraud, (b)compliance with federal or state laws or regulations c collecting debt on their own behalf,and d such other uses as shall be appropriate and lawful. ❑ CQ11oct on department of a creditor. ElCollection company acting on behalf of a creditor or on its own behalf. ❑ Other public or private entity for the purpose of detecting, investigating or preventing fraud. Describe your business: 2. AUTHORIZED USE(At least one (1) must be checked to receive Social Security Numbers) Location of suspects or criminals. ❑ Location of non-custodial parents allegedly owing child support and ex-spouses allegedly D,,ving spousal support. ❑ Location of individuals alleged to have failed to pay taxes or other lawful debts. ❑ Jdentity verification. ❑ Other uses similar to those described above. Descr the you use: LNRS Non-FCRA Perm Purp Cert–Govt(Q3.15.v1) Confidential Page 2 of 5 By selecting above, the Customer certifies that it is an Authorized User, and that it will use Social Security Numbers only for the purpose(s) it designated on the Authorized Use List and for no other purpose(s). DRIVER'S LICENSE NUMBERS ❑ Not an authorized user. Proceed to SECTION 4. DEATH MASTER FILE 1. AUTHORIZED USER(At least one(1) must be checked to receive Driver's License Numbers) ® Federal state or local government agency with law enforcement responsibilities. ❑ Special investigative unit, subrogation department and claims department of a private or public insurance company for the purposes of detecting, investigating or preventing fraud. ❑ Financial institution for the purposes of(a)detecting, investigating or preventing fraud, (b)compliance with federal or state laws or re ulations, c collecting debt on their own behalf, and d such other uses as shall be appropriate and lawful. ❑ Collection department of a creditor. ❑ Collection company acting on behalf of a creditor or on its own behalf. ❑ Other public or private entity for the purpose of detecting, investigating or preventing fraud. Describe your business: 2. AUTHORIZED USE(At least one(1) must be checked to receive Driver's License Numbers) ® Location of suspects or criminals. ❑ Location of non-custodial parents allegedly owing child support and ex-spouses allegedly owing spousal support. ❑ Location of individuals aile ed to have failed to pay taxes or other lawful debts. ❑ Identity verification. ❑ Other uses similar to those described above. Describe your use: By selecting above,the Customer certifies that it is an Authorized User, and that it will use Driver's License Numbers only for the purpose(s) it designated on the Authorized Use List and for no other purpose(s). SECTION 4. DEATH MASTER FILE For access to Limited Access DMF Data only. No permissible purpose. Proceed to AUTHORIZATION AND ACCEPTANCE OF TERMS I. Definitions. For purposes of this Certification,these terms are defined as follows: a. DMF Agreement: The Limited Access Death Master File Non-federal Licensee Agreement for Use and Resale executed by LexisNexis Risk Data Retrieval Services LLC, on behalf of itself, its affiliates and subsidiaries, and its and their successors, with the federal government (NTIS, as below defined). The DMF Agreement form is found at www.lexisnexis.com/risk/DMFDocuments. b. Certification Form: The Limited Access Death Master File Subscriber Certification Form executed by LexisNexis Risk Data Retrieval Services LLC, on behalf of itself, its affiliates and subsidiaries, and its and their successors, with the federal government (NTIS, as below defined). The Certification Form is found at www.lexisnexis.com/risk/DMFDocuments. c. DMF: The federal Death Master File. d. NTIS: National Technical Information Service, U.S. Department of Commerce e. Open Access DMF: The DMF product made available through LN, which obtains the data from NTIS, and which does not include DMF with respect to any deceased individual at any time during the three-calendar-year period beginning on the date of the individual's death. Open Access DMF data should not be accessed pursuant to this Certification but should be accessed pursuant to a customer contract for such DMF data that is not Limited Access DMF. f. Limited Access DMF: Limited Access DMF includes DMF data with respect to any deceased individual at any time during the three-calendar-year period beginning on the date of the individual's death. Limited Access DMF is made available through LN as a Certified Person, by NTIS. This Certification governs Customer's access to Limited Access DMF from LN (or the applicable LN affiliate), whether full or partial Limited Access DMF records or indicators of deceased status, and via any format, including online,XML feed,or in-house file processing through LN. LNRS Non-FCRA Perm Purp Cert—Govt(Q3.15.v1) Confidential Page 3 of 5 II. Certification. Customer's access to the Limited Access DMF requires certification of purpose, as required by 15 CFR Part 1110 and section 