SECTION 1 ..................................................................................................... 1 INTRODUCTION ............................................................................................................... 1 SECTION 2 ..................................................................................................... 2 PREPARING FOR ICT PROCUREMENT PLANNING ................................................ 2 How do we prepare for ICT Procurement? .............................................................. 2 What is the value of Hiring ICT procurement consultants ................................. 3 What are the classifications of ICT Procurement? ................................................ 4 What are Technical Specifications? ........................................................................ 7 Drafting the Technical Specifications ........................................................................ 8 Reference to Benchmarks .......................................................................................... 12 Importance of Technology Neutrality .................................................................... 12 Use of Brand Names in ICT Procurement .............................................................. 13 Green considerations in making technical specifications ........................... 14 What is Total Cost of Ownership?......................................................................... 15 Relevance of TCO to Approved Budget for the Contract ............................... 16 PREPARING THE BIDDING DOCUMENTS ............................................................. 17 What are Bidding Documents? ................................................................................. 17 The Technical Responsiveness Checklist .............................................................. 17 The Bid Evaluation Template .................................................................................... 18 Who shall participate in the preparation of the Bidding Documents? ....... 18 Enhancing the BAC for ICT Projects ........................................................................ 19 What various types and sizes of contracts may be provided in the Bidding Documents? ..................................................................................................................... 19 Use of Model Contracts ................................................................................................ 22 How should Pre-Procurement Conference be conducted? ............................. 22 SECTION 3 .................................................................................................. 23 INSTRUCTIONS ON THE PROCEDURAL STEPS FOR ICT PROCUREMENT .. 23 Competitive Bidding ..................................................................................................... 23 NCC Accreditation .......................................................................................................... 23 Bid Evaluation Process ................................................................................................ 23 Proof-of-Concept requirement at the post-qualification stage ..................... 24 SECTION 4 .................................................................................................. 25 GUIDELINES ON CONTRACT IMPLEMENTATION FOR ICT PROCUREMENT OF GOODS ....................................................................................................................... 25 Dispute Resolution........................................................................................................ 25 ANNEX 1 ICT PROCUREMENT FLOWCHART ........................................ 26 ANNEX 2 NCC WEIGHTED SCORING METHOD ..................................... 27 ANNEX 2A - EVALUATION OF SYSTEMS INTEGRATIONPROJECTS .. 34 ANNEX 3 - LIST OF ICT EQUIPMENT, GOODS AND SERVICES ............ 41
Information and Communications Technology Office Page 1 Manual of Procedures for Procurement of ICT SECTION 1
INTRODUCTION
This Manual seeks to provide its users with clear, concise and accurate information on the public procurement of (a) information and communications technology (ICT) goods and services; (b) ICT infrastructure; and, (c) ICT consulting services, by discussing the steps that need to be taken to effect such procurement in the manner prescribed by R.A. 9184, otherwise known as the Government Procurement Reform Act, and its IRR-A. It supplements the Generic Procurement Manual Volumes 1-4 (the GPM) that governs the general procurement process and also discusses important issues that may confront government officials in all stages of procurement, from the preparation of bid documents, to the actual bidding activity, monitoring of contract implementation and the final payment to the supplier. For all ICT public procurement, the GPM will continue to apply in matters not specifically provided for in this Manual.
ICT is defined in Executive Order No. 269 as the totality of electronic means to collect, store, process and present information to end-users in support of their activities. It consists, among others, of computer systems, office systems and consumer electronics, as well as networked information infrastructure, the components of which include the telephone system, the internet, fax machines and computers. Accordingly, ICT procurement is simply any procurement of goods or services, infrastructure, or consulting services in relation to ICT.
The typical ICT procurement will involve the acquisition and delivery of some combination of the following:
1. Hardware (servers, PCs, notebooks, routers, switches, etc); 2. Software (Operating systems, database management systems, packaged software e.g. office automation software, and customized applications, etc); 3. Technical services (systems integration, application systems design/development, network design/installation, Internet and leased line service, web hosting, system configuration, etc); and, 4. Ancillary services (training, warranty, repair and maintenance).
The myriad of ways in which the four basic components discussed above can be combined makes ICT procurement complex, such that a given project may not fit into any of the three procurement models specified in the GPRA (Goods, Consulting Services and Infrastructure). A further complicating factor is that not all services are billed using time and materials, with some services based on lump sum pricing while others are based on volume. While the acquisition of hardware and packaged software (and to some extent the related ancillary services) can easily be packaged as Procurement of Goods, and the acquisition of some technical services alone can be packaged as Procurement of Consulting Services, the combination of all the four components cannot easily be packaged into any of the defined models.
Information and Communications Technology Office Page 2 Manual of Procedures for Procurement of ICT A common approach that is taken is to divide up the procurement into a number of lots, so that each lot can be easily categorized as goods or consulting services. The Goods and Services lots would be evaluated using the pass/fail criteria while the consulting lots would be evaluated using the Quality-Based or the Quality-Cost Method where the maximum weight for the Quality or Technical portion is 60 % and the minimum weight for the Cost component is 40%. The Weighted Scoring Method is attached as Annex 2. While this has worked on many occasions, it is quite simplistic and prevents the procuring entity from being able to impose over-all responsibility and total warranty over the performance and functionality of systems to be procured. It will not work, for example, on large turnkey projects where the winning supplier is supposed to provide both the hardware and the application software, as well as various services for the project. In this case, a stricter technical eligibility criteria needs to be imposed on the prospective suppliers which is a good track record as a system integrator and access to expertise in the knowledge domain of the application/information system being procured. A very good example is the Election Automation System which calls for not only system management experience but a very good logistical network backed up by a financial capability that will enable it to carry out the automated elections with COMELEC simultaneously in all parts of the country.
Further, while strictly speaking, given the definition provided in EO 269, the procurement of fax machines and cell phones would also be covered within the realm of ICT procurement, such commodity items are best procured through the PhilGEPS, without need for any special procurement processes. In fact, even for the acquisition of regular PCs and notebooks, it is recommended that the PhilGEPS be used. Only when there are special requirements imposed on the PCs or their delivery and installation should government entities resort to Procurement using these ICT guidelines.
The rest of this supplemental manual is intended to assist government entities in planning and preparing for ICT procurement which necessarily includes understanding how to properly package the items and services to be procured, in conducting the actual procurement, in evaluating bids, in contracting with the winning bidder, and in contract implementation.
SECTION 2
PREPARING FOR ICT PROCUREMENT PLANNING
How do we prepare for ICT Procurement?
The GPM contains extensive discussions on Procurement Planning for the different types of government procurement. In view of the complex nature of ICT procurement, the need for careful procurement planning cannot be overemphasized.
Information and Communications Technology Office Page 3 Manual of Procedures for Procurement of ICT Identifying the need. The procurement considerations described in the GPM apply to ICT procurement as well. In addition, a thorough understanding of the agency needs that are to be addressed by technological solutions is the most basic ICT procurement prerequisite. Thus, any procurement exercise must be planned to address a demonstrated need.
Developing a business case. Once the procuring entity identifies a need to be addressed by ICT procurement, as with any other procurement, a business case should be developed weighing options, costs and benefits associated with the need. A cost-benefit analysis of the potential procurement, especially for high-value purchases, would be ideal. The business case for procurement should not be limited to consideration of initial costs but should consider the total cost of ownership, as well as support and interoperability requirements.
Strategic Alignment. Cohesion between agency and ICT strategy ensures efficiency in ICT spending. Cross-functional knowledge is essential to enable both management and ICT officials to speak the same language. In developing plans for ICT procurement, functional alignment between management and ICT facilitates project design that is truly responsive to agency needs.
Much like private sector ICT procurement, the business requirements must be clearly expressed and translated into technical specifications that will constitute the framework for the procurement of hardware, software, services or any combination thereof. ICT is a tool, the value of which must be evaluated on the basis of the extent to which proposed solutions address the agency requirements and the cost it entails throughout its lifetime, including the initial costs, maintenance and support, and training costs.
Other Considerations. Also to be considered in planning ICT procurement are risk management, supply market analysis and a review of existing ICT supply arrangements. In addition, the ability of the solution to interoperate with other technologies utilized by the procuring agency and other agencies, as may be necessary, is a key consideration. Furthermore, procuring agencies must be able to grasp intellectual property and licensing issues in the use of technology, and may need to build into procurement project requirements the necessary mechanisms by which the impact of these issues can be quantified in the evaluation of qualified bids.
What is the value of Hiring ICT procurement consultants
If the expertise required to plan for the ICT procurement (as described above) as well as to prepare the bidding documents and technical specifications is not readily available within the Agency, the Procuring Entity may opt to hire ICT procurement consultants before embarking on the actual procurement of the ICT systems. This is akin to the hiring of engineering consultants in the procurement of infrastructure projects to conduct the preliminary study and detailed engineering for the project.
The ICT procurement consultants activities can include:
Information and Communications Technology Office Page 4 Manual of Procedures for Procurement of ICT Procurement Planning
A. Reviewing/updating the Agencys Information Systems Strategic Plan (ISSP) including prioritization of systems
B. Aligning the ICT Strategy with the Agencys strategic thrusts and directions Procurement Process
C. Formulating ICT Standards and/or defining the Agencys Enterprise Architecture
D. Preparing the Bid Documents including the Technical Specifications and Terms of Reference (refer to Annex 4)
E. Assisting the Procuring Entity through the procurement process (i.e. pre-bid conference, bid submission, bid evaluation, post-qualification, contract negotiations)
Project Management
F. Performing or assisting in the contract and project management during the implementation of the contract
It is entirely up to the Procuring Entity whether the assistance to be provided by the ICT procurement consultants would be limited to just the procurement process itself or would extend before and beyond the actual procurement exercise.
The procurement of the ICT procurement consultants should also follow the guidelines for procurement of ICT Consulting Services. Furthermore, appropriate mechanisms and guarantees should be put in place to ensure that there will be no possible conflict of interest that would arise in case the ICT procurement consultants would have an interest in the actual system to be procured.
What are the classifications of ICT Procurement?
ICT procurement may be straightforward, involving either goods (such as personal computers, laptops, or off-the-shelf software, including operating systems) or purely consulting services. Many, however, are quite complex, involving a combination of hardware, software and services (hereinafter referred to as mixed procurement): for instance, building a network or simply upgrading one would involve acquisition of hardware as well as services required for installation, software development or customization (as may be necessary) and services for the actual operation and maintenance thereafter. While the different components, in some cases, may be procured separately, considerations such as practicality and risk management may demand turnkey solutions that may, in turn, implicate classification issues. As the procedure and requirements for, as well as the evaluation method of, each procurement depends upon its
Information and Communications Technology Office Page 5 Manual of Procedures for Procurement of ICT classification as goods, infrastructure, or consulting services, the correctness of any such classification is vital in any procurement (refer to Annex 3).
The primary purpose of the procurement is the determining factor in the classification of a mixed procurement. Often, the primary purpose is evident from the cost of a component relative to the other items procured. But cost is not necessarily indicative of the primacy of a component in a mixed procurement, and the identification of the primary purpose is largely situational.
Four different procurement models are proposed to handle the different kinds of ICT procurement. These are:
Procurement of ICT Goods and Ancillary Services
Procurement of ICT Consulting Services
Procurement of ICT Outsourced Services
Procurement of ICT Total Solutions
Following the ICT Procurement Flowchart (refer to Annex 1), if what is being procured consists primarily of:
purely ancillary services (installation, related training, maintenance and warranty) then it is suggested that the procuring entity either make use of PhilGEPS, or in the case of special requirements, make use of the guidelines, SBDs and sample contracts for Procurement of ICT Goods. The procedure to be followed under this scenario is the one for Procurement of Goods under the GPRA IRR.
For procurement of technical services (e.g. procurement consulting, project management, systems analysis and development, programming, training, network/database design or fine tuning, specialist consulting services, etc), where the payment for these services is based on time and materials (i.e. the total price for the Contract will be mostly computed using some kind of rate(s) multiplied by a number of person-days or person-months), the procuring entity should make use of the guidelines, SBDs and sample contracts for Procurement of ICT Consulting Services. These kinds of projects typically involve having the services provided either under the direct supervision or in close cooperation with the staff of the procuring entity. The procedures, SBDs and sample contracts shall closely follow the guidelines for the Procurement of Consulting Services under the GPRA IRR.
If, on the other hand, the services are being provided under a fixed price or volume-based contract with Service Level Agreements, and/or a pre-defined set of output deliverables under an
Information and Communications Technology Office Page 6 Manual of Procedures for Procurement of ICT outsourcing arrangement, then the guidelines, modified SBDs for Consulting Contracts and sample contracts for Procurement of ICT Outsourced Services shall apply. This model is applicable for the procurement of such services as (but not limited to):
Web hosting; Server hosting; Internet Service; Data Conversion/Entry; Application service or subscriptions; and, Development, customization or revision of applications
This is a new category of procurement not envisioned under the GPRA IRR. Taking into account the unique characteristics of ICT procurement, the SBDs for Consulting Services, including the applicable General Conditions of Contract and Special Conditions of Contracts shall be modified, for this type of ICT procurement. For example, delivery of goods is a one-time event and correspondingly acceptance can also be done one-time. But delivery of some services would be a continuing activity, so that acceptance will need to be continuous using SLAs.)
Finally, all other procurement projects that would normally involve some combination of hardware, packaged software, custom software and services, both ancillary and otherwise, should make use of the guidelines, SBDs and sample contracts for Procurement of Total ICT Solutions. This is another new category of procurement not envisioned under the GPRA IRR and a modified set of SBDs for Consulting Services would be used for this type of projects.
Of course there will continue to be some gray areas, particularly when what is being procured appears to straddle two or more of the procurement models. Three examples follow:
Example 1: Procurement of Outsourced Network Management Service which includes the delivery/installation of a network management system and server on site
Possible Solution: If the Network Management Service provider will charge for the network management system and server, the procurement can be split up into two or three lots, as appropriate one each for the Outsourced Service, the Server and possibly, the Software.
If, however, the system and server costs are bundled into the Service itself, either as a rental or as a free item, then it can be considered under Procurement of Outsourced ICT Services.
Example 2: Procurement of a turnkey solution using the services of a Systems Integrator
Possible solution: If the Systems Integrator (SI) is responsible for delivering all components of the ICT solution (e.g., the hardware, software and services required to complete the ICT solution procured, regardless of the involvement of numerous vendors), then the model for Procurement of Total ICT Solutions applies.
If the SI is only providing consulting services and is not delivering the actual solution components, then the Procurement of ICT Consulting Services shall apply for the SI contract,
Information and Communications Technology Office Page 7 Manual of Procedures for Procurement of ICT with the solution coming in separately as Goods, Consulting Services, Outsourced Services, Total ICT Solutions or some combination thereof.
If the SI is delivering some of the components of the solution, then the Procurement of Total ICT Solutions still applies but whatever the SI will not be supplying can be procured separately using the appropriate model.
Example 3: Procurement of a web-based application with servers, network infrastructure and PC workstations
Possible solution: There are three possible ways to package this procurement. First, the whole system can be procured using the SBD and guidelines for Total ICT Solutions. This simplifies procurement, on the one hand, as overall responsibility can be passed onto the single supplier. However, costs can be higher due to limited competition (there will be fewer bidders capable of delivering all components) and the fact that mark-ups will be made by the bidder for products they are not directly providing.
