Specifications include, but are not limited to: 1. Solution needs to offer true, real-time bi-directional synchronization with Banner for course section scheduling as well as academic and events scheduling.; 2. The solution includes a detailed audit table or tables that will allow administrators to track the history of requests and communications.; 3. The solution is open and can receive user data from multiple systems of record. Users will have the ability to enter data in one system and the other system will be updated in real time via Application Program Interface (API) Web Services.; 4. A user can use a single sign-on to access all the products and automatically map roles based on the college’s SSO technology (i.e., SAML, CAS, Shibboleth, G Suite, MS Active Directory).; 5. Role-based access-control that limits field/object access by role and on a conditional basis.; 6. Platform is Software-as-a-Services (SaaS) cloud-hosted solution.; 7. User permissions should include, but not limited to, an unlimited number of users where the administrative users can assign groups or roles to limit administrator-level privileges. Ability to restrict viewing, scheduling, editing by user or group.; 8. Service Level Agreement (SLA) should include, but not be limited to, a detailed description of available support, typical response times, and whether there are credits for significant down-time.; 9. Security of the delivery shall be documented in a vendor-provided Higher Education Community Vendor Assessment Tool (HECVAT). The Lite version of the HECVAT is acceptable.; 10. User Interface must be intuitive and meet Federal and Commonwealth of Massachusetts requirements for ADA compliance. Mobile-enabled solution with responsive design for all users, with mobile browser compatibility with contemporary browser is preferred to a mobile app. A common interface for administrative users and end users, with visible features governed by user privileges, is preferred to distinct interfaces.; 11. System shall use appropriate means to preserve and protect College data, including, without limitation, use of stable storage media, data backup and archiving, password protection of volumes, and data encryption.