B. Technical Regulations: 1. Introduction: Recommenda Tion CM / Rec (2014) 4
B. Technical Regulations: 1. Introduction: Recommenda Tion CM / Rec (2014) 4
com/translate_f
B. Technical regulations
French version:
https://wcd.coe.int/V iewDoc.jsp?
Ref=CM/Rec(2014)4&Language=lanFrench&V er=original&Site=CM&BackColorInternet=C3C3C3&BackColorIntranet=EDB021&BackColorLogged=F5D
.
English version:
https://wcd.coe.int/V iewDoc.jsp?
p=&Ref=CM/Rec%282014%294&Language=lanEnglish&V er=original&Site=CM&BackColorInternet=C3C3C3&BackColorIntranet=EDB021&BackColorL
.
In addition, the multilateral meeting (with which Belgium participated), which took place in Strasbourg on 27 and 28 November 2014,
with the subject of this recommendatio n, pointed out that electronic supervision had to be combined with other means specifically
addressing the problems Of the delinquents and the criminological needs to achieve ef fective reintegration.
The tenderer will find the French version of the report of the multilateral meeting following link:
http://www.coe.int/t/dgi/criminallawcoop /projects/Multilateral%20meeting/Report%20on%20MM%20on%20electronic%20monitoring
% 20FR.pdf .
2. LEGAL FRAMEWORK
1. Introduction
1. General organization of electronic surveillance in Belgium
Since July 1, 2014, the implementation of electronic surveillance in Belgium has been the responsibility of the communities
(hereinafter referred to as "serviced entities"). There are three communities: the German-speaking Community, the French
Community and the Flemish Community. The French and Flemish Community established their own services on 1 January 2015.
The German-speaking Community appeals to the capacity of the French and / or Flemish Community for the execution of electronic
surveillance and will not order individual technical equipment.
Until 31 December 2014, electronic surveillance was carried out by the federal government's National Center for Electronic
Supervision (FPS Justice).
The electronic surveillance services are responsible for:
The management of the electronic surveillance files (not for the containment files);
To gather the necessary information to create a management tool that gives a daily and global view of the implementation of
electronic surveillance. To that end, electronic surveillance services are centralized and coordinated by the community, with
regard to electronic surveillance;
The control of compliance with the hourly control and the perimeter;
The management and placement of the electronic surveillance material (ankle tape and surveillance box).
With regard to the elaboration and follow-up of electronic surveillance (ET), electronic surveillance services work closely with:
The judiciary (justice assistant - responsible for the guidance of the judiciary);
The commissioners (Criminal Court, Investigation Court, Detention Management Board, Prison Administration);
Electronic surveillance services are dynamic services in full expansion that play a leading role in the implementation of penal
sanctions. They ensure a continuous 7-day service at 7 and 24 hours at 24.
2. Contracting authority
This public contract is a joint assignment, between the Flemish Community, the French Community and the German-speaking
Community.
In performing an agreement between the communities, the Flemish community acts as the contracting authority .
2. Legal framework
Art. 5, 1, III Special Law of 8 August 1980 for institutional reform stipulates that the implementation of electronic surveillance is a
community competence.
December 20, 1996: It was decided to start a project on electronic surveillance following an agreement in principle during a
cabinet meeting on December 20, 1996 on combating overcrowding in prisons;
https://translate.googleusercontent.com/translate_f 1/29
6/26/2017 https://translate.googleusercontent.com/translate_f
1998: The ET will be introduced in Belgium in the form of a pilot project in Brussels;
June 30, 2000: The Cabinet decided to the National Center for Electronic Surveillance (NCET) to set up within the Directorate-
General for Execution of Punishments and Measures. As of 1 October 2000, this center was charged with the gradual
implementation of the ET as an "alternate definitive character" for the execution of a criminal offense and its administration
throughout Belgium;
October 1, 2000: The National Center for Electronic Surveillance be established within DG EPI;
May 17, 2006: Act on the external legal status of persons sentenced to imprisonment and the rights granted to the victim in the
framework of the serving of sentences - Articles 22 et seq;
January 29, 2007: Royal Decree determining the concrete implementation of the program of limited detention and electronic
monitoring;
January 29, 2007: Royal Decree determining the content of the report of the Director and to determine the composition and
functioning of the college staf f;
January 29, 2007: Royal Decree determining the content of the summary information report and social inquiry;
February 7, 2007: Ministerial Circular (MO) No. 1794 on the external legal status of persons sentenced to imprisonment and
the rights granted to the victim in the framework of the serving of sentences,.
April 26, 2007: Law which provides for the electronic monitoring as implementing modality of a provision of the sentencing
court (Surb), which entered into force on January 1, 2012;
September 1, 2007: Mission entrusted to the justice centers: transfer of NCET and social workers;
July 25, 2008: MO No. III in 1803 on the regulation of electronic surveillance as sentencing modality;.
August 29, 2012: MO on home detention with voice recognition (Voice) for the persons sentenced to one or more custodial
sentences which the executable portion three years jail not exceeding goes and whose still been served until the eligibility date
for a VLV two months or Less;
December 27, 2012: Act containing various provisions relating to justice (the detention under electronic surveillance is inserted
into the Law on remand);
March 12, 2013: MO ET / SE-1 on the regulation on electronic supervision modality sentencing to prison, the sum being
implemented imprisonment not exceeding three years; Repealing the abovementioned MO of August 29, 2012;
July 17, 2013: MO ET / SE-2 on the regulation of electronic surveillance as modality sentencing to prison, the sum being
imprisonment not exceeding three years in execution; Repealing the abovementioned MO of March 12, 2013;
December 26, 2013: Royal Decree implementing Title II of the Act of December 27, 2012 containing various provisions relating
to justice;
December 31, 2013: MO ET / SE-3 on the warrant of arrest under electronic surveillance conducted;
February 17, 2014: Law establishing the electronic monitoring as a penalty (which came into force on May 1, 2016);
November 26, 2015: MO ET / SE -2bis on the rules governing the sentencing ET modality prison, the sum of the applicable
imprisonment not exceeding three years in execution.
Definition:
Electronic surveillance is an execution modality of the imprisonment sentence or of the provisional detention in accordance with a
particular implementation plan whose compliance is monitored in particular by electronic means.
General objectives of electronic surveillance:
Combat recidivism;
Fighting the sense of impunity and making the criminal justice system credible again;
To optimize the execution of the penalties (for convicted persons to penalties of less than three years, ET must become the
norm, except for exceptions);
Saving resources: 38.65 euros a day under ET versus 126 euros a day in prison.
The categories of electronic surveillance (ET): Provisional custody under ET (VHET), ET as an autonomous penalty, ET as execution
modality of a custodial sentence.
The Law of 27 December 2012, containing various provisions concerning the Law amending the Law of 20 July 1990 on Provisional
Custody, provides for the possibility of conducting a detention order in the form of an electronic detention custody (with GPS or
Galileo ).
The amendment of the law deals only with the execution methods of the detention order in the context of a detention order, under
which investigating officers are given the choice of either imprisonment sentence or imprisonment under electronic supervision. The
conditions for issuing an order for detention remain unchanged in comparison with the previous law. Provisional custody rules apply
(time limits, investigation by investigative rights, remedies, rights of defense, representation by a lawyer); Only the application
modalities may dif fer.
Every day spent under a custody order under electronic surveillance, one day of provisional detention is assimilated.
In concrete terms, the invalent subject who is subject to the electronic detention order is obliged to be permanently present at the
address specified in the order and may leave that address only for authorized removals as defined in the KB of 26 December 2013.
The serviced entity plants displacements according to:
https://translate.googleusercontent.com/translate_f 2/29
6/26/2017 https://translate.googleusercontent.com/translate_f
The necessities of the ongoing procedure (all appearances, remedies, dossiers consultations (Articles 21, 3, 22 and 22bis of
the Provisional Custody Act, etc.);
The serviced entity immediately informs the investigating court of any absence in any of those cases.
The technology is electronic surveillance with GPS (and when available, with Galileo).
2. ET as autonomous punishment
If a fact can be punished with a criminal of fense or a punitive sentence of up to one year , the court may impose electronic supervision
as a main penalty .
Consequently, electronic surveillance since 1 May 2016 in criminal and police cases has been a third punishment in addition to
imprisonment and the imprisonment.
The technology in this form of ET is radio frequency (RF) with ankle band, supplemented with biometric verification.
This category of ET concerns persons convicted of one or more penal sanctions, the executable portion of which is more than 4
months and not more than 8 months.
For the penalties of 4 to 6 months, Ministerial Circular No. 1816 of 10 January 2014 states that convicted persons must undergo a
month of custody (in jail or under ET) provided that the total of convictions for these prison sentences after 21 January 2014 Power of
resentment has occurred.
For the penalties of 6 to 8 months there is home detention.
The decision on the grant of electronic surveillance will allow the prison director .
No judicial assistant is appointed for these convicted persons.
The technology in this form of ET is radio frequency (RF) with ankle band, supplemented with biometric verification.
If a person is sentenced to one or more imprisonment sentences whose executable portion is more than 8 months but not more than
3 years, the prison director or the Detention Management Board may decide to grant him electronic supervision.
The presence of the convicted person in his place of residence is compulsory during the hourly rule imposed by the servant and is
controlled by the serviced entity . All changes to the timing must be sent to the serviced entity within a time limit.
A judicial assistant is appointed. The latter is instructed to contact the convicted person to explain to him the characteristics of the ET
as well as the general terms and conditions and any special conditions that the judge must comply with. To this end, a progress
report is drawn up.
The justice assistant guides the justice for the full duration of his ET, helps him with his administrative steps and communicates all
useful information to the service entity and / or the prison director (on his own initiative or on request).
The technology in this form of ET is radio frequency (RF) with ankle band, supplemented with biometric verification.
If a person has been convicted of one or more imprisonment sentences, the executable portion of which exceeds 3 years, the
electronic supervision by the Criminal Court (SURB) shall be granted on written request from the convicted person. The convicted
person must be within six months of the time limit for granting a conditional release to submit his request.
A judicial assistant (YES) will be appointed as soon as the decision on the award of a penalty implementation modality has become
enforceable, so as to promptly call on the judge and provide him with all useful information for the proper implementation of the
enforcement model.
During the ET, the YES delivers all useful information to the service entity and / or the SURB (on its own initiative or on request).
In addition, according to the general and special conditions imposed by the SURB, the JA is charged with the determination of an
hourly arrangement with the judicial authorities.
Consequently, the control exercised by the service entity is determined by the hourly notice provided by the YES.
The technology in this form of ET is radio frequency (RF) with ankle band, supplemented with biometric verification.
The decision of the SURB is a further sentence imposed by the court of law (of at least 5 years and up to 15 years) that must or may
be pronounced in the cases laid down by law for the protection of society against persons who are serious Commit crimes that affect
the integrity of persons.
The SURB decides to stay detained before the expiry of the effective capital punishment or the convicted person must remain
detained or electronically supervised.
During the period of deprivation of liberty , the SURB may award the sentenced electronic supervision.
The concrete course of action under ET seems strongly to those of more than three years (ETSURB), especially with regard to the
presence and role of the YES (including the provision of an hourly rule).
The technology in this form of ET is radio frequency (RF) with ankle band, supplemented with biometric verification.
4. Regulations
1. Electronic Supervision
Law of 20 July 1990 on Provisional Custody, as amended by the Law of 27 December 2012 on various provisions relating to
justice;
Royal Decree of 26 December 2013 implementing Title II of the Law of 27 December 2012 concerning various provisions
relating to justice (published December 31, 2013);
Ministerial Circular ET / SE-3 of 31 December 2013 concerning the detention order carried out under electronic supervision.
2. ET as autonomous punishment
Act of 17 May 2006 on the external legal status of convicted persons for a custodial sentence and the rights granted to victims
within the framework of the enforcement procedures;
Royal Decree of 29 January 2007 determining the concrete implementation of the limited detention and electronic surveillance
program, as amended by the Royal Decree of 16 July 2008;
https://translate.googleusercontent.com/translate_f 3/29
6/26/2017 https://translate.googleusercontent.com/translate_f
Ministerial Circular No. ET / SE-2 of 17 July 2013 on the regulations on electronic surveillance as a punishment modality for
imprisonment when the total imprisonment of imprisonment does not exceed three years;
Ministerial Circular No. 1771 of 17 January 2005 on Provisional Release, Amended by Ministerial Circular No. 1816 of 10
January 2014.