Second, the system can be packaged as four separate procurements, one each for the web-based application, the server (and associated licenses), the network infrastructure, and the PCs. The first can be procured under either Consulting or Outsourced Services, while the latter three can be procured using the guidelines for ICT Goods. This approach may yield the lowest procurement costs based on the aggregate cost of the winning bids. However, it complicates project management and shifts the burden of coordinating (e.g., managing deliver schedules, determination of responsibility among suppliers in case of delay or other fault affecting the completion, installation and operationg). Note, also, that in this case, suppliers will be reluctant to provide guarantees on performance as they are only providing a part of the total system.
Finally, a compromise between the first two approaches is possible, whereby all generic components that can be assumed to be off the shelf such as PCs and probably some network equipment can be procured separately as ICT Goods while the application, licenses, server(s) and server room network infrastructure would be procured using the modified SBD for Consulting in Total ICT Solutions.
The decision of which approach to employ would have to depend primarily on the Procuring Entitys assessment of its capability to manage multiple suppliers and quickly resolve technical issues considering the complexity of the system to be procured.
In case of any doubt as to how its project should be categorized, the procuring entity is encouraged to seek guidance from the National Computer Center (NCC).
What are Technical Specifications?
The GPM defines technical specifications as the physical description of the goods or services, as well as the Procuring Entitys requirements in terms of the functional, performance,
Information and Communications Technology Office Page 8 Manual of Procedures for Procurement of ICT environmental interface and design standard requirements to be met by the goods to be manufactured or supplied, or the services to be rendered. The technical specifications must include the testing parameters for goods, when such testing is required in the contract.
For ICT Procurement, the Procuring entity would ideally possess a thorough understanding of the precise agency requirements as well as the range of technology solutions that are available in the marketplace, the different business models that may be used to deliver the same, and cost and legal implications of any option. In reality however, the procuring entity may only have a vague idea of its functional requirements.
Drafting the Technical Specifications
The need for precision in drafting the technical specifications are particularly important for ICT procurement. Prior to drafting the technical specifications, the procuring entity must be clear on the following:
(i.) Purpose of procurement The actual objective of the procurement must be identified, e.g., automating existing internal procedures or re-engineering the delivery of government services.
(ii.) Procurement criteria The procuring entity must develop the criteria for evaluating bids based upon accomplishment of the purpose of procurement, taking into account technical and other factors such as ease of use, interoperability, security, costs through the entire life of the solution (including acquisition, training costs, support and maintenance costs), performance standards, customization, and reliability.
(iii.) Process The procuring entity shall adopt a process for developing the foregoing (e.g. it may establish an intra-agency /inter-agency working group, possibly including private sector participation, to undertake collaborative and voluntary development of technical specifications; it may adopt specifications from a similar project in another government agency; or, it may decide to hire consultants who shall prepare the technical specifications and assist in the conduct of procurement and technical evaluation of bids).
A set of precise and clear specifications is a prerequisite for Bidders to respond realistically and competitively to the requirements of the Procuring Entity without qualifying their Bids. In the context of Competitive Bidding, the specifications must be prepared to permit the widest possible competition and, at the same time, present a clear statement of the required standards of workmanship, materials, and performance of the goods and services to be procured. Broadly stated specifications that do not set out such standards clearly may result in bids that are neither comparable nor responsive to the needs of the Procuring Entity. Only by satisfying both requirements will the objectives of transparency, equity, efficiency, fairness and economy in procurement be realized, responsiveness of Bids be ensured, and the subsequent task of Bid evaluation and post-qualification facilitated.
Information and Communications Technology Office Page 9 Manual of Procedures for Procurement of ICT
In drafting technical specifications for PCs and similar end user equipment, the procuring entity is encouraged to access the NCC website where an updated set of specifications will be posted for use by government agencies. For computing equipment such as servers, it is important to consider and, if possible, specify the following:
Intended use and application
What software(s) will run on the server
How many users will simultaneously use the system
What existing infrastructure will the server need to interoperate with (e.g. existing network, OS etc)
Minimum memory requirement (usually derivable from the software to be run and the number of users)
Minimum disk storage capacity (derivable from the types and numbers of transactions to be supported and retention periods)
Connectivity (how will the server connect to the procuring entitys network)
Backup storage(what kind of backup storage capability is required)
Performance (e.g. fault tolerance, availability, speed of processing, expansion capability)
Packaging (e.g. rack mounted vs. tower, etc)
In specifying software, it is usually necessary to provide the following:
mode of operation and general system architecture
functional requirements, preferably detailed enough to the point of identifying all inputs and outputs (reports)
intended number of users
estimated number of transactions to be handled
interfacing and interoperability requirements with other systems
compatibility requirements
Information and Communications Technology Office Page 10 Manual of Procedures for Procurement of ICT security and auditability requirements
other special requirements (e.g. use of bar codes,
In specifying consultancy services, the required expertise, the required minimum availability of this expertise, and the expected outputs of the engagement should be clearly specified, preferably with a tentative timetable of activities. Terms of Reference for Consulting Services would normally contain the following sections: (a) Background; (b) Objectives; (c) Scope of the Services; (d) Training (when appropriate); (e) Reports and Time Schedule; and (f) Data, Local Services, Personnel, and Facilities to be provided by the PROCURING ENTITY.
For outsourced services, appropriate Service Levels (SL) will need to be specified together with penalties for not meeting these Service Level Agreements (SLAs) in addition to what is found in TORs for Consultancy Services. In its purest sense, SLAs are agreements between the supplier of a service and the user of that service that define:
The availability of the service to the user
The minimum acceptable performance of the components of the service
The measurement and reporting mechanisms that allow the monitoring of the service
The cost of the service or additional services (where applicable)
Obviously, the kind of Service Levels or QoS will depend on the type of service being procured. There are ITIL (Information Technology Infrastructure Library) specifications that can be applied to IT services.
For procurement of data services, (e.g. web hosting, shared hosting, application services, data center hosting etc) , Uptime Agreements are typically employed, including such QoS as system uptime, network uptime, power uptime (typically expressed as percentages, or a maximum amount of downtime within a period e.g. 99.9% uptime, or no more than 30 minutes downtime per month). In addition, transaction turnaround times, system response times, data retention and backup, the maximum amounts of service interruption, and scheduled maintenance windows can also be specified.
For call centers or service desks, the SL metrics commonly employed include:
ABA (Abandonment Rate): Percentage of calls abandoned while waiting to be answered.
ASA (Average Speed to Answer): Average time (usually in seconds) it takes for a call to be answered by the service desk.
TSF (Time Service Factor): Percentage of calls answered within a definite timeframe, e.g., 80% in 20 seconds.
Information and Communications Technology Office Page 11 Manual of Procedures for Procurement of ICT FCR (First Call Resolution): Percentage of incoming calls that can be resolved without the use of a callback or without having the caller call back the helpdesk to finish resolving the case.
TAT (Turn Around Time): Time taken to complete a certain task.
For systems development and maintenance, possible service levels will revolve around skill levels (i.e. certified staff), productivity, response and turnaround times, limits on bugs per line of code and length of full warranty against defects or bugs after deployment.
For data conversion services, the typical service levels would involve accuracy, turnaround time and security/confidentiality of information.
For repair and maintenance services, typical service level metrics include the availability, location (on-site/phone/walk-in) and response times of technical support, service/repair times, and possibly service escalation clauses which may include provision of service units and/or replacements.
It should be noted that proper use of SLAs in outsourced contracts should consider two well- differentiated phases: the negotiation of the contract and the monitoring of its fulfillment in real- time. Providing the Procuring Entitys required or desired Service Levels provides the SLA contract definition (basic schema with the QoS [quality of service] parameters) for SLA negotiation and finalization. SLA monitoring and SLA enforcement, according to defined policies would constitute the second phase. However, since most service providers would already have mechanisms in place for monitoring and reporting, Procuring Entities may leave it up to the bidders to propose how to meet the SLA monitoring requirement.
While it is important to include all critical service levels metrics that would ensure acceptable delivery of the service(s) required, procuring entities should realize that having too many actually complicates tracking and monitoring, and that there are actually costs involved in measuring and reporting on each SLA. Thus, Procuring Entities should strike a balance between ensuring good service and paying more for the same service(s).
In writing specifications for Total ICT Solutions, one will have to take into account the corresponding suggestions depending on the component of the solution that is being specified, e.g. hardware, software, consultancy, services etc. In short, the specifications for Total ICT Solutions will necessarily need to have all of the various types of specifications previously discussed. In addition, the overall business objectives of the procurement, the context of the project (in terms of the organizational structure in which the project will operate as well as existing ICT resources and infrastructure), and the general requirements for the combined ICT solutions project (i.e. Project Management, Systems Integration, Reporting and Documentation, Warranties and Post-implementation support) will need to be clearly defined.
Care must be taken in drafting specifications to ensure that they are not restrictive. In the specification of standards for equipment, materials, and workmanship, recognized Philippine and international standards should be used as much as possible to ensure interoperability with present
Information and Communications Technology Office Page 12 Manual of Procedures for Procurement of ICT systems or even those to be procured in the future. Where other particular standards are used, whether national standards or other standards, the specifications should state that equipment, materials, and workmanship that meet other authoritative standards, and which ensure at least a substantially equal quality than the standards mentioned, will also be acceptable. The following clause may be inserted in the Special Conditions of Contract or the Technical Specifications.
Sample Clause: Equivalency of Standards and Codes
Wherever reference is made in the Technical Specifications to specific standards and codes to be met by the goods and materials to be furnished or tested, the provisions of the latest edition or revision of the relevant standards and codes shall apply, unless otherwise expressly stated in the Contract. Where such standards and codes are national or relate to a particular country or region, other authoritative standards that ensure substantial equivalence to the standards and codes specified will be acceptable.
Where appropriate, drawings, including site plans as required, may be furnished by the PROCURING ENTITY with the Bidding Documents. Similarly, the Supplier may be requested to provide drawings or samples either with its Bid or for prior review by the PROCURING ENTITY during contract execution.
Reference to Benchmarks
In preparing the Technical Specifications, the Procuring Entity shall be guided by the benchmarks set and updated by the NCC from time to time for certain types of ICT procurement.
Importance of Technology Neutrality
Among the principles governing procurement under the GPRA is competitiveness by extending equal opportunity to enable private contracting parties who are eligible and qualified to participate in public bidding.1 The preference for competitive bidding2 and the prohibition on reference to brand names3, among other provisions, implement this policy, the underlying purpose being to ensure that government procurement will be carried out within the context of free competition to assure the best value for government.
The competitiveness principle requires technology neutrality in ICT procurement, and generally prohibits preference for specific technologies, standards, or vendors. To maximize choice and competition, ICT procurement should instead be based on objective standards, including performance, cost, security and interoperability. For example, in software procurement, the procuring entity should look at factors such as costs over the entire useful life of the technology, ongoing maintenance, training, data migration and integration with other systems. It should not focus on business models for software development and delivery (e.g. whether it is open source
Information and Communications Technology Office Page 13 Manual of Procedures for Procurement of ICT software, commercial software, or mixed-source software), and instead should evaluate whether the software fulfills the need intended to be addressed by the procurement.
Use of Brand Names in ICT Procurement
Sec. 18 of the GPRA prohibits the use of brand names for procurement. This prohibition was designed to prevent undue preference for certain brands and to promote competition. For ICT procurement, however, this prohibition renders the crafting of specifications that clearly and sufficiently describe the procuring agencys business requirements very difficult. This may result in failure to procure the correct type of technology solution for the procuring agencys business requirements and ultimately defeat the purpose of the procurement or, at best, deprive the government of the optimal and most cost-effective solution.
Sec. 3 of the GPRA lays down the governing principles on government procurement, one of which is that the procurement process shall be simple and made adaptable to advances in modern technology in order to ensure an effective and efficient method4. In view of this policy, procuring agencies may justify the use of brand names in procurement, by way of strict exception, only in the following instances:
(i.) it is required to ensure compatibility with legacy systems, or prior material investments, when prior financial or staff training investments in a particular product or technology are large in relation to the proposed new investments, and introducing a competing product or technology would create unreasonable disruption or expense;
(ii.) it refers to the required hardware/software platform for the proposed application;
(iii.) the brand name is de facto industry standard where a vast majority of the relevant constituency has adopted a particular product as a standard and there are no reasonable substitutes (e.g., use of TCP/IP, Windows OS for work stations);
(iv.) it refers to an enterprise technology standard, where the agency or the country has formally adopted a technology standard (e.g., Microsoft Office, Oracle Data Base Management System) for the following reasons: (1) significant economies of scale are achieved through standardization; (2) substantial simplification of technical environment; (3) dominant customer base and technical support in the relevant market; and (4) acceptable or manageable tradeoffs vis--vis risks of technological dependence and monopoly abuse;
Furthermore, bidding documents may specify brand, product or standard names provided that it allows functional equivalents through the addition of the words or substantially equivalent 5 where substantially equivalent means operationally and functionally interchangeable. Obviously, there will be differences in interpretation depending on the extent of existing ICT infrastructure in the procuring entity with which the items being procured will interoperate.
Information and Communications Technology Office Page 14 Manual of Procedures for Procurement of ICT
Green considerations in making technical specifications
Procuring the right ICT infrastructure, software or services can greatly reduce carbon emissions through energy savings and more efficient operations. This is especially true of devices that are regularly used or replenished such as PCs, printers and their components or supplies. In the design of an appropriate ICT configuration for an organization, whether this covers a full system or components thereof, it is important to achieve a balance of present and future technology needs, performance, price and environmental m covers energy efficiencies and future disposal of ICT hardware. Some green practices that can be considered in procurement of ICT systems or products include the following:
Select computer systems that are upgradeable. This saves money and the carbon footprint of a new system when performance needs to be increased or fixed as only certain parts need to be replaced or upgraded rather than the whole system. Look for systems with additional vacant memory slots, external graphic card slots and extra internal power connectors. Also select systems whose replaceable components are commonly available in the market.
Select power supplies with total wattage that meets current system needs with a reasonable allowance for short term expansion or addition of components. Websites of PC component manufactures and other dedicated hardware websites can provide information on the power consumption of common computer components. Some websites provide a convenient power calculator for computer systems.
Choose energy efficient power supplies, typically with ratings of 80plus, from reputable manufacturers. The rating indicates how much of the total maximum power draw of a power supply unit (PSU), expressed in watts, is actually used by the system. The balance is wasted as heat. An 80% efficiency rating means that the PSU can convert around 80% of its total power draw (for example 500 watts) into usable power for the system.
Select processors with energy efficient ratings (typically 45 watts in TDP or Thermal Design Power) for systems that do not require heavy work load or work that stress processing power. The TDP is the maximum power consumption of the processor under significant work load. For typical office computer work such as word processing, spreadsheets, emails and internet browsing, processors with TDP of 45 watts may be sufficient. The two major microprocessors producers Intel and AMD, have information on the power consumption of their products in the websites. Other hardware sites also regularly do testing on new processors which usually include power consumption figures.
