HomeMy WebLinkAboutContract 28185� � �3 � u` � i � I.
STATE OF TEXAS §
COUNTIES OF TARRANT,
DENTON AND W15E §
CIiY �����['�4R�� . ..
C(�N�'RACT � a _ � �.� �
KN�W ALL BYTHESE PRESENTS:
CONTRACT FOR PRO�ESSIONAL CONSULT�NG SERVICES
This Contract is made by the City ofi Fort War�h, Texas, a municipal corporation
situated in Tarrant County, Texas, hereinafter cal�ed "City", and Secure Commerce
Systems, Inc., a Texas for-profit corporation, hereinafter called °Consulfant", bath parties
acting herein by and #hroug� their duly authorized representatives:
1. 5cope of Services.
Consultant agrees to �arovide lnform�tion Technology System audit consultation
services to enab[e City to assess its electrortic informatian network's vulnerability and
penetrabi[ity, and provide recommendations for rendering it more secure, as described in
detail in Exhibit "A," Consultant's "Proposa[ for Network Securi�y 1 Vulnera�ility Audii" of
August 15, 2002. Same is attached hereafter and incorporated herein for all �urpases by
referenc�. In the event of a conflict between the terms of this Contract and the terms of
Exhibit "A," th�s Contract shall confrol. Specific exception is taken to SectEon 4.10 "General
Indemnification" of the Consultant's Proposal.
2. Compensation.
The amour�fi to be pa[d to consultant for alf s�rvices perFormed hereunder shall not
exceed Fifty-five thousand dollars ($55,OOQ).
, - `. � f
I .
� , ' i ��
3. Term.
The term of this Contract shall commence the date of full execution by Cify and
Consultant and, wifh the exception of on-going maintenance and monifioring as delineate�
in Exhibit "A," shall terminate no lat�r fhan the 28th day of February 2003, unless
terminated eariier as pro�ided her�in. .
4. Termination.
a. City may ierminate �h�s Contract at any time for cause amounting to a
material breach of fhis Confract by Consultant, by notice irt writing fio
Consultant. Upon receipt of such notice, Consulfiant shall immediately
discontinue all services and work and the placing af al� orders or the entering
into contracts for a[I supplies, assis�ance, facilities and mater�als in
connect�on with #he performance of this Contract and sha11 proceed ta cancel
prompily all existing confracts insofar as they are chargeable to this Contract.
if fihe Ci#y terminates ih�s Contract under this Section 4.a., the City shall pay
Contractor far services actuaily perFormed in accor�ance herewith prior to
such terminafion, less such payments as have been pre�iously made to
consultant, in accordance with a final statement submitted by Consultant
documenting the performance of such wa�k. Cansu[tant may terminate this
Contract ai any time if any payment due hereunder is not made by the City.
b. In #he event no funds or insufficienf funds are appropriated and budgeted by
City in any fiscal period for any payments due here�nder ("Default Period"),
City will notify Consultant of such occurrence prior to th�-�r�eqi_r�n'in� of`�t�e
} ,
, , ,� .
," ,
Default Period, and this Contract sha11 terminate on the last day ofitne fiscal
period for which appropriations were receivec� without penalty or expense to
City of any kind whatsoever with respect to #he Default Period, except as to
ihe portions of the payments herein agreed upon far which funds shall ha�e
been appropriated and budgeted. City agrees to appropriate and budget, as
prac�icably as possible after the Default Period, amounts sufficient to co�er
any paymer�ts owed but not paid to Consultan� as of the begir�ning of the
Default period, and to promptly pay these amounts to Con�ultant. Cify has
infarmed Consuliantthat, concurrentlywith approval ofthis contract, Citywifl
a�prapriate and butfget 10Q% of the funds specified in fhis Contract, sa t�at
all funds wiil be appropriated and budgeted prior �o ti�e commencem�nt date
of this Contract.
c. Upon t�rmination of this Contract for any reason, and subjeci to paragraphs 13
and 14, Car�sultant shall pro�ide fhe Ci#y with copies of all completed or partially
completed documents prepared Under �his Contract.
d. Eifiher parky may terminate this contracf upon 60 days natice in writing far
convenience.
5. Insurance.
a. Consuitanfi shall nat commence work under this Confract untif it has obtained
all insurance required under �his section and such insurance has been
approved by #he City, nor shafl Consultant allaw any subcontractor to
commence work on its st�bcontracf until all similar insurance of the
3 ' '. �
,�� � �
.,,
subcontractor has been so obtained and appro�ai gi�en by the City.
b, Workers' Campensation Ins�trance: Consultant shall take out and maintain
during the life af this Contract statutory Workers" Campensation Insurance for
a!I ofi its employees performing any of the services hereuncfer, and, in case
any work is sublet, Consultant shall require t�e subconfractor similarly to
provide Workers' Comper�satian insurance for all of the latter's employees
unless such employees are co�ered by the protection afforded by Contract's
ir�surance. ln case any class af employee who engages in hazardous work
under this Con�ract is not protected under the Workers' Comper�sation
statute, Cansuitanf shall provide and sha11 cause subcontractor to pro�ide
adequate and suitable insurance for the protection of employ�es not
otherwise protected.
c. Public Liability and Property Damage Insurance. Consultant shall take aut
and maintain during the Iffe of this Cor�fract suc� public liabi[ity and property
damage insurance as sf�all protect Consultant and any subcor�tractor.
perfvrming work co�ered by this Contract from claims for personal injuries,
�nciuding death, as well as from claims for property damages or losses which
may arise fram operation under this contract, wh�ther such operations be by
Consultanf or by any� subcantractor or by anyone directly or indirectly
employed by either of th�m. The amounf of such insuranc� sha[I be as
follows:
(1) Public Liability ]nsurance. In an amount no less than Two Hundred
►�
:IF . ",. � . ;.
�,. ,
� `� I� . ''� .
,
Fifty Thousand Dollars �$250,000) for injuri�s, incl�ding accidental
death, to any one �erson; and subject to the same limit for �ach
person, in an amount not less than Five Hundred Thousand Dollars
($500,�00) on account of one accident;
(2) Property Damage Insurance. In an amounf not less #han Five
Hundred Thousand Dollars ($500,000);
{3) Umbrella Policy. In an amount not less than �ne Million Dollars
($1,OOO,QO�).
d. Proof of Irtsurance Coverage. Contractor sha11 furnish the City with a
certifica#e of insurance as �roof that it has obtained for the durafion af th�s
Contract the insurance amdunts required herein. Cor�sultant's insurance
policy shall provide thafi the insurer shall give fhe City thirty (30) days' prior
written no#ice before altering, modifying or terminating the insurance
co�erage.
6. Independent Contractor.
Consultant shall perform all work and services hereunder as an independent
contractor and not as an officer, agent or emp[oyee of the City. Consultant sha[I have
exclusive confrol of, anci the exclusi�e right to control, the details of the work psr�armed
hereunder. Nothing herein shall be construed as creating a partnership or joint venfiure
betw�en the City and the Consulfiant, its afficers, agents, employees and subcontractars;
and the doctrine of respandeat superivr shall have no application as be�ween �he City and
the ConsuCtant.
5 ;i i, , ., t ,. .
,r ,. ;
�, � �
7. Disclosur� of Conflicts.
Consultant warrants to the City of Fort Worth that it has made full d�sclosur� in
wri�ing of any existing or potential co�flicts of interest relafed ta the services to be
perfo�med hereunder. Consultant further warrants that it wifl make prompt disclosure in
writing of any conflicts of interest which develop subsequent to the signing of this Contract.
8. Riqht to Audit.
Consultant agrees that the City shall, until the expiration of three (3) years after final
payment �nder this contract, ha�e access to and the right to examine at reasonable times
any directly pertinent baoks, documents, papers and records of th� consultant invol�ing
transactions relating ta this Contract. Consultant agrees that the City shall ha�e access
during normal rrvorking hours to all necessary Consulfiant fac�lities and sY�all be provided
adequate and apprapriate work space in order to conduct audits in compliance with the
prov�sions af this sec#ion. The City shall give Consultant reasonable advance no�ice of
intended audifs.
Consultantfurther agrees ta include in a11 its subcontracioragreements hereundera
pro�ision to th� effect that fhe subcontracto� agrees that the Cifiy shall, until the expiration
of three {3) years after final payment of the subcontract, have access to and the right to
examine at reasonable times any direcfly perkinent books, documents, papers and records
of such subcontractor involving transactians related �o �he subcontrac�, and furtherthat Ciiy
shall have access during normal worlting hours to all subcontractor facilities and shall be
provided adequate and appropriate work space in order to conduc# audits in complianc�
with the provisions of this paragraph. City shall give subcontractor reasonable nofice of
6 '�,� - " '
,.,,
intended auc�its.
9. Prohibit�on of Assiqnment.
Neither party hereio shall assign, sublet or #ransfer its interest herein without the
prior written consent of the other party, and any attempted assignment, sublease or
transfer of all or any part hereofi withouf s�ch prior written consenf shall be void.
10. Non-discrimina#ion.
As a condition of this Contract, Consultant co�enants that it wifl �ake
all necessary actions to insure thafi, in conr�ection with any work under �his
Gontract, Coniractors, its associates and subcontractors, wil[ not discriminate
�n the tr�atmeni or employment of any individual ar groups of indi�iduals on
the grounds of race, calor, religion, national origin, age, sex or physical
handicap unrelated to job performance, either directly, indirec�iy or through
contractual or other arrangements.
11, Choice of Law; Venue.
a. This Contract shall be construed in accardance vwrith th� internal law of the
State af Texas.
b. Should any action, whether real or asserted, at law or in equity, arise out af
the terms of th�s contracf, venue for said action shall be in Tarrant Coun#y,
Texas.
12. Riqhts in Results of Services.
The materials and me#hods used in th� pro�ision of Consultant's services are
proprietary to Consuitant. A11 rights, including copyrights, in and to such materials and
,..
7 - ' '�' �� _ ' ' .,
. : ,, .
.. . �
�� '�� „. �,,
methods shall remain the prap�rty of Consultant. City is granted a limited ri�ht of internal
reproduction and disfiribution of materials prepared specifically for City und�rihis Contract.