Act of 17 May 2006 on the external legal status of convicted persons for a custodial sentence and the rights granted to victims
within the framework of the enforcement procedures;
Royal Decree of 29 January 2007 determining the concrete implementation of the limited detention and electronic surveillance
program, as amended by the Royal Decree of 16 July 2008;
Ministerial Circular No. 1803 III of 25 July 2008 on the regulation of electronic surveillance as a criminal justice model.
Law of 26 April 2007 concerning the posting of the Criminal Court, entered into force on 1 January 2012.
Average
Min Max duration Number of
Procedure Types (Days) (Days) (days) mandates %
ITM 1 - Type 1 ET 30 234 123 23 0.37%
ITM 1 - Type 2 ET 1 409 118 3385 55.08%
ITM 1 - Type 3 ET 9 1278 254 757 12.32%
ITM 1 - Type 4 ET 105 441 202 5 0.08%
ITM 1 - Type 5 ET 1 249 38 1563 25.43%
ITM1 - Type 6 ET / / / / /
Subtotal ITM1 114 5733 93.28%
ITM2 - Type 7 ET 1 349 62 413 6.72%
Subtotal ITM2 62 413 6.72%
ITM3 - Type 8 ET / / / / /
Subtotal ITM3 / / / / /
Tota ITM 110 6146 100.00%
Type ET 1 = Management Detention M anagement (DDB)
Type ET 8 = victim
4. DEFINITIONS
1. Monitoring System
Depending on the decisions of the judicial authority and / or the person responsible for the execution of the sentence, the servant
must have the opportunity to enter an oversight system (hourly) according to an evolutionary implementation plan for electronic
https://translate.googleusercontent.com/translate_f 4/29
6/26/2017 https://translate.googleusercontent.com/translate_f
surveillance, in other words, the individualization of the custodial sentence as mentioned In the legal framework for electronic
supervision.
This will for individualization can be presented schematically as follows:
Detection Regularly Semi-permanent Continuous
The technical environment of the surveillance system (operation of the material, communication problems, panne, etc.).
3. Application and servers for the management of the contractor's electronic supervision (ABET)
ABET is the whole of the contractor's servers and software that allows the technical follow-up of electronic surveillance using the
data transmitted by the ITM.
The ABET must communicate with existing and future SISET .
ABET = contractor software and servers
4. Equipment
The equipment includes the full technical equipment used for any legal entity under ET , as well as its supervisory and control material
communicated with the ABET , allowing for electronic oversight of the judicial s ystem.
The monitoring system can be based on technical schemes in which use is made of radio frequency (RF) and geolocation signals
(supplemented with Wi-Fi on the basis of one or more access points 1 or LBS based on one or more mobile telephone masts 2 when
no geolocation signal Is received), whether or not supplemented with a biometric verification.
It consists of:
1. Either a personal identification device (TPI) (RF transmitter) and a monitoring unit (RF receiver).
As long as the convicted person is under electronic supervision, he carries an TPI (ankle band consisting of an electronic device
and the associated band) that guarantees the person's identification under ET. The ankle band transmits a signal to the ABET
via a monitoring unit (equipped with a receiving device) installed in the convicted place of residence. The ITM1 allows the
identification of the judicial via biometric verification based on fingerprints or iris (BV).
2. or a unit for follow-up in one piece (TPI + RF + LBS / wifi 3 + GPS or Galileo) and Monitoring Unit (RF receiver).
As long as the convicted person is under electronic supervision, he has a follow-up unit (an ankle device consisting of an
electronic device that can exist in two parts as long as it is not placed but must consist of one part when it is in the trial Applied)
which guarantees the identification and geographical location of a person under ET. The follow-up unit has a direct connection to
the ABET. He can send data to the ABET in case of signal loss in the home of the judicial system by means of a monitoring unit
(equipped with a receiving device). The ITM2 may have the possibility of identifying the justice via BV .
3. Either a follow-up unit placed on the perpetrator of the facts and a dispositive distance offender (DADS) carried by the victim
who should be able to localize the victim and inform the victim that the Under the supervision of an electronically supervised
offender equipped with the follow-up un it, is approaching.
4. The installation kit is the equipment used for technical interventions on the ITM. The mobile control unit is the tool for detecting
any type of ITM and its state of operation and any related violation can be reported.
6. Hours
5. The full document is understood to mean hourly, hourly, second-time hours of day and night, 7 days at 7, 24 hours at
24, all days of the year, including the holidays in Belgium and in Abroad. The time zone used is UTC + 1 during winter
and UTC + 2 during summer time.
FUNCTIONAL AND TECHNICAL SPECIFICA TIONS
1. The tenderer describes the ITM and MTK in part C of the tender .
The TPI;
The DADS.
4. By signing the tenderer declares that the ITM and the MTK point per point meet the specifications specified in the following
sections. In support of his submission, he adds the documents and clarifications requested below. He also adds a list of
specifications to which the proposed ITM and the proposed MTK do not respond, in the order in which they are discussed
below.
2. Telecommunications
In order to ensure efficient management of the ITM and MTK, both logistically and in terms of invoice follow-up, the contractor must
use barcodes and alphanumeric codes as the identification tool, which allows for The follow-up of the material, both in general and
for special cases such as loss and theft, as well as damage or defects.
For the last two cases, the coding structure must enable the components of the replaced ITM and the replaced MTK to be identified.
The contractor must provide for the integration of that data in the ABET and can be obtained from the system in a form that is
subsequently determined by a serviced entity .
1. The components of the ITM and MTK must have a unique identification number;
2. The unique identification number must on the ITM components and the componen ts of the MTK Two-way display:
alphanumeric code and barcode that is easily readable with a barcode reader . The barcode must be very rich in contrast;
3. The bar code must be able to be read with less than 0.5% error with a reader of the type of Data Logic GD4130 Gryphon (ie,
the reader is now being used by the controlled entity).
4. Cumulative characteristics
The ITM and MTK answer point per point to the specifications specified in the following points:
1. The active components of the ITM and the MTK to 24 hours at 24 for 7 days on 7 works;
2. The use of the ITM respects the person's dignity , integrity and personal privac y;
3. Inform the proposed terms of the ITM by the tenderer a controlled entity capable of every person under its individual checking
surveillance (not applicable for DADS) ;
4. The ge installed by an ITM is an individualization of the electronic surveillance through a specific parameterization of the
system;
5. The ITM is transportable. The contractor provides each ITM a reusable packaging that is non-transparent and neutral regarding
any designations indicated on it. This packaging protects the ITM against shocks and against a fall of 1.2m high. D eze packing
is either compact foldable (max. 4000 cm @ 3), such that they simply by the agent of the cell after the placement can be
brought unity. Whether it is washable, so that after each can be stored on-site installation without running the risk of harmful
bacteria n spread of parasites. The contractor in this case is responsible for washing and re g uitable make the packaging for
a new installation;
6. The installation time for the componen ts of the ITM by the staff of the mobile team is as short as possible and is up to 15
minutes (check the scope of detection included). These actions remain simple professional acts that are achievable within a
reasonable time;
7. The installation, modification and inspection of the components of the ITM in the field happen organically. There are other
words, no phone call from the staff of the mobile team needs to install the user of the monitoring to the ITM, change or verify
because the ITM and the ABET automatically communicate (not applicable for DADS) ;
8. The components of the ITM to make a self-test of the perimeter are possible: the individual which wears an ITM, moves along
the outer perimeter of its living environment. At the end of the test, the system sets a detection area (not applicable for the
DADS);
9. The components of the ITM and MTK minimize that can make the staff of the mobile team handling errors. Thus, making
electronic or mechanical controls (eg. An electronic and mechanical application with luminous warning or sound, visual and
aural application in real time to determine the scope of detection, ...) every wrong act of the employee of the electronic
supervision impossible;
10. The components of the ITM and MTK minimize that can make the staf f of the mobile team misinterpretation;
11. The subscribed by ITM and MTK language used is French, Dutch, German or English according to the parameterization of the
controlled entity;
12. It is possible to change the language used by the ITM if it is already installed and activated by the individual;
13. The detection range of the ITM should be adjustable at a distance from the ABET ( not applicable for the DADS) ;
14. The detection range a place of house arrest must correctly and fully cover. This range can be adjusted in a maximum radius,
with or without any obstacle due to a specific configuration at the time of the installation;
15. The solution must function places all kinds:
16. The ITM transmits at regular intervals a confirmation signal to the ABET to report the correct functioning of the ITM. Di t signal
is , in principle, four times a day sent , but d e frequency can be individually adjusted through the ABET . If ITM fails a make
over confirmation signal to the ABET , automatically undertake a new attempt a fter 10 minutes ;
https://translate.googleusercontent.com/translate_f 6/29
6/26/2017 https://translate.googleusercontent.com/translate_f
17. The ITM responds immediately (after less than one minute) to control signals emitted by the ABET ;
18. The ITM can not be opened by the individual (not applicable for the DADS) ;
19. The ITM and MTK components feature autonomous or rechargeable batteries .;
20. The remaining autonomy of the batteries of the ITM should be controllable via the ABET and must be an alarm can generate;
21. The ITM is configured in any manipulation (including movements for the monitoring units and releasing the TPI and the unit for
follow-up ), opening attempt at opening , damage , attempt to damage and malfunction of a component immediately (after less
than 1 minute), an alarm is sent to the ABET (not applicable for the DADS) . If that is a problem occurring outside the control
range, the ITM needs to these alarm message within one minute after the return within this control range to be transmitted ;
22. Any event which prevents the transmission of the data, is in real time, be detected and sent to the ABET ;
23. The ITM and the MTK automatically makes use of the time zone UTC + 1 during the winter time and UTC + 2 during the
daylight saving time ;
24. The components of the ITM and the MTK that are to be connected to the power supply , are adapted to the national standard
(230 V) and genere run an alarm in the event of interruption of the power supply;
25. The ITM and MTK are regulatory marketed in Belgium ;
26. All the functionalitie s of the ITM and the MTK are operating in an environment with a temperature which is at least varies
between minus 10 C and plus 50 C ;
27. All the functionalities of the ITM and the MTK are operating in an environmen t with a humidity of a minimum margin of 10% to
90% ;
28. The ITM and MTK poses no danger to the individual, any person or any animal in its environment: The certificates proving that
the respected health standards applicable in Belgium, be included in part C of the tender . In the same section is a list of
medical and technical contraindications attached (eg in case of contraindication associated with wearing a pacemaker or
connected with the work in the petrochemical industry) ;
29. The ITM and the MTK are as reliable as possible, both in terms of operation and in terms of operative communication with the
capacity ABET;
30. The mean time between failures, or too MTBF (mean time between failures), in other words, the arithmetic average of the time
between the spans of ITM, is mentioned in the section of its bid in which the ITM is described. In the calculation of the MTBF,
the repair and maintenance times are integrated and have the MTBF is the average time between the start of the repair and
the next span. The method for calculating the MTBF will be described. The MTBF should be as long as possible;
31. The average operating time before failure, or MTTF (mean time to failure), ie the average duration in days using ITM before the
first span it is mentioned in the tender is that the ITM is described. In the calculation of the MTTF is integrated, the following
formula, whereas it is n ITM's follows starting from their entry into (new), and in that t (i) is the duration that has elapsed at the
time when the first breakdown occurs, then the MTTF the average of t (i) (). The method for calculating the MTTF is described.
The MTTF is as high as possible;
32. If the whole or a part of the ITM or the MTK may be re-used, the subscriber defines the step-by-step procedure in order to bring
it back (in the technical and sanitary plane);
33. If all or part of the ITM or MTK single use and can not be reused, the tenderer describes the procedure to recycle it in a
responsible way;
34. Any improvements or modifications to the components of the ITM and MTK are submitted to the contracting authority and take
place at the expense of the contractor .
The TPI responds point by point to the specifications set out in the following points:
1. The TPI ensures the identification of the individual by means of an inviolable, and tamper-proof attachment which from Year
Old comprises n single bond and of which the detachment, the attaching and the attempts to tamper generate an alarm on the
ABET ;
2. The weight of the TPI and disruption may cause to its ergonomics to exercising daily and professional activities;
3. The TPI is discreet for the wearer (size, shape, color , noise);
4. The TPI can be adapted to the construction of the inserted individuals . The biggest anklet must have at least an inner
circumference of 300 mm. The device is placed around the ankle;
5. The TPI communicates with the monitoring unit through RF signals;
6. In its bid, the bidder clarifies the guaranteed autonomy of the TPI after installation, wherein the minimum autonomy is 12
months;
7. The TPI allows to generate events that contribute to the understanding of the situation and at least the following events:
intrusion, fallow , cutting the strap, batte ry level, re set ;
8. The TPI decision t a memory which is interrupted in case the connection with the Monitoring Unit, the TPI allows for at least
three days all registering events with their date and time of their transmission to the unit for monitoring or maintenance ;
9. If no permanent connection to the unit may be brought to monitor established, the data thus stored are entered by the
maintenance service of the contractor in the ABET ;
10. If the memory is full, TPI stores the events of the first 3 days after the breaking of the connection;
11. The TPI is waterproof and dustproof (IP 68 minimum standard or equivalent). The subscriber, this shows, by means of
certificates.
