Check the "Contract Updates for the Week"

Click here for piggybacking data form

KEY ACCESS SYSTEM

(contract last updated 08/02/2013)

SCOPE: Contract for the purchase of a system to provide secure storage for keys and control access to keys that is computer driven and network capable.  This contract is designed to offer users a variety of manufacturers from which they can purchase Key Access Systems.

CONTRACT # DESCRIPTION
14-5246 KEY ACCESS SYSTEM
CONTRACT ORIGIN: ADDITIONAL INFORMATION:
UW-Madison
Purchasing Services
21 N Park St, Ste 6101
Madison, WI 53715-1218
UW-Madison users contact:
Crescent Kringle
(608) 262-5321 FAX (608) 262-4467
ckringle@bussvc.wisc.edu
 

UW-Madison users:   contact Facilities Planning and Management for installation (263-3333)

Non-UW-Madison users:  contact Vendor Representative

COOPERATIVE PURCHASING: YES
CONTRACT TERM: August 1, 2013 through July 31, 2014, with automatic renewal extensions to July 31, 2018, unless amended, cancelled or rebid.

Manufacturer: DEISTER ELECTRONICS USA
Vendor(s)
129621
Canadian Time Systems Inc

dba Keytracer Systems

16-1833 Coast Meridian
Port Coquitlam BC V3C 6G5

Canada

     
Sales Representative: PHONE # FAX #
Leigh Smith 800-331-2882 X28 604-941-8480
E-mail leigh@keytracer.com
  PHONE # FAX #
Ordering/Expediting: 800-331-2882 X28 604-941-8480
Invoice Information: 800-331-2882 X22 604-941-8480
Returns: 800-331-2882 X22 604-941-8480
Supplier Diversity Reporting: 206-953-6906 604-941-8480
Website www.keytracer.com
Commodity Code 318-40
450-55
Federal Employee ID # (FEIN) 98-0620985
F.O.B.

“D” F.O.B. DESTINATION, FREIGHT PREPAID AND ALLOWED
“V” F.O.B. SERVICE/MAINTENANCE

Shipping, installation and training fees for non UW-Madison orders will vary depending on equipment ordered.
Terms: N/30
Delivery: 4-8 weeks ARO
Invoicing: Invoices shall reflect contract pricing.
Return Policy: Contractor will provide for return of items ordered in error for up to 30 calendar days from receipt with the University paying only the return shipping costs.
Warranty: 2 years hardware, software, software updates and all technical support.
Back Orders:

Will notify ordering department within 2 working days hours of order/release.

Pricing Information: SEE BELOW

ITEM

DESCRIPTION

UNIT PRICE

ORDER NUMBER FOR MFG

DISCOUNT

MANUFACTURER

1

Key Access System (simple installation)

$11,694.00

UWIN01

22% Discount

Deister Electronics USA

2

Key Access System (installation and integration with building automation plus data exchange with UW business applications)

$11,694.00

UWIN01C

22% Discount

Deister Electronics USA

 
All non-listed, related items from manufacturer's catalog or product list (i.e. parts, accessories, add-on units for expansion and consumables) are available at 22% discount.

The current price list is titled University of Wisconsin Key Tracer Price Book and is dated July 2013.


Manufacturer: MORSEWATCHMAN INC
Vendor(s)
129488
Hoffman N Company LLC

711 Main St

Delafield  WI  53018
     
Sales Representative: PHONE # FAX #
Nick Hoffman 262-391-8664 262-646-2609
E-mail nhoffman@hoffman-co.com
  PHONE # FAX #
Ordering/Expediting: 262-391-8664 262-646-2609
Invoice Information: 262-391-8664 262-646-2609
Returns: 262-391-8664 262-646-2609
Supplier Diversity Reporting: 262-391-3014 262-646-2609
Website www.hoffman-co.com
Commodity Code 318-40
450-55
Federal Employee ID # (FEIN) 20-3510100
F.O.B.

“D” F.O.B. DESTINATION, FREIGHT PREPAID AND ALLOWED
“V” F.O.B. SERVICE/MAINTENANCE

Freight is the only variable for non UW-Madison orders depending on system size and destination.
Terms: N/30
Delivery: 28-60 days ARO
Invoicing: Invoices shall reflect contract pricing.
Return Policy: Contractor will provide for return of items ordered in error for up to 30 calendar days from receipt with the University paying only the return shipping costs.
Warranty: 2 years parts and Unlimited Lifetime Telephone Support
Back Orders:

Will notify ordering department within 2 working days hours of order/release.

Pricing Information: SEE BELOW

ITEM

DESCRIPTION

UNIT PRICE

ORDER NUMBER FOR MFG

DISCOUNT

DISCOUNT OR MARKUP

MANUFACTURER

1

Key Access System (simple installation)

$9,685.00

KW6-96

23%

Discount

MorseWatchman Inc

2

Key Access System (installation and integration with building automation plus data exchange with UW business applications)

$10,510.95

KW6-96-S

23%

Discount

MorseWatchman Inc

 

All non-listed, related items from manufacturer's catalog or product list (i.e. parts, accessories, add-on units for expansion and consumables) are available at 23% discount.

 

The current price list is titled MorseWatchman Inc and is dated March 1, 2013.