13. Confidentiallnfiorma#ion.
City acknowledges and agrees that any and all information (in whate�er form)
relating #o the business of Consultant and acquired by Cify under this Contract, or
otherwise, js and shall remain, ta the extent permitted by lavv, confidentiaf information of
Consuitant to the extent that it includes �aluable and proprie#ary trade, business and
industry secrets of Consultant, City agrees to maintain in confid�nce and (except as
otherwise provided in paragraph '[3) to �efrain, directiy or indirect[y, from copying, using,
transferring, disclosing or ex�laiting in any manner any of such confidential information
during the term vf this Contract and following termination tl�ereof, for any reason.
EXECUTE� on this %�� day of �J11�r�, 2002.
,� ,
p,� �T: � CI Y F F�RT WOR H
:i.f � _ .��-d --. � - �,..
City Secret Charles Baswell
Assistant City 11�1anager
APPROVED P� TO F'ORM AND LEGALITY:
,
,� . _
,.- ��-
Assist� City Att rney
._�--���!._ _ _ -
�ontraet .�u�:����a����
._.�'°��10� ._. �.
Date
�
-� __
S�cure Commerce Systems
. ..., .-� � �� _ .�
. { . .� ��
gy. -��, �,,...� . t _ ;
DanEel P. White
CE�
s
� � .
„ , . . . �
� �
C'ity of ' Fo�t T�o�th, T'exas
f��yor �r�� Cou�cil Cor�mu�nica�io�
�ATE REFERENCE NUMBER � LOG NAME
10I81o2 �`* P�969�
Da02-0223
PAGE
1 of 2
suB��cT EXECUTE A CONTRACT WITH SECURE C�MMERCE SYSTEMS T� PERFORM A
COMPUTER SECURlTY AUDIT OF THE C1TY'S INFORMATION TEGHNOLOGY
NETWORK FOR THE INTERNAL AUDIT DEPARTMENT
RECOMMENDATION:
!t is recommended t�at the City Council:
Authorize the City Manager to execute a confract with � Secure Gammerca Systems �o perform a
com�u#er security audit af th� Cifiy's Information Technology Network for the lnternal Audit
Departmenf for an amount not to excee� $S�,�QO; and
2. A�thorize this contract fo begin on the date of contract execution, and expire three mon#hs thereafter,
DISCUSSI�N:
The City increasingly uses remote access to its computers by employees (through mobile data
corriputers, ce[lu�ar phones, dial-in telsphones, etc,), v�ndors, cansultants (thro�agh ,direct linlcs and the
internet), and the public (through the internet).
Ad�itiana�ly, the City currently has o�er 3,DOfl persanal camputers that. are connected to the mainframe
and various ne�worfc servers. AIf af these connections pose risks that persons, either emplayees or
nan-employees, could gain access to restricted data and intentionally ar unintentianally carrupt or
release the data.
Assessing the security of computers and networks is a highly technical undertaking that can �est be
performed by consultants using specialized saftware. The Purchasing Division issued a Request for
Propasal (RFP} to select a consuitant to pertorm a security assessment of interna) and external
vulnerabiliiies of #he City's mair►frame and netwark computers. Based on iheir presentatian during the
inienriew process, the lnternal Audit De�artment sefected Secure Gamm�rc� Systems ta p�rtarm tF�e
audii.
Tt�is initial sefection was based on the fallowing criteria:
a Cost effectiveness;
� Experience in conducting simi[ar r��iews;
• Technicat propasal; and
o Pro�ect deliuery times.
BID ADVERTISEMENT - The Purchasing Di�ision solicited thirteen vendor from the purchasing system
database and sixteen vendors fram RFP.Depo# �end�r listing. Sixt�en r�sponses were receiv�d, one
of which was a "no-bid".
TABULATIDN � See atfached bid tabu[ation.
C`ity of 'Fo�t Wo�th, Texas
M�yor ��nd �ou�ciC Co�r��a�«�t�or�
DAT� k�EFERENC� iVUMBER LOG NAM� PAGE
1018102 **P-9691 � 0002-0223 2 at 2
sus���T EXECUTE A CONTRACT W1TH SECURE COMMERCE YSTEMS TO PERFORM A
COMPUTER SECIJRITY AUDIT OF �THE CITY'S INF�RMATION TECHNO�.OGY
NETWORK FOR THE INTERNA� ALJDIT DEPARTMENT
MIWBE - A waiver of the goal far MIWB� subcontracting requirements was requested by fhe
Purchasing Di�ision and approve� by the MfllVBE Office because fhe purchase of services is from
sources where subcon�racting ar supplier oppartunities are negligible.
F15CAL INFORMATIONICERTIFICATION:
The Finance Director certifies that fiunds are availabfe in the current aperating budget, as apprapriated,
of the General Fund.
CB:n
6QN102-0223NVW
5ubmiiied far City Manager's
Oi'fice by:
Charles Baswell
Originating DegarEment Head:
� FC]Nb I ACCOUNT I CENT�R I AMO[TNT
� (to)
6183 I
CITY SECRETARY
]im Keyes
Additianal Informat'ran Cnntact:
Robert Combs
�
8517 (from)
GG01 531200
8357
0101400 $55,000.0� �
�
�
�
APPROVED 10/08/0�
City of �ori �'ort�i
l�roposat f 'or
�
... ,
I~•��H,� ' . . .
�.1 � ♦
;,� -�„ h`' .' '
,« r
1 �
,�:- -'
�:-
�
. `,
1�Tetwo�& S'ecurity /
iva�l�eNability Audit
T'o beperformed by:
���' ���
--�-�
��i'�"tE?"��'��� __.
�������
August I5, �04�
�1�OPRI�TARY and CONFIDENTIAL
This documenf contains Secure Commerce Sysfems proprietary
informati�n and should not be released outside of fhe City of Fort Warfh
wifhout prior writfen consent
�''�t�►���•k ���c{���•r'�� l ��f��'�r.��rr��ilit�r .� rrc���
.'�kk�ll'a� � 4, ���{1'ry *
Fot�ewortl
Secure Commerce Systems, Inc. submits this pz'opasal ta the City of Fort WortIl for the
purpose af establishin� a professional services agreement far the scope defined hereii�.
Addiiional copies and questions concert�ing this report should be directed to Daniel P.
White at Secure Cornrnerce Systerns, 17225 El Camino Real, Suite 340, Houston Texas,
77D58. The phone number far Secure Cornmerce Systerns is 281-286-3342,
2
PROPRI�TARY and CDNFIAENTlAL
This document contains 5ecure Commerce Systems propriefary
informaiion and should not f�e reJeased outside of the City of Fori Worfh
wifhou� prior written eonsent.
���.�fr��ylr k������F��t I �a�lrr�ricr��i�r.'t�� �� r�rl.r�
r�ta�,t��4 [5, ?S]l;?
City o�Fort Wo� Purchasing Office
ATTN: Robert Combs, Purchasing Manager
P.O. Bax 17027
Fort Worih, Texas 76I QZ
City of Fort Worth Purchasing Office
ATTN: Robert Combs� Purchasing Manager
1000 Throckmorton
Fort Worth, Texas 76102
3
PROPRI�"�,4RY and CONFID�NilA�
This document contains Secure Gommerce Sysiems proprietary
informafion and shvu�ld not be released outside of fhe City of Fort Worth
with�ut prior written consent.
�Vc������a�•�4 .5'c�rr���r'��� / ����rrc���cr1�r`�r��� �rrr�r."�
r�u�+���1 l5. �[}[}Z
1 Executi�� Su►a�rri�r�
Secure Commerce Systems is pleased to respond to the City of Fort Worth's request for assistance in
evaluating the City's existing networlc security aperations, and in providing effective recommendations
for mitigating the rislcs that are identified.
1.1 Intent to Perform Se�vices
Secure Cvmmerce Systems intends to perform f,he following services as specified in tlze Rec�uest for
Proposal (RFP):
1. Evaluate secttrity canlz�ols to detect and/or prevent unauthorized access to th� City oi Fort
Worth's computer network through its internet web pages.
2. Evaluate security controls to detect andlor prevani unautl�arized access to the City of Fort
Worth's computer network through its dial-in system.
3. Evaluate �xisting int�rnal network security controls that limit access andlor prevent �inauthorized
use of the City of Fort Worth's network r�sources by emplayees, contxactors and vendors.
4. Prepare a written repart, in a format agreed to by the City Auditor, listing securiiy vulnerabilities
identified and recommendatio�s for abating those vulnerabilities.
1.� Qualifications fop Selection
Secure Commerce Systems' vulnerabiliiy and penetration assessment se�rvices are among the most
advanced in the industry. Secure Commerce Systems uses tested comTnercial products such as Internet
Security System's .TnteYnet Scanner and Database Scanner, Symantee's Enterprise Securit}, Mctnag�r,
SPI Dynamics Web In�pect and its own GuexrdTower TM recurring assessment family of products.
Secure Commerce Systems' vulnerabiliiy assessmeni servic�s provide its clieilts with � thorougl�
understanding of the dynamics of their ever-changing networks.
Secure Commerce Systems' vulnerability assessment strategy uses two very different approaches that
include an "insider" with knQwledge of the network or an "outsider" with little ar i�a lcnowledge of t11e
nefwork. Typically, an Internet perimet�r assessment vwill use the latter approaeh and is often fol�owed
by a penetration test to determine what inteinal assets ca.n be accessed or intellecival p��operty
compromised as a result of the vulnerabilities discovered. Internal assessrnents usually use the "insider"
approach, where internal IT security personnal knowledge is utilized ta st�earnline #he engagement
aetivities and to explore the "insic�er gone bad" possibilrties far asset compromise.
4
�RO�Rf��ARY and CONFID�MTIAL
This documenf confains Secure Cammerce Systems proprietary
informatiorr and should raof be released outside af the Cify of Fart Worth
wifhauf prior wriften consent.
?1�����a���•1ti �Sc��}rr������ � i�rr����e��rrl'��[r'�� � ��r�r'�
���.���ur:� l�,?[}rl�
In either case, Secure Cammerce Sy�tems' assessments identify alI systems connected to il�e iletwor�c,
'Th� sysiems identified are care�ully examined to exclude devices such as printers, programmable logic
cantrallers, and legacy systems whase TCP/IP stacks may not l�e robust enough to withstand high
criticaiity vulnerability scanning.