The monitoring unit responds point by point to the specifications set out in the following points:
1. The unit for monitoring ensures the proximity of the individual through a wireless connection to the TPI;
2. The monitoring unit is in real conditions (intramural) the highest operating range with TPI thereof;
3. The subscriber indicates whether he needs to use signal repeaters if the range of operation between the unit for the
surveillance and the TPI in real conditions (intramural) is too small relative to the residence. In that case, the tenderer must
describe the signaalherhaler , which must have the same security as the rest of the ITM, and the same level of care and follow-
up as the unit for surveillance. The cost for using the signaalherhaler is included in the price of the ITM;
4. The monitoring unit is double checking RF BV ( only on the basis of fingerprints or the iris ) possible. The monitoring unit may
thereby only serve to establish communication with the ABET, the company itself is generated and controlled by ABET . The
dual control allows to check whether the individual is indeed his unit is monitoring (eg in case of an alarm of forbidden room,
where the individual claims he beside his unit monitoring is);
5. The unit for monitoring the TPI communicates with by means of RF-signals, and with the data center s of the supplier of the
SIM cards by means of the mobile telephone network (see section 1 6 );
6. The individual competent operated entity calls via the unit control.
7. The clerk responsible entity the individual calls via the unit control.
8. It should be possible to transfer a unit of control of one controlled entity to another entity controlled. In this case, the phone
calls to the other entity operated forward / to be able to leave there.
9. The unit for the supervision can be done by the individual can be coupled, moved and reconnected without the continuously
interrupting capacity of the monitoring;
10. The monitoring unit is plugged into the house;
11. The monitoring unit has a battery life of at least 48 hours in case of power failure ;
https://translate.googleusercontent.com/translate_f 7/29
6/26/2017 https://translate.googleusercontent.com/translate_f
12. The monitoring unit allows to generate events that contribute to the understanding of the situation and at least the following
events: motion detection of the TPI intrusion, burglary , power failure, remainin g autonomy minimum 12h, reset;
13. The monitoring unit can manage all of its events, as well as those transmitted by the TPI and the ABET (adjustment of the
schedule, updating the parameters of the ITM);
14. Unit surveillance decision t on a memory , in case the connection to the ABET is interrupted, the unit allows for at least 15 days
all events with their date and hour to register their transmission to the ABET or maintenance ;
15. If no permanent connection to the ABET can be established, the thus-stored data are input by the maintenance service of the
contractor in the ABET ;
16. If the memory is full, the unit for monitoring stores the events of the first 15 days after the termination of the connection;
17. The monitoring unit is waterproof and dustproof (IP44 minimum standard or equivalent). The subscriber, this shows, by means
of certificates.
The unit for follow-up (in one piece) satisfy particular point by point with the specifications set out in the following points:
1. The unit for follow-up is responsible for the geolocation of the litigant through GPS - or Galileo - signals when available ;
2. The unit for follow-up should also can be gegeolokaliseerd through other technology n over the satellite network when the
network is difficult to reach, such as inside buildings, metro, etc. This technology n can be combined to ensure a better safety
. The (separately or in combination) used technology n are :
RF , transmitted by the surveillance unit (without the addition of a TPI), which meets the requirements set out in Section
5.1.6 and ;
LBS, which at least from Year Old one mobile phone mast is used , and / or;
Wifi , wherein at least of Year Old is made n access point use ;
3. The unit for follow-up ensures the identification of the individual , thanks to an inviolable, and tamper-proof attachment which
from Year Old comprises n single bond and of which the detachment, the attaching and the attempts to tamper generate an
alarm on the ABET;
4. The unit for follow-up should be adapted to the construction of the placed individuals . The biggest anklet must have at least an
inner circumference of at least 300 mm. The device is placed around the ankle;
5. The unit for follow-up causes no hindrance in the performance of daily and professional activities;
6. The unit for follow-up is discreet for the wearer (size, shape, color , sound);
7. The unit for follow-up does not weigh more than 220 grams ;
8. The unit communicates with the monitoring unit for monitoring through RF signals;
9. When the unit for follow-up using the radio, he has in real conditions (intramural, ie within the property of the individual) the
highest operating range with his unit for surveillance;
10. The unit for monitoring communicates with the ABET through the mobile phone (see Chapter 16);
11. The unit for monitoring can alert the wearer trying to reach the clerk entity him ;
12. The unit for follow-up has a battery life of at least 24 hours and generates an alarm on the ABET when the remaining autonomy
minimum is 3 hours ;
13. In his tender the tenderer clarified how many months of installation mentioned the autonomy issue. 5.1.7 / 12 is guaranteed
with a minimum of 12 months ;
14. The rules for charging the battery from the unit for follow-up as simple as possible. The charging of the battery should be
possible to be by means of a battery cell (wireless), so that the mobility of the j remains ustitiabele ensured. For example,
charging may also be made possible by means of an electric cable connected to the power p citeitsnet ;
15. The time for charging the battery from the unit for follow-up is minimized. Wireless is the battery in 2 hours maximum charge to
an autonomy of 21 hours . If charging via the power supply is made possible, charge t the battery in up to one hour on to a
battery life of at least 21 hours ;
16. The unit for follow-up can generate events that contribute to the understanding of the situation and at least the following
events: motion, intrusion, burglary , cutting the tape, fully charged battery , remaining autonomy at least 3 hours, reset ;
17. The unit for follow-up has a memory, in case the connection to the ABET is interrupted, the unit allows for at least three days,
all events with their date and time to register their transmission to the ABET or maintenance;
18. If no permanent connection to the ABET can be established, the thus-stored data are input by the maintenance service of the
contractor in the ABET ;
19. If the memory is full, the unit saves to follow up the events of the first three days after the disconnection;
20. The unit for follow-up is waterproof and dustproof (IP 68 minimum or equivalent).
Tenderers shall establish an operative distance perpetrator-victim (DADS) that allows geolokaliseren victims and to inform him when
the offender placed under electronic su rveillance provided with the unit for follow-up approaches.
The DADS responds point by point to the criteria listed below:
1. The DADS is responsible for the geolocation of the victim through GPS - or Galileo signals, when available ;
2. It has the same geolokalisatie- and communication features as the unit for follow-up , in particular the characteristics described
in point. 5 .1.7 / 2 , 5 .1.7 / 10 and 5 .1.7 / 11 ;
3. The DADS is different from the unit for follow-up applied to the offender;
4. The DADS causes for the victim no hindrance in the performance of his daily and professional activities;
5. The DADS is discreet (volume, shape, color , sound) and can be carried in a handbag;
6. The DADS does not weigh more than 200 grams ;
7. The DADS is a battery life of at least 24 hours, and generates an alarm on the DADS when the remaining autonomy is at least
3 hours;
8. In his tender the tenderer clarified how many months of installation mentioned the autonomy issue. 5.1.8 / 7 is guaranteed with
a minimum of 12 months ;
9. The detailed rules for charging the battery of the DADS should be as simple as possible. For example, charging is made
possible by means of an electric cable connected to the electrical mains;
10. The time for charging the battery of DADS is as short as possible. The battery charges in up to one hour for an autonomy of at
least 2 4 hours ;
11. Alarms are generated if the victim and the person placed under electronic surveillance which includes the unit monitoring
closer together, so according to the rule s of the court decision. The victim bears the enacting permanent when it moves ;
12. The unit for follow-up has a memory, in case the connection to the ABET is interrupted, the unit allows for at least three days,
all events with their date and time to register their transmission to the ABET or maintenance;
13. If no permanent connection to the ABET can be established, the thus-stored data are input by the maintenance service of the
contractor in the ABET ;
14. If the memory is full, the unit saves to follow up the events of the first three days after the disconnection;
15. The DADS must be waterproof (at least IP54 or equivalent).
The mobile team kit (MTK) must meet the following cumulative characteristics:
https://translate.googleusercontent.com/translate_f 8/29
6/26/2017 https://translate.googleusercontent.com/translate_f
2. The MTK makes it possible to detect any type of ITM, to gather information that is transmitted by the ITM on the state of its
operation, and any alarm to notify that keeps relationship therewith;
3. The MTK weighs up to 200 grams and is easy to use;
4. When it uses RF signals, the MTK, in real conditions (intramural, ie within the property of the individual) the highest operating
range with the ITM;
5. The MTK has a battery life of at least 24 hours, and generates an alarm on the MTK when the remaining autonomy is at least 3
hours;
6. In his tender the tenderer clarified how many months after installation autonomy mentioned in paragraph 5.1.9 / 5 is
guaranteed, with a minimum of 12 months;
7. The time for charging the battery of DADS is as short as possible. The battery charges in up to one hour for an autonomy of 21
hours.
2. Specifications of ABET
1. generalities
1. The tender offers its services for the provision of ABET to in SaaS form (Software as a Service) ;
2. The subscriber defines and proves in part C of the tender , the functional and technical relevance of the ABET ;
a. If the hardware vendor (ITM) or software (ABET) is the contractor itself, the contractor should watch over the entrances
to support what gave the supplier, are not under the control of the supplier. This requires technical and organizational
measures shall be taken up to enable the contractor to each access (charged by the supplier eg. Ihkv updates of
software or firmware OR requested by the contractor) to open focused and log and only having access to give certain
devices / data at a particular location which is needed to perform the task of the supplier under the principle of "need to
know";
c. In the case of 3 rd line support on the software vendor should be on site and there will reproduce the error and analysis
under the supervision of the contractor's employees.
1. The contractor shall inform the contracting authority (and the suppliers with whom the contracting authority works) test - and an
acceptance area available ;
2. D hese environments have the same database and the same processing capabilities as the production environment ;
3. The Contractor shall comply with the requests of the contracting authority related to the management of them environments
such as updating the data on request, without the effect of these environments too far disturbing.
3. ABET- connection
1. generalities
1. Access to the application will be done through a web browser over a secure connection (HTTPS) from the PC ' s French
Community;
2. The authentication for the Web application ABET will be done over a secure connection (HTTPS), strong ( " two-factor " :
identifier / password and eI D card / PIN) authentication. I n the extent that the authentication has been delegated by means of
a federated connection, the authentication will be validated by the French Community;
3. The federated connection between the partners will be at least the SAML 2.0 standards respect.
4. The ABET Sat user management l be delegated to the Identity and Access Management (IAM) of the French Community .
5. The access rights to the application (access profiles) will be given through an agreement (see 5.4.2.3) and the management
will be delegated to the French Community IAM.
6. Access to ABET is by delegation. The authentication of users in the access to the ABET is delegated to the systems for access
control of the controlled entity via a federated connection. The federated coupling will be effected through the exchange of
messages between the SAML V2.0 identity provider (Identity Provider - IDP) of the access control of the ABET and the identity
of the supplier clerk entity .
7. Only operated entity will use this access right. They can connect at any one time, namely , for 24 hours at 24 at 7 for 7 days;
8. Access is obtained:
9. The identification of the entity controlled by its access to ABET is done through:
b. and at least one communicated by the contractor to the controlled entity password;
10. The clerk uses the entity identifiers it will be communicated at each connection to the ABET ;
11. The identifiers serve to protect the access to reserve the ABET to the users of the controlled entity in question, integrity and
availability of ABET , like integrity, availability and confidentiality of the data of the controlled entity as transmitted by the user;
a. The identifiers are personal and confidential. They can only be changed at the request of the controlled entity or on the
initiative of the contractor, provided that the employee entity in question before it is notified. The clerk entity connectable t
undertook to make every effort to keep the identifiers on t m keeping relate secret and not to make them known, in any form;
b. The clerk entity is fully responsible for the use of the identifiers and h ij is responsible for storing the access codes he m
delivered. He satisfied himself that no other person not authorized by the contractor access to the ABET. Overall, the clerk
https://translate.googleusercontent.com/translate_f 9/29
6/26/2017 https://translate.googleusercontent.com/translate_f
entity bears the responsibility for the safety of your PC ' s to access ABET. Where the employee entity would have knowledge
of the fact that another person has meant access, bring t h ij the contractor immediately aware;
1. Access to ABET is obtained via a web browser via an HTTPS connection with strong ( " two-factor " as an eID and an
associated PIN ) authentication from computers in the office automation network of the Flemish government ;
2. Access to ABET should be independent of the operating system and users can not install software on the PC ' s user worship
isen other than a W eb browser;
3. The user management is delegated to the user administration of the Flemish government (
https://overheid.vlaanderen.be/gebruikersbeheer ). The contractor shall submit to launch an integration with the Facility
Company of the Flemish government;
4. Access control is delegated to the access of the Flemish government ( https://overheid.vlaanderen.be/toegangsbeheer ). The
contractor must do so to start an integration with the Facility Company of the Flemish government;
5. The employee entity can connect at any time, namely 24 to ur 24 for 7 days 7;
6. The proposed opening of ABET to the Flemish government must be validated z ijn by the Services Department of the Flemish
government.
