Department Of Human Settlement And Urban Development Quezo Tender
Department Of Human Settlement And Urban Development Quezo Tender
Costs
Summary
Lease Of Ngfw Firewall For Dhsud For 3 Months (1st Rebidding) , Information Technology ,department Of Human Settlement And Urban Development - Quezon City Metro Manila
Description
Description Request For Quotation Doc Control No. : Form-as-pd-002 Revision No: 0 Effectivity Date : 1 September 2023 The Department Of Human Settlements And Urban Development (dhsud) Would Like To Invite Your Company To Submit A Quotation Or Proposal For The Following Procurement Activity: Request For Quotation No. Rfq No. 02-0057, S. 2024 Procurement Activity Lease Of Ngfw Firewall For Dhsud For 3 Months (1st Rebidding) Mode Of Procurement Negotiated Procurement – Small Value Procurement (section 53.9) Approved Budget For The Contract (abc) Two Hundred Ninety Five Thousand Pesos (php295,000.00), Inclusive Of All Existing And Appropriate Government Taxes And Charges. Deadline For The Receipt Of Quotations Or Bid Proposal On Or Before 3:00 Pm, February 26, 2024. Delivery Schedule Delivery Of Goods/items Shall Be Seven (7) To Twenty (20) Calendar Days Upon Receipt Of The Approved Purchase Order. The Minimum Technical Specifications For The Said Activities Are As Follows: Item No. Qty. Item, Description, & Minimum Specifications 1 3 Mos. Ngfw Firewall Lease 1. Background Of The Item Being Procured A. General Overview Of The Procurement Project I. The Dhsud Kmiss-itid Division Aims To Strengthen The Overall Network Security Infrastructure With Ensured Data Protection And Prevention Of Unauthorized Access. This Shall Be Primarily Achieved Through The Acquisition Of Latest Security Technologies Such As Network Monitoring Tools Capable Of Detecting And Filtering Malicious Traffic. Possible Entry Points Of Intrusions Are Mitigated With The Help Of Sensors And Security Rules And Policies. B. Brief Description Of The Item Being Procured I. As A Network And Infrastructure Recommended Security Practices, A Next Generation Firewall Is A Network Security Equipment Which Monitors Network Flow For Malicious Activities. The Ngfw Will Identify, Log Information, Report, And Attempt To Block Any Harmful Activity That Poses Threat To The Network. Network Traffic In The Dhsud Network Will Be Filtered With Layers Of Security Policies. With Unwanted Traffic Blocked, Dhsud’s Network Becomes Geared Towards Ensuring Data Protection And Meeting Other Security Objectives C. Abc Of The Project And Fund Source I. The Abc Of The Project Is Two Hundred Ninety-five Thousand Pesos Ii. Detailed Financial Breakdown Item Qty Price Lease Of Next-generation Application Firewall, Services, And Support And Networking Equipments 1 Lot Php 295,000 2. Purpose Of The Procurement A. Rationale I. The Main Objective Of This Proposal Is To Continue To Lease Licenses And Support Of Existing Next Generation Firewall Ii. Delivering And Ensuring Network And Data Protection And Unauthorized Access; Detecting And Filtering Malicious Traffic ● Monitoring Network Flow, Identity And Block Any Harmful Activity That Poses Threat To The Network. ● Diagnosis And Resolution Of Problems On The Performance Deficiencies Of The Software. ● Provide Product Patches, Updates, Releases, And New Versions Of The Software ● Health Check Of Firewall Appliance On A Regular Basis. ● Health Checks, Repair Or Replacement Of Defective/malfunctioning Hardware Parts During The Lease Period. ● The Service Provider Shall Provide 24/7 Technical Personnel In Close Coordination With The End User. ● 24x7 Phone, Email And Onsite Nbd Support 3. Mode Of Procurement A. Small Value Procurement 4. Scope Of Work A. Technical Specifications 1. Hardware Requirements (minimum Specifications) 1.1. Next Generation Firewall (1) 1.1.1. Performance 1.1.1.1. The Proposed Solution Must Have 2.5 Gbps Firewall Layer 3 Throughput. 