Choose computer motherboards with built in video, LAN. Sound and other functions and motherboards with smaller form factors (i.e. micro ATX or mini ITX) where appropriate. Having such functions integrated into the motherboards saves space and power usage compared to a system that uses separate component parts for video, sound, etc. Smaller board form factor also uses less energy due to its use of fewer electronic parts. The
Information and Communications Technology Office Page 15 Manual of Procedures for Procurement of ICT various websites of computer motherboard manufacturers list their products with integrated functions.
Choose energy efficient computer monitors, usually those that comply with EPA (US Environmental Protection Agency) requirements and monitors that have less toxic substances. Newer LCD monitors usually consume less power than older CRT monitors. Monitors that comply with EPA standards are usually marked as such or may have the EPA logo appear on their screen during the boot process. Websites of computer monitor manufacturers include the power consumption figures for their various models. Other sites may also test and list down the power usage for monitors available commercially.
Select green versions of components such as video cards, motherboards and hard drives, where appropriate, that have low power usage during idle and peak load times. Component with low power consumption at idle periods can save on energy cost especially for computer units that are left open for extended periods. Green versions of video cards have fewer power connectors while green hard drives usually have variable platter speeds that help reduce power usage when drive work load is not large. Green versions of such components can be used when speed in performance of the system is not critical.
Choose motherboards, computer cases and other computer components that are free of or have minimal content of lead and other toxic substances such as mercury and cadmium. Since a few years ago, manufacturers of computer components have introduced lead free products which help reduce the amount of toxic substances that pollute the environment especially during the disposal of such products.
Choose toner or ink efficient printers that have low cost factors per page or have a low total cost of ownership rating. More efficient printers use less toner or ink cartridges which reduce the cycle of replacement of such items consequently decreasing the carbon emissions in their manufacture.
Design physical layout of data centers or server rooms that have adequate ventilation, air flow and reduced heat from external sources to maintain temperatures required for optimum system performance. Carefully planned layouts of servers and data centers reduce the level of ventilation system required to maintain desired operating condition leading to lower power usage used to cool equipment while prolonging equipment life. Proper design of green data centers covers server casings, cabinets, racks and room configuration or location.
What is Total Cost of Ownership?
There have been many cases where vendors would offer their products at an initially low price with the objective of reaping substantial or exorbitant future profits from sales of supplies or parts, or of maintenance services from what would then be a captive buyer. This has frequently
Information and Communications Technology Office Page 16 Manual of Procedures for Procurement of ICT been experienced with printers for example, where the prices of some replacement cartridges are almost the same as the price of the printer.
In view of the above, in planning ICT procurement and in evaluating potential solutions, a procuring entity must look at the Total Cost of Ownership (TCO) of solutions being proposed. The TCO represents not just the acquisition cost of the system, but its expected operating and maintenance costs over its lifetime or some reasonable subset thereof. Its use helps prevent procurements that are the proverbial penny wise but dollar foolish.
In coming up with the TCO, the following costs have to be considered over the typical lifetime of the system which would usually be between 3 to 5 years:
The original acquisition cost or purchase price Required costs of necessary supplies (e.g. tapes, ink cartridges) Additional costs to operate the system
.. New or additional equipment required .. New or additional software required (e.g. need to upgrade OS) .. Staff (re)training .. Staff recruitment and retention (in case existing expertise is not available)
Required future maintenance costs
.. Recurring software licenses maintenance .. Preventive maintenance and servicing for equipment
Other costs associated with using and operating the system
Until the GPPB makes a final ruling on whether TCO may be considered in lieu of the bid prices, Procuring Entities may plug the loophole in the meantime by ensuring that their requirements as defined in the technical specifications would already include maintenance costs, provision of some supplies and spare parts, and include a provision that any additional costs necessary to make the system fully operational (e.g. hardware, software, training, etc) should be included and costed in the bid.
Relevance of TCO to Approved Budget for the Contract
The TCO in a way affects the ABC. The ABC is the ceiling for the contract price and is determined at the planning stage wherein the TCO is factored into the ABC as an adjustment to account for the future operating and maintaining costs for the system.
Information and Communications Technology Office Page 17 Manual of Procedures for Procurement of ICT PREPARING THE BIDDING DOCUMENTS
What are Bidding Documents?
The GPM describes the bidding documents to be issued by the Procuring Entity, as well as the contents thereof. This description, as well as the guidelines on the preparation of the bidding documents, also applies to all ICT procurement. Additional Bidding documents for ICT Procurement:
The Technical Responsiveness Checklist
The Bid Evaluation Template
The Technical Responsiveness Checklist
The Technical Responsiveness Checklist (TRC) is an electronic form provided as part of the bidding documents. It requires the bidders to provide a detailed point-by-point comparison of their proposed product or service against each detailed technical specification, demonstrating the substantial responsiveness of the overall design of the System and the individual Information Technologies, Goods, and Services being offered by the bidder to those Requirements.
Ample space should be provided for the bidders to fill up their response to each individual technical requirement. Self-serving and vague statements such as comply or meets (or exceeds) specification are not acceptable responses. Instead, specific and numerical (where applicable), responses are required. Where the space provided is inadequate to provide the full details of their response, bidders should refer specifically to the pages where the response can be found.
The bidders response in the TRC shall be the primary basis for evaluation. This avoids the problem of evaluators having to look for the appropriate response from the bidder to a particular requirement.
When filled up, the TRC provides the first two columns (Technical Requirements and Bidders Response) of the Bid Evaluation Template.
When utilized by the Procuring Entity, the TRC is deemed to be part of the Bidding Documents
Information and Communications Technology Office Page 18 Manual of Procedures for Procurement of ICT The Bid Evaluation Template
For ICT Procurement, the Procuring Entity may utilize a Bid Evaluation Template to make the Bid Evaluation process as straightforward and transparent as possible. In such cases, the Bid Evaluation Template may be distributed to all bidders as part of the Bidding Documents.
The Bid Evaluation Template is a spreadsheet which clearly shows the following as columns (for formatting purposes, more than 1 column may be assigned each item):
A. The detailed technical requirements being evaluated B. The specific bidders response to each of the technical requirements C. The evaluators assessment of whether the bidders offer meets the specific requirement
Column A should be filled up at the time of releasing the bid documents. Column B should be filled up by copying the contents of the Technical Responsiveness Checklist filled up by the bidders themselves, and submitted as their Technical Bid Form. Column C should be filled up by the evaluators.
The detailed technical requirements column should be filled up according to the technical specifications defined in the bid documents. For brevity, only the summary technical requirements which can be verified or otherwise evaluated and scored are provided. Clarifications, background information and other discussion points which are not measurable/verifiable should not find their way into the evaluation template.
When utilized by the Procuring Entity, the Bid Evaluation Template is deemed to be part of the Bidding Documents.
Who shall participate in the preparation of the Bidding Documents?
The following must participate in the preparation of the bidding documents:
1. The BAC; 2. The TWG; 3. The end-user unit/PMO; 4. Consultants, if any; and 5. The BAC Secretariat / Procurement Unit.
In view of the complexity of many types of ICT procurement, it is advisable to enhance the capacity of the BAC in the manner described below.
Information and Communications Technology Office Page 19 Manual of Procedures for Procurement of ICT Enhancing the BAC for ICT Projects
For ICT projects, to ensure that the BAC will be capable of addressing issues that may arise in connection with the procurement, the head of the procuring entity may either
(i.) create a separate BAC specifically for ICT projects; or (ii.) expand the membership of the BAC with the inclusion of two additional members.
Sec. 11 of the GPRA authorizes the head of the procurement to establish separate BACS where the number and complexity of the items to be procured shall so warrant. It also allows the appointment of up to 7 members to the BAC.
The complex nature of ICT procurement often raises issues that require specialized knowledge to properly address. Many of the criticisms of ICT procurement in the past were directed at perceived inability of the BAC to deal with such issues.
Accordingly, the head of the procuring entity is well-advised to take either of the aforementioned options for enhancing the capacity of the BAC to address ICT procurement issues. For either option, the BAC would benefit from the inclusion as members of the following: (i) an ICT knowledgeable official of the agency; and, (ii) an external resource who could be a CIO from another government agency, a representative from the NCC, or a private sector consultant duly accredited by the NCC. However, the appointment of a private sector consultant must be accompanied by a certification that the consultant does not have a direct or indirect interest in the contract to be bid out.
What various types and sizes of contracts may be provided in the Bidding Documents?
The bidding documents should clearly state the type of contract to be entered into and contain the proposed contract provisions as appropriate. There is a wide range of ICT contracts, depending on the type of transaction. The following are some examples of ICT contracts:
1. Acquisition of off-the-shelf products (e.g., anti-virus software, flash drives, printers); 2. Software development and license agreements, including software as a service agreements; 3. Maintenance and Support Agreements; 4. Outsourced Services Agreement; and, 5. Systems Integration Agreements.
Preparation of ICT contracts are challenging because of the difficulty in capturing the technical, business and support requirements in terms of outcome expressed in a contract. Furthermore, outcome is heavily influenced by institutional objectives, politics and capacity of the procuring entity. Anticipation of all requirements for proper project implementation through its life-cycle is imperative and must be dealt within the contracts.
Information and Communications Technology Office Page 20 Manual of Procedures for Procurement of ICT The following areas may be the subject of dispute and must be specifically governed by appropriate contractual language:
1. Costs Contracts may require up-front and fixed payments, periodic payments, recurring payments, payments on time-and-materials basis, or balloon payments, among other arrangements. Some may even require no initial payment but require payment for maintenance, support or related services. Depending on the business model of the software developer, the continuing use of the software, as well as maintenance and support, may involve additional cost, all of which must be clearly indicated in the contract.
2. Intellectual Property Ownership of intellectual property is relevant to cost, liabilities and remedies and should be adequately covered in the contract. Customized software development and licensing agreements must contain a provision dealing with source code ownership or access. It is not essential that the procuring entity acquires ownership of the source code, but it is recommended that the contract at least include mechanism to obtain access to source code in certain situations (e.g., as required for maintenance when the software developer is unable or unwilling to render additional services, or when the software developer has gone bankrupt or has ceased to exist). The procuring entity may negotiate for the inclusion of a source code escrow arrangement in the contract. In all cases, the contractor must warrant that it has full intellectual property rights or legal authority to provide to the procuring entity, for its use under the terms of the relevant contract, the hardware, software and services that is the subject of the procurement. If the use of open source software is contemplated, it is suggested the professional legal advice is sought to ensure that the appropriate licensing terms are adopted in the contract.
3. Scope/Change Management During the course of project implementation, and for various reasons, changes may be required by the procuring entity or requested by the contractor. The impact of such changes upon cost, liabilities and remedies depend largely upon the applicable contract. It is important for the contract to allow price/cost variation only in accordance with the agreed procedure and in exceptional circumstances as may be appropriate given the nature of the procurement.
4. Timetable The contract must clearly establish the timetable for delivery of goods or services procured. The contract must emphasize the obligation of the contractor to timely notify the procuring entity for anticipated delay, to take reasonable steps to minimize delay, and to refer to the dispute resolution process in case of disputes relating to the delay.
5. Warranties and Liabilities The contract must explicitly provide for the scope of the contractors warranties and liabilities. Among other things, the contractor must warrant that it has full capacity to enter into the contract; that it has and will continue to have all the necessary rights in the software (including third party software) and all relevant intellectual property rights to perform the contractors obligations under the contract; that all software provided shall perform in all material respects in accordance with its
Information and Communications Technology Office Page 21 Manual of Procedures for Procurement of ICT specification; and that the system, products and assets provided under the contract shall be free of all encumbrances.
6. Security and data protection The contract must include appropriate provisions warranting security of software/systems procured. Where a contractor shall be responsible for the handling of information on behalf of the procuring entity, the contract must require the implementation of reasonable security practices and procedures appropriate to the complexity of the task and proportional to the likelihood and severity of the potential harm that may arise due to unauthorized access.
7. Testing, Evaluation and Acceptance The contract must include an evaluation and acceptance mechanism consistent with the project goals and the scope defined in the contract. Where appropriate, the contract should provide for acceptance as a precondition to payment, although large IT contracts may provide for milestone achievements within the contract term that may be accepted as a basis for progress payments.
8. Remedies and Dispute resolution Depending on the complexity of the project, the contract must specifically provide for remedies in case of breach and dispute resolution options. For complex projects, the procuring entity may consider including in the contract a provision on referral to mediation, prior to arbitration. Mediation is a process whereby a neutral third-party is selected by the parties to assist in the settlement of the dispute. The mediator has no power to render a decision binding on the parties and only helps the parties identify settlement options that would satisfy their interests. Arbitration is a process whereby a dispute is submitted to a neutral third party (e.g., a sole arbitrator or a panel of three arbitrators), who shall receive evidence from the parties and thereafter render a decision. It is suggested that the contract provides for referral of disputes to binding arbitration before the Philippine Dispute Resolution Center.
9. Termination and Consequences of termination. The contract must provide for the specific grounds for termination and its consequences, which will include the payment of liquidated damages based on a pre-estimate of damages to be suffered, exit management, transfer of data, and assignment of all rights to the procuring entity. In appropriate cases, a remedial plan process and a cure period for breaches may be specifically provided in the agreement. The contract should also allow termination by the procuring entity by convenience.
10. Risk Distribution Who is responsible for insuring the system from delivery to final acceptance should be clearly defined. Especially for ongoing services, the risk should be upon contractor, being the one in the best position to manage risk. Thus, the contractor should be responsible for evaluating environmental factors that may affect risk and ought not to be able to invoke the same in order to be released from any contractual responsibility For combined ICT solutions projects, system integration projects, or any project when some contractual responsibilities are passed on to subcontractors, it is important to ensure that all obligations may be enforced against the primary contractor, without prejudice to a the right of the procuring entity, at its sole option, to take action to enforce its rights directly against the subcontractor. It is also advisable to require prior
Information and Communications Technology Office Page 22 Manual of Procedures for Procurement of ICT consent of the procuring entity to any subcontracting arrangement. Furthermore, any subcontracting agreement must fully pass on, as appropriate, all contractor obligations contained in the contract with the procuring entity.
11. Governing Law The governing law shall be the laws of the Republic of the Philippines.
12. Contract Governance. The Procuring entity should consider have a contract governance structure in place, typically providing for named representatives of the contractor and the Procuring Entity, and an escalation process to higher levels of management to oversee proper implementation of the contract and settlement of issues, prior to recourse to the formal dispute resolution process. For contracts involving outsourced services, this structure would include monitoring of the pre-agreed service levels that the contractor must maintain.
Use of Model Contracts
Unfortunately, no single model contract can apply to all types of ICT procurement transaction. The GPPB may include model contracts with the standard bidding documents. The model contracts are intended to be starting points to assist the procuring entity in properly drafting the relevant ICT contract. Model contracts must still be carefully adapted to the particular circumstances, with some provisions to be added or removed. Without a thorough understanding of the planned ICT procurement, as well as the other factors that will thereafter come into play, there is a danger that the appropriate contractual model may not be utilized, or that the contract will not comprehensively deal with all issues implicated by the proposed transaction. Accordingly, it is recommended that the governing contract be based on GPPBs model contracts, but further developed with appropriate professional advice.
How should Pre-Procurement Conference be conducted?