A component for management of the identification formalities and authorizations (GIA), based on the software environment
Novell / NetIQ Identity Manager ;
A component for access control applications (CA W-UI) .
The authentication of users belonging to the French Community for the access to the ABET is delegated to the CA W of Cerbre by a
federated coupling.
The federated coupling is accomplished by the exchange of messages between SAML V2.0, the identity provider (Identity Provider -
IDP) of the access control of the ABET and the identity of the supplier of Cerbre CA W.
Preferably, identity and role information for the user is also using the SAML pr otocol in the attribute statement in the authentication
response exchanged in authentication of the user , and holds the application, no separate database of identity information of its end-
users.
The basic scheme appended below illustrates the required federation process.
Note : "skill areas" here means "ABET".
1. A request for access to the application source of the ABET is sent by the browser client. The latter is directed to the IDP of the
access of ABET (the IDP ABET) for the selection of the context source (in this Case l the French Community) ;
2. The IDP-abet transmits an authentication r Equest to the IDP-ETNIC ;
3. The IDP ETNIC authenticates the user and retrieves optional additional data from the RIA Cerb re (R f rentiel of Identit
s et des A cc s) for the enrichment of the authentication response . It should be noted that the user identifier which is
transmitted in the authentication token, should be known in order for a the two parties (IDP ABET and IDP ETNIC) compound
can be made by the user which is locally managed by the ABET ;
4. The IDP ETNIC carries the authentication token on to the IDP-ABET which, on the basis of the contents thereof a compound
makes with a local user ;
5. The IDP ABET refers the client to the application for access.
The tenderer clarified his offer the technical means he will be committed to the implementation of the authentication process required
for users of controlled entity: IDP servers, selection of the context source, communication and security (certificates), as well as the
resources and actions expected of the employee entity .
The tenderer clarified in his tender the data schema related to the user that he will manage local, local gebruikersidentifiers to be
shared with the identity providers of employee entity , as well as additional attr ibutes which he must have to spot the user and access
to manage the ABET .
For the Flemish Community:
The user management of the Flemish government's own development as OpenIDM provisioneringscomponent and provides
management of identities and their privileges. G sers and users of the application will ABET for Flemish users through the
Flemish managed user management. The access of the Flemish government's own development in the T ivoli suite and Trust
Builder and provides access control for applications. The access to the ABET application will be managed by the user
management for Flemish Flemish users.
1. A request for access to the application source of ABET is sent by the browser client. The latter will be forwarded to the IDP of
the access of ABET (the IDP ABET) for the selectivity E of the context source;
2. The IDP ABET sends a digitally signed SAML 2.0 authentication request via an HTTP post or HTTP redirect call to ACM3 IDP;
3. The ACM3 IDP authenticates the user and takes optional additional data from the user administration for the Flemish
government for the enrichment of the authentication response. This authentication response will follow a transient name-ID
format, and contain an attribute statement containing d e common identifier;
4. The ACM3 IDP carries through http post call the SAML 2.0 authentication response on the IDP ABET making on the basis of
its content a connection to a local user . There is no use will be made of a SAML2.0 Artifact bond. The AMC3 IDP Flemish
government will this SAML 2.0 authentication response digitally sign and encrypt the IDP ABET ;
https://translate.googleusercontent.com/translate_f 10/29
6/26/2017 https://translate.googleusercontent.com/translate_f
5. The IDP ABET refers the client to the application.
3. user Profiles
The ABET minimum definition of user profiles to propose as directed by the contracting authority:
1. Level 1: ADMINISTRATOR to confer rights on at least three (3) lower levels and gain access to the same terms as those
levels;
2. Level 2: ADMINISTRATOR capable individuals manage ET under which his assigned community as well as the arrangements
for ge individualized follow-up to determine;
4. Level 4: TECHNICIAN capable to manage the stock of individual technical material of his community (active / damaged /
maintenance / ... ).
5. In order to correspond to the user profile of the application, four access profiles will be available within the French Community
IAM system. This can naturally evolve according to the needs of the application. This access profiles will be created (in the
agreed between the parties representation) to the IDP ABET in authentication (via federation) using SAML response (see table
in section 5.2.4.2).
6. The roles will be managed in the user management of the Flemish government. The contractor users management need to
clarify how the various roles have to be represented.
4. Number of users
1. The contractor ABET should be dimensioned for a total of 120 users including 60 concurrent users;
2. The increase in the total number of users does not increase costs.
1. generalities
1. ABET is an application that the clerk entities allows all offenders under electronic surveillance to them are assigned ,
regardless of the selected ITM , through a ge integrated platform to control ;
2. The encoded data in the ABET engraved mporteerd from the ITM, the MTK , or SISET (SISET Master - ABET Slave). ;
a. If the connection between SISET and abet the working correctly, the ABET prevents the manual coding by the user. This
in order to respect the master -slave relationship. The ABET will generate a reminder message on this matter ;
b. If the connection between the SISET and abet has been broken, the user can manually set the data that would be
provided by introducing into the SISET ABET. When the connection is then restored, the data in SISET be updated
based on the data from the ABET under conditions determined by SISET ;
3. ABET is made available in the form of a web application. The functionalities of the ABET also be made available via web
services;
5. The ABET makes use of the language (NL or FR) of the user that is specified in the user profile ;
6. The screens for the input of management data show only the fields that are relevant to the ITM and operated entity in question;
8. ABET is the coding and management of all relevant information regarding the individual litigant ( identification, timetables , set
alarms, whether that be general or individual, related to the technique or method of individual monitoring) ;
9. The ABET allows easy technology applied to an individual to change, without any other gelled windows to reenter without
interrupting the electronic monitoring ;
10. The ABET offers the possibility administrators designated by the clerk entities to manage the operation of the entire hardware
and software and the parameterization of the technology (RF, GPS or Galileo, BV, change of scope, polygons, ...) to change
through ABET;
11. The controlled entity should be able to do searches at each time point in the table (s) of the database (s) in order to refer to
shared information. That should be done through the web browser (https protocol);
12. ABET is the "double on request control" (for example: RF and BV) managing clerk if the entity in question to ask ;
13. The ABET must classify individuals according to criteria specified by the contracting authority (ex .: supervision of the French-
speaking litigants by agents associated with the group of French-speaking individuals) and the attendant entities (eg .: in a
category of offenders are supervised only possible by users who are associated with that group). The ABET should allow the
individual comforts change kkelijk group;
14. All information is available through the preparation of reports. The information in these reports is determined by each controlled
entity in its desiderata. They are the contractor made available as soon as possible, at the latest within two working days after
its application;
15. The ABET can analyze ITM2- and ITM3 displacement diagrams to identify unusual or risky behavior and make the users
aware;
16. The ABET must manage the names and surnames of individuals are at least compatible with all EU alphabets, with the
exception of the Greek and Cyrillic;
17. During the agreement are the versions of the components of the ABET (operating systems, software, etc.) to be supported by
their respective providers . The contractor undertakes actions to achieve this result ;
18. ABET is always compatible with the current version and the last three versions of Microsoft Internet Explorer , Firefox and
Google Chrome.
https://translate.googleusercontent.com/translate_f 11/29
6/26/2017 https://translate.googleusercontent.com/translate_f
19. The ABET ensures monitoring of alarms generated by the ITM through the following procedural steps: New - in treatment,
treated OR closure without follow;
20. The ABET manages the confirmation signals are transmitted at regular intervals by the ITM. When a confirmation signal not
right by the ITM is sent to the ABET, the ABET initiates after a few minutes to determine the entity operated a silent control of
the ITM. If the acknowledgment signal is not given again, the ABET undertakes automatically attempt to quiet control. If this
second attempt fails to silent monitoring, the ABET generates an alarm after a few minutes to determine the clerk entity;
21. The ABET provides the opportunity to create a grace period run and manage. The grace period is at least appropriate for all
entrance halls and departure alarms linked to the timetable of the individual. The grace period is a period of time by the
employee entity via the abet in which no alarm is generated for a particular individual affected. The above-mentioned term
should be able to be parameterized (by the controlled entities via the ABET) from 0 minutes up to 30 minutes, with a minimum
interval of 1 minute. By default, the grace period is determined by each controlled entity (administrator level), through the
ABET, for all individuals under its supervision, with the ability to customize individual that period. The use of the grace period is
stored in the ABET and can, if necessary , be consulted later ;
22. In the event an alarm is generated by ITM2 , is the time difference between the transmission of the localization and the alarm is
made visible in the ABET ;
23. The categorization of the types of alarms depending on the type (ITM, ABET, MTK) or importance (the degree of severity of 1
to 4) is agreed upon with the supplier during the implementation phase ;
24. The ABET makes it possible to distinguish between technical and business alarms alarms ;
a. allow exclusion zones to manage by using either polygons or circles with an address as the center;
d. must also provide the ability to switch from one method (circle or polygon) to another;
e. used an autonomous geographic information system (GIS) without an Internet connection, the data is stored in the ABET
and be able to manage a variety of cartographic data. The contracting authority may in the course of the contract the
change GIS if determinable t the quality of the used cartography not enough is ;
26. GIS:
a. road maps used with as large a scale as possible: 1 cm on the map will give the smallest possible distance and a
maximum of 5 m in reality ;
b. gives buildings again and may contain aerial photographs (Google Maps type 4 , for example
https://www.google.be/maps/@50.8475 979,4.3647063,57m/data=!3m1!1e3)
27. The ABET is with SISET accordance with the rules associated described in Chapter 8 ;
28. The ABET synchronizes the schedules automatically with the transition to either the summer or winter time.
2. History
1. Thanks ABET to the clerk entity and consult daily history (in read only) of the technical and business alarms related to the
persons ET for their controlled entity . This history can be consulted:
a. in general terms (for example: drafting the history of the last five days before the full electronic surveillance);
b. on an individual level (at the individual screen for example, the history of functional and technical alarms displays the last
two weeks, or the history of a period of thirty days from the previous year) ;
2. Thanks ABET to the clerk entity and consult daily history (in read only) of the codes ( create, update, delete) performed by a
user . Also this history is consulted:
a. at the general level (for example, the preparation history of the last fifty-five days);
b. on an individual level (the history preparation of the coding carried out by a user with respect to an individual file).
3. Alarm management
1. ABET is second category n and Year Old manage one subcategory of alarms: technical alarms, alarms business and its sub
5
mixed alarms ;
6
2. The business alarms appear at least in English, but may also appear in Dutch and French ;
3. Each business alarm a period of treatment is associated with the user. If the alarm has not been treated after that period, the
ABET notifies the users thereof ;
4. A business alarm is pending, is not accessible to treatment by another user. This alarm must be released, however, by an
administrator ;
5. The ABET shows on the PC ' s of users only by the clerk entity and certain business alarms. The technical alarms are
registered in the system, but are not on the user's screen ;
6. The ABET can increase the impact of a critical business alarm by distributing an audio signal;
7. The ABET makes it possible to create mixed alarms and manage. The clerk entities determined in cooperation with the
contractor at the beginning of the agreement and not later than 60 days after the beginning of the beginning of the
implementation phase the list of mixed alarms;
8. The clerk entities may amend the list of mixed alarms in the course of the contract. The programming of new mixed alarms or
modification thereof may be invoiced by the contractor to the unit price per person / day given on page 5/6 of the inventory ;
9. The ABET is maximum ( minimum 3 and maximum 10) treatment levels for business alarms grant by order of urgency and
importance (different colors for the window for overall control ... ).
4. Management of schedules
The ABET must at least meet the following requirements relating to the timetable of the person under ET :
1. The ABET can business manage alarms linked to the timetable, type " must go " , " must return " , " must go " and " may return
";
2. The ABET can at least five Managing schedules per day for a particular person under ET ;
3. The ABET can manage schedules for more than 24 hours for a particular person under ET ;
https://translate.googleusercontent.com/translate_f 12/29
6/26/2017 https://translate.googleusercontent.com/translate_f
4. The ABET allows easy synchronization of timetables with the ITM. The ABET detects when synchronization fails and
undertakes a new attempt at synchronization within a predetermined number of minutes .