In addition, Secure Commerce Systerns' assessmeut services offer the option af aLttomat�d vulnerability
remediaiion utilizin� the Citadel hTereules product. This product drastically rcduces the la�or rcquired
f�r vulne�rability remediation by perfortning concurrent patch application ta m�Itiple systems, incl�ading
configuration changas as needed. I�i this way, Sacure Commerce Sysiems is ahle to leave its clients with
an updated ope:rating system baseline far future comparison.
Networks, however, are canstantly changing as nevcT systems are eontinually being added to the network.
Car�figuration management is difficult ta achieve in developrnent networks, and nevvly disco�ered
vulnerabiiities plague even production networks that axe carefully configuration rx�anaged. Secure
Cammerce �ystems recommends recurring assessments throug�aut thc y�ar, and its GuardTower T"�
automated recux-�'ing ass�ssment services are available to provide economical cantinuing assessments far
mission critical systems.
Often, the Return On Investment {ROI) for vulnerability assessments is not apparent until vulnerabilities
have been used to gain unauthorized access or to create a denial of service situation. Sect�re Com�nerce
Systerns' reports demonstrate the value of remediation from a business perspective.
5
�1��P14l�TARY and COIVI�L��M�IA�
This documenf contains Secure Commerce 5ystems proprietary
information and should nof be released outside of the Crty af For� Worih
wifhout prior wriften consent.
1V�����oirk �'�c.*r�r*r'�� � [���1r�c�r�rr��rlr't�� r�l rr��it
;�4��;�wst 1�� ?fi���
l.3 Authori�ation Lette�^ c�nd Signatu�e
To the City of Fort Worth,
Secure Commerce Systems thanks you for the opportunity to work with you o�� Networlc
SecuritylVulnerability Audit project.
This proposal r�presents our current understanding of your needs, and our approach to addressing those
needs. Should this praposal be accepted, Secure Comrnerce Systems agraes to enter into a contract under
�he terms and conditions as prescribed by the Request For Proposal (RFP). No exceptions to tl�e tenns
and conditions prescribed by the RFP are taken.
Please review this proposal, and cammuzucate to us any changes, questions or concerns you may have.
We anticipate that we can respond to all of your requirements, and look forward to heginning work
saon.
Sincerely,
Ron Newrnan, Chief Qperations Officer
Secure Commerce Systems, Inc.
6
PRCJPRI�iARY and CONFlD�AITIAL
This document contains Secure Corrrmerce Systems proprietary
informatron and should not be released oufside of the City of Fort Worih
without priar wrrtten cansenf.
���t���r���J4 ���cu�r'��+ � ����l������crJ�rlr.�y �1�rrl�:�
.�����,�ti r �..��.o�
The �Yty of For� �orth Agreemen� for
�ecure Commerce Systems, Inc.
Professional Services
G`ansultrng Services estimated nat ta exceed
$I75.00 per hor�r fo�- 300 hours
For a totai of $52, SOl1. 00
And $2,500.00 in estimatec� expenses
For c� total authorization not to exceed
$55, 000.00
Contract Num6er: SC� 081502-1
Each of us agrees that the complete agreement betvveen Secure Cammerce Systems and the City of Fort
Worth about these ser�'ices consists of ihis Customer Agreement and the associated Engagem�ni Letter.
l�greed ta:
Customer Nam�:
City af Fort Wortla
Pu�chasing Offce
IODO Thpockmortor�
Fort Worth, Texas iG102
By
Authorizeti Signature
Rohert Ca�nbs
Name (type or print):
Title:
Purchasi�g Manager
�ate:
Agreed ta:
Secure Camrraerce Systems, Inc.
17225 El Cami�ao Real, Suite 340
Houston, Texas 7�058
By
Authorized Signakure
Dariied P. White
�Vame (type or print):
Title:
CEO
baie:
7
,PROPRI�'7'AF?Y and C01V�1D�fV�IA�
Thrs document contarns Secure Commerce Systems proprretary
rnforma�ron and should noi be released outsid� of fhe City of Fort Worfh
withouf prior wriffen consent.
�c����}o�•k ►S'e�����i��F � ��rtl,����'[f�)��f� �tf�I��
1lLa�USf �J. ��}��
� P��po�al
Secure Commerc� Systems is pleased to present this proposal to the City of Fort Worth. This propasal is
organized according to the RFP requirements ta �acilitate your review efforts.
Z.I UYganization
All work specified within this proposal will be performed by personnel from the Houston off ce of
Secure Cammerce Systems, Tnc., located at:
S�cure Commerce Systerns, Inc.
17225 El Carnino Real, Suite 340
Houstan, Texas 77058
5ecure Commerce Systems is an S-class corporation in the State of Texas and has offces in Hauston,
Dallas, Austin, Philadelphia, and Los Angeles.
�.� System Concept and Solution
Secure Cammerce Systems is praposing to provide the City of Fort Worth an analysis of the infarrnation
security vulnerabiliiies associated with information systams, routers, and fir�walls 1Qcated on tl�e TCPIII'
ne�works of tlie City of Fort Worih. Secure Commerce Systems will evaluate ihe Ciiy's vulnerability to
unauthorized access to or use of its neiwork resources.
�.3 Scope of Wo�k
The scope of this iz�£arrna�ion securi�y vulnerability assessrrient �vill include the information systems
administered hy the IT Solutions Department of the City of Fort Worth. Many of these systems are
cenirally located at City Hall, but not all are located in the IT Salutions coinputer room.
The purpose of this tasl� is to detect vulx�erabilities that can be exploited to penatrate the City of Fort
Worth Internet gateway firewalls and internal network systems via TCPIIP and network services
vulnerabilities. Secure Commeree Systems will conduct interviews wi�h designated City of Fort Wo�-th
neiwork pro%ssionals and use vatious proprietary intrusion testing methads to map the network and to
assess the security af the Internet gat�way ftrewalls and the internal network systems.
Secur� Commerce Systems inten.ds ta perForm the following sarvices as sp�cified in the Request for
Praposal (RFP):
8
PROARIE%9i;Y and COf111e1D�f1!'iIAL
This dacument contains Secure Commerce Systems proprietary
informafion and should rtot be released oufsrde of the Cify of Forf Worth
without priar writferr cansent.
�Ye������•1� �S'��c}rrr•���� l �����r��•�r.l�f�f�� ��1 rrc#�t
:�.���u�t �5, ?t.�{�:
1. Eval�.tate security cantrols to detect andlar prevent unauthorized access ta the City af Fart
Worth's computer network ihrough its internet web pages.
2. Evaluate sacurity controls to detect and/or preven� unauthorizad access to ihe City of Fort
Worth's cornput�r netwark through its dial-in system.
3. Evaluate excisting internal netrvork security controls thak limit access and/or prevent u;�autharized
use of the City of Fort Worth's network resources by �mployees, coz�tractars arld vendors,
4. Prepare a written xepc�rt, in a%rrnat agreed to by the City Auditor, listing an intraduction in
Sectian 1, an Executive Summary far City Council in Section 2, and detailed security
vulnerabilities identifed and recommendations for abating ihose vulnerabilities in Section 3,
2.4 System Solution
The Security Assessment Team will coardinafe its requirements and schedule with the appropriate City
of Fort Worth technical support and network points-of contact {POC}. A!1 assessment activities
requiring access ta production sy�tems and networks wi11 be gerformed in coordinatioi� with the
appropriate POC, and change cantrpl approval will be obtained prior to proceediilg witla the assessmeilt.
The methodology employed for per%rnung the vulnerability assessrnent will follow a sequence of
defined phases. Each phase will be dependent on the output or results of the pr�viaus phase or phases
for providing the data needed to accomplish its processes and activities. The phases of this m�thodology
are presented in the following sub-sections.
2. � Project I�aitiatio�a
The gurpose of this phase is to develop engagement objectives arad ta coinmuilicate t11e Security
Assessment Tearn's understanding of the rules of engagement.
2. b Di,scove�y
The purpose of this phase will be to gafiher a deiailed unc�erstanding of the Intern�t gat�way firewall and
int�rnal network systems. Types of activities included in this phase wili be:
o Network architecture reviews
• Dafia callection, through discussions with technical and management teains, to include ii�dividual
firewall rule sets and rauter conf gurations
9
�RO�Rl�TAf�Y and C��1�'I��MT1A�
This documenf cantains Secure CQmmerce Sysf�ms propri�tary
irrfarrraatiort and should n�t be released outsrde of fhe Cify of Fort Worth
without prror written consent.
������ot�1�. �e�r���i�,�f � ��rr[���r{rr�r��r.��a �f rcr���
.�;����: � �, ����]?
The collection of data from these activ�ties wi111�e used by the assessment �eam to gain an understanding
af the Tnternet gateway firewall operational environmer�t in arder to dev�lop the most appropriate and
effective m�ans for conducting the rest of the assessment.
2. i Assessment Phus�
The goal of this phase will be to canduct a technical examination af the Internet gateway firewall and
int�rnal network systems utilizing automated tools to assess the connectivity and network environm�nt
and to evaluate the adequacy of security controls in place. Tlus phase will be performed from two
perspectives:
A. DuEside Laoking In
The purpase of this view will be to sirnulate typical "hacker" type activities by analyzing
remate access to the Inteme� gatew�'ay �irer�all environment. The ou�come of this task will
be used to deternsine whether it is possible to attack the perirn�t�r security of the Internet
gateway firewall and to gain unauthorized access to resources within the internal network
environment.
B. Ir�side Lookir�g Out
The purpose of this view will be to assess the internal networl� sys#ems to deten�nine
whether it is possible ta exploit vulgerabilities of thesa systems to gain unauthorized
access to resources or to create denial of service situaiians.
28 Reporting
The purpose of this phase is to generat� a dacument that inclucies an Executive Suriunary af fhe
in_formation security vulnerabilities discovered, as wall as d�tail�d imdings thai will provide the iT
professionals responsibie for vttlnerability remediation wiih information on where to �ind paiches andlor
suggested technoZogy alternatives.
2.9 Remediation
The purpose nf this phase is to prflvid� remediation of the discovered vuinerabilities.
Z.10 Deliverahles
The outcome of fhe information security vulnerabili�.y assessment wi11 be aggregated into an easy to
understand pair of management and technical reports:
10
PI��PlZI�TAaY and CONFID�NiIAL
This documerrt contains Secure Commerce Systems proprietary
informatian and shaula� nof be released outsid� of the City of For� War#h
without prior written consent.