1.1.1.2. The Proposed Solution Must Support At Least 750,000 Connections Per Seconds 1.1.1.3. The Proposed Solution Must Support At Least 20,000 New Connections Per Seconds 1.1.1.4. Can Support 2 Or More Isp Providers 1.1.2. Interface 1.1.2.1. The Proposed Solution Must Have At Least 5*10/100/1000 Base-t Interface. 1.1.2.2. 2x Usb Port 1.1.2.3. 1x Management Port 1.1.2.4. 1x Console Port 1.1.3. Management 1.1.3.1. Management Console Must Be Managed Through Web Interfaces Via Secure Encrypted Connection. 1.1.4. Features 1.1.4.1. Stateful Firewall 1.1.4.2. Ddos Prevention, Arp Spoofing Prevention 1.1.4.3. Anti-virus 1.1.4.4. Anti-malware, On-premise Artificial Intelligence Based Malware Detection Engine 1.1.4.5. Anti-phishing 1.1.4.6. Intrusion Prevention System 1.1.4.7. Web Application Firewall, Semantic Detection Method 1.1.4.8. Ssl Decryption 1.1.4.9. Risk Assessment By On-demand And Real-time Scanner 1.1.4.10. Cloud Sandboxing 1.1.4.11. Cloud Threat Intelligence 1.1.4.12. Ipsec Vpn 1.1.4.13. Ssl Vpn 1.1.4.14. User Authentication And Grouping 1.1.4.15. Web(url) Filtering, Application Control, Bandwidth Management 1.1.4.16. Report Center 1.1.4.17. The Proposed Solution Must Support Security Protection For Pre-attack, During-attack And Post-attack. 1.1.4.18. The Proposed Solution Must Support Security Protection For Business Systems And Network Users. 1.1.5. Firewall 1.1.5.1. The Proposed Solution Must Support Static And Dynamic Package Filtering, Inspection On Well-known Protocols Of Ftp, Http, Smtp, Rtsp, H.323 (q.931, H.245, Rtp/rtcp), Sqlnet, Nms, Pptp, Tcp, Udp 1.1.5.2. The Proposed Solution Must Be Able To Protect Against Attacks Of Land, Smurf, Fraggle, Winnuke, Ping Of Death, Tear Drop, Ip Spoofing, Syn/icmp/udp Flood, Http Get Flood, Dns Query Flood, Arp Cheating, Icmp Redirection, Static And Dynamic Black List, Etc 1.1.5.3. Geo-location Block, Create Rules To Allow Or Block Traffic From Ip Addresses In Specific Countries, Regions And States, Reduce The Attack Possible. 1.1.5.4. Supports Real-time Integration Status Between The Local Firewall And The Cloud-threat Intelligence But Not Limited By Providing: 1.1.5.4.1. The Total Number Of External Attack Events 1.1.5.4.2. The Total Number Of Threats Detected By Cloud Threat Intelligent In The Local Firewall 1.1.6. Intrusion Prevention System 1.1.6.1. The Proposed Solution Must Support Vulnerability Database With At Least 9000+ Entries 1.1.6.2. The Proposed Solution Must Support Separate Server And Endpoint Vulnerability Database Group For Convenient Policy Configuration 1.1.6.3. The Ips System Must Be Able To Block Worms, Trojans, Spyware, Scanning, Dos, Ddos, Vulnerability Exploits, Buffer Overflow Attacks, Abnormal Protocol And Attacks With Evasive Tactic Employed. 1.1.6.4. The Ips Supports Automatically Block, Logging, Upload Gray Threat To The "cloud" 1.1.6.5. The Ips Supports Burp-force Attack Prevention For Ftp, Imap Mssql, Pop3 Smtp, Oracle, Rdp, Smbv1, Smbv2, Smbv3 And So On. 1.1.7. Apt Prevention 1.1.7.1. The Proposed Solution Must Support Apt Detection Of Identifying Botnet, Remote Control Trojans, Malicious Link, And Other Threats. 1.1.7.2. The Proposed Solution Must Support Anti-malware Database With More Than 400,000+ Entries 1.1.7.3. The Proposed Solution Must Be Able To Conduct Cross-module Intelligent Correction Of Ips, Waf And Apt Detection Modules To Generate Temporary Fw Rules To Lock The Suspicious Ip When Malicious Behavior From That Ip Is Detected By Any Of The Modules. 1.1.7.4. Apt Supports Sandbox Dynamic Detection Via Security Cloud 1.1.7.5. Apt Supports To Detect Ddos Attack From Intranet 1.1.7.6. Apt Can Effectively Distinguish The Hazardous Traffic Flow In The Common Application Of The Rdp, Ssl, Imap, Smtp, Pop3, Ftp,, Dns,, Http, Web, And So On Traffic Flow , But Also Can Be Used For The Normal Operation Of Non-standard Port For Early Warning. 1.1.7.7. Support Honeypot Feature And Locate The Real Host Ip Address Of The Intranet Infected Botnet Virus 1.1.7.8. Support In-depth Analysis On Detected Malware Or Trojan Behaviors By Demonstrating Interaction & Communication Between External C&c Botnets And Other Suspicious Events. 