As explained in the GPM, the pre-procurement conference is the forum where all officials of the Procuring Entity involved in the project meet to discuss all aspects of the said project to determine the readiness of the Procuring Entity to undertake the procurement. The conference focuses on the technical specifications, the ABC, the appropriateness and applicability of the recommended method of procurement, and the availability of pertinent budget releases.
For projects involving an ABC amounting to more than Two Million Pesos (Php 2 Million), a pre-procurement conference is conducted to determine the readiness of the Procuring Entity to procure goods and services in terms of the legal, technical and financial requirements of the project. More specifically, it ensures that the procurement will proceed in accordance with the PPMP and APP, confirms the availability of appropriations and programmed budget for the
Information and Communications Technology Office Page 23 Manual of Procedures for Procurement of ICT contract, and reviews all relevant documents in relation to their adherence to the law. (IRR- Section 20).
As ICT procurement is often complex, even if cases where the ABC amounts to P 2 Million and below, or a separate BAC is created for ICT projects or the membership of the BAC is expanded to include members with specialized knowledge on ICT, the BAC is strongly encouraged to conduct a pre-procurement conference, as circumstances warrant, before the Procuring Entity proceeds with the procurement.
The timing of and procedure for holding a pre-procurement conference for ICT procurement, and the participants thereto, are as indicated in the GPM. The Procuring Entity may request the ICTO to send a representative to help address pre-procurement issues.
SECTION 3
INSTRUCTIONS ON THE PROCEDURAL STEPS FOR ICT PROCUREMENT
Competitive Bidding
The procedural steps for ICT procurement are as detailed in the GPM. However, the following guidelines apply to facilitate smooth, fair and transparent ICT procurement.
NCC Accreditation
The NCC shall maintain a central registry of entities qualified to bid for ICT procurement. At the beginning of every calendar year, the NCC shall require the submission of basic documentary requirements as it deems necessary to establish the legitimacy of prospective bidders. Prospective bidders who are found by the NCC to be compliant with its procedure and requirements shall be issued a Certificate of Compliance which effectively pre-qualifies them. Documents already submitted to the NCC as a requirement for the issuance of such certificate do not have to be re-submitted to the Procuring Entity to establish eligibility to bid.
Bid Evaluation Process
Bid evaluation shall follow the process specified in the GPM Volume 2 which shall include:
Information and Communications Technology Office Page 24 Manual of Procedures for Procurement of ICT Preliminary evaluation during bid opening Detailed technical evaluation Detailed price evaluation for completeness and arithmetic errors
Detailed Evaluation against the technical specifications is greatly simplified if the Procuring entity adopts the Bid Evaluation Template discussed in an earlier section (reference).
At the point of bid evaluation, Columns A and B should be filled up with the following information respectively:
The Technical Requirements The Bidders detailed response
The designated evaluators will simply need to fill in Column C. They would need to fill in Column C with an assessment of whether the bidders meet the specific requirement. Financial evaluation, and if applicable, the merging of technical and financial scores are as defined in the General Procurement Manual.
Proof-of-Concept requirement at the post-qualification stage
For ICT procurement involving applications development, customization of software packages, or interfacing of/to existing applications, where the deliverables are still to be built, buyers usually have to rely on track record, methodologies and similar relatively intangible criteria which is sometimes tantamount to evaluating promises made in the bids. Frequently, a buyer finds that quite a number of these promises are not kept e.g. very nicely structured methodologies are not followed, etc.
Accordingly, in order to reduce the risk of contracting with bidders who promise a lot but cannot deliver, the Procuring Entity may require a Proof of Concept (POC), whereby the winning bidder is first asked to come up with and demonstrate a working prototype of a critical component of the system to be built BEFORE the actual contract is signed. Through this exercise, the Procuring Entity will be reasonably assured that he will be contracting with a party that has the capability to deliver on its promises.
The POC will be conducted at the cost of the bidder the bidder shall be responsible for providing all the hardware, software and services needed for the systems development and subsequent demonstration. The Procuring Entitys responsibility is limited to providing requirements and perhaps test data.
Because of the cost to be borne by the bidder doing the POC, it should be required only as a post qualification step, that is, only the lowest evaluated bidder will be asked to do the POC as a pre- requisite to contracting. In this way, bidders with no chance of getting the contract will not need to spend time and effort for a POC. Similarly the buyer will need to conduct hopefully only one POC exercise.
Information and Communications Technology Office Page 25 Manual of Procedures for Procurement of ICT
In the event that the POC for the lowest evaluated bidder fails, the Procuring Entity can proceed to the second lowest evaluated bidder, just like in any other case of failed post qualification.
Should Procuring Entity decided include a POC requirement in their post qualification, this must be clearly stated in the Instruction to Bidders, and the bid documents should clearly define the scope and specifications for the POC exercise, as well as the minimum criteria (in pass/fail language) for successful POC. The procurement schedule should also provide ample time (at least one month) for the conduct of the POC before contracting. The scope of the POC should be commensurate with the amount of time being given the bidder to come up with the system.
SECTION 4
GUIDELINES ON CONTRACT IMPLEMENTATION FOR ICT PROCUREMENT OF GOODS
Dispute Resolution
In addition to the provisions in the GPM on Contract Implementation, the contract governing all ICT procurement shall contain a clause providing that any and all disputes arising from the implementation of any government procurement contract shall be submitted to arbitration in the Philippines according to the provisions of Republic Act No. 876, otherwise known as the Arbitration Law. Arbitration is similar to court litigation but the case is tried before a private panel appointed by the parties. The following clause is suggested:
Any and all disputes arising out of, or in connection with, the interpretation, implementation, expiration or termination of this contract shall be submitted to arbitration before the Philippine Dispute Resolution Center, according to the provisions of Republic Act No. 876, otherwise known as the Arbitration Law and the rules in force in said institution.
Information and Communications Technology Office Page 26 Manual of Procedures for Procurement of ICT ANNEX 1 ICT PROCUREMENT FLOWCHART
ICT PROCUREMENT FLOWCHART 1
Procurement of Hardware, Off-the-Shelf Software and Ancillary Services (e.g. installation, maintenance, warranty, etc.)? B Use PhilGEPS or guidelines and SBDs for Procurement of ICT Goods YES NO Procurement of Consulting Services on time and materials basis? A Use PhilGEPS or guidelines and SBDs for Procurement of ICT ICT Consulting Services YES NO
Information and Communications Technology Office Page 27 Manual of Procedures for Procurement of ICT ANNEX 2 NCC WEIGHTED SCORING METHOD
EVALUATION METHODOLOGY GUIDE ANNEX D
I. Introduction
The recommended approach in the evaluation of system integration projects is the Multi- level Weighted Scoring Technique using Relative Rating. Associated with this approach is the use of the two-envelope system. This method assumes that the criteria and corresponding weights distribution have been predetermined and published with the bid documents issued.
The weight distribution between the technical and the cost aspects should advisably be on a 50%-50% ratio. However, if the agency feels that emphasis should be given to either technical or cost aspect, the most it should consider is a 60%-40% ratio.
This guideline is focused on the process undertaken by the Technical Evaluation Committee (TEC), a sub-committee created by the Bids and Awards Committee (BAC-ICT) to assist in the detailed technical evaluation of bids.
Weighted scoring is promoted to allow agencies to discriminate on the importance of the bid features to their specific requirements especially with respect to their Information Systems Development Plan (ISDP).
The Relative Rating Technique is adopted to promote maximum objectivity in scoring. The judgmental way of rating spawns controversies which should be minimized as much as possible.
This methodology is also most convenient in the case of complex bids where hardware, software, communications, applications development, training, change management, site engineering and preparation, facilities management and financing are packaged as one bid.
Information and Communications Technology Office Page 28 Manual of Procedures for Procurement of ICT
II. Evaluation of Technical Aspect (1 st Envelope)
1. Establishment of Technical Responsiveness Checklist (TRC)
All technical envelopes are opened and a thorough review of all proposals are conducted to establish the TRC sheets. The TRC sheets are item by item tables or listings presenting the abstract of the technical features of all the proposals. The document is prepared by extracting essential information, primarily the features to be rated, from the bid proposals documents.
The TRC sheets facilitate case of comparison and rating of the proposals in as much as proposals are not usually presented in a uniform manner notwithstanding the prescribed proposal format instructions. This document must be written in sufficient detail as it also serves as a quick reference to every question that may arise regarding a technical feature of a bid.
At the Agencys option, the Agency may require the vendor to fill-up the TRC sheets in the prescribed format and attach it as an integral part of the proposal. Any discrepancy with the actual contents of the proposal must be clarified with the bidder and if the latter is proven to have willfully provided wrong information in the TRC sheets to mislead the evaluators, this will constitute a sufficient ground for rejecting the proposal.
2. Validation of Features in the TRC Sheets
Validation of features in the TRC sheets is an integral part of the evaluation process, especially when the preparation of the TRC sheets is divided among the members of the TEC because of the tediousness of the work involved. Every feature entered in the TRC sheets must be verified as true and correct as the integrity of the result of the technical evaluation depends heavily on the accuracy of the entries in the TRC sheets. The evaluators must see to it that data entered in the TRC sheets are denominated in the same units and are comparable across various bids.
Information and Communications Technology Office Page 29 Manual of Procedures for Procurement of ICT
3. Preparation of Score Sheets and Entry of Responses
The next step is to set up the score sheets. The criteria and weight cells are filled up with the criteria and corresponding weight distribution announced to bidders. Then, using the TRC sheets as reference, the features cells are filled with the actual features of each proposal. To maintain the security of data in the worksheets, codes maybe substituted for bidders name so that data will not fall in the wrong hands even if the worksheets are accidentally leaked out.
4. Relative Scoring of the Basic Features
A. For features measured quantitatively, where direct measurement and quantification is not possible, a rating scale may be adopted as follows:
Nonexistent = 0 Poor = 20 Fair = 40 Average = 50 Good = 60 Very Good = 80 Excellent = 100
In this case, each evaluator assesses the feature by the qualitative description above and the corresponding score is used for averaging the rating of all the evaluators.
A variation of the methodology can be adopted whereby the two scores voted on by the most number of evaluators are used as choices for the next iteration of voting done by the evaluators. This is done until the voters agree en banc on the final score.
To minimize the bias in scoring or undue influence from other members, the TEC Chairman shall announce each criteria and the corresponding scoring guidelines for evaluators prior to secret voting. The advantages/disadvantages of each feature for consideration are tabulated on the board and explained to the body before the actual scoring. Each evaluator would then take turns in defending his score before the other members. Only those who have read the bids being scored must participate in the voting.
5. Computation of the Weighted Score
Weighted score is simply the raw score times the weight allocated to a criterion. For multi-level scoring, start computing the weighted score at the lowest level, then roll them upwards.
Information and Communications Technology Office Page 30 Manual of Procedures for Procurement of ICT
It is advisable to use a spreadsheet software in the preparation of the score sheets as formulae could be embedded in the tables to attain a fast and accurate computation of scores.
6. Establishment of Relative Technical Score
Finally, the total bidders are normalized so that the positioning of a certain bidder in a given range of the values is determined. The relative technical score of a specific bidder is computed as follows:
RTS =
Where: = feature value being scored = highest feature value
III. Evaluation of Cost Aspect (2nd Envelope)
The methodology continues with the evaluation of the cost aspect of the bids. Levelled costs are established and relative cost scores are computed for each bidder/proponent:
1. Establishment of Levelled Cost figures
Levelled cost figures are established by adding to the raw cost quotation the cost of the products/services bidded on but were not included by the bidders/proponents in their cost proposals. If the costs are not provided by the bidder/proponent, the highest cost provided for by the other bidders/proponents in this category shall be added to the cost. This may include costs for warranties, add-in system components, and all other aspects not reflected in the products/services bidded on.
Cost evaluation of proposals could be done by computing for the net present value of the levelled costs of the proposed equipment (hardware, software, maintenance) over the useful life of the proposed systems.
h
k
x 100 h
k
Information and Communications Technology Office Page 31 Manual of Procedures for Procurement of ICT
Using a zero interest rate, the cost of the proposed system will be taken per se for each projected year of use. The first year cost will be the same for the second year cost and so forth. The yearly cost will be summed up and added to the initial cost or one-time- charges to get the total system cost for a specified number of years. However, if a discounting rate other than zero is used, say 20%, the following formula is used:
DC n =
Where DC n is the discounted cost for the year n PC n is the actual cost for the year n i is the interest n is the year number (0 for initial year, 1 for year 1, )
After computing for the yearly discounted cost (DC n ) of each item (rental/lease, maintenance, software, etc.), the yearly cost is summed up and added to the one-time charges for the initial year to get the total equipment cost for a specified number of years (n = 1, 2, , k, where there are k years in the proposal for each vendor).
In formula form,
Total Present Value Cost = DC n
Where there are K years being considered in the comparative table of costs for all the bidder/proponent proposals.
(l + i) n
PC n
K n = l
Information and Communications Technology Office Page 32 Manual of Procedures for Procurement of ICT
It is recommended that twenty percent (20%) interest rate be adopted when evaluating the present value cost of proposals. However, this may change depending on the discounting rate of money thru k years considered. With this option, the agency would be in a better position to see how much the equipment would presently cost if paid one time.
2. Taking the Relative Cost Scores
The Relative Cost Score (RCS) of the resulting net present value costs are then computed. The RCS for a specific proposal is computed using the following formula:
RCS =
Where C h = the highest net present value cost proposal C k = the net present value cost proposal of a specified bidder k C l = the lowest net present value cost proposal
IV. Integration of Relative Technical and Cost Scores and Ranking of the Bidders
After the evaluation of the costs, the relative technical scores are integrated with the relative cost scores to derive the final score and the overall ranking of the bidders/proponents.
The final score for a bidder/proponent is made by taking a weighted relative scores for both technical and cost aspects. This is done by applying weights W t for technical and W c for cost and adding up the products.
In terms of formula,
Final Score = (RTS x Wt) + (RCS x Wc)
Where RTS is the relative technical score, RCS is the relative cost, and W t and W c are the weights distribution between the Technical and cost aspects
C h
C h C k + C l
x 100
Information and Communications Technology Office Page 33 Manual of Procedures for Procurement of ICT
The overall ranking is then made on the basis of the final score. The bidder with the highest final score is ranked as number 1 and the rest of the bidders in descending order. Equal totals are given the same rank.
V. Submission of the Evaluation Results to the BAC-ICT
The TEC at this point presents the results of the evaluation to the BAC-ICT. A summary report containing the overall ranking of the bidders from highest to lowest, the evaluation criteria and methodology used, and the final copies of the TRC sheets and score sheets are prepared and signed on every page by the members of the TEC for submission to the BAC- ICT.
Information and Communications Technology Office Page 34 Manual of Procedures for Procurement of ICT ANNEX 2A - EVALUATION OF SYSTEMS INTEGRATION PROJECTS TECHNICAL RESPONSIVENESS CHECKLIST (Additional Requirement for Technical Specifications- Section VI. Technical Specifications) Sample TRC
Name of Bidder: Item Description Minimum Specifications Bidders Offer 1 GENERAL SPECIFICATIONS
(Insert general technical requirements here such as power requirements, language support, safety and Environmental standards, specific locations of delivery, etc.)
