Specifications include, but are not limited to: a) Technical Requirements System Architecture: • If Web-Based System: • Capable of running on various web browsers (e.g., Google Chrome, Mozilla Completion of Higher Education Community Vendor Assessment Toolkit (HECVAT) to ensure compliance with data protection and security. • Accessibility: • Product interfaces compliant with WCAG 2.0 AA standards. b) Users The software application should accommodate multiple users with role-based access and permissions. Users should be able to log in to the system using their respective credentials and perform their designated tasks. The system should support user roles that allow for different levels of access and functionality based on the user's responsibilities. The application should provide an intuitive and user-friendly interface to ensure ease of use for all authorized users. c) Reporting/Forms, Custom Fields, Files The system should include comprehensive reporting capabilities to support data analysis and decision-making. The reporting functionality should meet the following requirements: Reports should be available in multiple formats, including on-screen viewing and downloadable options such as Excel, PDF, and Word. The system should provide predefined reports that cover key performance indicators, repair order summaries, inventory status, labor utilization, and profitability analysis. Users should have the ability to generate custom reports by selecting specific data fields, filters, and parameters. Reports should be intuitive, well-designed, and provide clear visualizations, such as charts and graphs, to facilitate data interpretation. The system should support scheduled report generation and delivery to specified recipients via email or other preferred communication channels. Firefox, Microsoft Edge, Safari). • Responsive and user-friendly experience on mobile devices (iOS and Android). • If Non-Web-Based System: • Compatible with Windows 10 or Windows 11 operating systems. • Single Sign-On (SSO) Support: • Ability to integrate with existing university credentials or centralized authentication systems. • Certifications and Security Compliance: • Provide SOC2 documentation. • Compliant with local, state, and federal data security standards. • Compliance with FERPA, GLBA, NACH, and Red Flag Regulation requirements.