1001 of Title 18, United States Code. Customer hereby certifies that it has the indicated permissible purpose(s) under part (a) of this Section II ("Certification'o and that it meets the requirements of part(b)of this Section II: (a) Such Customer has a legitimate fraud prevention interest, or has a legitimate business purpose pursuant to a law, governmental rule, regulation, or fiduciary duty, will use the Limited Access DMF only for such purpose(s), and specifies the basis for so certifying as(choose any applicable purposes that apply to Customer's use): Legitimate Fraud Prevention Interest: Customer has a legitimate fraud prevention interest to detect and prevent fraud and/or to confirm identities across its commercial business and/or government activities. V Legitimate Business Purpose Pursuant to a Law, Governmental Rule, Regulation, or Fiduciary Duty: Customer has one or more of the purposes permitted under 42 USC 1306c including fraud prevention and ID verification purposes. Customer's specific purpose(s)for obtaining Limited Access DMF data under this Certification is: Fraud Prevention and identity verification purposes For uses permitted or required by law © For uses permitted or required by governmental rules [� For uses permitted or required by regulation ❑ For uses necessary to fulfill or avoid violating fiduciary duties and (b) Customer has systems,facilities, and procedures in place to safeguard Limited Access DMF, and experience in maintaining the confidentiality, security, and appropriate use of such information, pursuant to requirements similar to the requirements of section 6103(p)(4)of the Internal Revenue Code of 1986,and (c) Customer agrees to satisfy the requirements of such section 6103(p)(4)as if such section applied to Customer. III. Flow-down Agreement Terms and Conditions The Parties agree that the following terms and conditions are applicable to Recipient and ordering, access to, and use of Limited Access DMF: 1. Compliance with Terms of Agreement and CFR. Recipient of Limited Access DMF must comply with the terms of the Agreement and the requirements of 15 CFR Part 1110, as though set forth as a Subscriber therein, and Recipients may not further distribute the Limited Access DMF. 2. Change in Status. Should Recipient's status change such that it would no longer have a permissible purpose to access Limited Access DMF under this Addendum, Recipient agrees to immediately notify LN in writing in the manner and format required for notices under the Contract. Should Recipient cease to have access rights to Limited Access DMF, Recipient shall destroy all Limited Access DMF, and will certify to LN in writing that is has destroyed all such DMF. 3. Security and Audit. Recipient will at all times have security provisions in place to protect the Limited Access DMF from being visible, searchable, harvestable or in any way discoverable on the World Wide Web. Recipient understands that any successful attempt by any person to gain unauthorized access to or use of the Limited Access DMF provided by LN may result in immediate termination of Recipient's access and this Addendum. In addition, any successful attempt by any person to gain unauthorized access may under certain circumstances result in penalties as prescribed in 15 CFR § 1110.200 levied on Recipient and the person attempting such access. Recipient will take appropriate action to ensure that all persons accessing the Limited Access DMF it obtains from LN are aware of their potential liability for misuse or attempting to gain unauthorized access. Any such access or attempted access is a breach, or attempted breach, of security and Recipient must immediately report the same to NTIS at dmfcertCa)ntis.00v; and to LN by written notification to the LN Information Assurance and Data Protection Organization at 1000 Alderman Drive, Alpharetta, Georgia 30005 and by email (security.investigations@lexisnexis.com) and by phone (1-888-872-5375). Recipient agrees to be subject to audit by LN and/or NTIS to determine Recipient's compliance with the requirements of this Addendum, the Agreement, and 15 CFR Part 1110. Recipient agrees to retain a list of all employees, contractors, and subcontractors to which it provides Limited Access DMF and to make that list available to NTIS and/or LN as part of any audits conducted hereunder. Recipient will not resell or otherwise redistribute the Limited Access DMF. 4. Penalties. Recipient acknowledges that failure to comply with the provisions of paragraph (3) of the Certification Form may subject Recipient to penalties under 15 CFR§ 1110.200 of$1,000 for each disclosure or use, up to a maximum of$250,000 in penalties per calendar year,or potentially uncapped for willful disclosure. 