1. The clerk entities to the variables that determine an unjustified delay , parameterized according to a certain grace period.
6. information T ables
The screens are provided for this purpose, provide useful information. The following information must be assured access:
4. the information relating to the alarms and states that the rate of interest to be determined by the use of different colors (can be
changed by the user);
8. on the basis of an alarm, the log ( the set of operations which were carried out by an agent with respect to such alarm).
7. Screen "lists"
1. The display " frames " displays lists of all persons under electronic surveillance by controlled entity , with at least the filters :
"decision phase", "activation phase", "execution", "closure phase", "activation of the day", "with business alarms awaiting
processing "," technical alarms pending treatment "," all " and " closing day " ;
10. A ll other phone numbers and addresses that can be recorded with the person contact ;
11. D Atum and hour of the beginning and end of the electronic surveillance,
12. The serial numbers of the sequentially made available ITM with hour, minute and date of the a ctivation and deactivation ;
9. Screen "timetable"
The "timetable" shows the schedules of the people under electronic surveillance:
1. The c configuring, of the individual timetable (schedule). Using that screen all need time segments can be entered for the entire
duration of the monitoring period ;
2. The ABET should in particular allow the schedule that a person under electronic surveillance may control zone but not
necessarily have to leave ;
3. The ABET should in particular allow the schedule that a person under electronic surveillance must leave his control zone or
should remain in his control zone .
The screen shows the individual situation of the individual data of the person under electronic surveillance:
1. A detailed screen should give the staff responsible for the audit, immediate ly ask aware of the situation of each individual
supervised (rapid transition from general monitoring to individual control);
2. D it screen displays continuous information on the most critical business alarm and . For example, is the person under
surveillance at home detected or not? When he is not at home, it is a planned absence or not; is the ABET in operation; is the
ITM into operation; sends the ITM1 and / or the ITM2 information to the ABET ; the GPRS network is operational , it is the TPI
still attached to the individual, etc.?
https://translate.googleusercontent.com/translate_f 13/29
6/26/2017 https://translate.googleusercontent.com/translate_f
11. Expenditure reports
The management of records per person supervised by an administrator or by typology, etc. are planned in a number of different
forms.:
1. in the form of daily reports, according to the modalities (. e-mail, intranet, fax, etc.) of each controlled entity are transferred to
their departments or any they have some external people;
2. in the form of periodic reports, the duration of which is determined by each controlled entity, also be transmitted according to
modalities (email, intranet, fax, etc.) determined by each controlled entity to their managements or only by those selected
external people;
3. in the form of reports, at the request of any entity controlled, according to the modalities (email, intranet, fax, etc.) determined
by the entity controlled by their management.
1. The ABET illustrates d e registers and logs, composed of the whole of data , which is by the ABET administered (more
specifically the business and technical alarms, alarms) with respect to a particular individual can for a certain period of time.
They allow a view on to the whole situation of an individual with the purpose of judicial review ;
2. D e registers and logs will be kept by the server. If necessary, they must be readily accessible for consultation via the PC ' s
users . This consultation is to be possible using the https protocol ;
3. Such records and logs should be drawn up for each person under supervision by manager, by typology, a business alarm, a
technical alarm ... At regular intervals, these records will be transferred to a backup device;
4. In these registers and logs, must also be provided for each user by the executed / applied for operation, during such a period of
at least two (2) months.
The contractor ABET must adapt to all elements of reporting and statistics requested by the controlled entities to remove. The layout
of the reports and statistics extracted from the ABET should be adjusted depending on the desiderata of each controlled entity. They
may contain an entry for the contractor in any case, whatever the form used.
6. Data processing
1. generalities
The controlled entities can not determine the number of decisions of entry for ET. Constant adaptation to the needs of the judicial or
administrative authorities is necessary . Fluctuations in the number of offenders under ET should therefore be made in the course of a
year and from one year to another . The increased memory space resulting, caused no additional cost .
2. Property Data
1. Data from the clerk entities ( "the Information") knows the contractor and processed, should be regarded as confidential
information;
2. These data include data collected by ABET , used, processed, stored and gen erated data;
3. The clerk entities are and remain the sole and exclusive owner of their data.
The contractor shows that he (or his subcontractor (s)) may not be forced to transfer the processed data to a state outside the EU
after given action based on specific legislation. Such a transfer may take place only with written notice of the employee entities in the
manner and with the express consent of all controlled entities required by the government.
1. The contractor will receive a limited license to the data, so solely with the intention to provide the services of ABET, including a
right to collect the data within the necessary boundaries, process, store, generate and to show;
2. The contractor keeps the data in the strictest confidentiality by using the appropriate level of attention and defined in
accordance with its obligations under the SLA to prevent unauthorized access, use or disclosure or loss of data;
3. The contractor may not use the data, sell, rent, transfer, distribute, publish or make available for its own purposes or for the
benefit of anyone other than the controlled entity in question.
The contractor shall provide the clerk entities, within two working days of the request, free of charge and without any conditions or
any risk, an extract of their data in the format specified by the controlled entities. This should be done over the SFTP protocol agreed
drop servers (one per-operated entity);
2. The contractor is responsible for recovering data if the service would be interrupted;
3. The contractor must keep a simultaneous backup of the data at any time can be repaired within two hours;
4. The contractor must daily to save a copy of the backup data is applied to another server where the same security and
confidentiality rules as the original data.
7. Loss of data
1. In the event of any act, error, forgetfulness, negligence, fault or breach the security, confidentiality, data integrity or physical,
technical, administrative and organizational security measures implemented by the contractor with regard to the protection of
safety, confidentiality or integrity of the data at risk or could af fect, the contractor should as appropriate:
a. As soon as possible but not later than 24 hours after the knowledge of that event, bring the controlled entities on the
height;
b. The clerk entities cooperate in the investigation of the event, including through the provision of relevant documents, logs,
reports and other materials required to comply with applicable law or requested by the clerk entities;
c. take all necessary measures to carry out or to adhere to the legislation which applies to that event;
https://translate.googleusercontent.com/translate_f 14/29
6/26/2017 https://translate.googleusercontent.com/translate_f
d. The lost data without cost to the employee entities, recreate, so in the manner determined by the controlled entities
according to the calendar;
e. The clerk entities with a detailed plan within 10 calendar days of the event, which spells out the measures which the
contractor will take to ensure that the event is still occurring in the future. This document contains a description of the
nature of the loss, a list of the data which has been af fected and the known or approximate date of loss;
2. The contractor is also made to the related data breaches obligations contained in the General Data Protection Regulation of
April 27, 2016, needs to comply as soon as it enters into force.
2. The contractor must set up a redundant system that enables uninterrupted service. The tender specifies the architecture which
is made available, and the DRP (Disaster Recovery Plan) for its data centers.
2. Availability of ABET
1. definitions
"Reference Month" : month to which the report / calculation relates. The number of weeks for the reference month is always equal to
4:33.
"Actual availability" means the total number of minutes of the reference month of ABET was actually available to authorized users
and could be used in its entirety .
"Maintenance Panel" : the total number of minutes of the reference month which relates to the (consecutive) day (s) and the (de) u
(u) r (s) to which the contractor will perform the maintenance: [day (s), and u (u) r (s)].
"Scheduled unavailability" : the total number of minutes of the reference month which relate to the maintenance window. The number
of minutes does not necessarily reflect the maintenance window .
"Planned availability" means the total number of minutes of the reference month minus the total number of minutes relating to the
planned unavailability .
"Performance Credit" means the credit owed to the contractor-operated entities in the context of non-compliance standard levels.
"Rental of GTET": the price of the ITM and the ABET for the reference month.
2. maintenance W indow
The tenderer provided in Part C of the tender successive day (s) and (the) u (u) r (s) to which he and the contractor would carry out
maintenance [day (s) and (u) r (and )].
The subscriber defines a maintenance window, with a minimum duration, which takes place outside the working days, subject to prior
approval of the provisioned entities.
3. scheduled unavailability
The tenderer provided in Part C of the tender , the total number of minutes per month related to the maintenance window .
The subscriber defines a scheduled unavailability with a minimum duration, which is carried out between 00.00 and 04.00, subject to
prior approval of the provisioned entities.
The ABET should be available for 100% of the planned availability to authorized users and can be used normally .
5. Calculation
(Actual availability / scheduled availability) * 100 = availability percentage (rounded to two decimal places).
6. performance Credit
1. If the availability percentage is higher than 99.98%, there is no credit performance due to the actuated entities;
2. If the availability percentage is lower than or equal to 99.98%, the contractor is due a service credit in the amount of 10% of the
rent of the GTET (as calculated on the basis of the reference month) for each deficit of 1% on the availability percentage after
rounding down.
7. calculation example
Suppose a maintenance window on Sunday from 00:00 am to 6:00 pm Eastern Standard Time, one unavailability of 240
minutes. That is an unavailability scheduled for June of 1040 minutes (1040 = 4.33 * 240 stated that a month consists of 52/12
weeks or 4,33));
The planned availability is equal to 42160 minutes (the total number of minutes of June 2014, 43200, min 1040 min scheduled
unavailability);
Suppose the actual availability is 41 400 minutes. The availability percentage is calculated as follows: (41 400/42 160) * 100 =
98.20%;
The difference between the standard o f 99.98%, and the availability percentage of 98.20% = 1.78%;
The difference of 1.78% is greater than 1%, but less than 2%; Consequently, the contractor for the reference month is due to
an achievement of credit in the amount of 10% of the rent of the GTET .
"Reference Month" : month to which the report / calculation relates. The number of weeks for the reference month is always equal to
4:33.
" Response time " means the time interval between the moment when a request is received at the contractor and the moment when
the answer to this request with the contractor. The measured time therefore does not include the time required for transport between
https://translate.googleusercontent.com/translate_f 15/29
6/26/2017 https://translate.googleusercontent.com/translate_f
ABET and operated entities, nor the time required for processing by the networks operated entities.
"Total transactions' : the total number of transactions carried out during the reference month.
"Transaction" or "T ransactions" : retrieve a web page or web of ABET .
"Rental of GTET": the price of the ITM and the ABET for the reference month.
The transactions have a measured response time of 3 seconds or less for 100% of the time reference of each month during the
period of ABET is available.
3. Calculation
(Total transactions - total transactions that do not meet the standard) / total transactions) * 100 = response time percentage (rounded
to two decimal places).
4. performance Credit
a. If the answer time rate is higher than 95.00%, there is no credit performance due to the actuated entities;
b. If the answer time percentage is lower than or equal to 95.00%, the contractor is due a service credit in the amount of 1% of
the rent of the GTET (as calculated on the basis of the reference month) for each deficit of 1% based on the response time
percentage after rounding down.
5. calculation example
Suppose the total transactions that do not meet the standard of 100% is 2274;
The response time is calculated as follows: ((44 252-2274) / 44,252) x 100 = 94.86%;
The difference between the standard o f 95.01%, and the response time percentage of 94.86% = 0.14%;
The difference of 0.14% is less than 1% ; therefore the contractor owes no performance credit.
"Reference Month" : month to which the report / calculation relates. The number of weeks for the reference month is always equal to
4:33.
"Total of the problems : the total number of problems that occurred during the reference month.
"Rental of GTET": the price of the ITM and the ABET for the reference month.
"Degree of severity" means the degree of severity defined in paragraph 10.2.6.
The assignee of the problems as received being confirmed for 100% of the time of the reference month, in accordance with the
response time required for the degree of seriousness of the problem.
3. Calculation
(Total of issues - total problems that do not meet the standard) / total issues) * 100 = percentage answered problems (rounded to two
decimal places). Note: This calculation must be made by degree of severity of the problem.
4. performance Credit
1. If the percentage answered problems is higher than 99.00%, no performance credit is payable to the clerk entities;
2. If the percentage answered problems is less than or equal to 99.00%, the contractor is due a service credit in the amount of
1% of the rent of the GTET (as calculated on the basis of the reference month) for each deficit of a full percentage point the
percentage answered problems.
1. If the percentage answered problems is higher than 90.00%, no performance credit is payable to the clerk entities;
2. If the percentage answered problems is less than or equal to 90.00%, the contractor will pay a credit performance in the
amount of 0.5% of the rent of the GTET (as calculated on the basis of the reference month) for each of a shortage full
percentage point in the proportion answered problems.