�V�t����� �l� S�c:r���i�x � �a�lrf��•c�1���i�? 1� ��rlr�
r��G��G�E f >, ?S�{3:?
• The management repart will quanti�y tbe number of discovered vulnerabilities for each af the
low, medium, and high risks present on �he n�trvork. The business threats that are inherently
obvious as a result of the vnlnerabilities will be presented in clear municipal business format.
� The �echnical report will clearly identify discovered vulnerabilities %r t11e Interr�ek gatevuay
firewall enviranment and p;rovide recornmendations for carrective ineasures, Specific patches
and their web iJRI, locafions (where applicable) will be pzovided within the report to facilitate
quick remediatian of discovered vulnerabilities.
Any inforrnation recovered during this phase will he treated as City of Fort Worth confidential and will
be de�ivered only to autharized representatives o� the City of Fort Warth. A copy of the report will be
�ept only as an archival copy on Secure Commerce Systems proprietary sysiems using a secure
encryption algorithm.
2.I1 Crty of Fo�t Wo�th Responsihilities
The City of Fort Worth will identify and make available �he necessary personnel and documentation to
provide the assessment team an understanding of the Internet gateway firewall a�d internal netwoi•I�
systems during the Discnver}r Phase of the prpject and via telephane and email thereafter.
Th� City o�Fart Worth will provide office space, supplies, and telecommunications faciIities as reyuired
during on-site work.
2.I2 P�ogram
The 5CS approach malces a clear distinction between "�enetration testing" and vulnerability assessment.
Penetratian testing, the expioitation of vulnerabilitias to gain access, is vezy useful in establishiiig a need
or business case for securzty. However, penetration testi�.g alone does no� lead ta a process ai rislc
reduction within the organization. A penetration tes# is an isola�ed event. SCS recommends lhe
irnplementation of a continuous security improvemeni methvdology that combines policy, pracess,
technology', and enforceable rnet�'ics. Qnly vvhen this has been accamplished, vvill an organization
succeed in greatly reducing its risks. And equally i�portant, this is the only way to sustain such rislc
reductifln over an extended period of time. The Security Capahility Maturity Mode� {�CN1M), de�eloped
by SC�, outlines the components of a mature and effective security program.
2..13 Exte�nal Security Assessment
2.I3.I Network Topology
An ICMP scan of all hosts in an address range is undertaken, u�ing a range of tools, nmap, strot�e and
asmodeus.
1�
PRO�RI�iARY and CONFID�NTIA�
Thrs document contains Secure Commerce Systems proprietary
inforrr►ation and should not be released outside of fhe C�ty of For� Worth
withouf prror wrrtien consenf
�V�����n�•1� �ST�c�����t�.� I ��r.r.��r.eiicr.l���it}.t ���r.�it
�,,��,us� �5;��]4�?
Commercial Scatmrng taols are nof used at this stage due to the slawness in response of these tools at
this point.
Depanding upon the blocking of ICMP traff'ic, alternative TCP/LJDP port scans will be undertalcen to
loeate any `hidden' systems.
An externally �isible network topology is plotted via the use of traceraut� to a111ocated hosts.
Networks are to be regularly probed over a period of time, to ensure that hosts are not ei�abled during
`out af hours' ar were unavailable due to rnaintenance or access restrictions. This also sorrle#inies
locates additional hos#s that a single scan sometimes misses due to network connectivity, loading or
timing problems.
This is done for a prolanged period of time, and might be detected by any security manitoring and
intnisian detection products at the client site.
2.13.2 Traffic Analysis
Protocol analysis of a!1 netwark traffic will be undertaken to deterrnine if the firewall is restricting
internal netvvark routing traffic correctly and that no internal traffic is bei��g fat-warded iz�canectly.
Any information of a personai ox confidenkial nature captured is to be completely deleted from all
storage media immediately following this analysis.
2.13.3 Port Scanning
When a system is located, it is scanned using both TCP (SYN and FIN) scanning and UDP scam�ing.
The part range scanned is 1-bS535. Ports that are open and available, and ports that are present but not
available are noted.
N�tworks are regularly prabed over a period of time, to ensure fihafi port� are not enabled during `out of
hours' ar were una�vailable due to maintenance or access restrictions.
These tests also produce additional ports that a single scan sometimes misses due to connectivity and
tirning problems.
This is dane for a prolanged period af time, and shauld be det�cted by any securiiy monitoring and
intrusion detection products at the clien.t site.
'� 2
�R��RI�i�RY and CON�'ID�NTIA�.
Thrs document contains Secure Commerce Sysfems praprietary
infarmafion and should not ,be released outside of the Cify of Fort Worth
wi�hout prrar written consent.
������o�•l�: �S"e�r�ri�x� �'ir.lrrc�rcr.�r'�it�f ���x�i�
.����k�st l�,�f1.()� .
Z.I3.4 Manuallnvestigatian
A manual investigafion af all visible systems will be undertaken using the keyboard mappings of the
domain country.
Any accessihle s�rvices will be reviewed for weai�nesses. These include the abse�ice of one tiine
password proteetion an �xternal tclnet servers, the lack o�a contralled or chrooted itp environrnent and
the presence of vulnerable CGI scripts on web servers or hot l�inks �o other systems and standard
sendmail and DNS vulnerabilities. The use of standard NT NetBIOS ports �uvi11 be flagged.
At this stage any rec�nt security acivisaries, passibly not incorporated into commercial securiry products
will ha investigated. _
2.13.5 Commercial S'cannirzg
Having lacated all visible hosts, we scan for security vulnerabilities using a coinmercial tool and select
scan non-responsive hosts. Ensuring the port range is suitable. The iools used include 7nteniet Scanner,
Eeye's Retina, Nessus, and SPT Dynamics' Web Inspect.
Z.I3. 6 Brute force attacks
Tf any services are vulnerable ta a brut� force atiack the client will be �otit'ied.
If the clien� has requested a brute force attack and a suitable applica#ion is available, brute farce scripts
will be tailored to kh� speeific �ervice and executed. If simultan�4us internal scanning is being
performed the use af Internal telcphone directories or any usear information gather�d will be utilized.
213. 7 Denir�L of Service uttacks
If any services are vulne:rable fo a denial of service attack tbe client will be nvfiified.
If �ie client has r�quested a denial of service attack, scripts will be tailored to the specific service.
2.I4 Intepnal 5ecurity Assessmerat
Internal security assessments follow the same methodology o� external security assessinents. Tl�e
folIowin� sections detail the differences.
2..14.1 CamhinerClnternal Exterrznl.5`cart
When an external and internal sca� overlap, the findings of the internal scan are to be fed l�ack ta the
external security auditors in an attempt to subvert ihe s�curity in a more realistic manner.
'[ 3
PROPI4I�TARY and CON�1D�11{�fAL
This document contains 5ecure Commerce 5ystems proprietary
informafr�n and should not be released oufside of the Cify of Fort Worth
wifhouf prior written consent.
ll�c�����r�•1� ►S'���rr���t�� I ��r�r[���.r�c�b�lf� �� rrrlit
���,���:;t � �. �{�r}�
Internal access also allows real time verification of security procedures during a networic intrusion
attack, assuming that the attack has been detected and that a security palicy is in effect.
2.14.2 Network Topology
When an Internal scan is being undertaken a comrnercial netwark analysis product will be used to detect
all systems on a network and plat net�orl� diagrams, regardless af addressing information provided by
the client. Secure Commerce Systems uses Raytheon's �ilentRunner.
,2.14.3 Traf�c Analysis
Protocal analysis af any captured packets will be unde:rtaken to determine the information exchanges
occutring and any clear text usernames and passwords passin.g over the int�rnal network. Thi� also
enables IPX, SNA and other non-IP based traffic to be scanned.
Any info�mation of a personal or confidential nature captured is to be campletely deleted from all
storage media im�nediately following this analysis.
2.14.4 Outgaing Access
The objectives of this exercise are to attempt ta gain external access avoiding any proxies and by
spoofing IP addresses in an attempt to prolae for routes through a firewall that might enabie access for
external systems.
2.I4.5 Database Applicatians
Tests will be perfartned in an attempt tv determine the structure of the database and any partitioning
(physical or logical) restricting query set size.
If internal and e�ternal scanning is being undertal�en, the use oF auditing recording authentication
in�ormation and journaling maintaining database integrity during application testing will be validated.
At�eYnpts to subvert referential integriiy will be made by using non-primary lceys, foreign keys or chosen
value aitacks.
Emhedded query language will b� examined using source code debugging unlities ta ensure that
variables are initialized, any data types rnatch, ihat return values are being checked and that all errors aa'e
being checked, that nu11 and illegal fields or argum�nts are handled.
Access to database adminisiration accounts, system catalogues and audit logs will ba attempted.
14
�ROPk1�iARY and C�IVFIDE1Vi1AL
Thrs document canfarns Secure Cammeree Systems proprietary
Informafion and should not be released outsrde of fhe City of Fort Worth
� wifhout prior writfen consen#.
l��c��a��•k �S'�c��r.�i�t��� ����r�rtc�r�cr.�r'.�i�y �rr.r.�it
r�ll�'ilw; f �,.?,?}I}'?
Any information of a personal or eonfideniial natur� captured is to be completely deleted from alI
storage media immediately following this analysis.
If the Database is a SQL, Oracle, ar Infor�nix server Database Scanner v�ll be used, otherwise a manual
invesfzgation will be undertaken,
�. I S Host ,5ecu�ity Assessm ents
2.IS.1 Host hased security products
During a host-based security review, the use of a commercial or other host based security audit product
will he used to evaluate the security of a given system. A detailed scan using on� of the follawing
products will be used: eEye Retina. rSS System Scanner, Syrnantec's Enfierprise Security Manager, SPI
Dyna�nic's �VebInspect, Computer Associate's CA Exarnine, Pentasafe's Vigilent, and Console Risk
Managem�nt's ConsuUZAdmiti.
Z.IS.� Manual review
In addition to running the cammercial products, a manual invesfiigation into host-�ased security will be
undertaken.
2.I6 Dial In Penet�atio� A��essments
Secure Commerce Systems' Dial-in penetration assessments are performed lacally to minimize Iong
distance toll charges for our clients. The telephone ranges to be scanned far ans�vering or cail vacic
rnodems, service contract rnfldems an systems, or telephone switches are identi�ied ir� advance in pre-
engage�ment meetings. The agreed upon tirnes and durations in non-prime shif� hours are established in
this pre-assessment planning meeting.