5. Law, Dispute Resolution, and Forum. Recipient acknowledges that this Addendum is governed by the terms of federal law. Recipient acknowledges that the terms of Section 14 of the Agreement govern disagreement handling, and, without limitation to the foregoing,that jurisdiction is federal court. LNRS Non+CRA Perm Purp Cert—Govt(Q3.15.v1) Confidential Page 4 of 5 8 a 6. Liability. The U.S. Government/NTIS and LN (a) make no warranty, express or implied, with respect to information provided under the Agreement, including but not limited to, implied warranties of merchantability and fitness for any particular use; (b) assume no liability for any direct, indirect or consequential damages flowing from any use of any part of the Limited Access DMF, including infringement of third party intellectual property rights; and (c)assume no liability for any errors or omissions in Limited Access DMF. The Limited Access DMF does have inaccuracies and NTIS and the Social Security Administration (SSA), which provides the DMF to NTIS, and LN, do not guarantee the accuracy of the Limited Access DMF. SSA does not have a death record for all deceased persons. Therefore, the absence of a particular person in the Limited Access DMF is not proof that the individual is alive. Further, in rare instances, it is possible for the records of a person who is not deceased to be included erroneously in the Limited Access DMF. Recipient specifically acknowledges the terms of Attachment B to the Agreement,which terms apply to Recipient. 7. Indemnification. To the extent not prohibited by law, Recipient shall indemnify and hold harmless LN and NTIS and the Department of Commerce from all claims, liabilities, demands, damages, expenses, and losses arising from or in connection with Recipient's, Recipient's employees', contractors', or subcontractors' use of the Limited Access DMF. This provision will include any and all claims or liability arising from intellectual property rights. 8. Survival. Provisions hereof related to indemnification, use and protection of Limited Access DMF, audit, disclaimer of warranties,and governing law shall survive termination of this Addendum. 9. Conflict of Terms. Recipient acknowledges that the terms of this Addendum, in the event of conflict with the terms of the Contract, apply in addition to, and not in lieu of,such Contract terms,with respect to the Limited Access DMF only. AUTHORIZATION AND ACCEPTANCE OF TERMS I HEREBY CERTIFY that I have direct knowledge of the facts stated above and that I am authorized to execute this Certification on behalf of the Customer listed above. CUSTOMER: Fb k,4-- [00 f 1 PO I1 c2 bP...Pa*+m eil"r Signature Print Namey I C dP Title Dated (mm/dd/yy) LNRS Non-FCRA Perm Purp Cert—Govt(Q3.15.v1) Confidential Page 5 of 5 Non-FCRA Addendum to the LexisNexis Master Terms and Conditions (form LNMTC) This Non-FCRA Addendum (the"Non-FCRA Addendum") is entered into as of 01Ithe "Effective Date'j, by and between LexisNexis Risk Solutions FL Inc. and its Affiliates (hereinafter, "LNRSFL' , with its principal place of business located at 1000 Alderman Drive, Alpharetta, Georgia 30005 and '> -f L � ice° (�t> c_ �jJf_A-t (hereinafter, "Customer"), with its principal place of business located at f Ll� `' Fr)+ L�,r� 4 h. T)( -? L_ I i 5 ,each individually referred to as the"Party"and collectively as the"Parties." WHEREAS, Customer has executed the LexisNexis Master Terms and Conditions(form LNMTC) (the"Master Terms' for the LN Services(as defined in the Master Terms); and WHEREAS, the Parties wish to add certain terms and conditions to the Master Terms to govern the provision of Non-FCRA LN Services(as defined below). NOW, THEREFORE, LNRSFL and Customer agree to be mutually bound by the additional terms and conditions of this Non-FCRA Addendum,and for other good and valuable consideration,the receipt and sufficiency of which is hereby acknowledged, do hereby agree as follows: 1. Non-FCRA Use Restrictions. The LN Services provided pursuant to this Non-FCRA Addendum and described in a Schedule A (as defined in the Master Terms) as Non-FCRA are not provided by"consumer reporting agencies,"as that term is defined in the Fair Credit Reporting Act(15 U.S.C. § 1681, et seq.) ("FCRA'j and do not constitute"consumer reports,"as that term is defined in the FCRA (the "Non-FCRA LN Services'. Accordingly, the Non-FCRA LN Services may not be used in whole or in part as a factor in determining eligibility for credit, insurance, employment or another purpose in connection with which a consumer report may be used under the FCRA. Further, (A) Customer certifies that it will not use any of the information it receives through the Non-FCRA LN Services to determine, in whole or in part an individual's eligibility for any of the following products, services or transactions: (1) credit or insurance to be used primarily for personal, family or household purposes; (2) employment purposes; (3) a license or other benefit granted by a government agency; or(4) any other product, service or transaction in connection with which a consumer