Suppose the total number of problems that do not meet the standard of 100%, is 4;
The percentage answered problems is calculated as follows: ((71-4) / 71) * 100 = 94.37%;
The difference between the standard o f 99.00% and the percentage answered problems of 94.37% = 4.64%;
The difference of 4.64% is greater than 4%, but less than 5%; therefore the contractor for the reference month owes a
performance credit amounting to 4% of the rent of the GTET .
"Reference Month" : month to which the report / calculation relates. The number of weeks for the reference month is always equal to
4:33.
"Total of trouble" : the total number of problems that occurred during the reference month.
"Rental of GTET": the price of the ITM and the ABET for the reference month.
"Degree of severity" means : the degree of severity defined in paragraph 10.2.6.
https://translate.googleusercontent.com/translate_f 16/29
6/26/2017 https://translate.googleusercontent.com/translate_f
The contractor solves the problems on for 100% of the time of the reference month, in accordance with the dissolution time which is
required for the degree of seriousness of the problem.
3. Calculation
(Total of the problems - total of the problems that do not conform to the standard) / total of the problems) * 100 = percentage of
solved problems (rounded of f to two de cimal places). Note: This calculation must be made by degree of severity of the problem.
4. performance Credit
1. If the percentage of solved problems is higher than 99.00%, no performance credit is due to the controlled entities;
2. If the percentage of solved problems is less than or equal to 99.00%, the contractor is due a service credit in the amount of 5%
of the rent of the GTET (as calculated on the basis of the reference month) for each deficit of a full percentage point the
percentage answered problems.
1. If the percentage of solved problems is higher than 90.00%, no performance credit is due to the controlled entities;
2. If the percentage of solved problems is less than or equal to 90.00%, the contractor is due a service credit in the amount of 1%
of the rent of the GTET (as calculated on the basis of the reference month) for each deficit of a full percentage point on the
percentage of solved problems.
Suppose the total number of problems that do not meet the standard of 100%, is 2;
The percentage of dissolved problems is calculated as follows: ((18-2) / 18) * 100 = 88.89%;
The difference between the standard o f 90.00%, and the percentage of solved problems of 88.89% = 1.11%;
The difference is greater than 1%, but less than 2%; Consequently, the contractor for the reference month is due to an
achievement of credit in the amount of 1% of the rent of the GTET .
1. ABET is considered available when the W eb application, database and web services " alive " are .
2. The availability of the service is measured by in order to carry out a simulation, the 5 minutes, which controls the above-
mentioned.
3. The performance is measured on the basis of the daily logs of the middleware.
1. The results of the monitoring of availability are always available for 24 hours via the web application of the ABET and
accessible to users with the role "administrator" or "administrator".
2. The contractor shall provide a monthly report (by the 15th day of the following month) on the availability and performance of
ABET.
3. The contractor shall provide a report (by the 15th day of the month following the end of the year cycle). The format of the report
will be determined in consultation with the contracting authority and shall contain at least the following information:
c. the actions undertaken by the Contractor or will take to achieve the standard levels of service;
4. The contractor and the contracting authority shall meet at least once a month.
1. Up to four times a year, the Contracting Authority may audit the monitoring and measurement to determine whether the
standard levels are fully achieved for the service;
2. If it is determined that any performan ce due credit was not paid to the employee entity, the Contractor shall immediately
reimburse the clerk entities related performance credit.
1. If the contractor's report on the level of service is not provided within the time limits, the level of service for calculating the credit
performance is regarded as utterly inadequate.
2. The contractor proves that he is making every effort to minimize the impact or duration of any power interruption and any
interruption or degradation of service. However, this does not af fect the imposition of the aforementioned penalties.
2. The bidder explained in the tender which communication modalities are used, and the safety level is applicable;
3. The contractor will follow during the execution of the contract permanently technologies, standards and norms applied in the
services sector. He will proactively inform the clerk entities on all relevant aspects of the preparation, introduction and use of
any new technologies, standards and norms in the context of the services;
4. The ITM and MTK do for any internal or external wireless communication of data, including the communication of data to the
ABET, use as secure as possible encoding and crypteersysteem according to the current state of technology: this is used
international standards (no proprietary technology) and at least seven levels achieved for all the algorithms and key lengths
according to ECRYPT II guidelines ( http://www.keylength.com/en/3/ ). In case a new version of a common international
standard is published or recommendation Encrypt III or higher is published, the ABET contractor must adapt to the new
standard within 6 months after the publication unless explicit rejection by the contracting authority. Suggestions are in
http://www.enisa.europa.eu/activities/id entity-and-trust/library/deliverables/algorithms-key-sizes-and-parameters-
report/at_download/fullReport. The subscriber gives to be used for all the safety devices on which algorithms and key lengths .
2. Safety ABET
1. Control and location of the ABET
1. ABET is fully controlled, managed and supervised by the contractor in compliance with the request of the contracting authority;
2. The tenderer shall inform the clerk entities about the exact location of the servers of the ABET (including the database) and
different environments (production, acc eptance ...);
3. These servers are housed in a data center located in the European Union from a supplier in an EU Member State with
European legislation on data protection or under the national law of a Member State of the Union ;
4. The applicable Belgian laws on data protection apply. The contractor also respects the General Data Protection Regulation
once it enters into force: http://www.consilium.europa.eu/en/polic ies/data-protection-reform/data-protection-regulation/ ;
5. If the contractor does subcontractors, mentions it in his tender . The identity of the bidder and the portion of the contract which
will be subcontracted to the subcontra ctor in question must be explicitly described and detailed in the tender of the tenderer.
The contractor for the execution of the services which are the subject of this contract only appeal to the subcontractors that
were expressly mentioned in the tender submitted the tenderer to participate in the mission. The client reserves the right to
review at any time the qualifications specified subcontractor (s) and assess. Such subcontracting the contractor will not be
released from his obligations towards the principal. The contractor will remain fully liable to the Client for the performance of
the sub-contractor of its obligations under the implementation of the agreement. Nothing in the agreement between the
contractor and a subcontractor will establish a contractual relationship between the contracting authority or a controlled entity
and di e subcontractor . The opdrachtne mer will oblige any subcontractor to comply with all provisions of these specifications.
A subcontractor will not bring more costs involved for the client ;
6. Any change of subcontractors during the execution of the services requires a prior written agreement of the contracting
authority ;
7. To ensure optimum delivery of services during the performance of the contract the contractor constantly follows the
technologies, standards and norms applied in the services sector. He will proactively inform the customer about all relevant
aspects of the preparation, introduction and use of any new technologies, standards and norms in the context of the services.
2. Specifications
1. The contractor secures access and use of the ABET by means of protocols in accordance with the practice in this regard;
2. The contractor uses effective controls to protect against unauthorized physical and electronic access to the operating system
and the application s of the contractor as well as the confidential information of customers so as to provide reasonable
assurance that access to the systems and the customer data is limited to authorized persons and that the confidential
information of the customers are protected from any use that is inconsistent with its purpose;
3. Without prejudice to the obligation of the contractor on the protection of the data, which more is described in detail here, the
contractor is responsible for the creation and maintenance of a program for the protection of the information (data privacy) (eg :
ISO270XY) and information security (information security program), taking into account the physical, technical, administrative
and organizational security measures;
5. For communication with the ITM, the MTK and operated entities , use the ABET as secure as possible encoding and
crypteersysteem according to the current state of technology: procedure using international standards (no proprietary
technology) and at least level 7 achieved for all the algorithms and key lengths according to ECRYPT II guidelines (
http://www.keylength.com/en/3/ ). In case a new version of a common international standard is published or recommendation
Encrypt III or higher is published, the ABET contractor must adapt to the new standard within 6 months after the publication
unless explicit rejection by the contracting authority. Suggestions are in http://www.enisa.europa.eu/activities/identity-and-
trust/library/deliverables/algorithms-key-sizes-and-parameters-report/at_download/fullReport. The subscriber gives to be used
for all the safety devices on which algorithms and key lengths ;
8. The contractor ABET protect against anticipated threats or hazards to the security or integrity of the data;
9. The contractor ABET protects against unauthorized distribution, unauthorized access and unauthorized use of data;
10. The contractor shall ensure that all workers, as the case agents and subcontractors of the contractor to abide by all of the
foregoing;
https://translate.googleusercontent.com/translate_f 18/29
6/26/2017 https://translate.googleusercontent.com/translate_f
13. The contractor shall ensure that the equipment and networks controlled entities do not become infected with a virus (computer
viruses, malware or similar elements) using the ABET. If an employee entity is infected with a virus following the use of ABET,
the Contractor shall reimburse the employee entity concerned for the actual costs incurred to remove the virus and the damage
caused. The total cost includes also the cost of the persons employed by the controlled entity in question.
3. Audits of GTET
1. Audit by the clerk entities
1. At least once a year, let the clerk entities perform a complete audit of the GTET, including the program for the protection of the
data and the program for the information security of the contractor;
b. the up-to-dateness of the used information security (eg OW ASP top 10.) according to the state of the technology;
c. evaluating the used encryption algorithms and key lengths against the latest vulnerabilities in such systems;
d. Conformity and reliability of the ITM, more specifically MTTF (mean time to failure) and MTBF (mean time between
failures);
f. The inventory of all the data needed to calculate the penalties, and the MTTF and MTBF .
3. Instead of an on-site audit commits the contractor undertakes to complete an audit questionnaire provided by the contracting
authority at the request of the contracting authority within 45 calendar days of receipt of the request related to the contractor for
the protection program the data and the security of the information.
2. Audit conclusions
1. The contractor will implement appropriate security measures identified by the contracting authority following an audit of the
program for the protection of data and the security of the information.
8. INTEGRATION / CUSTOMIZATION
1. SISET compound
1. General
1. SISET CRM is a web application that allows you to manage individuals under electronic surveillance administrative clerk
entities;
2. The current version of SISET communicates with other external applications via an integration platform (SIP) by relying on the
PSI Web services in paragraph 8 listed are .1.4. For communication between ABET and SIP requires a site-to-site VPN
connection between ABET and the data center of the current supplier of SISET. The contractor must provide a suitable IP
range and the installation of the required certificates on the ABET servers ;
5. The web application of ABET should as a standalone application allowing all steps necessary for the proper management of
electronic surveillance perform.
6. On top of the application layer , the ABET must webservices provide for communication with current SISET ( via the integration
platform ) . The required Web services are described below p unt 8.1.4 . All these web services should be available at the
latest at the time ABET is in production ;
7. On top of the application layer, the ABET must also allow all the steps necessary for the proper management of the exportable
electronic monitoring via a new / evolved web application from the clerk entities that receives the required the ABET data via
web services and sent to the ABET . These Web services must meet the crit eria of 8.1.3
8. SISET for the ABET authentic source signal faire data on the of fender and the schedules of the individual;
9. SISET in ABET should be able to adjust the status of alarms which an employee entity has decided that they are treated in
SISET.
12. The contractor makes a detailed schedule for the connection to the current SISET (see point 8 .1.4) and the web services that
meet the criteria in paragraph 8 .1.3 and should allow long term the sound management of electronic surveillance completely to
carry out, via a new / ge volueerde web application of the served entities ;
13. The Web services are an integral part o f the definition of ABET (see default levels);
14. There is no place migration of the database from the old to the new ABET. The active mandates in SISET migrate to the ABET
by a synchronization from SISET .
To get a picture of the data flow between the current SISET and ABET, find the tenderer Annex 8 is a table showing the data flow
between the current SISET , the SIP and the current application for the manag ement of electronic monitoring (EMS) .
https://translate.googleusercontent.com/translate_f 19/29
6/26/2017 https://translate.googleusercontent.com/translate_f
3. Web services to be
In a later version of SISET will be communicated to ABET through Web services that must comply with the following characteristics.
The contractor will serve to provide these web services.
1. Business oriented
If an employee entity instance adds information about a person (name, address, order, etc.), they only used one business
service and not a sequence of calling services that require a thorough understanding of the requirements of the internal flow
of ABET.
2. Cookbook
The cookbook describes the sequence and content of the call services to complete a specific business need.
3. Business rules
1. Regardless of the availability of business-oriented services provided by the contractor documentation relating to the business
rules of ABET.
For example, when a certain ET technology is implemented, the document defines the conditions (requirements) to carry this
technology.
4. push notifications
1. The ABET should be able to send events (integration platform) Siset, where they will be treated through a handle_event
service;
2. The reports are permanently on the side of the transmitter so that no loss of any messages in a span of the integration
platform.
5. Agnostic
1. The services must be agnostic (agnosticism). They must be compatible with the common systems without which requires
special adaptations.
