Specifications include, but are not limited to: SDBOR requests proposals for an integrated electronic training and learning management system to supplement OCR’s required in-person training on Title IX and Campus SaVE Act that includes training on sexual harassment (and violence) prevention, discrimination, retaliation, and bystander intervention training. The training system must provide audience appropriate training to employees, faculty, students, volunteers, and summer programming staff/chaperones regarding Title IX and sexual violence: Essential Curriculum Harassment (Including Sexual Harassment) Prevention Sexual Violence Awareness and Title IX o What constitutes sexual violence, including same-sex sexual violence; o The school’s definition of consent applicable to sexual conduct, including reference to affirmative consent and incapacity, with examples; o How the school analyzes whether conduct was unwelcome under Title IX; o How the school analyzes whether unwelcome sexual conduct creates a hostile environment; o Reporting options, including formal reporting and confidential disclosure options and any timeframes set by the school for reporting; o Mandatory reporting due to South Dakota Misprision of Felony statute and Board of Regents policy; o The school’s grievance procedures used to process sexual violence complaints; o Disciplinary code provisions relating to sexual violence and the consequences of violating those provisions; Effects of trauma, including neurobiological changes; o The role alcohol and drugs often play in sexual violence incidents, including the deliberate use of alcohol and/or other drugs to perpetrate sexual violence; o Strategies and skills for bystanders to intervene to prevent possible sexual violence; o How to report sexual violence to campus or local law enforcement and the ability to pursue law enforcement proceedings simultaneously with a Title IX grievance Domestic Violence/Dating Violence Stalking Retaliation Awareness and Avoidance Campus Safety and Security Act (Clery Act) Complying with the Campus SaVE Act Desirable Curriculum Bullying Prevention for Higher Education, including cyber bullying TECHNICAL REQUIREMENTS 1. Must support our ability to maintain FERPA Compliance. 2. The user interface must be compliant with the American Disability Act’s accessibility requirements. 3. The user interface must be browser based and not require the installation of client software on the user’s device to support using the vendor’s solution. 4. The web based user interface must be compatible with reasonably current Windows and Macintosh browsing environments with compatibility for future web browsers (Internet Explorer, Firefox, Safari, Chrome, Opera) to support user and administrator access. 5. Vendor should provide a complete solution without requiring the SDBOR to secure relationships with partner vendors to support the features/functions of the proposed solutions. If partners are required, they must be identified along with added costs. 6. The vendor’s product should have the ability to integrate the proposed solution and reporting tool(s) with standard third party products administrative tools such as Outlook, Word, and Excel. If the solution has the ability to export or provides download features, please identify. 7. Administrative security should be at the system, institution, and department levels. 8. Reports should be able to be run at the system, institution, department, organization, and event levels with the security at the system, institution, and department levels. 9. Will SDBOR have direct access to database or copies of the database to use when writing queries with reporting writing tools? 10. The solution should provide a 24/7 uptime availability less regular maintenance time in off hours? 11. Do you provide a Service Level Agreement to your clients? Please include an example in your response. 12. The technology hosting environment should comply with industry standard security. Please identify any certifications or standards achieved or adopted at your hosting center. 13. Please provide information about your architecture including hosting center locations, failover strategies, disaster recovery strategies, support strategies, network architecture to include arriers supporting data centers, etc.