report may be used under the FCRA or any similar state statute, including without limitation apartment rental, check-cashing, or the opening of a deposit or transaction account; (B) by way of clarification, without limiting the foregoing, Customer may use, except as otherwise prohibited or limited by this Non-FCRA Addendum, information received through the Non- FCRA LN Services for the following purposes: (1)to verify or authenticate an individual's identity; (2)to prevent or detect fraud or other unlawful activity; (3) to locate an individual; (4) to review the status of a legal proceeding; (5) to collect a debt, provided that such debt collection does not constitute in whole or in part, a determination of an individual consumer's eligibility for credit or insurance to be used primarily for personal, family or household purposes; or (6) to determine whether to buy or sell consumer debt or a portfolio of consumer debt in a commercial secondary market transaction, provided that such determination does not constitute in whole or in part, a determination of an individual consumer's eligibility for credit or insurance to be used primarily for personal, family or household purposes; (C) specifically, if Customer is using the Non-FCRA LN Services in connection with collection of a consumer debt on its own behalf, or on behalf of a third-party, Customer shall not use the Non-FCRA LN Services: (1) to revoke consumer credit; (2) to accelerate, set or change repayment terms; or (3) for the purpose of determining a consumer's eligibility for any repayment plan; provided, however, that Customer may, consistent with the certification and limitations set forth in this Section 1, use the Non-FCRA LN Services for identifying, locating, or contacting a consumer in connection with the collection of a consumer's debt or for prioritizing collection activities; and (D) Customer shall not use any of the information it receives through the Non-FCRA LN Services to take any"adverse action,"as that term is defined in the FCRA. 2. General. Customer and LNRSFL agree that: (i) capitalized terms used herein but not otherwise defined herein shall have the meanings ascribed to them in the Master Terms; (ii) this Non-FCRA Addendum modifies and amends only those specific terms of the Master Terms expressly referenced herein; and (iii)all terms of the Master Terms are hereby restated as if written herein, shall remain in full force and effect, and shall constitute the legal valid, binding and enforceable obligations of the parties; and (iv)the LexisNexis Risk Solutions Application, the Master Terms, the Non-FCRA Addendum and the applicable Schedules A are collectively referred to as the"Agreement"for purposes of governing the provision and use of the Non-FCRA LN Services. AUTHORIZATION AND ACCEPTANCE OF TERMS I HEREBY CERTIFY that I am authorized to execute this Non-FCRA Addendum on behalf of the Customer listed above. CUSTOMER: FC "+JA e:O+ Signature Print Name I l i C(tiQ LL�III a-,- Title Te d1 n,l 10q y �e fyl C e s M CC41Qcw Dated /oZ fl��I a01'7 (mm/dd/yy) LNRS Non-FCRA Addendum(Q4.14.v1) Confidential Page 1 of 1 ATAC Workstation License Terms Addendum This ATAC Workstation License Terms Addendum ("Addendum'l sets forth terms and conditions for the use of the ATAC Workstation software and product options ordered on the Schedule A which are in addition to, and without limitation of, the terms and conditions set forth in the services agreement between the customer identified below ("Customer") and LexisNexis Risk Solutions FL Inc. or its affiliated entity("LN")for services provided by LN (such services agreement,the "Agreement"). Grant and Scope of License LN grants Customer, a limited, non-exclusive, non-transferable right to install and/or use the ATAC Workstation software and/or service (the"Software Product's and any documentation supporting the use of the Software Product(the "Documentation'l, only by individual end users located in the United States or otherwise pre-approved in writing by LN in advance, provided that Customer complies with all of the terms and conditions of this Addendum, and does so in strict accordance with the following conditions: (i)Customer shall use the Software Product to scan data of and for the Customer only; (ii)Customer shall use the Software Product solely for Customer's own internal law enforcement purposes; (iii)Customer shall not use the Software Product to evaluate or scan data of or for third parties,and such evaluation and/or scanning is expressly prohibited; (iv) Customer shall not reveal any links, Customer accounts, or passwords for the Software Product to third parties(other than to agents of Customer that have been pre-authorized in writing by LN and who have a need to know such information); (v) Customer shall not use the Software Product to create a product or service that would compete with the Software Product; (vi) Customer