6. performance
1. The tenderer shall inform the clerk entities in the tender for the maximum load that can handle web services;
2. The tenderer shall inform the clerk entities in the tender on the expected response times for a given service.
7. Scalability (Scalability)
Since the Belgian Government relies heavily on the use of the ankle to reduce the prison population, the system must be flexible
enough to manage up to 5,000 people simultaneously under electronic surveillance .
8. WS-Security
Developed web services by the contractor using the security protocol WS-Security .
WS-Security defines three main mechanisms:
How SOAP messages must be signed to ensure integrity? The signed messages also provide the repudiation (if you are using
a secure communication channel and a precise time from an external source: NTP or similar);
How SOAP messages are encrypted to ensure confidentiality?
How are security tokens (security tokens) to be installed to verify the identity of the sender?
The specifications make a variety of formats of signature, encryption algorithms and numerous domains trust (trust domains) as
possible and open to various types of security tokens, such as:
X.509 certificates;
Kerberos tickets;
User ID / Password credentials;
SAML Assertions, and;
custom-defined tokens.
The formats of tokens and semantics defined in the documents relating to linked profiles.
WS-Security security elements comprises in the header of a SOAP message that work on the application level (application layer) in
the Internet model.
These mechanisms are in themselves not a complete security solution for Web services . Therefore, the contracting authority
imposes on certain minimums. These specifications are building blocks that can be used in combination with other extensions of web
services and application protocols for a wide variety of security models and security technologies allow. Generally provides WSS no
self security guarantee . In the implementation and the use of the framework and the syntax of the contractor must ensure that the
result is not vulnerable.
The key , the trust bootstrapping and technical details ( numbers, formats , algorithms ) are outside the scope of WS-Security.
The contractor uses the most secure possible coding and crypteersysteem according to the current state of technology: this is made
of international standards use (no proprietary technology) and at least level 7 achieved for all the algorithms and key lengths
according to ECRYPT II guidelines ( http://www.keylength.com/en/3/ ). In case a new version of a common international standard is
published or recommendation Encrypt III or higher is published, the ABET contractor must adapt to the new standard within 6 months
after the publication unless explicit rejection by the contracting authority. Suggestions are in
http://www.enisa.europa.eu/activities/id entity-and-trust/library/deliverables/algorithms-key-sizes-and-parameters-
report/at_download/fullReport. The subscriber gives to be used for all the safety devices on which algorithms and key lengths.
1. generalities
In this section the various web services are described which are necessary at this time for the integration with Siset. These services
must be provided by the ABET. Eventually the ABET will have to "push" the events to SISET, instead of SISET they will pick up (
"pull").
https://translate.googleusercontent.com/translate_f 20/29
6/26/2017 https://translate.googleusercontent.com/translate_f
1. Safety
2. error Codes
The following error codes are applicable to all services described below . The code serves as a unique key .
Code message Reason error type
The message sent by the client is
invalid. It does not validate against the
1000 Schema validation error XML schema ERROR
An external service provider returned a
Runtime error from SOAP fault, not equal to a business
4000 provider error. ERROR
The endpoint URI used to contact the
service provider is invalid. This
4010 Invalid provider URI Indicates a configuration error . ERROR
The service provider can not be
Reached, does not respond within a
timeout, or does not respond with a
4020 Error calling the provider SOAP message. ERROR
The service provider has thrown a
validation error. Your call has not been
4030 provider validation processed correctly. ERROR
The message sent by the client was
processed, for example to add metadata,
or to wrap it into other XML How many
2000 Enrichment error followers during an error occurred ERROR
3000 Transformation error A data transformation error occurred ERROR
Upon initializing the service upon
receipt of the consumer messages, an
9000 Initialization error error occurred. ERROR
An unexpected error occurred during
9100 service error processing ERROR
An unexpected error occurred during
9200 service error processing ERROR
An unexpected error occurred during
9300 service error processing ERROR
3. Web
stating the following scenarios all Web services that provide ABET will have to integrate with current Siset. There are for the current
version of Siset not need other web than the web below .
If Annex (10) contains a compressed file with a set of Web service definitions (in WSDL format) and schema definitions of the
elements used therein (in XSD format). Only the Web services listed below are used in the shaft version of Siset.
Scenario 1: Creating justiciable standard schedule
In Siset creates a new mandate, which should result in a new litigant in ABET .
The following requests are to be executed sequentially:
Scenario 4: coupling of an existing term in Siset with an existing condemned in the ABET .
In the start-up of Siset was the Electronic Monitoring System (predecessor of the ABET) already present and it was necessary to
couple on the existing data in the two systems. By manually the technical ABET ID of an already existing individual concerned to
manually look up in the ABET, and then to introduce into SISET, can SISET the synchronization between its individual and the
corresponding object of the ABET (AS IS) technical mating on ABET ID level.
https://translate.googleusercontent.com/translate_f 21/29
6/26/2017 https://translate.googleusercontent.com/translate_f
each update the schedule, passed by SISET to ABET, a sendESMonitor Download will ensure that ABET receiving timetable
effectively activates / downloads to the appropriate device.
9. MAINTENANCE
1. generalities
1. The tenderer gives a description of the maintenance of the ITM and the ABET ;
2. She responds point by point to the specifications described in the following paragraphs.
2. Maintenance ITM
1. Action Center
1. The maintenance center is outsourced (outside the premises of the controlled entities);
2. The transfer of the ITM between the service center and operated entities is organized by the contractor;
a. delivery to the clerk of the entity ITM in perfect condition, ready for a new installation;
4. The treatment (loading and unloading) of the ITM between the transport vehicle and the areas of the served entities, and vice
versa, is performed by the supplier;
5. The contractor shall ensure that such shipments (which he hosts) are performed daily .
2. generalities
1. The contractor will organize the maintenance of the ITM before each installation;
2. should the ITM are located in the state of "refurbished like new" At each return to a controlled entity;
3. The maintenance of the ITM at least the cleaning and disinfection (including the cleaning and disinfection of the package if it is
not foldable), functionality testing, reset the upgrades and useful updates, version control, longevity the batteries, replace the
SIM cards, etc;
4. The period between the receipt of the ITM by the contractor for maintenance and return to the clerk entity shall not exceed 3
days;
5. The contractor shall ensure that the ITM package is complete before the return to the clerk entity in question;
6. The ITM to be returned by a controlled entity at the service center, be considered "used" to be and should receive
maintenance;
7. The ITM to be returned by the service center to a controlled entity, are considered to be "in perfect condition" and thus can be
used immediately for a new use;
8. The service center is responsible for the management of the stock that is returned for service.
3. Maintenance of ABET
1. The bottom of the ABET is done in accordance with the requirements as to the availability of the ABET, specified in Section 6.2
;
2. In the maintenance window, the electronic monitoring is ensured without interruption, so that the restart of the ABET, after the
maintenance window , no data will be lo st;
3. Unless otherwise agreed by the contracting authority, the contractor brings the clerk entities at least 30 days advance written
notice of any non-urgent maintenance ABET ;
4. Unless other arrangements with government contracting, brings the contractor operated entity in advance in writing of any
emergency maintenance of ABET ;
5. Unless otherwise agreed by the contracting authority on case by case basis, have the clerk entities in a non-urgent
maintenance over a period of 10 days (business days) to test any changes before the contractor implements changes in the
production environment;
a. If the reject operated entities after the test phase changes, the contractor will not apply those rejected changes to the
production environment;
b. If the clerk entities have rejected any maintenance-related changes at the end of the test phase, they will be deemed
accepted by the controlled entities and authorized the contractor to implement the changes in the production
environment;
6. The acceptance test environments of ABET must be connected to the respective environments SISET to test adjustments.
https://translate.googleusercontent.com/translate_f 22/29
6/26/2017 https://translate.googleusercontent.com/translate_f
1. generalities
1. The ABET generates two types of alarms: Alarms technical and business alarms:
a. business alarms: Alarms that provide controlled entity's ability to carry out the monitoring of persons under ET ;
b. Technical alarms: Alarms that operated entity the opportunity to carry out the monitoring of the GTET .
2. technical monitoring
1. The tenderer provided in section C of the tender an analytical list of the GTET generated alarms in particular contain a clear
description of each alarm, its classification as a technical alarm or business alarm and their classification in the light of the
proposed technologies ;
2. Tenderers are hereby informed that the controlled entities can change the classification as a business alarm in the course of
the contract;
3. The contractor is responsible for the conversion of a technical alarm in a business alarm to the clerk entity to indicate that they
must take action and thereby determine. For example, when an alarm "Battery of the ankle band almost empty" , the need to
the contractor , the controlled entity to notify of the alarm in order that the latter would carry out the technical intervention.
4. monitoring Reports
1. 15 calendar days after the end of each month the contractor provide any entity controlled electronic list (Excel type) of the
technical alarms of the reference month and this states that these are transformed into business alarms. The list includes at
least the following points:
a. date and time of the alarm;
b. Reference (s) of the individual (s) in question that are assigned to the actuated entity in question;
c. type of alarm;
d. description of the alarm;
e. expected response from the contractor;
f. response time of the contractor between the appearance of the technical alarm and take account of it by the contractor;
g. solution time between the examination and the solution;
h. Submitted Materials solution;
i. date and time of the possible transmission of technical alarm (that from one business alarm) to the clerk entity
concerned.
2. The controlled entity must consult the technical alarms.
Tenderers provide in section B of the tender price list (price per man-day) for additional assistance (eg. Changes / extensions) that
may be requested throughout the duration of the contract by the controlled entities.
Daily price for a working day of eight
profiles hours
Architect Inventory
Developer Inventory
tester Inventory
Functional Analyst Inventory
Consultant Inventory
The clerk entities may need to rely on half or full day assistance invoiced as they are used. This "man-days" are for anything deemed
necessary in the context of the requested extensions.
The annual number of man-days required is estimated at 50 days per year (all sections together).
Implementations that are delivered under the regime of supplementary assistance, are included for the duration of the contract of
guarantee, without additional costs.
In the monthly report on the level of service the receipt of the problem in 100% of cases are confirmed by the Contractor in
accordance with the deadline applicable to the severity of the problem.
In each monthly report on the level of service the problem must be in 100% of cases are resolved by the contractor in accordance
with the resolution limit for the degree of seriousness of the problem.
a. Either by calling or sending an e-mail to the technical support team of the contractor, the contractor integrates the
question in his website for the controlled entities;
b. Or by submitting a request through the website of the contractor intended for the controlled entities;
2. The technical support team application has a degree of severity according to the problem indicated by the applicant (see
description below).
https://translate.googleusercontent.com/translate_f 23/29
6/26/2017 https://translate.googleusercontent.com/translate_f
Unauthorized reproduction of all or
part of the data.
1. In case of non-telephonic requests for technical support contractor confirms the applicant's receipt of the application within the
deadline applicable to such an application;
2. If an application in connection with a problem with degree of severity 1 or 2 are not in a can be corrected in a satisfactory
manner for the applicant within the valid term solution:
b. the contractor undertakes ceaseless action to resolve the problem as quickly as possible;
c. The contractor shall provide the applicant an hourly report of the actions taken and still take steps to resolve the problem,
progress in correcting it and the time it is estimated to cost to fix the problem;
d. allows the contractor after each phase of two hours for a higher level of expertise and greater involvement of the management
of the contractor .
1. In case of non-telephonic requests for technical support contractor confirms the applicant's receipt of the application within the
deadline applicable to such an application;
2. If an application relating to a problem with severity level 3 or 4 is not on the applicant a satisfactory manner, which can only
assess the applicant can be corrected within the applicable term solution:
b. whether the applicant and the contractor will be mutually agreed on a plan to resolve the problem.
11. MANUALS
1. generalities
The contractor shall notify the clerk entities set the manuals available for the following two systems:
The manuals are aimed at ensuring that entities controlled electronic surveillance perform correctly and safely, implement and
monitor.