2 PRODUCT SPECIFICATIONS
Product Please Specify Model Name Please Specify Copier Machine Price shall include the following units or options
with Auto Reverse Document Feeder for back-to-back copying 40-50 sheets capacity with built-in duplex unit or equivalent feature 250-300 sheets capacity with two (2) paper feeder unit 50-100 sheets, Size: A3-A5 with multi-purpose or bypass tray with pedestal Copy/Engine Speed: 21-26 pages per minute, Size: A4 (8 " x 11")
Resolution: 600 x 600 dpi (scan/copy) Time to first copy: 10 seconds or less Multiple copy: up to 999 copies Warm up time 45 seconds or less Zoom 25-400 % (1 step increment/step) Memory: Standard: 32 MB, Please specify Paper Input Capacity Standard tray: 2 -250-300 sheets universal paper cassette (A3,A4,A5,ledger, legal,etc.) By-pass tray: 50-100 sheets (size: A3-A5)
Paper Size: Universal Size (A3,A4.A5,ledger,legal, etc.)
Dimension (WxDxH) Please specify manufacturer standard
Weight: Please specify manufacturer standard
Power Source: 220-240V, 50/60 Hz Power Consumption Please specify manufacturer standard
Please specify other feature of your product:
Warranty and After-Sales Services: Please specify your offer.
Information and Communications Technology Office Page 35 Manual of Procedures for Procurement of ICT
Technical Responsiveness Checklist (Additional Requirement for Technical Specifications- Section VI. Technical Specifications)
Evaluation of TRC (Goods)
Name of Bidder: ECOPY CORPORATION PHILCOPY CORPORATION OTUS COPY SYSTEMS, INC.
(Insert general technical requirements here such as power requirements, language support, safety and Environmental standards, specific locations of delivery, etc.)
2 PRODUCT SPECIFICATIONS
Product Please Specify SHARP Digital Passed Digital Copier Passed Fuji Xerox Passed
Model Name Please Specify AR 5726/RP10 Passed KYOCERA Taskalfa 220 Passed DocuCentre- III 2007 Passed
Copier Machine Price shall include the following units or options
with Auto Reverse Document Feeder for back-to-back copying 40-50 sheets capacity 100 Sheets cap. Passed 50-sheets cap. (DP-420) Passed 75-sheets cap.
Passed
with built-in duplex unit or equivalent feature
with built in duplex unit Passed with DU-420 Duplex Unit Passed Duplex module equipped Passed
with two (2) paper feeder unit 250-300 sheets capacity 2-500 sheets paper tray Passed 2-300 sheets paper feeder Passed 4-500 sheets feeder unit Passed
Power Consumption Please specify manufacturer standard 1.45 KW Passed 437w copying, 60w standby Passed
1.920W(Max.) , 686W (Running), Passed
Please specify other feature of your product: Please refer to Annex "2" Passed As stated in the statement of compliance Passed As stated in the statement of compliance Passed
Warranty and After-Sales Services: Please specify your offer. One year warranty & Lifetime free service Passed Parts warranty: One (1) year or 150,000 copies Service Warranty: Two (2) years Passed Three (3) years parts replacement warranty; lifetime on service Passed REMARKS COMPLY COMPLY COMPLY
Information and Communications Technology Office Page 37 Manual of Procedures for Procurement of ICT
Name of Bidder: BIDDER 1 Bidder 2
Specification Offered POINTS Specification Offered POINTS Item Description Approved Budget for Contract Minimum Specifications Bidder's Offer GENERAL WORK SPECIFICATIONS:
I. Project Management PhP 200,000 Quality Based evaluation 20% 20% Service Set-up System Installation three weeks
Quality Assurance and Testing four weeks
Agents System Testing classroom instruction
Supervisors Systems Testing classroom instruction
Documentation Loose leaf
II. Manpower and Facilities (1-yr Subscription) PhP 11,700,000 Least Cost
Annual Manpower salaries/benefits and facilities for 15 seats with the agents (generalists, team leaders and supervisor)
A. Customer Relationship Management Software Quality Based evaluation 25% 25% Application Development Tools Workflow Management
IVR Scripts
Call Tracking Capability
Call Handling Capability
B. ISP for the 6 participating agencies - 1 yr PhP 12,000,000 Least Cost
Information and Communications Technology Office Page 38 Manual of Procedures for Procurement of ICT Leased Line and Subscription to an ISP provider for each of the 6 agencies with 3 mbps bandwidth (CIR)
C. Call Charges PhP 11,000,000 Least Cost
III. Build-up of Knowledge Databases PhP 986,384 Quality- Based eval. 15% 15%
Policies and Procedures Manual
Complilation of Generalized and Specialist Information from FAQ Book
IV. Capability Building of CCB Team PhP 3,132,000 Quality-Based evaluation 20% 20%
Group Competency Development Plan
Training Modules for Supervisors, Generalists and Specialists
Conduct of Training (30 people)
V. Assessment of Networking Facilities Quality-Based evaluation 20% 20%
100% 100%
Cost Passing Score (CSP) = 75 Technical Passing Score (TSP) = 75 lowest passing technical score RCS1 * 0.4 (TS1 / TSP) * 0.6 Where RCS1 is Financial Score Bidder1 and computed as shown in III.2 above Where TS1 is TechScore - Bidder1 and computed as shown in II.6 above
Information and Communications Technology Office Page 39 Manual of Procedures for Procurement of ICT Computation of TCO (in the planning phase) The hurdle TCO must be specified in the technical specifications.
B. Computation of Consumable items using the Maximum Reference Useful Life as validated. Ref. No. List of Consumable Items QTY TENDERING OFFICES/FIRM Computation of Consumable Items using Maximum Reference Life R A N K Remarks OTUS COPY SYSTEMS, INC. Unit Price Copy Life Cost/page Copy Life Total Cost Copylife was based on the actual price offered. 1 Toner 1.0 3,754.00 25,000.00 0.15 25,000.00 3,754.00 2 Drum 1.0 7,908.00 55,000.00 0.14 150,000.00 21,567.27 3 Developer 1.0 N/A - 100,000.00 0 Total Cost of Consumable Items (Pesos) 25,321.27 2
Ref. No. List of Consumable Items QTY TENDERING OFFICES/FIRM Computation of Consumable Items using Maximum Reference Life R A N K Remarks ECOPY CORPORATION Unit Price Copy Life Cost/page Copy Life Total Cost Copy life was based on the validated price and its estimated useful life. 1 Toner 1.0 8,278.00 25,000.00 0.33 25,000.00 8,278.00 2 Drum 1.0 2,219.00 75,000.00 0.03 150,000.00 4,438.00 3 Developer 1.0 1,684.00 75,000.00 0.02 150,000.00 3,368.00 Total Cost of Consumable Items (Pesos) 16,084.00 1
Ref. No. List of Consumable Items QTY TENDERING OFFICES/FIRM Computation of Consumable Items using Maximum Reference Life R A N K Remarks PHILCOPY CORPORATION Unit Price Copy Life Cost/page Copy Life Total Cost Copy life was based on the actual price offered. 1 Toner 1.0 6,944.00 15,000.00 0.46 25,000.00 11,573.33 2 Drum 1.0 16,800.00 150,000.00 0.11 150,000.00 16,800.00 3 Developer 1.0 - 100,000.00 - 100,000.00 - Total Cost of Consumable Items (Pesos) 28,373.33 3
Information and Communications Technology Office Page 40 Manual of Procedures for Procurement of ICT
COMPUTATION OF TOTAL COST OF OWNERSHIP (TCO)
A. Suppliers Offered for Consumable Items
Ref. No. List of Consumable Items QTY TENDERING OFFICES/FIRM REMARKS OTUS COPY SYSTEMS, INC. ECOPY CORPORATION PHILCOPY CORPORATION Unit Price Copy Life Unit Price Copy Life Unit Price Copy Life ICT GOODS GOODS 1 Total Cost of the Unit 10.0 120,000.00 1,200,000.00 120,900.00 1,209,000.00 119,000.00 1,190,000.00 PhilCopy 2 Total Cost of Consumable Item 1.0 25,321.27 25,321.27 16,084.00 16,084.00 28,373.33 150,000.00 ECOPY (LERB) Total Cost of Ownership 1,225,321.27 1,225,084.00 1,340,000.00
Information and Communications Technology Office Page 41 Manual of Procedures for Procurement of ICT ANNEX 3 - LIST OF ICT EQUIPMENT, GOODS AND SERVICES
1. Computer Systems
1.1. Central Processing Unit
The Central Processing Unit (CPU), also known as CPU, is the main processing chip of a computer. This chip processes the information that the various components in the computer pass to it. In current times the speed of the CPU is rated in Mhz or Ghz. (Source: bleepingcomputer.com) http://www.bleepingcomputer.com/glossary/definition79.html
1.2. Desktop PCs
A desktop computer is a type of personal computer used in a stationary location. Desktop computers come in a variety of sizes, colors and styles and have widely shaped the technology world and the way people communicate, document and create. (Source:eHowTech) http://www.ehow.com/about_5070744_definition-desktop-pcs.html
1.3. Portable/Laptop Computer
Portable/Laptop computer is a portable personal computer light and small enough to sit on a person's lap. A laptop computer can be powered by battery or plugged into the wall. (Source: About.com Operations/Technolgy) http://operationstech.about.com/od/glossary/g/Definition-Of-Laptop- Computer.htm
1.4. Tablet/Pocket PC/Personal Digital Assistant/Smart Phone
Tablet computers, commonly referred to as tablet PCs, are wireless portable personal computers that utilize a touchscreen or a stylus pen to access or process information. (Source: eHowTech) http://www.ehow.com/facts_6898001_definition-tablet-computer.html
A Pocket PC (P/PC, PPC) an operating environment for handheld computers from Microsoft, based on the Windows CE operating system. In 2000, Microsoft introduced the Pocket PC, which included Pocket Office applications (Internet Explorer, Word and Excel), handwriting recognition, an e-book reader and wireless Internet. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=Pocket+PC&i=49428,00.asp
PDA (personal digital assistant) is a term for any small mobile hand-held device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedule calendars and address book
Information and Communications Technology Office Page 42 Manual of Procedures for Procurement of ICT information handy. These include Hewlett-Packard's Palmtop and 3Com's Palm Pilot. (Source: SearchMobileComputing) http://searchmobilecomputing.techtarget.com/definition/personal-digital-assistant
Smart Phone - A cellular telephone with built-in applications and Internet access. In addition to digital voice service, modern smartphones provide text messaging, e-mail, Web browsing, still and video cameras, MP3 player and video playback and calling. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,2542,t=Smartphone&i=51537,00.asp
1.5. Server
Server is a software program, or the computer on which that program runs, that provides a specific kind of service to client software running on the same computer or other computers on a network. (Source: The Linux Information Project) http://www.linfo.org/server.html
1.6. Workstation
A workstation is a computer dedicated to a user or group of users engaged in business or professional work. It includes one or more high resolution displays and a faster processor than a personal computer (PC). (Source: Technopedia) http://www.techopedia.com/definition/5140/workstation-ws
1.7. Minicomputer
A minicomputer is a type of computer that possesses most of the features and capabilities of a large computer but is smaller in physical size. A minicomputer may also be called a mid-range computer. (Source: Technopedia) http://www.techopedia.com/definition/4615/minicomputer
1.8. Mainframe
A mainframe (also known as "big iron") is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer. (Source: SearchDataCenter) http://searchdatacenter.techtarget.com/definition/mainframe
2. Input/Output Device
2.1. Barcode Reader
Electronic device that scans a barcode by shining a laser beam on it. Barcode readers (unlike magnetic-stripe readers) are 'non-contact' automatic data capture devices, operate only at short distances (a few inches), and (unlike in radio frequency
Information and Communications Technology Office Page 43 Manual of Procedures for Procurement of ICT identification) do not provide 'out of line of sight' reading. (Source: BusinessDictionary.com) http://www.businessdictionary.com/definition/barcode-reader.html
2.2. CCTV/Video Camera
(Closed Circuit TV) A surveillance system comprised of cameras, recorders and displays that is used to monitor activities in a store or company.
