Why Your EM Procurement RFP Matters More Than You Think
A well-structured Request for Proposal separates agencies that get reliable monitoring programs from agencies that spend years recovering from poor vendor selection. Electronic monitoring equipment is a 3–7 year commitment — the RFP determines which technology your officers use daily, which data you present to courts, and whether your program budget sustains or collapses under hidden costs.
This guide provides a section-by-section RFP framework specifically for GPS ankle monitoring procurement. It’s designed for county corrections departments, state DOC procurement offices, pretrial services agencies, and judicial districts issuing competitive solicitations.
Section 1: Scope of Work
Define exactly what you’re buying. Ambiguity in the SOW produces mismatched vendor proposals that can’t be compared fairly.
Essential scope elements:
- Monitoring type: GPS continuous tracking, RF home monitoring, or both
- Estimated caseload: Average active monitoring population and peak population
- Contract type: Service-bundled (daily rate) vs hardware purchase + software license
- Contract term: Initial term (typically 3 years) + renewal options (1–2 year increments)
- Deployment timeline: Pilot phase → full deployment milestones
- Geographic coverage: Jurisdictions, urban/rural mix, coverage requirements
- Program types: Pretrial, probation, parole, DV, sex offender, house arrest — list all
Section 2: Technical Requirements (Minimum Specifications)
This is the most critical section. Establish minimum technical thresholds that vendors must meet or exceed. Weak technical requirements produce proposals from vendors whose devices can’t perform in the field.
GPS/GNSS Positioning
| Requirement | Minimum Specification | Preferred Specification |
|---|---|---|
| Satellite constellations | GPS + one additional (GLONASS or Galileo) | GPS + BeiDou + GLONASS + Galileo |
| Accuracy (outdoor) | < 5 m CEP | < 2 m CEP |
| Indoor fallback | Cell tower (LBS) | WiFi + LBS + BLE |
| Position reporting interval | Configurable, minimum 5-minute option | 1-minute to 15-minute configurable |
| Time-to-first-fix (cold start) | < 60 seconds | < 35 seconds |
Cellular Communication
| Requirement | Minimum | Preferred |
|---|---|---|
| Network technology | 4G LTE | LTE-M / NB-IoT + GSM fallback |
| 2G sunset resilience | Must function post-2G/3G shutdown | Native 4G/5G-compatible IoT networks |
| Encryption | AES-128 minimum | AES-256, HTTPS/SSL end-to-end |
| eSIM support | Not required | eSIM for carrier flexibility |
Anti-Tamper Detection
| Requirement | Minimum | Preferred |
|---|---|---|
| Detection method | Strap removal and cut detection | Optical fiber or equivalent deterministic detection |
| False tamper alert rate | < 2% of all alerts | < 0.5% of all alerts |
| Detection latency | < 30 seconds from tamper to alert | < 10 seconds |
| Physical evidence | Not required | Tamper leaves permanent physical evidence on device/strap |
| Independent power | Not required | Anti-tamper operates on depleted battery |
Battery and Physical
| Requirement | Minimum | Preferred |
|---|---|---|
| Battery life (5-min GPS interval) | 48 hours | 7+ days |
| Recharge time | < 4 hours | < 2.5 hours |
| Waterproof rating | IP65 (splash-proof) | IP68 (submersible) |
| Weight (complete device) | < 200 g | < 120 g |
| Operating temperature | 0 to +45 °C | -20 to +60 °C |
| Installation time | < 5 minutes | < 30 seconds, no tools required |
Section 3: Software Platform Requirements
- Real-time dashboard: Map-based visualization of all monitored individuals with status indicators
- Alert management: Configurable alert types, priority levels, escalation rules, and officer assignment
- Geofencing: Inclusion zones, exclusion zones, buffer zones, schedule-based zones — with polygon drawing tools
- Reporting: Court-ready reports, compliance summaries, customizable date ranges, exportable formats (PDF, CSV)
- Mobile access: iOS and Android app for field officers with offline capability
- Integration: API access for integration with existing jail management, case management, or court systems
- Multi-agency: Role-based access control supporting multiple agencies, departments, or officers within a single platform instance
- Data retention: Minimum 7-year data retention for court evidence requirements
- Uptime SLA: 99.9% platform availability with documented disaster recovery procedures
Section 4: Vendor Qualification Requirements
Require vendors to demonstrate:
- Deployment history: Minimum 3 comparable deployments (similar caseload size and program type) with agency references
- Device certifications: FCC (US), CE (if international origin), IP68 (third-party waterproof certification), applicable safety certifications (IEC 62133 for battery safety, UN38.3 for shipping)
- Cybersecurity: Documented cybersecurity standards (EN 18031, SOC 2, or equivalent). Data encryption at rest and in transit
- Financial stability: 3 years of audited financial statements or equivalent evidence of business viability
- Insurance: Product liability insurance, cyber liability insurance, professional liability insurance
- Support capability: Technical support response times (4-hour critical, 24-hour standard), escalation procedures, on-site support availability
Section 5: Evaluation Criteria and Scoring
Establish a weighted scoring methodology before you open proposals. This prevents subjective selection and ensures the evaluation committee applies consistent criteria.
Recommended scoring weights:
| Criterion | Weight | What to Evaluate |
|---|---|---|
| Technical capability | 35% | Spec compliance, anti-tamper quality, battery life, positioning accuracy |
| Total cost of ownership | 25% | 3-year TCO including all hidden costs (see pricing guide) |
| Vendor experience | 15% | Deployment history, reference checks, agency testimonials |
| Software platform | 15% | Usability, features, reporting, integration, mobile capability |
| Support and training | 10% | Response times, training plan, on-site availability, SLAs |
Evaluation process:
- Pass/fail compliance check: Does proposal meet all minimum requirements in Section 2?
- Written scoring: Committee scores each qualifying proposal against criteria
- Product demonstration: Top 2–3 vendors invited for live demo (2–4 hours each)
- Reference verification: Call 2–3 references per finalist vendor
- Best and final offer: Negotiate pricing with top-ranked vendor
- Award recommendation: Committee presents scored evaluation to decision authority
Section 6: Contract Terms to Negotiate
Key terms that protect your agency:
- Performance guarantees: Uptime SLA (99.9%), maximum false alert rate, battery life warranty
- Data ownership: Agency retains full ownership of all monitoring data, exportable in standard formats upon contract termination
- Termination clause: 90-day termination for convenience with defined transition support
- Price escalation: Cap annual price increases (3–5% max) or lock pricing for contract term
- Technology refresh: Define how/when hardware is upgraded during multi-year contracts
- Liability: Vendor indemnification for device failure, data breach, or tamper detection failure
- Transition support: Vendor must provide data export, training, and 60-day parallel operation during any vendor transition
Common RFP Mistakes to Avoid
- Specifying daily rate only — doesn’t account for hidden costs; use TCO comparison instead
- No minimum anti-tamper standard — lets vendors with high false-alert devices qualify
- No battery life minimum — daily-charge devices create massive operational burden at scale
- Accepting “meets or exceeds” without verification — require third-party certification documentation, not just vendor claims
- No reference checks — always call 2–3 current agency users of the proposed equipment
- Ignoring data portability — you may need to switch vendors; ensure data export is contractually guaranteed