1.1.8. Risk Assessment And Prevention 1.1.8.1. The Proposed Solution Must Provide Risk Assessment Module That Allows To Scan And Identify Security Loopholes Such As Open Port, System Vulnerabilities, Weak Passwords And Other Risks Of The Protected Servers 1.1.8.2. The Proposed Solution Must Support Real-time Vulnerability Analysis, Includes The Underlying Software Vulnerability Analysis, Web Application Risk Analysis, Web Unsafe Configuration Detection And Server Weak Password Detection, And Generate Real-time Analysis Reports. That Can Be Deployed In Mirror Mode To Discover System Vulnerabilities Within A Protected Network In Real-time. 1.1.8.3. The Real-time Vulnerability Is Also Supported To Detect For The Website If It Existed Backlink, And Can Record The Type Of The Black Link And The Location Of Backlink. 1.1.8.4. Risk Assessment And Scanning Results Must Be Shown And Generated With Corresponding Reports With Detailed Description Of The Issues And Recommended Solution. 1.1.8.5. Risk Assessment Module Must Be Able To Be Affiliated With The Ips And Server Protection Module To Automatically Generate The Protection Policies 1.1.8.6. Threat Alerts Is Able To Actively Push The Current Popular Zero Day Or High-risk Vulnerabilities, And Can Provide Vulnerability Detection Tools For Business Scan, According To The Results Of Scan, It Can Generate Safety Protection Policies. 1.1.9. Web Application Firewall 1.1.9.1. The Proposed Solution Should Come With Built-in Advanced Waf Capability In Firewall But Not Separate Appliance 1.1.9.2. The Proposed Solution Must Be Able To Defend Against The 10 Major Web-based Attacks Identified By The Open Web Application Security Project (owasp) , Including Sql Injection, Xss, Csrf, Etc., By Semantic Detection Engine. 1.1.9.3. The Proposed Solution Must Support Waf Database That Hosts Not Less Than 5000 Web-based Attacks Rules 1.1.9.4. The Proposed Solution Must Be Able To Perform Inspection Of The Content At The Perimeter For Incoming Traffic. Only To Allow Input Parameters That Conform To The Application Functionalities Required Of The Web Application And No Malicious Input Parameters 1.1.9.5. The Proposed Solution Must Be Able To Restrict Suspicious File Uploading With File Types Of Asp, Asa, Exe, Jsp, Php,aspx,php3,php4,phtml, Vbs Etc. 1.1.9.6. The Proposed Solution Must Support Application Hiding Of Http Error Pages Replacement, Http (s) Response Headers Hidden, And Ftp Server And Software Version Information Hidden, Etc. 1.1.9.7. Support Cc, Csrf And Cookie Attack Prevention. 1.1.9.8. Should Support Automatic On-demand Web Application Decoding 1.1.9.9. Support Password Protection, Including Ftp Weak Password Detection, Web Login Weak Password Detection, Web Login Plaintext Transmission Detection, Password Brute Force Protection 1.1.10. Anti-defacement 1.1.10.1. The Proposed Solution Must Support Server Access Verification For Administrator Website, Avoid Website Defacement 1.1.11. Data Breach Protection 1.1.11.1. Allow To Define Multiple Types Of Sensitive Information Based On The Characteristics Of Stored Data, The Sensitive Information Includes Email Account Information, Md5 Encrypted Passwords. 1.1.11.2. The Proposed Solution Must Be Able To Restrict Suspicious File Downloading With File Types Of Dat, Bak,dmp,backup, Asa,log, Fp, Frx, Frt, Cnf, Ade,mde, Db, Ldb,etc. 1.1.12. Anti-virus 1.1.12.1. Stream-based Antivirus For Http, Ftp, Smtp And Pop3 , Smbv3 Protocols, Etc. 1.1.12.2. The Proposed Solution Must Support Built-in Artificial Intelligence Capability To Detect Malware, Virus And Ransomware Variants And Provide The Malware Analysis Report 1.1.12.3. Should Support Compressed File Malware Inspection, Up To 16 Layer 1.1.12.4. Should Support Cloud Based Threat Intelligence And Analytics 1.1.13. Content Security 1.1.13.1. Mail Protect Support Pop3, Smtp, Imap, Pop3s, Smtps, Imaps And Other Specific Port. 1.1.13.2. Mail Protect Support Mail Collision Attack Prevention And Anti-phishing. 