A private television system involving one or more cameras connected to one or more monitors for security, surveillance, law enforcement, and general purpose monitoring applications. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=CCTV&i=59748,00.asp
2.3. Digital Camera
Digital camera records and stores photographic images in digital form. Many current models are also able to capture sound or video, in addition to still images. (Source: SearchMobileComputing) http://searchmobilecomputing.techtarget.com/definition/digital-camera
2.4. Digital Copier
Copying system that converts reflected light off an original into an electronic digital pattern (pixels) via a CCD and system controller for storage in memory or for imaging the photoconductor with a laser beam, LED array, or ink jet. (Source: Precision Roller) http://www.precisionroller.com/definition/digital-copier/
2.5. Digitizer
Digitizers convert analog or physical input into digital images. This makes them related to both scanners and mice, although current digitizers serve completely different roles. (Source: eHowTech) http://www.ehow.com/facts_5070215_digitizer.html
2.6. Facial Scanner
Facial recognition software is an application that can be used to automatically identify or verify individuals from video frame or digital images. (Source: Technopedia) http://www.techopedia.com/definition/26948/facial-recognition-software
2.7. Fingerprint Scanner
A scanner used to identify a person's fingerprint for security purposes. After a sample is taken, access to a computer or other system is granted if the fingerprint matches the stored sample. (Source: PCMAG.COM)
Information and Communications Technology Office Page 44 Manual of Procedures for Procurement of ICT http://www.pcmag.com/encyclopedia_term/0,1237,t=fingerprint+reader&i=43211,00. asp
2.8. Image Scanner
An image scanner is a digital device used to scan images, pictures, printed text and objects and then convert them to digital images. Image scanners are used in a variety of domestic and industrial applications like design, reverse engineering, orthotics, gaming and testing. (Source: Technopedia) http://www.techopedia.com/definition/25331/image-scanner
2.9. Iris Scanner
Iris cameras perform recognition detection of a persons identity by mathematical analysis of the random patterns that are visible within the iris of an eye from some distance. It combines computer vision, pattern recognition, statistical inference and optics. (Source: findbiometrics) http://www.findbiometrics.com/iris-recognition/
2.10. RFID Reader
A transmitter/receiver that reads the contents of RFID tags in the vicinity. Also called a "Radio Frequency Identification interrogator." (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=RFID+reader&i=56953,00.asp
2.11. Keyboard
External input device used to type data into some sort of computer system whether it be a mobile device, a personal computer, or another electronic machine. Source: BusinessDictionary.com) http://www.businessdictionary.com/definition/keyboard.html
2.12. Light Pen
A light-sensitive stylus wired to a video terminal used to draw pictures or select menu options. The user brings the pen to the desired point on screen and presses the pen button to make contact. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=light+pen&i=46079,00.asp
2.13. Microphone
An instrument that converts sound waves into an electric current, usually fed into an amplifier, a recorder, or a broadcast transmitter. (Source: Answers) http://www.answers.com/topic/microphone
Information and Communications Technology Office Page 45 Manual of Procedures for Procurement of ICT 2.14. MIDI Keyboard/Other Digital Musical Instruments
MIDI (Musical Instrument Digital Interface) is a protocol designed for recording and playing back music on digital synthesizers that is supported by many makes of personal computer sound cards. (Source: SocioCIO-Midmarket http://searchcio-midmarket.techtarget.com/definition/MIDI
2.15. Motion Sensor
A device used to detect motion by receiving infrared radiation. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=PIR+sensor&i=60092,00.asp
2.16. Mouse
A mouse is a small device a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position. (Source: SearchExchage) http://searchexchange.techtarget.com/definition/mouse
2.17. Palm Scanner
A scanner that is moved across the image to be scanned by hand. (Source: Your Dictionary) http://computer.yourdictionary.com/handheld-scanner
2.18. Touch Screen
A touch screen is a computer display screen that is also an input device. The screens are sensitive to pressure; a user interacts with the computer by touching pictures or words on the screen. (Source: SocioCIO-Midmarket) http://searchcio-midmarket.techtarget.com/definition/touch-screen
2.19. Web Camera
A video camera that attaches to a computer typically via USB or that is built into a laptop or desktop screen. (Source: Your Dictionary) http://computer.yourdictionary.com/webcam
2.20. 3D Scanner
3D scanning is the process of capturing digital information about the shape of an object with equipment that uses a laser or light to measure the distance between the scanner and the object. (Source: Absolute Geometrics) http://www.absolutegeometries.com/3D-Scanning.html
Information and Communications Technology Office Page 46 Manual of Procedures for Procurement of ICT 2.21. Software
Software is a set of instructions that cause a computer to perform one or more tasks. The set of instructions is often called a program or, if the set is particularly large and complex, a system. Computers cannot do any useful work without instructions from software; thus, a combination of software and hardware (the computer) is necessary to do any computerized work. (Source: European Information Technology Observatory) http://www.eito.eu/WebRoot/Store15/Shops/63182014/MediaGallery/Categories/Rep orts/EITO2012_Definitions_and_Methodology.pdf
2.22. Other IT equipment
IT equipment is defined as technological hardware used in the processing of information in the form of data (input, process, output, communication, and storage). It includes computer systems (client and server devices), system peripherals (printers and MFPs), media tablets, storage hardware and other hardware. (Source: European Information Technology Observatory) http://www.eito.eu/WebRoot/Store15/Shops/63182014/MediaGallery/Categories/Rep orts/EITO2012_Definitions_and_Methodology.pdf
2.23. ICT equipment
ICT equipment means desktop computers, laptops, servers, monitors, printers, audio- visual (AV) equipment, software and network equipment, but excludes IT consumables such as printer cartridges. (Source: Organisation for Economic Co-operation and Development 10-Jun-2009)
2.24. ICT goods must either be intended to fulfill the function of information processing and communication by electronic means, including transmission and display, use electronic processing to detect, measure and/or record physical phenomena, or to control a physical process. (Source: Organisation for Economic Co-operation and Development 10-Jun-2009, www.oecd.org/dataoecd/16/46/42978297.pdf)
3. Storage Devices
3.1. CD-ROM/RW
(Compact Disc Read Only Memory) A compact disc format used to store programs and data files. (Source: Your Dictionary) http://computer.yourdictionary.com/cd-rom
Information and Communications Technology Office Page 47 Manual of Procedures for Procurement of ICT 3.2. Compact Flash Card
CompactFlash (CF) is a removable storage device used for mass storage in portable electronic machines, such as PCs. (Source: Technopedia) http://www.techopedia.com/definition/25275/compactflash-cf
3.3. Computer Tape/Cartridge
A cartridge containing an endless loop of magnetic tape and designed for automatic use on insertion into a compatible sound or video recorder or computer system. (Source: Your Dictionary) http://www.yourdictionary.com/tape-cartridge
3.4. Floppy Disk
A floppy disk drive (FDD), or floppy drive, is a hardware device that reads data storage information. It was invented in 1967 by a team at IBM and was one of the first types of hardware storage that could read/write a portable device. (Source: Technopedia) http://www.techopedia.com/definition/24861/floppy-disk-drive-fdd
3.5. Hard Disk (Internal/External/Portable)
A hard disk is part of a unit, often called a "disk drive," "hard drive," or "hard disk drive," that stores and provides relatively quick access to large amounts of data on an electromagnetically charged surface or set of surfaces. (Source: SearchStorage http://searchstorage.techtarget.com/definition/hard-disk
The Memory Stick is a digital data storage technology with up to 10 times the storage capacity of a 3.5 diskette. (Source: SearchStorage) http://searchstorage.techtarget.com/definition/Memory-Stick
3.7. Multimedia Card (MMC)
A MultiMediaCard (MMC) is a tiny memory card that uses flash memory to make storage portable among various devices, such as car navigation systems, cellular phones, eBooks, PDAs, smartphones, and digital cameras, music players, and video camcorders, and personal computers. (Source: SearchCIO-MidMarket) http://searchcio-midmarket.techtarget.com/definition/MultiMediaCard
A Secure Digital (SD) card is a tiny memory card used to make storage portable among various devices, such as car navigation systems, cellular phones, eBooks,
Information and Communications Technology Office Page 48 Manual of Procedures for Procurement of ICT PDAs, smartphones, digital cameras, music players, camcorders, and personal computers. (Source: SearchStorage) http://searchstorage.techtarget.com/definition/Secure-Digital-card
3.9. SmartMedia Card
A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. (Source: BitPipe.com) http://www.bitpipe.com/tlist/Smart-Cards.html
3.10. Solid State Drive (SSD)
An SSD (solid-state drive or solid-state disk) is a storage device that stores persistent data on solid-state flash memory. SSDs actually aren't hard drives at all, in the traditional sense of the term, as there are no moving parts involved. (Source: SearchStorage) http://searchstorage.techtarget.com/definition/solid-state-drive
3.11. Storage Area Network (SAN)/Network Attached Storage (NAS)
A storage area network (SAN) is a type of local area network (LAN) designed to handle large data transfers. A SAN typically supports data storage, retrieval and replication on business networks using high-end servers, multiple disk arrays and Fibre Channel interconnection technology. (Source: About.com) http://compnetworking.about.com/od/networkstorage/g/storage_san.htm
3.12. USB Flash Drive
USB flash drives are compact file storage devices to save your information externally. Flash drives are about the size of a disposable lighter and can be conveniently worn around your neck or attached to your keychain. (Source: About.com) http://presentationsoft.about.com/od/uvw/g/usb_flash.htm
4. Printers
4.1. Barcode Printer
A barcode printer is a printer designed to produce barcode labels which can be attached to other objects. (Source: BusinessDictionary.com) http://www.businessdictionary.com/definition/bar-code-printer.html
4.2. Digital Copy Printer
Information and Communications Technology Office Page 49 Manual of Procedures for Procurement of ICT A copy machine that duplicates the image to be copied by scanning the original into a digital memory and printing from the memory. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=digital+copy+machine&i=4131 7,00.asp
4.3. Dot Matrix Printer
A printer that uses hammers and a ribbon to form images out of dots. It is widely used to print multipart forms and address labels. Also known as a "serial dot matrix printer," the tractor and sprocket mechanism in these devices handles thicker media better than laser and inkjet printers. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=serial+matrix+printer&i=41904, 00.asp
4.4. Impact Printer
An impact printer uses a mechanism called a "head" to strike an ink ribbon that places a character on a piece of paper. (Source: eHow Tech) http://www.ehow.com/about_5125377_definition-impact-printers.html
4.5. Ink Jet/Bubble Jet Printer
A type of ink-jet printer developed by Canon. The principal difference between bubble-jet printers and other ink-jet printers is that bubble-jet printers use special heating elements to prepare the ink whereas ink-jet printers use piezoelectric crystals. (Source: Webopedia) http://www.webopedia.com/TERM/B/bubble_jet_printer.html
4.6. Large Format Printer
A printer that prints on large paper, which can range from two to more than 15 feet in width. Such printers typically use inkjet technology to print on a variety of output, including premium glossy-coated paper for signs and posters. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=wide- format+printer&i=54454,00.asp
4.7. Laser Printer
A laser printer is a popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology. (Source: Whatls.com) http://whatis.techtarget.com/definition/laser-printer
4.8. Line Printer
Information and Communications Technology Office Page 50 Manual of Procedures for Procurement of ICT A high-speed printing device, primarily used in data processing, that prints an entire line of type as a unit instead of printing each character individually. (Source: Answer.com) http://www.answers.com/topic/lineprinter
4.9. Passbook Printer
As the name says passbook printers are used to print passbooks, cheques, demand drafts printing in banks. Nowadays all the banks use Passbook Printers. (Source: IndiaStudyChannel.Com) http://www.indiastudychannel.com/resources/144486-Introduction-Printers-An- overview.aspx
4.10. Plotter
A graphics printer that draws images with ink pens. It actually draws point-to-point lines directly from vector graphics files. The plotter was the first computer output device that could print graphics as well as accommodate full-size engineering and architectural drawings. Using different colored pens, it was also able to print in color long before inkjet printers became an alternative. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=xy+plotter&i=49385,00.asp
4.11. POS Printer
A point of sale/service (POS) machine is used to conduct retail transactions. It can provide many services, including credit card processing, check reading and cash transactions, depending on the model. (Source:eHow.com) http://www.ehow.com/about_5076476_definition-pos-machine.html
4.12. Serial Printer
A printer that uses a serial connection to the computer. A printer that prints a row of characters, one character at a time. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=serial+printer&i=51138,00.asp
4.13. Sticker Maker Printer
Barcode Label Maker is known to be making of multiple labels by application in different formats. Barcode Software can do several works to modify your generation of bar code to make products identity also customizes in number of features. Barcode tags is important for every products used in todays life in every sectors. As we know it used to implement data or identification related that particular within simple code in form of alpha numeric values within it. Each code define the certain identification for bar codes. (Source: Barcode Level Surface) http://www.barcodelabelsoftware.biz/barcodelabels/barcode-label-maker.html 4.14. Thermal Printer
Information and Communications Technology Office Page 51 Manual of Procedures for Procurement of ICT A thermal transfer printer is a non-impact printer that uses heat to register an impression on paper. (Source: Whatls.com) http://whatis.techtarget.com/definition/thermal-transfer-printer
5. Cards
5.1. Controller Card
A controller card is a hardware component that works as an interface between the motherboard and other computer components. (Source: Technopedia) http://www.techopedia.com/definition/5275/controller-card
5.2. Expansion Card
An expansion card is an electronic card/board that is used to add extra functionality to a computer. It is inserted into an expansion slot on the motherboard of a computer. (Source: Technopedia) http://www.techopedia.com/definition/5281/expansion-card
5.3. Video/Graphics Card
A graphics card is a mechanical device built into a computer that enables the user to see graphics and video faster and clearer. (Source: eHowTech) http://www.ehow.com/video_4973940_definition-graphics-card_.html
6. Multimedia
6.1. Headphone/Earphone
Headphones combined with a microphone. Used in call centers and by people in telephone-intensive jobs, headsets provide the equivalent functionality of a telephone handset with hands-free operation. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=headset&i=44185,00.asp
6.2. Multimedia Kit
A package of hardware and software that adds multimedia capabilities to acomputer. Typically a multimedia kit includes a CD-ROM or DVD player, a sound card, speakers, and a bundle of CD-ROMs. (Source:Webopedia) http://www.webopedia.com/TERM/M/multimedia_kit.html
6.3. Multimedia Projector System
A multimedia projector is a compact, high resolution, full-color projector capable of projecting text, images, video and audio content. (Source: eHowTech http://www.ehow.com/facts_6858260_definition-multimedia-projector.html
Information and Communications Technology Office Page 52 Manual of Procedures for Procurement of ICT
6.4. Multimedia Speaker System
A multimedia speaker system delivers multi-channel sound that seems to surround you. It has been specifically designed for computer listening - just right for music, games and movies. (Source: Bose) http://www.boseindia.com/retail/bose-product-detail.aspx?Prd_Id=68
7. Power Protection System
7.1. Automatic Voltage Regulator
A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. (Source: Wikipedia Dictionaries) http://test-dictionary.babylon.com/automatic_voltage_regulator/
7.2. Battery Charger
A rectifier unit used to change alternating to direct power for charging a storage battery. (Source: Answer.com) http://www.answers.com/topic/battery-charger-1
7.3. Emergency Power unit
Any source of hydraulic or electric power that permits controlled flight in glide subsequent to engine failure. (Source: Answer.com) http://www.answers.com/topic/emergency-power-unit
7.4. Surge Protector/Suppressor
A surge protector (or surge suppressor) is an appliance designed to protect electrical devices. (Source: Answer.com) http://www.answers.com/search?q=Surge+Protector%2FSuppressor
7.5. Uninterruptible Power Supply
A device that provides battery backup when the electrical power fails or drops to an unacceptable voltage level. Small UPS systems provide power for a few minutes; enough to power down the computer in an orderly manner, while larger systems have enough battery for several hours. (Source: Answer.com) http://www.answers.com/topic/uninterruptible-power-supply
8. System Memory Boards
8.1. Math co-processor
Information and Communications Technology Office Page 53 Manual of Procedures for Procurement of ICT A coprocessor is a computer processor used to supplement the functions of the primary processor (the CPU). (Source: Answer.com) http://www.answers.com/topic/memory-card
8.2. Memory Card
A small card, typically with dimensions of about 2 3 inches (5 8 centimeters), that can store information, usually in integrated circuits or magnetic strips. (Source: Answer.com) http://www.answers.com/search?q=Memory+Upgrade
8.3. Memory Module
Memory module is a broad term used to refer to a series of dynamic random access memory integrated circuits modules mounted on a printed circuit board and designed for use in personal computers, workstations and servers. (Source: Answer.com)
8.4. Memory Upgrades
An upgrade (UPG) is an updated version of existing hardware, software or firmware and is usually sold at a reduced price with a full version. (Source: Technopedia) http://www.techopedia.com/definition/4380/upgrade-upg
8.5. SIMM/DIMM RAM
A dual inline memory module (DIMM) is a small-scale circuit board that holds memory chips on the motherboard. DIMM incorporates a series of memory called dynamic random access memory (DRAM), which provides primary storage, the main memory that continually reads and executes stored instructions or data directly to the CPU. (Source: Technopedia) http://www.techopedia.com/definition/2768/dual-inline-memory-module-dimm
