Specifications include, but are not limited to: Provide an enterprise solution to better manage email communications to the KU community. Requirements: • Integration with KU’s Single Sign-on (SSO). • One top-level administrator account with multiple sub-accounts. o Top-level account can moderate messages. o Top-level account can access all sub-accounts. o Contact lists can be shared to all sub-accounts. Sub-accounts can also compile their own contact lists. o Top-level account can share branded templates, images, assets, etc. to sub-accounts. o Sub-account owners have separate and independent administration of sub-accounts, except for global controls set by the top-level administrator. o Sub-accounts are siloed from each other with no visibility or administration of other sub-accounts. o Ability for multiple individuals and access/permissions roles on each sub-account. • Supports multiple top-level domains. • The solution must use role-based access control for granting permissions. • Built in message approval workflow/dashboard. • Enterprise branded message templates with ability for sub-account customization. • Drag & drop message creation. • A/B content testing. • Pre-send message preview testing. • Throttled message sending. • API access. • Robust message tracking and metrics (e.g., open rates, click rates, etc.) for both internal and external messages. • Top Level Administrator reporting on usage for all sub-accounts. • Ability to suppress “unsubscribe” notice and functionality on messages sent to @ku.edu and @kumc.edu mailboxes. • Phone and email support available to all sub-accounts. • The solution does not require any antivirus exclusions. • The solution does not require any changes to KU's current email configuration. • Any SSL/TLS being used will be configured to meet or exceed KU’s requirements. • Vendor will not need remote access to the KU network or other systems. • Vendor must not process, store or transmit payment card data. • Vendor solutions operating in a multi-tenant environment must have precautions to secure systems and data storage volumes in line with this architecture model. Data is separated logically.