1.1.13.3. Mail Attachment Can Be Detected By Anti-virus. 1.1.13.4. Support Mail Attachment Filter And Http/ftp Download/upload Filter. 1.1.13.5. When Users Receive Malicious Mail, The Proposed Solution Will Tamper The Mail Subject 1.1.14. Access Management 1.1.14.1. The Proposed Solution Must Support Up To Eight User Identification Methods Such As Active Directory (ad) Authentication And Remote Authentication Dial-in User Service (radius) 1.1.14.2. The Proposed Solution Should Support Internet Application Identification Database With More Than 9000+ Entries And Url Database With More Than Hundreds Of Millions Entries That Updated With Cloud-based Technologies 1.1.14.3. The Proposed Solution Must Support Policy Configuration Oriented Toward Users And Applications For Web Filter, Application Control And Bandwidth Management 1.1.14.4. The Proposed Solution Must Support Security Policy Optimizer, Which Helps: 1.1.14.5. 1) Identify The Redundant Policy, Expired Policy, Conflict Policy Etc. 1.1.14.6. 2) Be Able To Track The Acl Policy Life Cycle, Help To Track Every Change That Have Been Done To The Policy In A Specific Period Of Time 1.1.14.7. The Proposed Solution Must Support Link Load Balance Per Traffic Load As Well As Application Type In Occasion Of Multiple Internet Lines 1.1.15. Reporting 1.1.15.1. The Proposed Solution Must Support Built-in Report Center, Which Provides Comprehensive Security Analyzing Reports Including But Not Limit To Attack Trends By “all Attacks” And “valid Attacks”; Security Rating By “business Server Security”, “user Security” And “vulnerability”; Business Server Security By Suffered Attack Times Ranking; Vulnerability Assessment 1.1.15.2. The Proposed Solution Must Support Business Model Learning, Which Will Help To Simplify The Security Operation For Web Servers, And Reduce The False Positives. 1.1.15.3. Support The Detailed Logs For Security Issues Such As Dos Attack, Web Attack, Ips, Viruses, Website Access, Application Control, User Login And Os Configuration. 1.1.15.4. Support Detailed Threats Analysis For Specific Attack By Description, Target, Solution; Support Security Analysis For Specific Server With Attack Type, Attack Source, Etc. 1.1.15.5. The Report Center Must Provide Full Visibility To Network, Endpoint Clients And The Business Servers With Multi-dimensional Analysis Of Risks, Vulnerabilities, Attacks, Threats, Traffic And Behaviors 1.1.15.6. Support Pdf Format And Automatically Send To Predefined Mailbox On Daily/weekly/monthly Basis 1.1.15.7. Supports Automatic Generation Of Comprehensive Security Risk Reports. The Content Of The Report Should Reflect But Not Limited: 1.1.15.7.1. The Overall Security Level Of The Protected Network Object 1.1.15.7.2. The Vulnerability Information & Forensic Evidence Each Attack 1.1.16. Deployment 1.1.16.1. Gateway (route Mode) 1.1.16.2. Bridge Mode 1.1.16.3. Mirror Mode 1.1.16.4. Multiple Bridge Mode(2- 4 Bridges 1.1.16.5. The Proposed Solution Must Support Build-in Auto Hardware Bypass In The Event Of Hardware Failure 1.1.16.6. Support Quick Deployment From Central Management Console 1.1.16.7. Must Be Compatible With The Existing Dhsud Network. 1.1.17. Vpn 1.1.17.1. The Proposed Solution Must Support To Build Proprietary Vpn Tunnel Between Hq And Branches 1.1.17.2. Ipsec Vpn 1.1.17.3. Authentication Algorithm: Md5/sha-1 1.1.17.4. Encryption Algorithm: Des/3des/aes128 Hash:md5/sha 1.1.17.5. Ssl Vpn 1.1.17.6. Source Type: L3vpn Resources, Tcp Resources. 1.1.17.7. Operating System Supported: Win Xp/win 7/win 8/win10/win11/mac 1.1.17.8. Supports 2fa With Google Authenticator, Microsoft Authenticator 1.1.18. Real-time Visibility 1.1.18.1. Real Time Provides Cpu, Memory, Disk Usage, Session Number, The Number Of Online Users, The Network Interface, Box Resource Information 1.1.18.2. The Proposed Solution Must Be Provided Real-time User Ranking / Real-time Application Ranking / Real-time Host Ranking 1.1.18.3. The Proposed Solution Must Provide Real-time Attack Map, Include Top Attack Country And Counting, Real-time Attacks And Threat Detail 1.1.18.4. Provide Information Security Incidents, Including Recently Security Incidents, Server Security Incidents, Terminal Security Incidents 1.1.18.5. In Security Status,it Displays The Current Network Risks That Need To Be Handled, And Top Attacks, Bots Show The Threat Stage And Security Rating. 