acknowledges and agrees that it is not permitted to and that it shall not use the Software Product or the information accessed in connection therewith, in whole or in part,for the purpose of serving as a factor in establishing a consumer's eligibility for credit or insurance, employment purposes, or for any other purpose(s) authorized under section 604 of the federal Fair Credit Reporting Act(15 U.S.C. Sec. 1681 et seq.) ("FCRA'j or similar state statute; (vii)Customer shall use the Software Product in accordance with the requirements of all applicable laws and regulations; and (viii) Customer shall use the Software Product solely for law enforcement purposes and to the extent permitted by laws and regulations applicable to Customer and by this Addendum. Customer represents and warrants that is has the right to use the Software Product in all manners and purposes for which it uses the Software Product. Customer shall be liable for its agent's breach of this Addendum as if such breach had been committed by Customer. PRICING,TERMINATION AND ACCOUNT INACTIVATION. This Addendum shall become effective upon the earlier of LN's grant of access to the Software Product, LN's acceptance of Customer's order for the Software Product,or the date set forth on the Schedule A provided by LN and executed by Customer which is incorporated into this Addendum by reference ("Schedule A'J. LN may terminate this Addendum and/or all access to data files immediately and without notice if (i) any fee is not received within the time periods provided above; or(ii) LN has a reasonable basis to believe that Customer or any of its employees or agents have used or will use the Software Product in connection with any violation of applicable laws, regulations, or the scope of the license granted hereunder or have committed or will commit hostile network attacks or other improper activities. Unless otherwise stated in the Schedule A, either party may terminate this Addendum at any time, with or without cause, upon at least thirty(30) days prior written notice to the other party. Refunds shall not be granted in the event of early termination of this Addendum by Customer without cause. If LN terminates this Addendum without cause, LN shall refund the prorated portion of those license fees actually paid by Customer for the Software Product applicable to the pre-paid period that would have been remaining. Upon termination, Customer shall immediately cease using the Software Product and shall dispose of all copies of the Software Product, Documentation, and any other Software Products or materials received from LN by either returning same to LN or erasing, purging or destroying same. Upon request, Customer shall provide LN with a written statement signed by a duly authorized representative certifying that all such Software Product, Documentation, and other products or materials received from LN have been duly returned,erased, purged and destroyed. DESCRIPTION OF LIMITATIONS. Customer agrees not to modify, adapt, reproduce, distribute, resell, retransmit, merge with any other program, prepare derivative works based on, demonstrate, translate, or reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software Product, except: (i) Customer may install or access the Software Product and/or Documentation on or from Customer's computer hard drives (including network or server computers) only as needed to exercise the license rights granted herein; (ii)Customer may make one (1) copy each of the Software Product, if applicable, and Documentation for each site where the Software Product is in authorized use under this Addendum for use only as a backup; and/or(iii) to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation. Customer must first give LN notice of its intention to engage in any such activity expressly permitted by applicable law sufficiently in advance thereof to permit LN to determine for itself beforehand if such activity is so permitted. Any copy of the Software Product or Documentation made by Customer shall contain all copyright,trade secret,trademark and other proprietary rights notices or logos as are in the original. UPDATES. Updates to the Software Product will be made available from time to time by LN,at its sole discretion. NOTIFICATION OF ERRORS. If Customer notifies LN of any area of the Software Product that gives unexpected or apparently incorrect results, LN will, in its sole and absolute discretion, (i) examine and/or (ii) make necessary modifications in that area. LN invites Customer's feedback concerning the Software Product and Documentation or any bugs, errors, or other problems discovered. Customer will not include its own confidential information in such suggestions and LN will have no confidentiality obligations with respect thereto. Customer agrees that LN and its designees may copy, modify, create derivative works, display, disclose, distribute, license and