Establish a standardized, volunteer registration system that will include readily available, verifiable, up-to-date information regarding the volunteer's identity, licensing, credentialing, accreditation, privileging in hospitals or other medical facilities, and background checks (criminal). The system also needs to integrate with DE TRAIN learning management system for training verification. Identify and better utilize health professional volunteers in emergencies and disasters. Provide portability, or the ability to share health volunteer information between regions and states. This system must be designed to perform primary source verification, i.e., the direct verification of a health care professional's credential(s) by the entity that issued the credential(s) or by means of a Credential Verification Organization, or a Joint Commission for the Accreditation of Health Care Organizations designated equivalent source. Additionally, the system must be able to classify health volunteers according to the Emergency Credentialing Standards, i.e., Levels 1 (volunteer possesses all of the minimum required credentials and credentials have been appropriately verified) to Level 4, (Unencumbered License, Indeterminate) Establish a health alert system that will allow us to collaborate with federal, state, territorial and city/county partners to ensure a robust interoperable platform for the rapid distribution of public health information. The system should be developed in compliance with the overarching service-oriented architecture (SOA) based technical approach completely in compliance with Public Health Information Network (PHIN) technical guidelines. Some of the services may or may not exist during the development of the systems, but it is required that the delivered product should satisfy all the functional requirements identified. The necessary web services from the developed modules should be published for consumption by the other modules in order for the overall mission to be accomplished. Appropriate security and authorization protocols should be followed to the best of the available technology. Bidders are expected to describe how their proposed solutions meet the requirements described in this section.