The situation of the staf f or the board b y process 9 , sub-process, activity and task to do;
3. The manuals for the staf f ask the staf f able to:
https://translate.googleusercontent.com/translate_f 24/29
6/26/2017 https://translate.googleusercontent.com/translate_f
Event categorize correctly;
recognize the time should be switched to the manual administration of the controlled entity;
4. The manuals for clarifying the staff, when the employee of the entity-ope rated must stop the particular procedure, or to
suspend and must rely on the operational management of the controlled entity;
5. The guides for the operational management should allow to fine-the board:
to analyze events properly under the framework of analysis provided in the manual for the operational management;
to find the correct answer on the basis of the possible answers provided in the instruction manual for operational
management;
6. The manuals explain the operational management when the operational management member must stop the analysis and
must rely on the support services of the contractor;
7. The manuals are updated each time by the contractor shall be amended as a member of the ABET (processes, sub-processes,
activities and tasks);
8. If the new element was requested by the contracting authority, the contractor may invoice adjustment to the communities at a
flat rate of 45 euros per 1,500 characters;
9. There is provided a classification code and a date (follow-up versions of the manual);
10. The manuals are written in Dutch and French, each in a separate document;
11. The manuals are in color and contain the screen images (screenshots) in Dutch and French;
12. The manuals are at least seven calendar days before the date of the training made available to the employee entity;
13. If a procedure is modified, the guides are on hand for at least 7 calendar days available to the clerk entities;
The situation of the staf f or board mem ber for each process, sub-process, activity and task to do;
3. The manuals for the staf f should enable the committed staf f:
The messages that are generated by the ITM and the MTK to understand during the installation;
A safety diagnosis can state (damage to the material, degradation, loss of signal, ...);
Knowing when the scheduled procedure should be stopped or suspended and then either be switched to manual
administrative management which are made available by the operator entity , or rely on the operational management;
4. The manuals for clarifying the staff, when the employee of the entity-ope rated must stop the particular procedure, or to
suspend and must rely on the operational management of the controlled entity;
5. The manuals (for ITM) have to undertake in the state board for the operational management:
to analyze events properly under the framework of analysis provided in the manual for the operational management;
to find the correct answer on the basis of the possible answers provided in the instruction manual for operational
management;
6. The manuals (for ITM) make clear when the operational management must stop the analysis and must rely on the support of
the contractor;
7. The manuals are updated by the contractor each time a member of the ITM and changes of MTK (processes, sub-processes,
activities and tasks);
8. If the new element was requested by the contracting authority, the contractor may invoice adjustment to the communities at a
flat rate of 45 euros per 1,500 characters;
9. There is provided a classification code and a date (follow-up versions of the manual);
10. The manuals are written in Dutch and French, each in a separate document;
11. The manuals are in color and contain pictures of the operations .;
12. The manuals are at least seven calendar days before the date of the training made available to the employee entity;
13. If a procedure is modified, the guides are on hand for at least 7 calendar days available to the clerk entities;
12. TRAINING
https://translate.googleusercontent.com/translate_f 25/29
6/26/2017 https://translate.googleusercontent.com/translate_f
12. TRAINING
1. beforehand
The contractor is obliged to introduce a system of continuous training, which can make the various actors as much as possible of the
entities controlled using the various features of the system.
2. Organization
The contractor is required to provide training for the use of the following systems:
3. ABET training
1. The courses are presented separately in Dutch and French;
2. The programs are supported by educational materials in Dutch and French that at least the manual (see previous point
regarding the manuals) and the evaluation test;
3. The educational material is transmitted for at least 7 days prior to the date of the program to the controlled entity in question;
5. For the training of agents: the courses are held three times for each language on the same subject in three weeks (with three
different audiences). For the training of members of operational management: the courses are held twice each language on the
same subject (twice with different audiences). Thus, each employee entity may organize themselves so that all employee s
could follow the course;
7. At the end of the course, participants should have acquired the following skills;
a. To train staff:
know when the procedure in which it is provided, it must be put stop or suspended and if an action needs to be
done in the operational management.
analyze the events correctly under the framework of analysis provided in the manual for the operational
management;
the correct answer is found on the basis of the possible answers provided in the instruction manual for operational
management;
know when the analysis must stop and put to be called on the service support of the contractor;
8. The programs are the subject of an evaluation test on the processing of the information given to the staff of the clerk entities.
This test is organized by program group and managed by the contractor , who report on it to the clerk entity in question;
a. in the introduction of the new GTET (no later than 15 days prior to the introduction);
b. every introduction of new functionalities (no later than 15 calendar days prior to introduction) unless the contracting
authority exempts him from;
c. when an employee entity that calls (up to 1 time per year for each type of GTET and no later than 60 calendar days after
the request.)
11. The contractor shall ensure that the training be organized so that they do not interfere with the proper functioning of the
controlled entities.
2. The programs are supported by educational materials in Dutch and French that at least the guide (see next point regarding the
manuals) and the evaluation test;
3. The educational material is transmitted for at least 7 days prior to the date of the program to the controlled entity in question;
5. For the training of agents: the courses are held three times for each language on the same subject in three weeks (with three
different audiences). For the training of members of operational management: the courses are held twice each language on the
same subject (twice with different audiences). Thus, each employee entity may organize themselves so that all employee s
could follow the course;
7. At the end of the course, participants should have acquired the following skills;
https://translate.googleusercontent.com/translate_f 26/29
6/26/2017 https://translate.googleusercontent.com/translate_f
a. To train staff:
The events that the ITM and the MTK generates understand during the installation;
a safety diagnosis may make relative to the ITM and the MTK (damage to the material, degradation, loss of signal,
...);
know when the procedure provided for should be discontinued or suspended and put where either be switched to
the manual on administrative management for the controlled entity shall be made available to either rely on the
operational management;
b. For the training of the members of the operational management (only for the ITM):
to analyze events properly under the framework of analysis provided in the manual for the operational
management;
to find the correct answer on the basis of the possible answers provided in the instruction manual for operational
management;
namely when the analysis must stop and must rely on the support of the contractor;
8. The programs are the subject of an evaluation test on the processing of the information given to the staff of the clerk entity
managed by a contractor whose report is submitted to the clerk entity;
a. in the introduction of the new GTET (no later than 15 days prior to the introduction);
b. every introduction of new functionalities (no later than 15 calendar days prior to introduction) unless the contracting
authority exempts him from;
c. When the clerk asks the entity (up to 1 time per year for each type of GTET and no later than 60 calendar days after the
request.)
11. The contractor shall ensure that the training be organized so that they do not interfere with the proper functioning of the
controlled entity.
1. evaluation
1. The tenderer shows descriptive document in Part C of the tender to the methodology it will follow during the start-up phase;
2. At the end of the agreement, the various databases that exist in the system that is the subject can be transferred from this
assignment so they can be used in the new management system to be set;
3. The maximum period stipulated for the replacement of the entire individual technical material that is the subject of this
Agreement shall not exceed three months (90 days) from the day after the date of receipt of the notification of the end of the
agreement by the contractor;
4. 6 months before the end of the contract the Contractor undertakes to take all appropriate measures to convert the data in CSV
format;
5. He also undertakes , at the end of the agreement to conclude a cooperation agreement with any other contractor would have
chosen a controlled entity or entities operated under a new procedure. That agreement includes in particular a realistic
schedule to facilitate the transfer of existing data to the new management at that time;
6. To this end adds the tenderer in Part C of the tender planning proposal and the methodology which highlights the critical
points that must be mastered in order to succeed the ultimate stage;
https://translate.googleusercontent.com/translate_f 27/29
6/26/2017 https://translate.googleusercontent.com/translate_f
7. At the end of the contract, the contractor shall take appropriate measures to ensure the return of all equipment of the GTET
(ITM). The dates for the return to be determined by mutual agreement with the employee entity in question;
8. to have delivered at the end of the contract, after the return of all equipment of the GTET and after all the stored data to the
clerk entities, the contractor destroys the data would have remained in his possession;
14.
15. MISCELLANEOUS
1. ITM supplies
With each new delivery of ITM the contractor delivers an Excel file with a unique identification number and the type of material.
2. MTK
1. The contractor is provided the equipment necessary for the installation of the ITM in the form of complete installation kits for
the benefit of the personnel to the ITM place at a rate of one per 50 ITM kit with a minimum of 50 kits;
2. The installation kit also contains parts which must be used at each intervention (eg: activation, intervention during measure, ...).
3. PCs
PC used by the controlled entities are provided by the controlled entity. The clerk entities will no software, add-ons, ... installed on
their PCs at the request of the contractor .
2. When one of the components of the ITM is declared corrupted, and when such damage is attributable applied to the contractor,
the maintenance clause of application, and is a penalty;
3. When a loss of components or damaged and declared irreparable and if that loss or attributable irreparable damage is to the
employee entity, the material is immediately replaced by equivalent material at the rate of the rest redemption value (initial
value minus 20% depreciation per year);
4. When one of the components of the lost or stolen ITM is later found, it is immediately reintroduced into the park equipment.
The replacement material pursuant to paragraph 1 has been charged, is returned immediately. The contractor shall draw up a
credit note for the amount paid for the replacement material;
5. On the basis of a full report of the contractor and any other information available, the controlled entity in question must decide
whether the intended material listed among the cases in point 1 , 2 or 3 falls or whether the repair clause specified in the
contract should be applied. In the event of a prolonged dispute could decide the contractor and the entity operated in concert to
appeal to an independent expert. In all cases where expert evidence is borne by the contractor .
the PCs of the entities controlled via a leased line per employee entity. That is the primary connection. The redundant
communication is via the Internet. The redundancy is provided in an automatic active / passive mode. Access via the
Internet is via the normal Internet of controlled entities. The leased lines are provided by the contractor, up to the access
point designated by the actuated entities with the operated entities;
the data centers of the supplier of the SIM cards for the communication of data via another secure leased lines are
provided by the entities operated in the data center of ABET. The contractor must be provided with a place for installation
of the CPE (type router plus firewall) of the leased lines, as well as an electric power supply for these, on which the
contractor are ABET connecting (via a UTP Ethernet port). The internal wiring between the access point where the
telecom operator enters the data center and the place where the CPE is installed is borne by the contractor. The same
goes for the cabling between the CPE and the ABET .
The data center of the telecom operator (DC-A and DC-B) are mutually redundant in an active-passive mode. The contractor
must take this into account.
2. The contracting authority will provide the SIM cards must install the Agent on the ITM to communicate over the cellular network
to the ABET;
3. SIM cards can at the minimum (2FF), micro (3FF) or nano (4FF) format delivered. The contractor specifies in its tender any
format will be used. The machine-to-machine format QFN8 can be accepted, but the preference is for SIM cards in 2FF-, 3FF-
or 4FF format.
4. The contracting authority shall notify the contractor in obtaining all required connection parameters with the configuration of the
GSM modem of the ITM (APN, authentication parameters, etc.);
5. The communication interface of the ITM (who need to communicate with the ABET) comply with the GSM network to the 3GPP
standards should, and the 3GPP TS 23.122 specification regarding network selection (PLMN selection) (http: //www .3gpp .org /
DynaReport / 23122.htm) and must be at least compatible with GSM, GPRS / EDGE and 3G (http://www .3gpp.org/);
6. The ITM that needs to communicate with the ABET , using the mobile telephon e network for the transmission of data;
7. The voice communications between the ITM and operated entities is done via the mobile phone network. The voice
communication should be in circuit mode (classic mobile telephony). The availability of an end-to-end VoIP mode will be
considered an advantage for future developments;
8. The leased lines between the data centers of the operator who provides the SIM cards and ABET is borne by the employee
entities to the extent that they run on the Belgian territory. The additional costs associated with the compound outside this
territory, are fully borne by the contractor;
https://translate.googleusercontent.com/translate_f 28/29
6/26/2017 https://translate.googleusercontent.com/translate_f
9. The tenderer specifies the required minimum bandwidth of leased lines between ABET and the data centers of the supplier of
the SIM cards. The contracting authority has a preference for the lowest possible minimum bandwidth. The cost for the
connection between ITM and ABET are borne by the employee entities. The CPE is supplied and installed by the controlled
entities, but the costs for any local wiring between the access and the equipment of the contractor shall be borne by the
contractor;
10. The tenderer states in his of fer the exa ct physical location or locations (address, floor , room) where ABET installed;
11. The ABET must be in a permanent connection to the ITM and the provisioned entities. These connections must be protected
by a coding and crypteersysteem according to the current state of technology: this is made of international standards use (no
proprietary technology) and at least level 7 is reached for all the algorithms and key lengths according to ECRYPT II guidelines
(http://www.keylength.com/en/3/). In case a new version of a common international standard is published or recommendation
Encrypt III or higher is published, the ABET contractor must adapt to the new standard within 6 months after the publication
unless explicit rejection by the contracting authority. Suggestions are in http://www.enisa.europa.eu/activities/identity-and-
trust/library/deliverables/algorithms-key-sizes-and-parameter s-report / at_download / full report . The subscriber gives to be
used for all the safety devices on which algorithms and key lengths;
12. The subscriber specifies the properties of the offered leased lines between the ABET and the provisioned entities. That should
allow us to achieve the higher level of service mentioned.
https://translate.googleusercontent.com/translate_f 29/29