South Carolina ID Theft Protection Services RFP Response September 9, 2013
Table of Contents South Carolina RFP Pricing Proposal... V. Qualifications & Experience... 2
South Carolina RFP Pricing Proposal The State of South Carolina is unique and CSID firmly believes that the 2012 exposure event as well as the RFP process through which further protection may be offered presents a genuine opportunity to highlight CSID s differentiation in the market to address South Carolina s request. In our primary RFP response, we have sought to respond to the topics requested as well as share a perspective and direction as to the disposition for the breach event to yield the best result for the State and the constituents affected. CSID is unique in this evaluation as our sole operating business is as the wholesale provider of products and services to the identity protection industry. The result for South Carolina is the ability to procure the utmost in protection, for every South Carolinian, including coverage for individuals, children, and businesses, using the most proven provider, through a sound marketing plan, at a fiscally responsible price point. Price Proposal Schedule Below are two pricing structures as requested in Section VIII in the RFP. The first is a per-person annual rate and the other is a flat rate price that serves as a maximum spend associated with the program. Both approaches are inclusive of the communications and marketing plan, call center services, individual, child, and business monitoring, and full-service restoration services to 100% of the affected population. Description Price for Initial Term Price for all Renewal Terms Per-Person Annual Price $6.00 $5.00 Guaranteed Maximum Annual Price $8,500,000.00 $6,500,000.00 Optional Schedule Per the request for pricing on Optional Services for which additional credit bureau monitoring can be provided, CSID has provided pricing structures below that include full three (3) bureau credit monitoring services in addition to the full suite of non-credit monitoring, child monitoring, business monitoring, and full-service restoration services. Description Price for Initial Term Price for all Renewal Terms Per-Person Annual Price $30.00 $26.00 Guaranteed Maximum Annual Price $33,000,000.00 $29,000,000.00 The State of South Carolina has an opportunity to bring to market the most significant program for Identity Protection in the United States. Connecting the reach of the Department of Revenue with the Global Monitoring and ID Theft Resolution services of CSID yields a program that will change the outcome of ID Theft for a large percentage of the population of the State. CSID has the experience, proven track record, and exclusive focus on Identity Protection to deliver the best possible solution to South Carolina. 3
V. Qualifications & Experience A) A brief history of experience in providing Work of similar size, scope and complexity. CONFIDENTIAL/> 4
<\END CONFIDENTIAL B) A detailed, narrative statement explaining how the Offeror has available the appropriate financial, material, equipment, facility, and personnel resources and expertise, or firm commitments to obtain them, necessary to meet all contractual requirements of this solicitation. CSID has the appropriate financial, material, equipment, facility, and personnel resources and expertise necessary to meet all contractual requirements required by South Carolina within this solicitation. CSID encourages South Carolina to review the financial statements and audits provided in the attached Financial Statements and Audit Addendum. CSID s combination of strong financials, relevant experience, and subject matter expertise ensures we are the ideal long term partner for the state of South Carolina. Our responses to this technical RFP have been intentionally crafted to reflect the most seamless deployment of Identity Theft Protection services possible while ultimately obtaining high activation rates and reducing all unnecessary costs to the state. The impact of CSID s relevant experience in helping mitigate some of the largest data breaches of the past decade can be seen in the specific manner in which we catered our RFP responses. CSID is not a marketing company and our long-term goals are fundamentally different from all other vendors within the data breach remediation industry. As an example, when SONY had a worldwide breach impacting over 77 million subscribers, CSID was able to develop a global Identity Theft Protection solution for Sony in a matter of weeks. In the case of the Texas State Comptroller s breach, in order to save the State millions of dollars in postage, CSID developed a landing page that allowed individuals who thought they might have been impacted by the breach to enter their name, DOB and last 4 of their Social Security number to see if they were impacted and thus eligible for the Identity Theft Protection services offered by the State. This enabled the State to do PSA announcements and send potential impacted citizens to the site versus mailing everyone a letter. The benefit to South Carolina is the most straightforward, efficient, and cost effective identity theft protection plan available. C) The most current financial statement, financial statements for the last three fiscal years, and information reflecting the current financial position. If there are audited financial statements meeting these requirements, these statements must be provided. Please see the attached Financial Statements and Audit Addendum. D) A detailed, narrative statement listing the three most recent, comparable contracts (including contact information) that have been performed and the general history and experience of the organization. 5
The following is a list of the three most recent data breaches CSID has helped mitigate that share similar traits to the SCDOR breach of 2012. Like South Carolina s SCDOR data breach, the following incidents affected populations of greater than 1MM persons, received a great deal of both national and international media attention and scrutiny, and required CSID to launch an identity theft protection program within a very short timeframe. CONFIDENTIAL/> 6
<\END CONFIDENTIAL E) A list of every business for which at any time during the past three year(s), Work substantially similar to those sought with this Solicitation have been performed. Err on the side of inclusion; by submitting an offer, Offeror represents that the list is complete. The following is a list of organizations that have directly partnered with CSID during the past three years to obtain our Identity Theft Protection services as a post breach solution, excluding those that have explicit non-disclosure provisions related to breach servicing. CONFIDENTIAL/> 7
<\END CONFIDENTIAL Of this list, it is worth noting that CSID has long standing breach agreements where we are the go to company for any breach services needed. For the largest of CSID s enterprise clients, our breach remediation services are invoked on a weekly basis. Furthermore, not included on this list are the marketing companies that utilize some or all of CSID s product, service, or subscriber management / platform solutions as the foundation of their own solutions. As stated throughout the body of this 8
technical proposal, CSID is the primary wholesaler of Identity Theft Protection solutions within the retail ID theft, credit monitoring, and breach response industries. F) List of failed projects, suspensions, debarments, significant litigation, and fines or administrative or regulatory actions imposed by State, Federal or local governmental agencies. CSID has not been accused of or found to be at fault for any of the business/commercial failures listed above. CSID is proud of its uninterrupted history of successful breach remediation contracts and launches. G) Key staff that will be assigned to this contract (project manager, customer service manager, etc.); include resumes. CSID s internal team of Account Management and Project Management professionals includes 18 non-executives who will be available to work directly with the state in facilitating this vendor transition. Key personnel managing these teams includes: CONFIDENTIAL/> 9
<\END CONFIDENTIAL 10