sublicense, incorporate, and otherwise use any or all of the suggestions, including derivative works thereof, for any purpose. U.S. GOVERNMENT USE. Customer acknowledges and agrees that the Software Product and Documentation are "commercial computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Subpart 227.72 and FAR Section 12.212, as applicable, and any use, modification, reproduction, release, performance, display, provision, or disclosure of the ATAC Workstation Addendum(Q2.15.0) CONFIDENTIAL Page 1 I--': -•Software Product or Documentation by the U.S. Government shall be governed solely by the terms of this Addendum and shall be prohibited except to the extent expressly permitted by the terms of this Addendum. MISCELLANEOUS. This Addendum applies to updates, supplements, add-on components, or service components of the Software Product that LN may provide or make available to Customer after the date Customer obtains the initial copy of the Software Product, unless they are accompanied by separate terms. LN reserves the right to discontinue the Software Product and related services. THE APPLICATION OF THE UNITED NATIONS CONVENTION ON CONTRACTS FOR THE INTERNATIONAL SALE OF GOODS IS EXPRESSLY EXCLUDED. Customer acknowledges that the Software Product is of U.S. origin and subject to U.S. export jurisdiction. Any export and/or use of Software Product outside of the United States of America, and compliance with corresponding laws, Nation State regulations, taxes, and tariffs, are the sole responsibility of the Customer. Customer acknowledges that LN is subject to economic sanctions laws, including but not limited to those enforced by the U.S. Department of the Treasury's Office of Foreign Assets Control ('OFAC'J, the European Union, and the United Kingdom. Accordingly, Customer shall comply with all economic sanctions laws of the United States, the European Union, and the United Kingdom. Customer shall not provide access to the Software Product to any individuals identified on OFAC's list of Specially Designated Nationals ("SDN List'j, the UK's HM Treasury's Consolidated List of Sanctions Targets, or the EU's Consolidated List of Persons,Groups, and Entities Subject to EU Financial Sanctions. Customer shall not take any action which would place LN in a position of non-compliance with any such economic sanctions laws. The failure or delay by either party in exercising any right, power or remedy under this Addendum shall not operate as a waiver of any such right, power or remedy. If any provision of this Addendum shall be held by a court of competent jurisdiction to be contrary to law, such provision shall be changed and interpreted so as to best accomplish the objectives of the original provision to the fullest extent allowed by law, and the remaining provisions of this Addendum shall remain in full force and effect. The headings in this Addendum are inserted for reference and convenience only and shall not enter into the interpretation hereof. Unless otherwise specified in a Schedule A to this Addendum, all payments made pursuant to this Addendum shall be in United States Dollars. ENTIRE AGREEMENT. This Addendum, including the Agreement, is the entire agreement between Customer and LN relating to the Software Product and this Addendum shall control if any conflict arises between the two. This Addendum supersedes all prior agreements (and any addenda or amendments thereto) and all other prior or contemporaneous oral or written communications, proposals and representations with respect to the Software Product, services, or any other subject matter covered by this Addendum. ANY ADDITIONAL OR DIFFERENT TERM WHICH MAY APPEAR IN ANY PURCHASE ORDER OR OTHER DOCUMENT ORIGINATING WITH CUSTOMER IS HEREBY OBJECTED TO AND REJECTED, AND TO THE EXTENT THAT THERE IS ANY CONFLICT BETWEEN ANY SUCH TERM AND ANY TERM OF THIS ADDENDUM,THE APPLICABLE TERM OF THIS ADDENDUM SHALL CONTROL. AUTHORIZATION AND ACCEPTANCE I HEREBY CERTIFY that I am authorized to execute this Addendum on behalf of Customer. CUSTOMER: Signature: Print: M i cls ae_1 I'Vl u.n dQ.y Title: I1?G11 hCG i Oq 4 Sao C_:5 Ma lager Date: 121 IS'l 20 0 ATAC Workstation Addendum(Q2.15.0) CONFIDENTIAL Page 2 of LexisNexis Risk Solutions SCHEDULE A Accurint Crime Analysis via Accurint for Law Enforcement ATAC Workstation (Subscription) Customer Name: Fort Worth TX Police Department Billgroup#: ACC-1616610 LN Account Manager: Nicholas Patts This Schedule A sets forth additional or amended terms and conditions for the use of the Accurint Crime Analysis and ATAC Workstation services ("LN Services"), as set forth in the services agreement between Customer and LN or LN's affiliate(s) for the LN Services ("Agreement"), to which this Schedule A is incorporated by reference. The LN Services herein shall be provided by LexisNexis Risk Solutions FL Inc. ("LN"). Customer acknowledges that the services provided under this Schedule A are non-FCRA services and are not "consumer reports"within the meaning of the FCRA and Customer agrees not to use such reports in any manner that would cause them to be characterized as"consumer reports". This Schedule A governs the use of the Accurint Crime Analysis services listed herein, but not the separate use of any Accurint for Law Enforcement services. 