1.1.18.6. Top Session Can Display Real-time, Last 24 Hours, Last 7 Days Of The Current Session And The New Session. 1.1.19. Routing 1.1.19.1. Supports Static Route, Ripv1 & V2, Ospfv2 And Bgp 1.1.19.2. The Proposed Solution Must Be Able To Support But Not Limited To Intelligent Route Selection Based On Source And Destination Ip, Port, Protocol And Country-based Ip Address 1.1.19.3. Support Dns-mapping 1.1.19.4. Support Custom Intranet Dns Server Address To Avoid Botnet Detection Misjudgment Dns Server 1.1.20. Certification 1.1.20.1. The Proposed Solution Must Be Certified By Icsa Labs. 1.1.20.2. The Proposed Solution Must Have Aaa Rating At Cyberratings Enterprise Firewall. 1.1.20.3. The Proposed Solution Must Be In Visionaries Or Higher Level Of Gartner Magic Quadrant For Network Firewalls 2021 1.1.20.4. The Proposed Solution Must Be Cmmi L5 Certified. 1.1.20.5. Iso 9001:2015 1.1.20.6. Iso/iec 27001:2013 1.1.20.7. The Project Implementer Must Be Cissp Certified. 1.2. Scope Of Works 1.2.1.1. Diagnosis And Resolution Of Problems On The Performance Deficiencies Of The Software/firmware/licenses. 1.2.1.2. Provide Product Patches, Updates, Releases, And New Versions Of The Software/firmware/licenses 1.2.1.3. Health Check Of Firewall Appliance On A Regular Basis (at Least Once A Month) 1.2.1.4. Health Checks, Repair Or Replacement Of Defective/malfunctioning Hardware Parts During The Lease Period. 1.2.1.5. The Service Provider Shall Provide 24/7 Technical Personnel In Close Coordination With The End User. B. Deliverables I. Three (3) Months Of Support During The Lease Period C. Duration Of The Contract I. The Overall Duration Of The Contract Is One Hundred (90) Calendar Days For The Supply, Delivery, Installation, Configuration, And Training With Provision For Extension. While The Necessary Services Are Required To Be Provided For Three (3) Months After Implementation. D. Service Support Requirements I. The Prospective Bidder Must Have A Team Of Certified Engineers For The Installation And Configuration For Local Deployment Using The Offered Solution. The Bidder Must Provide Copies Of Certificates From The Manufacturer That Engineers Are Certified/qualified To Install And Configure The System. Ii. The Prospective Bidder Must Provide Maintenance Services Thru Corrective/remedial Maintenance And Quarterly Health Checks During The Duration Of The Contract. Iii. The Prospective Bidder Must Ensure Service Units Are Readily Available During Down-time During The Contract Period. Service Units Should Be Delivered On-site Next Business Day When The Hardware Cannot Be Repaired On Site Due To Failure, Within Metro Manila. Iv. The Principal Manufacturer Must Provide Unlimited E-mail Submission And Telephone Access 24x7. Prospective Bidder Must Provide Procedures Support And Problem Escalation, Technical Phone Support 24x7; Response Time Must Be Within Four (4) Hours Upon Receipt Of Notification From Dhsud End-user/designated Personnel. E. Minimum Requirements For Bidders: I. Valid And Current Certificate Of Distributorship/resellership/dealership Issued By Manufacturer. If The Certificate Is Not Issued By The Manufacturer, The Bidder Must Also Present An Appropriate Document Showing The Relationship Between The Manufacturer And The Issuing Company. 5. Acceptance/testing Criteria And Process A. User Acceptance I. Proposed Product Must Conform With The Technical Specifications And Schedule Of Requirements. 