SPECIFICATIONS

1.        Unit price for each “system” defined as the Contractor’s customary bundle of goods and services with at least the following unless exceptions are noted by Contractor.  UW reserves the right to purchase a smaller cabinet if installation requirements dictate:

  • Contractor’s price to be based on UW trades employees doing the installation with support/instruction of Contractor, on-site if needed.
  • System built on Contractor’s “large cabinet” if large and small are offered, such as a 96-key cabinet or multiple cabinets coordinated with each other to achieve a range of 90-100 capacity. 
  • Cabinet to feature a door of some kind to restrict access to key stations to authorized users, not an un-covered panel.
  • Cabinet equipped with sensors and ability to log and send alarms for possible tampering.
  • Necessary software for running all features usable by at least 5 concurrent users.
  • Station capacity at least 90 inventory items (keys).
  • A supply of at least 3 times the capacity of the storage unit of key rings and related seals or authentication devices.
  • A supply of any tools or access devices needed to manage the system.
  • Battery backup power supply.

 

2.        Product Specifications Secure Storage and Access to Keys
There will be an unknown number of systems purchased, for use by distinct campus organizations with different ideas about how to manage keys.   For this bid, for each implementation, it is assumed that UW will provide electric power, LAN access, and tradespersons to install the hardware.  UW will require detailed instruction and assistance with procedures for installation and we require end user training in set-up strategies.  We require expert resources to consult with our software developers if they have questions.

 

Two examples are being provided for background and bidding purposes only – these implementations have already occurred but facets of each may be replicated or modified in future implementations.

 

Example one, simple installation. 

Partner with UW trades to install a system with power and LAN access.  Install key system management software for users as needed.  Train end users to credential keys, users, manage the software, and use the consumable key fobs or rings or other means of affixing keys to the system.  A no-frills implementation.

 

Example two, installation and integration with building automation plus data exchange with UW business applications. 

This example is based on the fleet operation but in many cases other UW departments will need to consume data from the key system or write data to the key system in order to synchronize other application data or achieve business process goals.  The fleet example is simply a stand-in for the concept of an implementation which will integrate into other complex systems.  Some very specific details are included below, it is important for bidders to understand they are for background and to illustrate the complex interaction that will be expected of an awarded contractor.  UW is seeking a supplier of both hardware and software that is open enough to allow for process and data integration with external systems.  The specific fleet example has already been implemented and has been performing well for years.

Begin example:

This daily rental operation wishes to have a method to dispense rental keys to customers after hours.  The cabinet will be installed inside a building equipped with an access control system.  The key dispenser will need a remote access credential method such as the ability to accept an HID card reader input.  UW can supply an external grade keypad which outputs the HID card access protocol communication signal.  A person can input their code credential into the keypad outdoors, signaling the key dispenser controller to evaluate the access.  The key dispenser has a door, the door must be opened upon recognition of user credentials.  The door actuation signal will be read by some device capable of relaying signal to the access control system.  One possible example is wiring a micro relay into the key dispenser door actuation circuit.  The relay signals the building access controller which in turn performs some programmed action such as unlocking an exterior door. 

 

UW will supply the building access control, the HID compatible keypad, and the communication hardware to the building access control.  The key dispenser Contractor will provide consulting for implementing hardware connections, grounding, safety, and necessary software programming.

 

In this example, the fleet customers will be expected to enter a six digit numeric PIN for access to ‘their key’.  The process would play out like this; the key dispenser should receive a valid credential, respond by beginning its native successful key deployment method, thereby firing a signal to the building access and begin timing out.  The building access signal will result in action to unlock the door and inform the person that they may enter.  Once the person is inside the building, the key cabinet needs to be attracting attention (via beeper, flasher, etc.).  Upon opening the cabinet, the user needs to be attracted to ‘their key’ (via illuminated light or other similar means).  Assuming the person plays along properly, they remove their key, close the cabinet and the process is ended.  If the user fails to open the cabinet it needs to time out.

Necessary system customizations will involve data being written to, modified, and deleted from the key management database to create user PIN’s and modify the attributes of in-cabinet key stations.  UW may write software interfaces to allow the fleet motor pool staff to populate the cabinet with the appropriate keys and PIN’s each night. 

In this example, some features the system must have are the ability to:

  • grant and revoke access to certain keys and not others
  • create and disable numeric access codes via software that interfaces with our other existing systems
  • allow UW software developers to have access to or training in system protocols so that they may be integrated into our other systems
  • provide date and time stamp records that can be reported out for which authorized user(s) used which keys at which times
  • provide monitoring of the system and alarms for unauthorized use
  • provide a user friendly software package to manage the key system as a stand-alone in addition to our in house developed software integration

3.        Computer Access

  • Network compatible via TCP/IP or browser based and compatible with a Microsoft environment (for instance but not limited to Internet Explorer, SQL, ODBC).
  • Systems located in physically distinct locations able to, via LAN control, work together to dispatch/return keys and user access/control able to be done remotely.
  • Reporting user interface and database available to our reporting tools.
  • Controlling user credentials and inventory, defining HID devices .
  • Ability to control/manage key dispensing devices in multiple building from one workstation/database.  
  • Ability to dispense/return keys to/from multiple dispenser locations using one workstation/database as management.

4.        Access for Software Development  
•      Open protocol for UW Madison to develop against, aka API (application programming interface) and/or:
•      Read/write access to key management system database
•      No cost manufacturer support for UW Developer/Database Admin/IT staff to maintain interfaces and data access.

5.        Device Attributes
•      Sturdy with a variety of optional configurations for key or other inventory density within secured storage
•      Controlled open/close for access to contents
•      Controlled access to individual and/or multiple items
•      User assistance lights to highlight which specific content items are accessible
•      Defined inventory of items, controlled by software, with two way communication to database
•      HID and/or RFID device access with technology that does not require electrical contacts
•      PIN access for users via numeric code
•      Ability to add biometric access
•      Item that is controlled (such as a key) must be locked down in the cabinet if the user returns the item to an incorrect position.


Revision History

link to top of document