1. SCHEDULE A TERM The term of this Schedule A will be 10 months beginning November 1, 2017 (the "Initial Term"). Following the Initial Term, this Schedule A shall automatically renew for additional periods of twelve (12) months (each one, a "Renewal Term"), unless written notice of termination is provided to either party at least sixty (60) days prior to the expiration of the Initial Term or any Renewal Term. If an account is activated after the first day of a calendar month, charges will not be pro-rated. 2. ACCURINT CRIME ANALYSIS ("ACA") FEES In exchange for the Accurint Crime Analysis services provided from September 1, 2017 until October 31, 2017, Customer agrees to pay to LN $847.00. Beginning November 1, 2017 until August 31, 2018, Customer shall pay to LN $4,235.00 which shall be invoiced monthly, Beginning September 1 2018 and continuing each 12- month period ("Year") of the Schedule A Term, Customer shall pay to LN an annual license fee of $5,285.28 ("ACA Annual License Fee") which shall be invoiced in 12 equal monthly installments of $440.44 per month, in exchange for access to and use of the Accurint Crime Analysis service. The ACA Annual License Fee shall include one standard Offender Database Interface and Web/Telephonic product training. Upon conclusion of the Initial Term and continuing each Year thereafter, the ACA Annual License Fee will be increased 4.00 %. 3. ATAC WORKSTATION FEES In addition to the fees in Section 2 herein and in exchange for the ATAC Workstation services provided from September 1, 2017 until August 31, 2018, Customer agrees to pay to LN an ATAC Workstation Upgrade Technical Support Plan ("UTSP") Fee in the amount of$4,878.00. Beginning September 1, 2018 and continuing each Year thereafter, Customer shall pay to LN an annual license fee of$4,878.00 ("ATAC Annual Workstation UTSP Fee") in exchange for an ATAC Workstation Upgrade &Technical Support Plan ("UTSP"). 4. EXPIRATION Unless otherwise accepted by LN, the terms herein are valid if the Schedule A is signed by the Customer and received by LN on or before October 27, 2017. Page 1 of 2 277936.1v4 Customized Schedule A Accurint Crime Analysis - Online (Subscription) + ATAC Workstation S. CONFIDENTIAL INFORMATION This Schedule A contains the confidential pricing information of LN. Customer acknowledges that the disclosure of such pricing information could cause competitive harm to LN, and as such, Customer agrees to maintain this Schedule A in trust and confidence and take reasonable precautions against disclosure to any third party AGREED TO AND ACCEPTED BY: Fort Worth TX Police Department Signed: Name: M t dl-a M U,tL4 CL- i Title: c F-j 1-\C b g y Sc�►V Lw Y"1 Ct-p �aq r Date: l2�Id Za 11 Page 2 of 2 277936.1v4 Customized Schedule A Accurint Crime Analysis - Online (Subscription) + ATAC Workstation 1-- ACCURINT CRIME ANALYSIS and LEXISNEXIS COMMUNITY CRIME MAP Addendum This Addendum sets forth additional or amended terms and conditions for the use of ACCURINT CRIME ANALYSIS and/or LEXISNEXIS COMMUNITY CRIME MAP (the "LN Services" provided herein), which are in addition to, and without limitation of, the terms and conditions set forth in the services agreement between the customer identified below ("Customer's and LexisNexis Risk Solutions FL Inc. or its affiliated entity ("LN'l for the LN Services (such services agreement, the "Agreement'l. Capitalized terms used herein but not defined herein shall have the meanings ascribed to them in the Agreement. I. Government Case Data Exchange Database 1. LN maintains the LexisNexis® Public Safety Data Exchange Database("PSDEX'J, which contains information related to public safety and state and local law enforcement investigations. PSDEX is compiled from information submitted by PSDEX customers and enhanced by LN data and technology. 2. In exchange for good and valuable consideration, including access to PSDEX, Customer hereby agrees to contribute public safety information that may be used for analysis, investigations and reporting. (the "Customer Data Contribution'). 3. LN's obligations. a. LN agrees to provide PSDEX information to Customer. b. LN agrees to provide Customer with instructions for submitting information to the PSDEX database and for using the PSDEX service. c. LN agrees and Customer acknowledges that it will not make available to Customer the source(s) of the PSDEX reports submitted by other PSDEX customers except as required by law or a court of competent jurisdiction and except when such LN customer provides information regarding potential fraud committed by its own employees/agents. 