NSW government revamps IT services procurement
- 30 January, 2013 15:49
The NSW government today announced an overhaul of its primary ICT contract processes, claimed to make it easier for agencies to procure the services they need.
Under the reforms, the NSW government has introduced a two-tier supplier listing that “more realistically reflects the risk profile of the required goods and services," said the minister for finance and services, Greg Pearce.
These include a new registered supplier list for low-risk goods and services valued at less than $150,000 and an advanced registered supplier list for high-risk contracts worth more than $150,000.
“This reform follows extensive consultation between government and industry to make the most of procurement opportunities and features a simple online application process to replace previous costly panel contracting arrangements,” Pearce said in a statement.
“These new arrangements with ensure NSW government agencies can find and procure the services that best meet their needs and cut red tape for business.
“We are keen to fill the void left by Labor by taking advantage of the ICT sector’s expertiuse that will enable us to improve service delivery for citizens and ensure we meet public expectations."
The change will come into effect from March 1, 2013.
Developments for the new arrangements will be published on the ProcurePoint website at www.procurepoint.nsw.gov.au/before-you-buy/prequalification-schemes-0/ict-services-scheme.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Quantifying the Value of Investments in HP ALM Solutions: Focus on Quality
- Building the Anytime, Anywhere Enterprise
- Discover the Smart Choice for Managing BYOD
- CSO Spotlight: Security-as-a-Service Gaining Popularity
- A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Agentless Security for Virtual Environments
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result in a number of significant operational security issues. Find out more about the first agentless security platform solution.
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
ESG Whitepaper: Integrated Computing Platform Survey
Data centres, servers, storage and more are being combined for simplified management and cost savings. In this survey, ESG looks at the current and future trends surrounding today’s integrated computing solutions. Download to find out how organisations are more likely to see commit IT budgets to the purchase of integrated solutions. Read more.