8.6. SDRAM/RDRAM/DDR3/DDR SDRAM stands for Double Data Rate Synchronous Dynamic Random Access Memory. Random Access means that the data stored on the chip does not need to be accessed sequentially, as opposed to data on a cassette tape, for example. (Source: eHowTech) http://www.ehow.com/about_6693094_difference-rdram-_amp_-ddr-sdram_.html
9. Data Communications and Networking Equipment
9.1. Adapters
A device that allows one system to connect to and work with another. An adapter is often a simple circuit that converts one set of signals to another; however, the term often refers to devices which are more accurately called "controllers. (Source: PCMAG.COM)
Information and Communications Technology Office Page 54 Manual of Procedures for Procurement of ICT http://www.pcmag.com/encyclopedia_term/0,1237,t=adapter&i=37499,00.asp
9.2. Bridges
A bridge device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments. (Source: About.com) http://compnetworking.about.com/cs/internetworking/g/bldef_bridge.htm
9.3. Echo Canceller
Transmission equipment designed to suppress echo in a two-way circuit by attenuating the signals propagating in one direction caused by reflected (i.e., echoed) signal currents in the other direction. (Source:Your Dictionary) http://computer.yourdictionary.com/echo-canceller
9.4. Fax Machines
A facsimile (fax) machine uses public switched telephone networks (PSTN) and the Internet for the electronic fax transmission of text and images. (Source: Technopedia) http://www.techopedia.com/definition/3590/facsimile-machine-fax-machine
9.5. Fax Modem/Card
A fax modem is an electronic device that transmits documentation to a fax machine or modem. Like data modems, fax modems are installed via motherboard, external Universal Serial Bus (USB) or parallel port. (Source: Technopedia) http://www.techopedia.com/definition/3003/fax-modem
9.6. Microwave Repeater System
A tower equipped with a receiver and transmitter for picking up, amplifying, and passing on in either direction the signals sent over a microwave network by highly directional microwave beams. Also known as microwave link; microwave relay. (Source: Answer.com) http://www.answers.com/topic/integrated-services-digital-network
9.7. Modem
A modem is a network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital information for processing. Modems accomplish both of these tasks simultaneously and, for this reason, the term modem is a combination of "modulate" and "demodulate." (Source: Technopedia) http://www.techopedia.com/definition/24118/modem
9.8. Multimedia Messaging System
Information and Communications Technology Office Page 55 Manual of Procedures for Procurement of ICT Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging System - is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable mobile phones and other devices. (Source: SearchMobileComputing) http://searchmobilecomputing.techtarget.com/definition/Multimedia-Messaging- Service
9.9. Multiplexers
A multiplexer (MUX) is a device allowing one or more low-speed analog or digital input signals to be selected, combined and transmitted at a higher speed on a single shared medium or within a single shared device. (Source: Technopedia) http://www.techopedia.com/definition/24124/multiplexer-mux
9.10. Network Desktop
A remote desktop is a separate program or feature found on most operating systems that allows a user to access an operating computer system's desktop. (Source: Technopedia) http://www.techopedia.com/definition/3421/remote-desktop
9.11. Network Interface Cards
A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network. (Source: SearchNetworking) http://searchnetworking.techtarget.com/definition/network-interface-card
9.12. Network PC Cards
An expansion interface developed by the Personal Computer Memory Card International Association (PCMCIA) that was popular on laptops in the 1990s and early 2000s. Also known as "PCMCIA cards," PC Cards are plug-in modules that contain devices such as a modem, network adapter, sound card, solid state drive or hard disk. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=PC+Card&i=48924,00.asp
9.13. Network Server
A network server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet. (Source: Answer.com) http://compnetworking.about.com/od/basicnetworkingconcepts/g/network_servers.ht m
9.14. Network Tools
Information and Communications Technology Office Page 56 Manual of Procedures for Procurement of ICT A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network. (Source: SearchNetworking) http://searchnetworking.techtarget.com/definition/network-tracking-tool
9.15. PABX/Telephone System/Cellular Phones
A PBX (private branch exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. The main purpose of a PBX is to save the cost of requiring a line for each user to the telephone company's central office. While Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication. (Source: Whatls.com) http://whatis.techtarget.com/search/query?q=Cellular+phone&techTermButton=Look +It+Up
9.16. Paging Systems
A pager is a small telecommunications device that receives (and, in some cases, transmits) alert signals and/or short messages. (Source: SearchMobileComputing) http://searchmobilecomputing.techtarget.com/definition/pager
9.17. PC Telex Interface Cards
PC telex adapter is PC telegraphic interface that provides communication between PC and public telex networks. In that manner, PC substitutes a stand-alone telex machine and provides a variety of possibilities, such as: text processing transfer, automatic dialing, message timing transmission, telegraph processing control etc. (Source: Decode) http://www.decode.rs/index.php/en/pc-telex/76-pc-telex-adapter
9.18. Remote Access Server
Remote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch offices, telecommuters, and people who are travelling may need access to the corporation's network. (Source: SearchMidMarketSecurity) http://searchmidmarketsecurity.techtarget.com/definition/remote-access
9.19. Routers
Routers are small physical devices that join multiple networks together. Technically, a router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model. (Source: About.com) http://compnetworking.about.com/cs/routers/g/bldef_router.htm
Information and Communications Technology Office Page 57 Manual of Procedures for Procurement of ICT
9.20. Repeater
Network repeaters regenerate incoming electrical, wireless or optical signals. With physical media like Ethernet or Wi-Fi, data transmissions can only span a limited distance before the quality of the signal degrades. (Source: About.com) http://compnetworking.about.com/cs/internetworking/g/bldef_repeater.htm
9.21. Signaling Converter
A device that changes the electrical or light characteristics of a signal. (Source: YourDictinary) http://computer.yourdictionary.com/signal-converter
9.22. Switches and Hubs
A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Technically, network switches operate at layer two (Data Link Layer) of the OSI model. (Source: About.com) http://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htm
9.23. Switching System
An assembly of switching and control devices provided so that any station in a communications system may be connected as desired with any other station. (Source: About.com) http://www.answers.com/topic/switching-system
9.24. Telephone Adaptor
A device that connects regular telephones to a broadband cable or DSL network for voice over IP (VoIP) service. The analog telephone adapter (ATA) provides the conversion between analog voice signals and IP packets, delivers dial tone and manages the call setup. (Source: From Free Dictionary) http://encyclopedia2.thefreedictionary.com/phone+adapter
9.25. Telephone Remote Control Power Controller
A computer system is configured to be powered up by a hand-held controller. The hand-held controller is in wireless communication with a computer. One or more buttons on the hand-held controller may be used to automatically launch a particular application program which has been pre-selected by a computer user after completing the power up process. (Source: Patent number: 7005966) http://www.google.com/patents/US7005966
9.26. Test and Measurement System
Information and Communications Technology Office Page 58 Manual of Procedures for Procurement of ICT These are tools used to analyze, validate, and verify measurements of electronic and mechanical systems. Due to the increasing need for greater accuracy and higher definition measurement, the tools involved in this industry are constantly developing to accommodate technological advancements in the industries they cater to. The test and measurement industry creates both general use and highly specialized tools and caters primarily to high-tech industrial, automotive, communications, and medical electronics industries.
An electronic device or circuit that transmits and receives analog or digital signals. It comes in many forms; for example, a transponder on a satellite, a network adapter in the computer or the voice circuits in a cellphone. (Source: PCMAG.COM) http://www.pcmag.com/encyclopedia_term/0,1237,t=transceiver&i=53081,00.asp
9.28. Trunked Mobile Radio
Trunking refers to the automatic and dynamic sharing of a small number of radio channels among a large number of radio users. Trunked Mobile Radio promises greater airtime efficiency, ease of use and higher availability, compared to other technologies. (Source: IntelliGrid) http://xanthus- consulting.com/IntelliGrid_Architecture/New_Technologies/Tech_Trunked_Mobile_ Radio_(TMR,_TETRA,_Project25).htm
9.29. Video Conferencing System/Kit
A videoconference is a live connection between people in separate locations for the purpose of communication, usually involving audio and often text as well as video. At its simplest, videoconferencing provides transmission of static images and text between two locations. At its most sophisticated, it provides transmission of full- motion video images and high-quality audio between multiple locations. (Source: SearchMobileComputing) http://searchmobilecomputing.techtarget.com/definition/videoconference
9.30. Voice Mail/Voice Messaging System
An electronic system that uses telephones and a computer to store and then deliver recorded voice messages or message or messages sent or stored in such a system. (Source: Your Dictionary) http://www.yourdictionary.com/voice-mail
9.31. Structured cabling
Structured cabling refers to a standardized way of connecting the wires that allow computers and other electronics to communicate and network. Structured cabling is
Information and Communications Technology Office Page 59 Manual of Procedures for Procurement of ICT widely used in data centers, campuses, offices, apartment buildings, hospitals, warehouses, manufacturing facilities, etc. and is based on two types of cables: copper and fiber optics. (Source: NU TEK Assemblies) http://www.cfsalesinc.com/what_is_structured_cabling.html
10. Other Data Communications Equipment
Data communications equipment (DCE) refers to computer hardware devices used to establish, maintain and terminate communication network sessions between a data source and its destination. DCE is connected to the data terminal equipment (DTE) and data transmission circuit (DTC) to convert transmission signals. (Source: Technopedia) http://www.techopedia.com/definition/1296/data-communications-equipment-dce
10.1. Portable/Laptop Computer
Portable/Laptop computer is a portable personal computer light and small enough to sit on a person's lap. A laptop computer can be powered by battery or plugged into the wall. (Source: About.com Operations/Technolgy)
10.2. Tablet/Pocket PC/Personal Digital Assistant/Smart Phone
Tablet computers, commonly referred to as tablet PCs, are wireless portable personal computers that utilize a touchscreen or a stylus pen to access or process information. (Source: eHowTech)
A Pocket PC (P/PC, PPC) an operating environment for handheld computers from Microsoft, based on the Windows CE operating system. In 2000, Microsoft introduced the Pocket PC, which included Pocket Office applications (Internet Explorer, Word and Excel), handwriting recognition, an e-book reader and wireless Internet. (Source: PCMAG.COM)
PDA (personal digital assistant) is a term for any small mobile hand-held device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedule calendars and address book information handy. These include Hewlett-Packard's Palmtop and 3Com's Palm Pilot. (Source: SearchMobileComputing)
Smart Phone - A cellular telephone with built-in applications and Internet access. In addition to digital voice service, modern smartphones provide text messaging, e-mail, Web browsing, still and video cameras, MP3 player and video playback and calling. (Source: PCMAG.COM)
10.3. Server
Information and Communications Technology Office Page 60 Manual of Procedures for Procurement of ICT Server is a software program, or the computer on which that program runs, that provides a specific kind of service to client software running on the same computer or other computers on a network. (Source: The Linux Information Project)
10.4. Workstation A workstation is a computer dedicated to a user or group of users engaged in business or professional work. It includes one or more high resolution displays and a faster processor than a personal computer (PC). (Source: Technopedia)
10.5. Minicomputer
A minicomputer is a type of computer that possesses most of the features and capabilities of a large computer but is smaller in physical size. A minicomputer may also be called a mid-range computer. (Source: Technopedia)
10.6. Mainframe
A mainframe (also known as "big iron") is a high-performance computer used for large-scale computing purposes that require greater availability and security than a smaller-scale machine can offer. (Source: SearchDataCenter)
11. ICT Consulting Services
11.1. ICT Project Management
This service consists of the discipline of planning, organizing, securing, managing, leading, and controlling resources to achieve specific goals of an ICT project. A project is a temporary endeavor with a defined beginning and end (usually time- constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value. http://en.wikipedia.org/wiki/Project_management
The art and discipline of completing and delivering project requirements on time and on budget. It includes project initiation, implementation planning, execution, monitoring and control, and closure. A project is a temporary endeavor undertaken to create a unique product, service or result for which costs and related information must be segregated and monitored. http://www.pmi.org
11.2. Information System Auditing
This service consists of an examination of the system controls within an IT architecture - which means the process of evaluating the suitability and validity of an organization's IT configurations, practices and operations. The evaluation of obtained
Information and Communications Technology Office Page 61 Manual of Procedures for Procurement of ICT evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. http://www.webpix.in/services/consultancy/information-system-auditing.html
11.3. ICT Management Auditing
This service consists of a systematic assessment of methods and policies of an organization's management in the administration and the use of resources, tactical and strategic planning, and employee and organizational improvement. The objectives of a management audit are to (1) establish the current level of effectiveness, (2) suggest improvements, and (3) lay down standards for future performance. Management auditors (employees of the company or independent consultants) do not appraise individual performance, but may critically evaluate the senior executives as a management team. See also performance audit. http://www.businessdictionary.com/definition/management-audit.html
It also covers an analysis and assessment of competencies and capabilities of a company's management in order to evaluate their effectiveness, especially with regard to the strategic objectives and policies of the business. The objective of a management audit is not to appraise individual executive performance, but to evaluate the management team in relation to their competition. http://www.investopedia.com/terms/m/management-audit.asp#axzz26Oqf9t4L
11.4. Risk Assessment and Evaluation
The service consists mainly of a scientific and quantitative exercise out coming from analysis of field and-or experimental data (e.g. modeled tsunami wave height) and from an overall understanding of the nature of the hazard and of vulnerable parameters (UNDP, 1994). Risk evaluation joins perceived risk to a more enlarged qualitative analysis including, for example, Cost benefits trade off and socio economic impact. http://www.un.org/Depts/oios/pages/risk_management.html
A step in a risk management procedure. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat (also called hazard). Quantitative risk assessment requires calculations of two components of risk (R):, the magnitude of the potential loss (L), and the probability (p) that the loss will occur. http://en.wikipedia.org/wiki/Risk_assessment
11.5. ICT Project Feasibility Study
This service aims to objectively and rationally uncover the strengths and weaknesses of an existing business or proposed venture, opportunities and threats as presented by
Information and Communications Technology Office Page 62 Manual of Procedures for Procurement of ICT the environment, the resources required to carry through, and ultimately the prospects for success. http://en.wikipedia.org/wiki/Feasibility_study
11.6. ICT Policy and Standards Design
This service covers the design of policy, procedures and standards as a process, the goal of which is to implement a policy infrastructure that allows IT to manage risk appropriately, yet meet business needs. http://www.disaster-resource.com/articles/07p_106.shtml
11.7. ICT Capacity Planning
Capacity planning is the science and art of estimating the space, computer hardware, software and connection infrastructure resources that will be needed over some future period of time. A typical capacity concern of many enterprises is whether resources will be in place to handle an increasing number of requests as the number of users or interactions increase. The aim of the capacity planner is to plan so well that new capacity is added just in time to meet the anticipated need but not so early that resources go unused for a long period. The successful capacity planner is one that makes the trade-offs between the present and the future that overall prove to be the most cost-efficient. http://searchenterprisewan.techtarget.com/definition/capacity-planning
11.8. Business Process Reengineering (BPR)
A business management strategy originally pioneered in the early 1990s, focusing on the analysis and design of workflows and processes within an organization. BPR aimed to help organizations fundamentally rethink how they do their work in order to dramatically improve customer service, cut operational, and become world- class competitors. http://en.wikipedia.org/wiki/Business_process_reengineering
11.9. Enterprise Architecture Formulation
The process of translating business vision and strategy into effective enterprise change by creating, communicating and improving the key requirements, principles and models that describe the enterprise's future state and enable its evolution. http://en.wikipedia.org/wiki/Enterprise_architecture
11.10. Information Systems Strategic Plan Formulation
The continuous review of computer technology, applications and management structure to ensure that the current and anticipated information and process needs of the organization are met in a way that provides an acceptable return on investment, is
Information and Communications Technology Office Page 63 Manual of Procedures for Procurement of ICT sensitive to the dynamic politics and culture of the organization and is aware of the sociological environment within which the organization exists. http://www.cse.dmu.ac.uk/~nkm/sisp/WHATIS.html
11.11. Information Systems Strategic Plan Evaluation