4. Customer obligations. a. Customer agrees to submit to LN, with reasonable promptness and consistency, Customer Data Contributions. b. Customer acknowledges and agrees that it is solely responsible for the content of the Customer Data Contributions submitted to LN and that it shall use reasonable care to ensure the information submitted is a reasonable reflection of the actual report. Each submission to LN with respect to an incident or subject constitutes a Customer Data Contribution. c. Customer's disclosure of information to LN is and will be in compliance with all applicable laws, regulations and rulings. d. Customer agrees to notify LN promptly of any change in status, factual background, circumstances or errors concerning any Customer Data Contribution previously provided to LN. Customer further agrees to submit corrected information in a timely manner. Customer agrees that it will fully and promptly cooperate with LN should any inquiry about the Customer Data Contributions arise. e. The following named individual/department shall serve as the contact person(s) for submissions made to LN. The contact person shall respond to requests from LN for clarification or updates on incident reports submitted by Customer during normal business hours, and Customer will not reasonably withhold from LN information on any such submission. LN shall not reveal the identity of the Customer's contact ))person(stoo any other PSDEX customer. Name: ( /ae( / UAJ Title: —Te--e ►10 d rv+co e Address: O W. - Sf— rl& 600(ih TR 7401 l Phone: �1?- 31a - ZS3 Fax: Email: icvklt f. Customer agrees that it will access information contributed to PSDEX by other customers only through LN. g. Customer agrees that LN and all other PSDEX customers shall not be liable to Customer, and Customer hereby releases LN and all other PSDEX customers from liability to Customer, for any ACA LNCCM Addendum(Q3.16.v1) Confidential Page 1 of 2 claims, damages, liabilities, losses and injuries arising out of, or caused in whole or in part by LN or each such other PSDEX customer's negligence, gross negligence, willful misconduct and other acts and omissions in reporting or updating incidents of alleged wrongdoing for inclusion in PSDEX. Other PSDEX customers are intended to be third party beneficiaries of this paragraph. II. General Terms 1. LICENSE GRANT. Customer, at no charge, hereby grants to LN a paid up, irrevocable, worldwide, non- exclusive license to use, adapt, compile, aggregate, create derivative works, transfer, transmit, publish and distribute to PSDEX customers the Customer Data Contributions for use in PSDEX and all successor databases and/or information services provided by LN. 2. GOGGLE GEOCODER. LN used Google Geocoder to geocode address locations that do not already contain "X"and "Y"coordinates. Any"X" and "Y"coordinate information provided by the Customer is assumed by LN to be accurate and will not be geocoded by Google Geocoder. Crime dot locations geocoded by Google Geocoder as displayed in PSDEX are approximate due to automated location methods and address inconsistencies. DATA DISCLAIMER. LN is not responsible for the loss of any data or the accuracy of the data, or for any errors or omissions in the LN Services or the use of the LN Services or data therein by any third party, including the public or any law enforcement or governmental agencies. 4. LINKS TO THIRD PARTY SITES. PSDEX may contain links or produce search results that reference links to third party websites ("Linked Sites"). LN has no control over these Linked Sites or the content within them. LN cannot and does not guarantee, represent, or warrant that the content contained in the Linked Sites, including,without limitation other links, is accurate, legal, and/or inoffensive. LN does not endorse the content of any Linked Site, nor does it warrant that a Linked Site will not contain computer viruses or other harmful code. By using PSDEX to search for or link to Linked Sites, Customer agrees and understands that such use is entirely at its own risk, and that Customer may not make any claim against LN for any damages or losses whatsoever resulting from such use. 5. OWNERSHIP OF SUBMITTED CONTENT. All information provided by a PSDEX customer is offered and owned by that customer. Unless otherwise indicated by such customer, all data will be retained by LN and remain accessible by the general public and/or other PSDEX customers in accordance with the provisions of this Addendum. AUTHORIZATION AND ACCEPTANCE I HEREBY CERTIFY that I am authorized to execute this Addendum on behalf of Customer. Required: Customer ORI number(Originating Agency Identifier): CUSTOMER: F6 V+ W\()(-ffi POI ICC, DSI ' ►'`ent Signature: /r Print: l CA ICL e% LU1 dQ�I Title: Te-C11110i[YlS4 �SefJ1C I"IC2nuif'f" Date: / 2I/8/2017 ACA LNCCM Addendum(Q3.16.v1) Confidential Page 2 of 2