6. Payment Terms And Schedule Activities/milestone Duration % Progress Health Check, Inspection And Acceptance Of Next Generation Firewall Within 15 Days From Notice To Proceed 10% Of The Contract Price Monthly Leasing Of Next Generation Application Firewall Monthly Payment For Three (3) Months After The Conduct Of Successful Training And Submission Of Complete Documentation 90% Of The Contract Price 7. Timelines For The Implementation Of The Project A. Delivery Schedule Item Delivery Date Health Check, Inspection And Acceptance With Technical Report/s Within Fifteen (15) Calendar Days From Receipt Of Notice To Proceed. Knowledge Transfer For At Least Six (6) Dhsud Personnel Submission Of Complete Project Documentation. Within Fifteen (15) Calendar Days From Receipt Of Notice To Proceed. Three (3) Months Of Lease, Services And Support Will Commence After Project Implementationterms And Conditions: 1. Payment Shall Be Made Upon Completion Of Service/delivery And Submission Of The Supporting Documents (e.g., Delivery Receipt, Sales Invoice, Billing Statement, Warranty Certificate If Applicable, And Other Documents As May Be Required In The Technical Specifications); 2. Kindly Accomplish The Attached Reply Slip Correctly And Accurately. Please Do Not Alter The Contents Of The Form In Any Way; 3. All Technical Specifications Are Mandatory. Failure To Comply With Any Of The Said Requirements Shall Be A Cause For The Disqualification Of Your Quotation; 4. The Department Shall Have The Right To Inspect The Goods To Check Its Conformity With The Required Minimum Technical Specifications; 5. Issuance Of Official Receipts (or) Or Sales Invoice (si) In The Name Of The Department Of Human Settlements And Urban Development (dhsud) Is Mandatory. The Supplier Shall Bear The Cost Of Mailing The Ors Or Sis. The Supplier Shall Be Responsible For Bearing Any Bank Charges And/or Service Charges That May Be Incurred By The Department In Case Of Payment Requests Via Check Deposit; 6. Please Submit The Latest Copy Or E-copy Of The Following Documentary Requirements: A. Philgeps Registration Number / Certificate Of Philgeps Membership; B. 2024 Mayor’s Permit/business Permit; (note: In Case The Permit Has Recently Expired, Please Submit The Old Permit And Attach The Official Receipt For The Renewal Application Thereof.) C. Signed Omnibus Sworn Statement (oss); Note: A Notarized Omnibus Sworn Statement (oss) Shall Be Submitted By The Lcrb Or Scrb Prior To The Processing Of Payment. If The Authorized Representative Listed On The Reply Slip Is Not The Same Person Who Executed The Omnibus Sworn Statement (oss) Kindly Attach A Copy Of The Notarized Special Power Of Attorney (spa) Together With The Valid Government-issued Identification Card Of Both Signatories. D. Supporting Documents (as May Be Applicable): For Sole Proprietorships – Dti Business Name Registration; For Partnerships Or Corporations - A Notarized Special Power Of Attorney, Or A Notarized Secretary’s Certificate, Whichever Is Applicable (bidders With Previously Submitted Eligibility Requirements, Provided They Are Current And Updated, Are No Longer Required To Submit The Said Documents.) Your Quotation Or Bid Proposal Must Be Submitted Together With The Attached Reply Slip And The Above Mentioned Documentary Requirements Through Personal Delivery, And In A Sealed Envelope, To The Procurement Division Located At The 8th Floor, Dhsud Building, Kalayaan Avenue Corner Mayaman Street, Diliman, Quezon City, Or Through Electronic Mail At Procurement@dhsud.gov.ph. The Dhsud Bids And Awards Committee (bac), Through The Concerned End-user Unit And The Bac Secretariat, Shall Recommend The Award Of The Contract To The Head Of The End-user Unit Or Implementing Office, Of The Service Provider With The Single/lowest Calculated And Responsive Quotation Slrq/(lcrq) Pursuant To Section 53.10 Of The 2016 Revised Irr Of Ra 9184. With The End View Of Obtaining The Contract Most Advantageous To The Government Pursuant To Sec. 41 Of The 2016 Revised Irr Of Ra 9184, Dhsud Reserves The Right To Reject Any And All Quotations/bids, To Annul The Procurement Process, To Declare A