Victorian government backtracks on eServices panel
- 15 July, 2011 10:12
The Victorian government has backtracked on changes to its eServices panel, announcing a restructure that will be finalised by the end of October.
Companies represented on the panel are eligible to bid for contracts to provide ICT services to Victorian departments and agencies. The previous panel had been in place since 2003, but changes that came in into effect on July 1 targeted inner government departments and 'streamlined' the terms and conditions of contracts.
The move was criticised by Victoria’s shadow Minister for ICT, Adem Somyurek, who said companies were provided only two days notice of the changes, which resulted in the removal of 75 per cent of companies.
“The wholesale changes to the panel include the cutting the number of companies on the panel and the removal of the $1 million cap for contracts,” he said in a statement.
Somyurek said departments had been left wondering as to the impact of the decision to the arrangements already in place between the government and the companies which were no longer on the panel. He called on the state's Premier, Ted Baillieu, to intervene.
The government has since announced companies will have another opportunity to gain a place on the panel and the Victorian Department of Treasury and Finance will provide additional information about the evaluation criteria. The offer is open to both new tenderers and companies that were unsuccessful in the recent panel announcement.
Companies that are already on the panel will be able to either keep their existing bids or submit further bids.
“The eServices Panel is also designed to improve the Victorian Government’s value for money and efficiency in engaging ICT service providers, so it’s important the panel serves these purposes as well,” Minister for Technology, Gordon Rich-Phillips, said.
The government will also establish a working party to provide advice to the government on the panel’s future.
“This is a win for the Victorian ICT Sector, a win for the various departments and agencies engaging the panel’s IT providers, and a win for common sense,” Somyurek said, adding the government will be forced to re-tender hundreds of organisations for hundreds of contracts across government.
ICT industry group, the Australian Internet Industry Association (AIIA,) has welcomed the restructure. AIIA national chair, Philip Cronin, said the government had shown commitment to listening to industry concerns and to working toward outcomes that will better benefit the state.
Follow Georgina Swan on Twitter: @swandives
Follow CIO Australia on Twitter: @CIO_Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.
Cloud-Based Mobile Device Security Streamlines Data Protection
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions
Protection Storage Architecture: The What, Why, and How
Traditional backup architectures lack the flexibility, agility, and scale to meet new data protection challenges and requirements. That’s where a Protection Storage Architecture comes in. This whitepaper details how transformational architecture enables backup teams to solve immediate tactical challenges, while helping to evolve IT teams.