Secure Cammerce Systems uses commercial tools such as Phone Sweep and ToneLOC to scan the
telephone address ranges for answering modems. A list of answering modems is compzled and Secure
Commerce ,Sysiems us�s our G�ardTower�M Sysiem Access Directory (SAD) to identify every knawn
answering madetn's aperating system and it's "lockout" characteristics as a guide for attempting
password cracking activities on answering modems. Secure Commerce Systems uses LQphtcrac�c, cracic,
John ihe Ripper, Internet �ecurity System's Internet Scanner, and other internally developed dictionary
passvvord cracking programs to gain access to th� systems. Once access is obtained to the systei�ns, a�ly
vulnexabilifiies that a�e identif��d are exploitad to gain administrator access, and/or the access obtaii�ed is
used to access City sensitive ox system sensitive I ie passworc� files} informaiion. A copy of these iiles
are made to include in the repart fuadi�zags.
15
P140PRfETARY and CON�IU�NYIAL
This documenf cor�tains Secure Commerce Sysfems proprietary
informatfon and shauld not f�e released autside of the City of Fart Worfh
withaut prior wriiten consent.
fVe�c}c�r�� ��rc����rty I X�rt�',�c#��cr1��1r�.� �i���ir
��,��u�� � �. ��o�
�.I � PR4DUCT Applicatio�a Security Assessrne�ts
Any fianctional specificatians relating to the PRODUCT application that are pxovided will be reviewed
from a security perspective and used to audit the PRODUCT application. Code Ie�el inspection is
performed when under the scape of ttie engagement.
�.17.1 Legitimate User Testi�ag
Fabricated or test accounts will be used during iegitimate user testing, wlienever passible.
Attempts to forge trax�sactions or to obtain information owned by another legitimate us�r will be made.
If information of a personal or confidentxal nature is accessible, the client will be notif ed immediately,
�f information af a personal ar confiden�ial nature is obtained during an ethical hacking exercise, the
me�hodology used to ob�ain the informafion is io b� retained but all information obtained is ta be
completely del�ted from all storage media and the client notified of the intrusion immediately.
�.IB Firewarl Secu�ity assessments
The operating systems underpin�ing the firewalls will be manually assessed t� ensure tbey have been
hardened.
The ins#allation of the firewall will be mauually checked to ensu.re that suitabl� partition�ng have been
set for the firewalls.
The firewall configuration and rulesets will he manually checked against any CUSTOMER secuxity
policies or con�iguration guides and the results of the security assessments.
The management of the firewall will be audited ta ensure that configuration and ruleset chai�ges,
backups, removal and �xamination of audit logs are con.taralled in accordance with any supplied policies.
Any intrusion detectian mechanisrns or policies will be audited to ensure that attacks are dealt with jn
accardance with any supplied policies.
It will be necessary for any firewall specifications, tag�ther with policies and procedures associated with
the fire�vall to be provided to SCS either before or ai the start of the internal phase of the assignment,
16
�ROPRI�%4RY and CON�ID�1VilAL
Thrs document contains Secure Commerce Systems praprrefary
informati�n and should not be released oufside of the Ciiy of Fort Worth
without prior written consent.
�e��o�•#� S'���r�it�? l� T�ir������crl��[i� .�i��r��t
r�ll�115I j �, .�.{��)�
Z.I9 Exte�nal Testing via lnternet
2.61 Externally Visihle Infarniation
Any externally ava,ilable infor�nation relating to the PRODUCT infi•astruc�ure will be examined for
securiry rrelated information. If DNS infarmation is avai�able it is researched to obtain all IP addressing
details relating to a given domain narne, and reverse address laokups rnade to obtain and verify an
address range.
Tn addition to IP address details, contact names and any indication of the user account na�ning policies in
place within an organizaiion is obtained. In additional to providin� valuable information for fiir�her use,
this stage ensures that the IP address range ta be tested is defined, dacumented, correct azad approved.
Nslookup, and d�g requests are rnade to local name servers to abtain further addressing informa�ion, any
oth�r adc�ress ranges, which are then looked up using Tntemic databases to verify awnership.
Auihoritative name ser�er requests are made by changing to the primary and secondary name servers af
an organization to ensur� that no DNS zone transfer attacks can be Fnade or other addiiional infonnation
obtained.
2.61.1 Route�s
Router configuration policies wi.11 be reviewed as part of the final exfernal testing phase to ensure ihat
the PRQDUCT infrastructure is adequately protected.
The router will be checked for suitable packet filtering and Native Address Translation {NAT)
cvnfiguration and that IP spoofing or IP source routing is prevented.
2.20 Assessment Me�hodology Flow cha�t
Next page
17
PRDPRI��Af:Y and C01V�I��N►IA�
Thrs document contains Secure Commerce Sysfems proprietary
irtformafiorr and should rrot be reJeased outside of fhe City flf Fort Worth
wrthout prior written consent.
}V�����o�#� ���.�cr��i��f I �xr.�r����cr�i���� �rrr�i�
r����,i�si i�, ?i7���
Continued from Page 1
WorkArea
ss
suB er,e��ist
�
Pre-Arrival
documents
Review
SCS
Pracess
with
Client
Approves c
5C5 A&P
ClEent is
provided
Waiver
to sign
�
Process Modiflcation
NO
Client requesis
modifications to
A&P process
ND
YES
OFF-SITE
ICantact ISP's
Prnvir,�g_��pL pf
Copy of Cllenf
W
Pracedural
Checklist
Reviewed
Final
review and
discussion
I
ocatlon o
A&P
Testing
STQP �
Call Client
ON-SITE
I
Procedural
OnsiEe staff to be
•� of
SCS Seraarity g
Consu{tartl to
followSCS Def€ned
prpcedures —
I I
SCS Security I SCS Securily
Consultant ta � Consultan[ ta
followSCS ➢efined p R��Rf���� fapow5C5 Defined .�����,���
pracedures R� Q�$ procedures
This d nf contarns SE rce Systems proprietary
informafion a d should not be released flutsrde of the Crty af Forf 4Nor�h
without prior wrrtfen consent.
���������1� �S��c-��#r�i�� l ��r�x��r{rr��rr'.�r:�x� �� ��r�f�
.�4��.���� i �. ������ .
2.2I Delive�ahle Reports
5ecure Comm�rce Systems GuardTower�'� Methodology pravides accurate, tiine sta�nped,
configuratian management of the intermediate deliverables compiled for each sectian af our rislc
assessments. Each af the interim assessment resuits are double checked far va3idity and possible,
identi.fiable false positives. A dacument managex is assigned to collacf each af the ext�rnal and internal
ass�ssment results frflm network, host, database and application results and integrates them into the draft
�inal report.
The City of Fort Worth POC will be inforrned prior to each phase of the assessme�t what is about to b�
done, when and over what expected duratian the tests will be performed, and with permission to praceed
on a non-interruption of City business basis. When tesring is cornplete, the POC will be notified and the
estimate far delivery of the �na1 report will be provided at that ti�e. Final Report Drafts are us�.ially
delivered within twa weeks of the ternunation o� assessment activities.
19
PRO�RI��ARY and CONI�ID�f1lTlA�
Thrs document contains Secure Commerce Systems proprietary
infarmatron and shQuld not 6e released outside of fhe Crty of Fort Worth
withaut prior wr'it�en c�nsent.
�Vc�t��o�ik S�c��r���y � �} T���r���cr.1�r'.�r�� ��rclr�
n������ E�, �c).rr?
�.�2 Projectli�TanagementStructure
�
Barry Qiller
VP of Engineering
�--� �--`
/ �
� 1 1
Dan White � �
Project Manager --- t-- �ity of Fort Worth �
I POC I
I I
� I � I
Vulnerability � �
Sciences � City of �art Worth �
� Team Personnel �
� !
� i
— —�
—Ciry of Fart Worth—
� Architecture `
Pracfice �
PoEicy Admin
2fl
PROP141�TARY and GON�ID�N�'!�4l�
This document canfains Secure Commerce Sysfems propriefary
infarmatron and should nof be refeased outside of the Cify af Fort Worth
wrthout prior written cons�nt.
�
O
� �
� �.
Q� �
� �
� �
4ro
CA
O � �D
C�
� 4- r�.,,, �
� � � �
� O � �
�
� � � �
� � � �
O � � "�
� � � N
� � Q � �
� � � O
o y ro Z
� � m O
�a� �
Z
� � a
n ~
`'C�
�
O �
`"' a
� �
�, '�'+�
1a7
O �
�
1 f �. �O2
io �� ; T25k Na�tte � o�renon r
1 ` `IntrodudoryMeatin `..;.....^....��.�.. . _. 7 daY?
9
2 � �� �� Pr�Assesssment0uestron�ire Rde�?
---�--��.. � �__._._._... - -
_... � _w____..__...�....-- -....._.......�._ r
3 Assessmen[RuthoriYa6on 1 daf+
` ----._.�._.__�._______________......._..---------
q _......._.__._, 6demal PenelraHon Test �` 8 day�7
5 ---�`�� Sten F�ctertnal RauterandFlrewall � E� 2 days
S � Exqrn? disca�r8rad vuln6r9billu�5 3 tlays
7 Web 5ite RSsassment 1 d�y�
— 8 ilrkerr�al V�dnara6€fityA�a�samerrt ; 6days7
..,..,.�..,.�.�..,T_,..,..,,._,_.._.._ ...........................__..,.._.,.._.�.�.�..........�.., .�_
9 � MeeGng w�Lh FW IT Persmnei j 2 c�ys
� ..,_._._... ,.,.�.�. _.�. .�-..� �.�.,..�.� ................_... �.---'
"iii'"""" ---�--:4ssess IJnlx and?�PS Systems 2 da�+s
��� WAssess INVS�§�jstams .....�.-.-.-.�� 1 da,�?