Failure Of Bidding, To Reject All Quotations/bids At Any Time Prior To Contract Award, Or Not To Award The Contract, Without Thereby Incurring Any Liability To The Affected Bidder/s. For Questions And/or Clarifications, Please Contact The Procurement Division At Telephone Number 8424-4080 (local 1833). (original Signed) Anilaine L. Gamba Oic, Procurement Division Reply Slip Procurement: Lease Of Ngfw Firewall For Dhsud For 3 Months (1st Rebidding) Request For Quotation No.: 02-0057, S. 2024 _______________ Date Anilaine L. Gamba Oic-procurement Division Department Of Human Settlements And Urban Development 8th Floor, Administrative Services Dhsud Bldg. Kalayaan Avenue, Cor. Mayaman St. Quezon City Dear Ms. Gamba: This Is To Submit The Following Bid Quotation/proposal For The Subject Procurement With A Total Bid Price Of __________________________________ Pesos (php________.00), Inclusive Of All Existing And Appropriate Government Taxes And Charges: Quantity Unit Description I Hereby Certify That The Above Bid Quotation/proposal Is True And Correct, And I Accept The Rights Of The Department Of Human Settlements And Urban Development, As The Procuring Entity, Under Section 41 Of The 2016 Revised Implementing Rules And Regulations (irr) Of Republic Act (ra) No. 9184. Thank You. Truly Yours, Name Of Company: ____________________________________________ Name Of Authorized Representative: _______________________________ Designation/position: ____________________________________________ Address: _____________________________________________________ Telephone No./mobile No.: _______________________________________ Email Address: ________________________________________________ Philgeps Registration No. : ______________________________________ Landbank Account No.: _________________________________________ If With Ada, Kindly Indicate The Landbank Account Name And Account Number; If None, Please Indicate To Whom Checks Should Be Made Payable To : _____________________________________ Tin: __________________________ Vat-registered: Vat󠄀 ( ) Non-vat ( ) Signature: ____________________________________________________ Omnibus Sworn Statement (revised) [shall Be Submitted With The Bid] [kindly Fill Out This Template Accordingly By Completing The Needed Information And Deleting The Non-applicable Provisions That May Be Deleted.] _________________________________________________________________________ Republic Of The Philippines ) City/municipality Of ______ ) S.s. Affidavit I, [name Of Affiant], Of Legal Age, [civil Status], [nationality], And Residing At [address Of Affiant], After Having Been Duly Sworn In Accordance With Law, Do Hereby Depose And State That: 1. [select One, Delete The Other:] [if A Sole Proprietorship:] I Am The Sole Proprietor Or Authorized Representative Of [name Of Bidder] With Office Address At [address Of Bidder]; [if A Partnership, Corporation, Cooperative, Or Joint Venture:] I Am The Duly Authorized And Designated Representative Of [name Of Bidder] With Office Address At [address Of Bidder]; 2. [select One, Delete The Other:] [if A Sole Proprietorship:] As The Owner And Sole Proprietor, Or Authorized Representative Of [name Of Bidder], I Have Full Power And Authority To Do, Execute And Perform Any And All Acts Necessary To Participate, Submit The Bid, And To Sign And Execute The Ensuing Contract For [name Of The Project] Of The [name Of The Procuring Entity], As Shown In The Attached Duly Notarized Special Power Of Attorney; [if A Partnership, Corporation, Cooperative, Or Joint Venture:] I Am Granted Full Power And Authority To Do, Execute And Perform Any And All Acts Necessary To Participate, Submit The Bid, And To Sign And Execute The Ensuing Contract For [name Of The Project] Of The [name Of The Procuring Entity], As Shown In The Attached [state Title Of Attached Document Showing Proof Of Authorization (e.g., Duly Notarized Secretary’s Certificate, Board/partnership Resolution, Or Special Power Of Attorney, Whichever Is Applicable;)]; 