92 ��Olal-1nPenetratlonTesk 'Ida�
---�-�-�-�—�-�—•------._..�_.._�..._....__�_.......-� +-�----
13 � Scan Ciry 7elephona RangeS 1 da/'�
14 I , Util¢e SAO for Pas'sword Craclang _ 9 tla/7
18
39
I CallatE Automated Toof Re5uIt5
'� AnelyzaRBsufts
; C'brt8la[e and Format Ds[eilad Resulls
` T_ cutive 9�mmarY
E)sveop'pe -�.T.__ ..............___.,..,..,..,..,.,..,
. seot�an
—s aays?
2 da�s
2 d3/5
1 dag?
2 tlaj�5
. 1 daf'?
Task � : RoEletl Up Task �� Eueamal Tasla
Critical Task � j Rolletl Up Crilical Task � _�� Projeet S�mm9ry
Profett: Projec:l progress Rolled Up Mllestona O Graup ffij Summary
pe[e: Thu 81t5702
Mile�orre � RolledllpFTogess �
Summary �. ,p,. SPlit ,n.�.».:,,�,._.3,3,.,,,�,:..
Page 1
� s� zz. �oz _ . +
_ _ -�s
I �
. .�
QdA
�
�
r
�
�
�
i!'ti
�
�
� ��
tr �
�� �
e.� �
� �
?..� ""
�
�
.�
�
w
�,
�
�
�
�
�
�
�
iseRa,�oa EsgLiS.'oz
�e���c�r#1c Sc.�c°rr�•it�� � � �r.1.,r��{u�rr'fi#�� �����i�
f�t,�a�3 �s,.?r�c�?
2.Z3 Prior Expe�ience
Secure Corn�erce Systems has performed over fifty penetration and test enga�emenis for clients in the
govermnent, healthcar�, financial service and telecommunications industries. Our engagements are
pratected by clien� confidentiality clauses and no pul�licity clanses and we respect this privacy of our
clients, as we will far the City of Fort Worth. Esteemed references are available upon request.
.�.24 Pe�sonnel
The following personnel wili be assigned to this project:
1. Danie� P. White
Daniel P. White is �he CEO of Secure Cornrnerce Systems, Inc. in Houston, Texas.
Dan White has been providing Information Technology solutions for th� Fortune 500 for over
twanty ye�rs. Dan b�gan his career at Shell �il, where for 3 yea�rs he provided SCADA con�rol
systems, and then, in the Iate 1980s, he worked for Sun Microsystems. During the 199�s, Dan
provided security systems engineering at Lockheed Martin �or the NASA rohnson Space Center
(JSC) Mission Cantrol Cen�er. � the late 1990s, Dan joined the mallagemant of Price Waterl7ouse in
their Enterprise Security Solutions practice. He later joined Interr�et Security Systems as tlle Directar
of Professianal Services for the Central Region,
Dan started Secure Commerce Syste�s in 200Q to provide information security services and
products to the government, healthcare, financial services, telecommunications, and technology
indusCries. A noted speaker and practitioner on intrusion detection systems, firewalls, and security
cpntrol systems, Dan has supported healthcare concerns with consulting on HIl'AA and 21 CFR 11,
fnancial concerns with regards to GLB regulatory compliazice, Banking and Telecammunications
with E-Commerce, and industxy-wide support in infarmation security sirategic and tackical solutions.
Dan has a Bachelox af Science degree in Electro-Optics from the University af Houston-Ci�ar Lake
and has CC�E and ISS industry certi�cations.
Dan �ill serve as Project mar�ager For this engagement and will devate 15% of his time to this
proj ect.
2. Barry R. Diller, CISSP, VP of Engineering
Barry R. Dil�er is the Director af Security Systenvs Engineering for Secure Commerce Systems, Inc.
in Hous�on, Texas.
Barry started wark with IBM after college and transfierred to Houston in 1986 to worlc ii� the
cornpany's Federal Systems Division, perfor�ning system integration work in support of a number af
22
l�RO�RI�iA�Y and C011d�lD�NiIAL
This documenf contains 5ecure Comrrrerce Systems proprietary
information and should noi be released outsrde of fhe Ci�y of Fort Worth
wiihouf prior written consent.
.��c�tsr#orl��,ST�crrrr�wl ��f�l.����t�rr��r����� �r.rr�f�
F��1����IC i�5 �S+L%�
commercial business prflposals. Tn i991, he began parforming network engineering for the
institutional network at the NASA Johnson Space Center (JSC) and, later, for the 5pace Shuttle
Onboard Flight Saftware development organization. Barty installed his first netw�rk security
firewall in 1994 and b�came more and more invalved in the security aspects oi networlc engineerin�
over the years. Barry 1�egan work as a senior security engineer and manager vvith Cnnsolidated 5pace
Operations Contract (C50C) in 1999 anci was later designated Computer Secu�ity Officer (CSO} for
the 7SC Mission Control Center, responszble for development and implernentation of s�curity
architecture, palicies, and procedures for �hat facil�ty.
Barry received his Master af Scienca de�ee in Elecirical Engineering from Oklahoma State
University and holds CGSA, CCSE, and CIS�P certifications.
Barry will serve as Lead Consultant and wi1l devote 1Q0 % of his iime to this project.
3. Ja�es E. Brigham, CCNA, Sr. Consultant
James E. Brigham is a Senior Security Cansultant for Secure Cominerce Systems, Inc. in Hottston,
Texas.
Jim Brigham has over fifteen years of experience providing netwark securiiy for leading edge
Fortune 500 clisnts and cornpanies. He has worked closely with the National Security Agency in the
U.S. and the German National Agency in developing one of the first Cox�mon Criteria Labaratories
in the United States. 3im has also been a leader in the HIPAA arena providing consulting and
implementation services. In addition to his previous accomplishments, 3im has been certified in
Cisco s�curity devices.
Jim is now working far Secure Commerce Systems in Austin, Texas in network security product and
services sales, consuliing, and implementation.
�itn wi11 serve as a Sr. Consultant and will devote 100% afhis time to this project.
4. Joe L. White, Jr., CISSP, MCSE (NT4 & W�I�, CCPTP, SCSA
Jae L. White, Jr. is the Western Region Manager �or Secure Commerce Systems, I�ic. ��d is Uased
out nf San Fra.ncisco, Califomia.
Joe brings an unique blend ofhands-on technical abili#y and busin�ss experience to SCS. Witli over
14 years of Information TechnoIogy experience, Joe's ii�dustry exposure sp�as Finance, Securities,
Mortgage Banking, Soi�ware and Cansulting.
23
�RO�RI�iARY and CONFIDENiIAL
This document contairrs Secure Commerce Sysfems proprietary
informafion and shauld nof be released outsrde af the City of Fort Worth
wifhout privr wriften consent.
�e#�ixo�A�`� .S"�c�r.��ir.�.� I ��rr�r������lri�r'� �1 rrrf��
��,���� : �_ ?�,�;�
Qui of college, Joe worked as a 1'rcensed 5eries '� Securities Broker and while in his mid-twenties
was pxomoted to the youngest manager in his firm. After ihe crash of '87, Joe i�egan working full
time with Ir�formation Technology, turning whafi was, up until then, a hobby into his care�r. He
b�gan consulting and managi.ng server farms for top firms �n the Silicon Valley. He was then hired
inta the pioneerin� eCommerce Cansulting division of KPMG and subsequent�y left KPMG to
became a senior member of the pioneering Electronic Security Solutions group at Ernst & Young.
While ate E&Y, Joe participated in numeraus consulting engagements including but not liinited to
pene�rat�on tests, n�twork security assessments and system design reviews. A newl� fonned startup,
NeiReliance, then recruited �oe to build, manage and administer its systems infrastructure. Mare
r�cently, Joe has worked as a senior member with the Information Systems Security Cxraup for The
Charles Schwab Corporation and has consulted on a range of projects within the San Francisca Bay
area.
2.25 Authorized Negotiato�
The person within Secure Comrnerce Systems who is autborized to negotia�e contraci �erms and render
binding decisions on contracival rnatters is:
Ronald Newman
COO
Secure Commerce Systems, Inc.
7528 Sweetgum
Irving, Texas 75063
Phone: 972-83��9923
Email: rnewman@securecomin�rcesystems.com
�.26 Cost P�oposal
►- � �
J .C'�+CE���Ik4�`[L�L�LL11��{JIY�vst �s7
� ���fa��rt;�l �{4�1���:±-,�4�i1s1� ��s�'�S?,171�C11 [�(a
3 �'t�ll-1C1 �'CF1Gl1'il3iClTti ����� 1'��
-# �'�'cL, ��tc ��s���sir��nl ?
� �t�}������1 ���:v�lc��xi����t3d G[1
1.�:�bor �'o��l:�?�ot to Esc�eclj* 3fII1
'��2,�0(1
* Licensing Cast Expense for SPI Dynamics' Web �nspect ( additionaI $2,�00.00)
�ayment will b� made monthly upon receipt of Secure Commerce Systems' invoice specifying the
amount of work done,
24
PR�PRI�iA14Y and CON�lD�Nil'AL
Thrs documenf contarns Secure Commerce Systems proprietary
informafran and should not be released outside of ih� City of Farf Warth
wrthouf prior wriften consent.
���T���o��l� �'���rr.��i�x� l ����l�r�.}�•cr#�r�r�,}� � r�rlrt
���teu�i l�, �?i�€k?
S�cure Cc�mmerce Systems is in compliance with all applicable rules and regulations of Federal, State,
and Locai gaverning en�ities. Secure Commerce Systems is in compliance with the terms of the Request
for Propasal (RFP).
25
PROP141�i�+' RY and CONFID�NT[At
This document can�ains Secure Cammerce Systems proprietary
information and should not 6e re�eased outside of �he Crty of Fort Worth
without prior wriften consent.
.�Yc.*��c�r1� 4�'e�}rr��r'��� I T�r�rl�r���{r�br�i�}a �}� ��r�r"�
����x��� ��. }����
� Cor�clu�i�n
Sec�tre Commerce Systems appreciates the opporiunity to work with the City of Fort Warth. Shauld you
have any questions regarding this engagement, please contact Ron Newman at 972-830-9923. Secure
Cammerce Systems recognizes the importance of this prajec� to your organization; we are cornmitted to
your success and are con�zdent th� p�roposed assistanoe will provide high �+alue to the Ci�y of Fart Warth
as it pursues its obj ec�ives.
Sincerety,
Roraald Newrta.an
COO, Secure Commerce Systems, Inc.
26
�RO�RI�iARX and CONFIDEN'�IAL.
This document contarns Secure Commerce Sys�ems proprietary
rnformation and should nof be released oufside of fhe Cify of Fori Worih
wrfhout prior writfen consenf.
�Ve������1� ��'�c�r�•��t � ������r���•�r1��l��,�� � rr��tt
A4��;�: �� €5, ?S1(a�
� Ter�s an� C�n€�ifcions
4.I Secur�ity
Secure Commerce Systems shall have such access to designated sites, as it is reasonably necessaiy to
perfortn the services required by this Agreement. Tn perf�rming the services Secure Commerce Systems
shall fully comply with established building access and security procedures, including use of desigi�ated
entrance(s}, display of City of Fort Worth issued ID carc�s, and use and safeguazding af City of Fort
Worth issued access control cards, as prescribed by City af Fart Worth. Any issued passes or other
identification that may be xequired to be prasented upan request by Secure Cammerce Systems'
personnel or agents seeking access to premises shall be issued at the discretion of ihe operator of tl�e
premises, and shall be surrendered upon demand or upon terminanon of this Agr�ement.
4.� Term and Termination
City of Fort Worth may terntinate thzs Agreement upoz� thirty {30} days written notice to Secure
Co�n.tnerce Systems at any time without penalty. Upan termination, Secure Commerce Systems sha11
send wjithin thirty (30) days a termination proposal to City af Fork Worih. Such termination proposal
may not exceed the �otal con�ract price [ess payfn�nts previousl� nr�ade and less the contract price flf
work not te�nated, if applicable. In the event of such termination, City of Fort Worth's sole obligatian
shall be ta pay Secure Cornmerce Systems a prorated fea and reimbursable expenses, as defined in this
Agreement, through the daie of termination.
4,3 Co�i�act Compretiar�
Secure Comrnerce Systems shall have fulfilled its obligations under this Agreem�nt when one of the
following first occurs:
1. Sec�re Commerce Systems provides the total number of hours stated in the Agreement a�d any
subsequent change authorization�; any change authorizations Secure Cornmerce Systems is
issued during the time period of this Agreem�nt and within the scope of the original project will
be subj ect to all the terins, conditions, and rates as speci�ied in ilus Agreement; or
2. This Agreement is terminated with a 30 day notice and withaut cause by mutual decision made
by Secure Commeree Systems ar City of Fort Worth managen:�ent; such agreement to be
documented and signed by both parties.
27
P140P1�I��ARYand CONFIDEIVilAL
This document canfains Secure Commerce 5ystems proprrefary
information and should no� be released oufs�de �f the Ci�y of Fart Worth
without prior written corrsent.
�V�#r�#���k,���c���r�j' I �����f��E'���rf��lf�� �i�frlr'.�
A,,,�;,�w� f �, '�][�:�
4.4 Co�z�dentiality
Secure Comrneree Systems acknowledges that if may �e furnished with, rece�ve, or otherwise llave
access to infortnation of or cancerning City af Fart Wortn which City of Fort Worth considers to be
confidential or otherwise xestricted. "Confidential In�oz�mation" is any business, marketing, technical,
scientific, security arrangements of City of Fort Warth or other infonnation disclosed by City of Foi-t
Worih, which at the time of disclosuxe is designated as confidential {or lilce designation). Coniidential
Information shall be retained in confidez�ce by Secure Commerce Systems and shall Ue used, disclosed,
and copied solely for the purposes of, and in accordance with, this Agreement. Secure Commerce
Systems shall only diselase Con�dential Information ta thos� emp3oyees with a need to lalaw sucl�
Confidential Information.
Secure Commerce Systems sha11 take reasonable steps to ensut�e that its employees and contractors
comply with ihes� conf den�iality provisiuns. Secure Commerce Systems shall use the same de�ree of
care as it uses ta protect iis own Confidential InFormation of a similar nature, but no less than reasonabla
care, to prevent the unauthorized use, disclosure or publication of the Confidential Inforniation. Secure
Commerce Systems will not use City o� Fart Worth's Confidential Infarmation for purposes other than
those necessary to directly further the purposes of this Agreement. Secure Commerce Systems grants
City o£ Fart Worth the right to reproduce documentation and installation materials for the sole purpose
af distczbution within the Ciiy of Fort Worth system.
Neither party will disclose to third parties the oth�r's Confidential Information withoui the prior wrilten
consent of the other Party. No obligation of confidentzality exists with respect to any information wliich
either Secure Commerce Sys�ems or City of Fort Worth can demonstrate: (a) is already in the rightful
possession of the receiving party at the time of disclosure to it; (b} is rightfully received after disclosure
to it from a third party who had a lawful right to disclose such info�atian to it without any obligation to
restrict its further nse or disclosure; (c) zs independently develaped by or for the receiving party without
reference to Confidential Information of the furnishing party; (d) was, at the iime of disclaslu'e to it, iil
the public domazn, ox (e) after disclosure to it, published or othet�visa becomes part of ihe public damain
through no fault of the receiving party.
�n addition, Secure Canr�nerce Systems ar City of Fort Worth shall not be considered to have breach�d
its obligations by disclosing Confden�ial Information of the other parLy as required ta satisfy any legal
requirem�nt of a competant government body provided that, immediately upon receiving any such
request and to the e�tent that it may legally do so, such party advises the other party prompt�y and prior
to ma.king such disclosure in orde�r that the other party may interpose an objection to such disclosure,
take action to assure canfidential handling of tha Confidential Information, or take such other action as it
deems appropriate to protect the Confidential Information.
28
�ROARI�'�ARY and CON�l��N�IAL
This docurr�ent confarns Secure Commerce Systems propriefary
infarmation and should not be r'eleased aufside of fhe City af Fort Wor�h
withaut prior wriften consent.
11{et���v�-� ��'��c�rr�{r'��� I ����r�.c�cr.�ir��#� A rr���t
{tu�<<;t l �, ?U�}��
4.5 No Publicity
Secure Commerce Systems agrees that it will not refer to City of Fart Wortl1 in any customer Iists,
publicatio�s, ar advertisements and will not publicize in any way its role with resp�ct to the Agreement
withaut Ciiy of Fort Worth' prior written consent.
4.6 Insurance
Secure Comtnerce Systems agrees io obtain and maintain during the performance of services under this
A�reement and to furnish City af Fort Worth, if requested, with evidence of warker's compensation and
ernployer's lialaility insurance and general comprehensive (includirzg contractual coverage) and
automabile liability insurance in form and amount satisfactory to City of Fort VL�ortli.
4. % WQYYCl1Z�
Secure Cammerce Systems' sole and exclusive �varranty sha11 be to perform the Services provided under
this Agreement r�ith a degree of skill and care which is consistent with then current, generally accepted
pro%ssional practice and procedures. Secure Commez-ce �ysterns reservas the right #o subcontract to
third parties any or all �ervices to be provided hy Secure Comrnerce Systems under this Agreement or
any SOW. City of Fort Worth hereby agrees that in arder for Secure Co�nmerce �ystems to render t�e
Services under this Agreement and any applicable SOW, City of Fort Worth must perform all of iis
obligations as zdentified in this Agreemenf and any applicable SOW. Secure Co�x�merce Systems s1�aI1
not be respon�ible for any delay or failure of performaz�ce arising out of City of Fort Worth's failure to
perform such obligations.
4.8 Intellectual Property Rights
Secure Commerce Systems, Inc and City of Fork Worth shall each retain owzaership of, and aIl right,
titie, and intexest in and to, their respective, pre-existing intellectual property including, but not Iimited
to, (A) patentabJ.e and unpatentable disco�eries, and ideas, including, but not limited to, methods,
techniques, "know hov�', concepts, or praducts ("Inventions") and (B) all worlcs fixed in any medium oi
exp�ssion, including copyright and rnask work rights, and except as set fnrth in Section 4.8.1 below, �1a
license therein, whether express or implied, is granted by this agreement, as a result of' the Services
perfotrned hereunder. To the extent the parties r�rish to grant righ�s ar intere�ts in pre-existing intellectual
capital beyond the rights granted pursuant to Section 4.8.1 below, separate license agreements on
mutually acceptahle terms will be executed.
29
PRD�RI��ARY and CONFIDLNiIAL
This document confains Secure Camm�rce Sysfems praprietary
informafion and shouJd not be r�leased outside of fhe Cify of Fort Worth
wifhout prior wrrften consent.
�c.����#�r�1c Sc��.�r�r�r:�} I� T�rr[�rc��-r.�bilr��? ���rrl��
f��.��u�� i �. ���t�,�
4.81 Nnt "Work for Hir�e"
The Deliverables performed under this agreement are not "works for hire" and Secure Commerce
Systems, Inc. retains all rights, title, anfierest in the underlying cornponents including, but not limited to,
any t�chnology, techniques, methodalogies, programs, cades, objects, inventions, data, designs,
graphics, specifications, pracesses, procedures, best practices, and other reusable cornponenfs own�d or
provided by Secure Cammerca Systems prior to, in t�e course of, or independent of the Service� and/or
the Deliverables ("Underlying Components"). Cit}r of Fort Worth understands and agrees that tl�e
Underlying Components shall be solely owned by Secure Commerce Systems, Inc. To the extent that the
Underlying Camponents are essential to the propar use and enjoyment of the Deliverable, Secure
Commexce Systems granis to City of Fo�t Worth a non-exclusive, non�ransferable, royalty-free lic�nse
ta use and copy such Underlying componenfis as pa�t of a Deliverable for City of Fort Warth's in#ernal
busine5s purposes only including, but not limited ta, providing a copy to a third parties for consideration
of internal business practices of City of Fort Worth, subject to third parties signing a confidentiality
agreement wifh terrns similar to those contained in Section 4.4 a� this docum�n�. City of Fort Worth
agrees to include Secure Commerce Systems copyright natice, as applicable on a11 copies of deliverable
items made by ar for City of Fort Worth.
4.8.2 Right to Use
Secure Commerc�; Systems, at all times, retains the ri�ht �a use aily general l�now how, technic�ues,
ideas, cancepts, algarithms, ar other laiowledge acquired or developed during the perforrnanc� of this
agreement, on behal� af itself, and its future customers. Secure Commerce Systems may perfarm the
same or similar services �'ar others, provided f.hat any City of Fort Worth canfidential, proprieCary, or
trade secret information is treated in accordance with the parties' obligatians under Section 4.4.