3. [name Of Bidder] Is Not “blacklisted” Or Barred From Bidding By The Government Of The Philippines Or Any Of Its Agencies, Offices, Corporations, Or Local Government Units, Foreign Government/foreign Or International Financing Institution Whose Blacklisting Rules Have Been Recognized By The Government Procurement Policy Board, By Itself Or By Relation, Membership, Association, Affiliation, Or Controlling Interest With Another Blacklisted Person Or Entity As Defined And Provided For In The Uniform Guidelines On Blacklisting; 4. Each Of The Documents Submitted In Satisfaction Of The Bidding Requirements Is An Authentic Copy Of The Original, Complete, And All Statements And Information Provided Therein Are True And Correct; 5. [name Of Bidder] Is Authorizing The Head Of The Procuring Entity Or Its Duly Authorized Representative(s) To Verify All The Documents Submitted; 6. [select One, Delete The Rest:] [if A Sole Proprietorship:] The Owner Or Sole Proprietor Is Not Related To The Head Of The Procuring Entity, Members Of The Bids And Awards Committee (bac), The Technical Working Group, And The Bac Secretariat, The Head Of The Project Management Office Or The End-user Unit, And The Project Consultants By Consanguinity Or Affinity Up To The Third Civil Degree; [if A Partnership Or Cooperative:] None Of The Officers And Members Of [name Of Bidder] Is Related To The Head Of The Procuring Entity, Members Of The Bids And Awards Committee (bac), The Technical Working Group, And The Bac Secretariat, The Head Of The Project Management Office Or The End-user Unit, And The Project Consultants By Consanguinity Or Affinity Up To The Third Civil Degree; [if A Corporation Or Joint Venture:] None Of The Officers, Directors, And Controlling Stockholders Of [name Of Bidder] Is Related To The Head Of The Procuring Entity, Members Of The Bids And Awards Committee (bac), The Technical Working Group, And The Bac Secretariat, The Head Of The Project Management Office Or The End-user Unit, And The Project Consultants By Consanguinity Or Affinity Up To The Third Civil Degree; 7. [name Of Bidder] Complies With Existing Labor Laws And Standards; And 8. [name Of Bidder] Is Aware Of And Has Undertaken The Responsibilities As A Bidder In Compliance With The Philippine Bidding Documents, Which Includes: A. Carefully Examining All Of The Bidding Documents; B. Acknowledging All Conditions, Local Or Otherwise, Affecting The Implementation Of The Contract; C. Making An Estimate Of The Facilities Available And Needed For The Contract To Be Bid, If Any; And D. Inquiring Or Securing Supplemental/bid Bulletin(s) Issued For The [name Of The Project]. 9. [name Of Bidder] Did Not Give Or Pay Directly Or Indirectly, Any Commission, Amount, Fee, Or Any Form Of Consideration, Pecuniary Or Otherwise, To Any Person Or Official, Personnel Or Representative Of The Government In Relation To Any Procurement Project Or Activity. 10. In Case Advance Payment Was Made Or Given, Failure To Perform Or Deliver Any Of The Obligations And Undertakings In The Contract Shall Be Sufficient Grounds To Constitute Criminal Liability For Swindling (estafa) Or The Commission Of Fraud With Unfaithfulness Or Abuse Of Confidence Through Misappropriating Or Converting Any Payment Received By A Person Or Entity Under An Obligation Involving The Duty To Deliver Certain Goods Or Services, To The Prejudice Of The Public And The Government Of The Philippines Pursuant To Article 315 Of Act No. 3815 S. 1930, As Amended, Or The Revised Penal Code. In Witness Whereof, I Have Hereunto Set My Hand This __ Day Of ___, 20__ At ____________, Philippines. [insert Name Of Bidder Or Its Authorized Representative] [insert Signatory’s Legal Capacity] Affiant [jurat] [format Shall Be Based On The Latest Rules On Notarial Practice]
Contact
Tender Id
5276dc7c-f604-30c5-8009-7d4b64d70163Tender No
10575254Tender Authority
Department Of Human Settlement And Urban Development Quezo ViewPurchaser Address
-Website
notices.philgeps.gov.ph