4.9 Limits of Liabiliiy
AGGREGATE EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, Secuce Commerc�
Systems SPECIFICALLY DISCLAIMS, AND City of Fort Wor�h HEREBY WAI�ES, ANY AND
ALL EXPRESS DR IMPLI�D PROMISE�, REPRESENTATIONS AND WARR!-�NTTES WITH
RESPECT TO THE SERVICES AND PRDDUCTS PROVIDED HEREUNDER, INCLUDING, BUT
NOT LIlVIITED TO, ANY WARRANTY AS TO ITS MERCHANTABILITY, QUALTTY,
OPERATION OR ITS FITNESS FOR ANY PARTICULAR PURPOSE, AS WELL AS ANY
WARRANTIE� ALLEGED TD HAVE ARISEN FROM CUSTOM, USAGE, OR PAST DEALINGS
BETWEEN THE P.ARTIES.
THE PARTTES ACKNOWLEDGE AND AGREE THAT IN NO EVENT SHALL Secure Cornmerce
Systems BE LIABLE, WI3ETHER IN CONTRACT, TORT OR OTHERWTSE, FOR ANY SPECIAL,
INCIDENTAL, CON�EQUENTIAL, INDIlZ.ECT QR ECONOMIC DAMACrES, HOV4'EVER
ARISING, AND OF WHATSOEVER NATURE, INCLUDING PiJNITNE DAMAGES, DAMAGES
FOR LOSS OF PRQFITS, LOSS OF BUSINESS, BUSINES,S EXPENSE, MACHINE DOWN TIME,
�a
�RO�RI��i4RY and COfVF'ID�NTIAL
This document contarns Secure Commerce 5ystems proprietary
rnformafion and should not be released oufside of the Crty af Forf Worih
wifhout prior wriften eonsent.
11�'c�#����r�� ,.��c����•��y I �r�,I�rerA�rlri#��� 1=���rl.r'�
�1��g��f f �. 2��02
LOSS OF DATA, OR ANY OTHER SPECIAL OR EXEMPLARY DAMAGES, EVEN IF Secur�
Cornmerce Systems HAS BEEN ADVISED OF THE PQSSIBILITY OF SUCH DAMAGES.
NOTWITHSTANDING ANY 4THER PROVI�IONS OF THIS AGREEMENT TO THE
CONTRARY, City of Fort Worth HEREBY ACKNOWLEDGES AND AGREES THAT S�cure
Commerce Systems TOTAL LIABILITY TO City of Fart Worth SHALL IN NO CIItCUMSTANCE
EXCEED THE AGGREGATE AMOUNT PAID TO Secure Commerce Systems PURSUANT TQ THE
APPLICABLE SOW FOR THE SERVICES TO WHICH THE CLATM RELATES. Il�T NO EVENT
SHALL THE TOTAL AMOUNT OF Secure Commerce Systems' LIABII.ITY FOR ALL CLAIMS
EXGEED THE AMOUNT PAID TQ S�cure Cammerce Sj�5i0TI15 PURSUANT TQ THIS
AGREEMENT.
4.10 Gene�allndem�ei�cation
City of Fort Worth shall, to the fullest extent permitted hy Iaw, indemnify and hold harmless Secure
Commarce Sys�ems, its directors, officers, ernployees, agents, partially or wholly owned subsidiaries,
s�xcc�ssors and a.ssigns from and against all suits, actions, 1�ga1 or administrative proceedings, claims,
liens, demands, liabilities, losses, costs, fees, and expenses (including �vithout lirnitation reasonable
attorney's fees and expenses), directly or indireeily arising out of or in connection w�th tlie performance
of the Services of this Agreement by Secure Cornmerca Systems or Secure Commerce �ystems'
r�presentativss, including but no� limited fo injury ar death to persons (including without Iimifiati�n
�ecure Comme�ree Systems ernployees) and damage to propet'ly, regardless of concurrent or eontributory
negligence, whether active or passive, or strict liability of such indemnified parties, �xcept those caused
by the sale intentional negliger�ce or willful misconduct of such inc�emnified parties.
4.I1 Licensed S'oftware
Only licensed safkware provided by City of Fort Worth and in-house developed code (including City of
Fort Worth and Secure Commerce Sysiems d�veloped} shall be used on City of Fart Worth's syst�ms.
No public domain, shareware, or bulletin board soii:ware shall be installed. All additional hardware and
saftware packages proposed far use, including upgxades, must be approved in advance and in writing by
Ciiy af Fort Worth.
4.Y.2 Savings Clause
City of Fort Worth's failure to perform any of its responsibilities set forth in tlais Agreement shall not be
deemed to be grounds for termination by S�cure Commerce Systems; provided that City of Fort Worth'
nonperformance of its abligatxons under this Agre�meni shall be exc�sed if and to the extent (i) City of
Fort Worth' nonperformance resuits from Secure Carnrneree Systems' failure io perfarm its
responsibilities, and {ii) City of Fort Worth provides Secure Commerce Systems wiih reasonable notice
of such nanperformance and uses commercially reasonable efforts ta per�orm notwithstanding Secure
31
PRD�I4I�'►ARY and COMFl��1��lAL
This document contains Secure Cammerce Systems proprietary
information and should not be released outside of fhe Cify of Fort Worth
wifhout prior written consent.
�V�*#��n��k .S=e�rr��rt�r / � ����r��•cr#�r'.l�r�� �?�r�lr�
1��,��u�fi l�, �l}ii2.
CaYnmerce Systems' failure to perforzn (with the Seeiue Cammerce Systems reimbursing City of Fort
Worth for its additional out�of-packet expenses for such efforts.)
4. �3 Fo�ce Majeure
Neither party shall be liable for any default or delay in the performance af its ob3igations under• this
Agreement, or for failure to manufacture, deliver, or perform under this Agreement {i} if and to the
extent such default ar delay is caused, directly or indirectly, by: fire, flood, earthqualce, elemerlts of
natur� or acts of God; riots, civil disorders, rebellians or revalutians in any country; or any other �ause
beyond the reasonable control of suck� parly (ii) provided the non-performing party is without fatilt in
causing such deiault or delay, and such default or delay could not liave been prevented by reasonable
precautions and can not reasonably be circux�nvented by the non-performing pariy thraugh the use of
alternate sources, workaxound plans ar ather means.
4.I� As�ig�me�t
Neither party may assign this Agreement in whole or in part or any interest herein, vvithout the prior
written cansent of the other. Such consent vvill not be unreasonably withheld. NotwitY�standing the
above, City of Fort Worth rnay assign this Agreernent to any en�ity within the City of Fort Woz�th system
vwith the written consent of Secure Cammerce Systerns.
4.1 S Ser�vice CantYact Act
Secure Commerce Systems certifies tlaat this Agreement is not subject to fhe Service Contract Act of
1965 because of eiiher (1) the Agreement is nat for the performance af "services" as that term is used in
the act or (2} the Agreement is principally for the maintenance, calibration, and/or repair of enuipment
described in 29 C.F.R. § 4.123(e)(1)(i), and because Secure Cammexce Syst�ms comes within the
circumstances set forth in 29 C.F.R. � 4.123{e){1)(ii). Secure Commerce Systems agrees that the
serviees be�ng pravided are consulting ser�+ices associated with City of Fort Worth infarmation security
program.
4.16 Applicable Law
This Agreemen� shall be governed by and construed in accordance with the Federal law o� th�; United
States oi Arnerica and in the absence of contxolling Federallaw, in accordance with the laws af Tarraiit
County of the state of Texas.
4.17 Notice
Any notice to be given bereunder shall be given in writing by prepaid rec�ipt�d mail, facsimile ar
overnight courier, and shall be effectiv� as %llows: (i) in the case of facsirnile or courier, an th� next
32
Pi��PR1�iARY and CON�1D�'N'�I�9L
This document contains S�cure Commerce Systems proprietary
information and should not be released outside af fh� Cify af Fort Wor�h
wrfhout prror wrift�n consenf.
,�1fc�t������•!� 5������•r[�� � �r�l����•rr��i�r't�� �,f frrlr".�
r���b��s3 l5: ��7i��
business day, and (zz) in the case of receip�ed mail, five (5) business days follvwing the date af deposit in
�lie mail. If natice is {1) sent by' a nationally recognizeti express mail service or by registered or certifieci
mail, return receipt reque�ted, addressed to the party to which such notice is to be given at its address
below; or (2) delivered in person to such pariy at its address below:
To: Rabert Combs, Purch�sing Manager To:
City of Fort �Vorth Purrc�asing �ffice
P.O. Box 17027
Fort Worth, Texas 76102
Daniel P. VVhite
Secure Commerce �ystems, Inc.
17225 El Camino Real, Suite 340
Houston, Texas 77058
4.18 Additional Iterns
Secure Commerce Sysfems azid City of Fort �TVorth agree that any disputes may at either party's aptioi�
be resoived by arbitration, and that if arbitratian is selected n�ither party wiIl seek damages in toi-t or
jury by trial.
4.I9 Miseellaneous
Terrnination of this Agreemeni shall not a�ect the survi�al of representations, warranties and covenants
contained berein. The rights and obligations, which by their nature extend beyond ihe termination of
this Agreement survive and continue after ternvnation of this Agreement. All such pro�isions shall bind
the parties hereto and their legal representative, successors an.d assignees. The failure of a party to claim
a breach of any term of this Agreement shall noi constitute a waiver of such bxeach ar the �-ighf of such
party to eraforce any subsequent br�ach oi such tertn. If any term or provision of this Agreement sliould
be dectared invalid by a caurt of competent jurisdictian or by operation of law, the remaining tenns ar�d
provisions of this Agreement shall be unimpaired, and the invalid term or pravision shall be replaced by
such valid ter�n or provision as comes closest to the intention underlying the invalid term or provision,
This Agreement may not be modified vr wai�ed orally and may be modif ed only in a wri�ing signed by
duly anthorized representative of both parties.
4.20 EntireAg�eement
This Agreement, including all Attachments, represents the entire agreement between the pai�ies
regardi�g this subject matter and replaces any ara1 ar written corrunurucations.
33
PRO�RI�iARY and COfVF1D�,NTIAL
Thrs document cantarrrs Secure Commerce Systems proprietary
information and should not be released oufside of the Crty of Fort Worfh
withouf prior wriften consent.