Executive Order No. 265 mandates all government agencies and instrumentalities, including local government units, to align their respective computerization projects with the priorities identified in the GISP. The National Computer Center, being the technical arm of the ITECC (now ICTO) is tasked to review and evaluate the agency Information Systems Strategic Plan (ISSP) to ensure that computerization projects in government are consistent with the priorities identified in the GISP. The ISSP serves as the building blocks for the GISP. http://www.ncc.gov.ph/default.php?a1=2&a2=4&a3=1
11.12. Formulation of Terms of Reference
The Terms of Reference (ToR) is the document that serves as the basis of a contractual relationship between the commissioner of an evaluation and the team responsible for carrying out the work. Devising the Terms of Reference is a vital step when an evaluation has to be performed by outside consultants. This work is equally important when part of the evaluation is performed in-house. The ToR may concern either the evaluation operation as a whole (when it is entrusted to a single team) or a part of the research work programmed in the evaluation project (in-depth analysis of an evaluative question). http://ec.europa.eu/regional_policy/sources/docgener/evaluation/evalsed/guide/design ing implementing/designing_planning/terms_ref_en.htm
11.13. Request for Proposal Formulation (RFP)
The service covers the formulation of a document utilized by many organizations to receive offers of services or goods from potential vendors. The exact structure for an RFP will vary from one situation to another. This means that the formula for how to write a request for proposal will depend a great deal on the culture of the entity that is issuing the request and what they hope to learn from the responses. Here are some examples of elements that are found in many requests for proposal regardless of the industry or organization involved. http://www.wisegeek.com/what-is-a-request-for-proposal-rfp.htm
11.14. ICT Procurement Management
Procurement Management includes the processes necessary to purchase or acquire products and services, or results needed from outside the project team. The organization can be either the buyer or seller of the products, services, or results. Project procurement management includes the contract management and change
Information and Communications Technology Office Page 64 Manual of Procedures for Procurement of ICT control processes required to develop and administer contracts or purchase orders issued by authorized project team members http://www.pmi.org
Procurement refers to the acquisition of Goods, Consulting Services, and the contracting for Infrastructure Projects by the Procuring Entity. Procurement shall also include the lease of goods and real estate. With respect to real property, its procurement shall be governed by the provisions of Republic Act No.8974, entitled "An Act to Facilitate the Acquisition of Right-of -Way Site or Location of National Government Infrastructure Projects and for Other Purposes" and other applicable laws, rules and regulations. http://www.coa.gov.ph/Bid/RA9184.asp
The process companies use to purchase economic resources and business input from suppliers or vendors. This process helps companies negotiate prices and get the best quality resources for production processes. Smaller businesses do not usually have a department dedicated to procurement since they have much smaller business operations. Usually, small business owners or entrepreneurs are responsible for working with vendors and suppliers to obtain the necessary goods for business operations. Larger companies are able to purchase resources and inputs in large volume quantities; high volume purchases usually require a procurement management process. http://www.wisegeek.com/what-is-procurement-management.htm
11.14.1. Bid Administration
Bid administration and tender administration are particular skills which are designed to create expert documentation and procedure, with a see to specifying a companys buying requirement precisely making certain that quality, appropriate suppliers are engaged, and on the other aspect of the fence, assisting these possible suppliers to construct a successful bid. http://inthreeeasysteps.com/78/bid-administration-and-tender- administration-are-particular-skills-which-are-designed-to-create-expert- documentation-and-procedure-with-a-see-to-specifying-a-companys- buying-requirement-precisely-m
11.14.2. Bid Engineering Services
"Engineering services" means any service or creative work, the adequate performance of which requires engineering education, training and experience in the application of special knowledge of the mathematical, physical and engineering sciences to such services or creative work as consultation, investigation, evaluation, planning and design of engineering works and systems, engineering studies and the review of construction for the purpose of assuring substantial compliance with drawings and specifications; any of which embrace such services or work, either public
Information and Communications Technology Office Page 65 Manual of Procedures for Procurement of ICT or private, in connection with any utilities, structures, buildings, machines, equipment, processes, work systems, projects and industrial or consumer products or equipment of a mechanical, electrical, hydraulic, chemical, pneumatic or thermal nature, insofar as they involve safeguarding life, health or property, and including such other professional services as may be necessary to the planning, progress and completion of any engineering services. Such practice includes the performance of architectural work incidental to the practice of engineering. "Engineering services" does not include responsibility for the superintendence of construction, site conditions, operations, equipment, personnel or the maintenance of safety in the work place. http://law.justia.com/codes/new- mexico/2011/chapter13/article1/section13-1-55/
11.14.3. Bid Evaluation Management
After the submission deadline, the process of opening, examining, and evaluating bids to determine the bidders' responsibility, responsiveness, and other factors associated with selection of a bid for contract award. http://www.businessdictionary.com/definition/bid- evaluation.html#ixzz294WnVNLJ
11.15. ICT Contract Management
This service consists of the management of contracts made with customers, vendors, partners, or employees. Contract management includes negotiating the terms and conditions in contracts and ensuring compliance with the terms and conditions, as well as documenting and agreeing on any changes or amendments that may arise during its implementation or execution. It can be summarized as the process of systematically and efficiently managing contract creation, execution, and analysis for the purpose of maximizing financial and operational performance and minimizing risk. http://en.wikipedia.org/wiki/Contract_management
11.16. ICT Security Audit
Systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria. A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. Security audits are often used to determine regulatory compliance, in the wake of legislation (such as HIPAA, the Sarbanes, and the California Security Breach Information Act) that specifies how organizations must deal with information. http://searchcio.techtarget.com/definition/security-audit
11.17. ICT Organizational Design
Information and Communications Technology Office Page 66 Manual of Procedures for Procurement of ICT
The manner in which management achieves the right combination of differentiation and integration of the organization's operations, in response to the level of uncertainty in its external environment. Differentiation refers to the subdivision of functional or departmental units, each concentrating on a particular aspect of the organization's operations. Integration refers to the linking of differentiated units to achieve unity of effort in working toward organization's goals. In times of high uncertainty, greater organizational is achieved through high differentiation coupled with high integration. In times of low uncertainty, low differentiation and low integration are more effective. See also organizational structure. http://www.businessdictionary.com/definition/organizational- design.html#ixzz26QYY8t9y
A systematization and generalization of procedures on how to design an ICT organization. Identify and explore the strength and weaknesses of particular organizational designs. http://desrist2009.ist.psu.edu/Papers/desrist2009_submission_5.pdf; http://www.doiserbia.nb.rs/img/doi/1820-0214/2009/1820-02140901093C.pdf;
11.18. E-Governance Audit
E-Governance projects involve huge investments which require Business Process Reengineering in the government. Security concerns confidentiality, integrity and availability of data are of paramount importance. The extent to which these projects achieve their objectives needs to be evaluated by an independent audit. While IT specialists are engaged to comment on technical security weaknesses, academic and research agencies are employed to conduct citizen surveys to gauze satisfaction of services. These are piece-meal efforts and there is a need for taking a comprehensive look of all technical, safety, cost and performance parameters through IT Audit to present an overall perspective and suggest organization level improvements. http://www.ipaiindia.org/files/16_G.%20Srinivas.pdf
11.19. ICT Training Needs Analysis
This service covers an assessment of the training requirements of a target group in terms of (1) number of trainees, (2) their educational and professional background, (3) their present level of competence, and (4) the desired behavior or skill level acquired at the completion of training. http://www.businessdictionary.com/definition/training-needs-analysis.html
Building a competent ICT workforce to meet the industrys challenging opportunities. Training Needs Assessment provides decision making information on the competency gaps of the training audiences, training providers and courses available, training gaps, appropriate delivery methods, training strategies, recommendations and strategic vision as a way forward for the ICT industry. Training, education and development
Information and Communications Technology Office Page 67 Manual of Procedures for Procurement of ICT areas are focused with a Competency Based Training approach in the skill development of the ICT industry workforce. The nature of a never-ending cycle in training and the role of HR managers in planning, monitoring, reviewing and evaluating the training outcomes for enhanced and effective work performance emphasize the need for a continuous strategic training process for the industry. The horizontal and vertical career movements in search of higher exposure in gaining strong profiles and the transitory trend of keep learning keep moving of the workforce identifies the need for faster learning techniques and acknowledging IT worker as an industry resource rather than an organization resource. The multiple professional expertises required in terms of the industry specific technical nature of the ICT capabilities for effective discharge functions is identified. http://www.icta.lk/pdf/Final_Report_v15.pdf
11.20. ICT Course Design and Development
Process of selecting, organizing, executing and evaluating IT learning experiences on the basis of the needs, abilities and interests of the trainees and the nature of the society or community. NCI IT Curriculum Design and Development Training Manual 200
A technical course designed to enable IT trainers to develop the competencies and effectiveness of ICT Course development. This course teaches course design methodologies, and communication and presentation skills. National Computer Institute Bulletin Board
11.21. ICT Competency Plan Development
Defines the knowledge and skills an individual must possess at a recognized level of competence in specific ICT fields/areas. Knowledge and skills in competency areas are presented generally with specifics on essential areas of learning and performance indicators, but avoid reference to specific vendors, versions or equipment. Thus, it allows flexibility in the adoption of the standard while preserving the general requirements for competence. http://www.ncc.gov.ph/nics/index.htm
Develop competence in using ICT for tasks associated with information access and management, problem solving, decision making, communicating, creative expression, and empirical reasoning. It is also essential that students develop knowledge, skills and understanding around the fundamental logic and conventions underpinning ICT use and the ability to transfer these from one ICT environment to another (such as from school to workplace and to other social contexts). Equally important is the manner in which ICT is used, based on an understanding of the technologys limitations and its impact on individuals, groups, communities and organizations. http://consultation.australiancurriculum.edu.au/GeneralCapabilities/ICT/ConceptualSt atement
Information and Communications Technology Office Page 68 Manual of Procedures for Procurement of ICT
11.22. ICT Recruitment and Placement
Refers to any act of canvassing, enlisting, contracting, transporting, utilizing, hiring or procuring workers, and includes referrals, contract services, promising or advertising for employment, locally or abroad, whether for profit or not: Provided, That any person or entity which, in any manner, offers or promises for a fee, employment to two or more persons shall be deemed engaged in recruitment and placement. http://www.atty.ws/labor_law/?p=246
Process of searching for and obtaining sufficient number and quality of potential job seekers or applicants to enable the organizaton to select the most appropriate people to fill its job needs in ICT. It is pertinent to note that the process of recruitment must begin with a clear specification or understanding of ICT manpower needs. It should consider the time that the manpower requirement must be met. http://wikieducator.org/Lesson_2.Recruitment_,Selection,and_Placement
11.23. Organizational Knowledge Design And Development
Describing the structure of an organization in a particular field; provides decision- making agents with appropriate knowledge for problem solving tasks http://www.imamu.edu.sa/Data/abstract/management/Modularity%20,%20 flexibility%20,%20and%20Knowledge%20Management%20in%20Product%20and% 20Organization%20Design.pdf
11.24. ICT Solutions Engineering
Designs and builds information systems to meet the individual requirements of our government and commercial clients. These systems include the client/server (web client and desktop client) applications, data warehouses, data marts, web systems, on- line reporting, analyses, decision support, and automated actions or events. http://www.soleng.com
11.25. ICT Infrastructure Library Management
A comprehensive set of documents, which defines best practices and accepted techniques in the Information Technology community. This set of guidelines is widely used in both the public and private sector, essentially providing companies with a blueprint on how to organize and manage information technology operations at the company. The library is constantly updated to ensure accuracy and to include emerging technological advances. http://www.businessdictionary.com/definition/Information-Technology- Infrastructure-Library-ITIL.html#ixzz26QbgFAGl
Information and Communications Technology Office Page 69 Manual of Procedures for Procurement of ICT
11.26. ICT Quality Management System Assessment
A subset of project management that includes the processes required to ensure that the project will satisfy the needs for which it was undertaken Project Quality Management is a critical aspect of the performing organization, and integral to project management. It includes the processes and activities that determine the quality policies, objectives, and responsibilities necessary to assure that project requirements are met. http://pmguide.ncc.gov.ph/index.php?id1=20&id2=2&id3=1
A total quality management (TQM) and continuous improvements in the pursuit of excellence in the field of ICT. There is a need to foster TQM/PM integration with feasible means of self-assessment. http://www.tandfonline.com/doi/abs/10.1080/0954412022000010127
Fundamental principles necessary for developing usable metrics in practice that can help organizations develop usable data quality metrics http://dl.acm.org/citation.cfm?id=506010
11.27. Communication Plan Design
This service encompasses the design of the appropriate marketing strategies to reach out to the intended beneficiaries of the project. It includes the design of the promotion materials and the choice of the communication media to convey the message to the intended audience.
11.28. Change Management Plan Design
This is the total design package of services needed to evoke a positive response and buy in of the entire organization on the new system or methods being introduced and prepare them for the new automated processing environment by enhancing the present capacities and capabilities of the present workforce to meet the challenge.
12. ICT Services
12.1. Application Programming
This service covers the full cycle software programming services which includes requirements management , product design and architecture, programming and development, quality assurance, documentation preparation, technical support and software maintenance en.wikipedia.org/.../Generic_Security_Services_Application_Program
Information and Communications Technology Office Page 70 Manual of Procedures for Procurement of ICT 12.2. Application Service Subscription
A business model where a customer must pay a subscription price to have access to the ICT service. www.peoplecube.com/products-hosting.htm
12.3. Application Source Code review
This service complements application penetration testing with an internal view of the applications code quality and potential security issues relating to its design. This include internal/external penetration testing, forensic and incident response services, vulnerability assessment, network architecture and design review, database penetration testing, VOIP and host build review. www.dmxtechnologies.com/en/services/source-code-review.html www.stachliu.com/brochures/appcodereview.pdf
12.4. Application Systems Customization and Maintenance
Specialized maintenance assistance for hardware, firmware and software systems aiming at increasing systems productive life, provide comprehensive maintenance and customization service i.e., mid life upgrade services for hardware platforms, hardware customization for component obsolescence and enterprise application system and customization. www.powersoft19.com/MaintenanceAndCust.aspx
12.5. Applications Systems Design and Development
It is a broad-based system architecture design, development, deployment, support, field service and educating venture capitalists in the concepts underlying object models and artificial intelligence https://www.fbo.gov/?s=opportunity&mode=form&id
12.6. Business Continuity Planning
This service covers the formulation of a plan that will keep the company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, supply chain problems and more. Their involvement in the process can range from overseeing the plan, providing input and output, to putting the plain into action during an emergency. www.ibm.com/services/...services/business-continuity-and-resiliency-.
12.7. Business Process Management (BPM)
This service includes a process-based governance and assets enabling the right focus, helping decide where to innovate and what not to change. www.hcltech.com/...services/...services/business-process-management
Information and Communications Technology Office Page 71 Manual of Procedures for Procurement of ICT
12.8. Cloud computing Services
A packaged set of ICT services whereby businesses could increase their ICT capacity or functionality without having to add infrastructure, personnel and software. There are six types of cloud computing (1) Web-based cloud services (2) SaaS (Software as a Service) (3) Platform as a Service (4) Managed services, (5) (Service Commerce and (6) Utility cloud services www.networkworld.com/supp/2009/.../051809-cloud-buy-services.ht...
12.9. Computer Facilities Management
This service includes all support activities (i.e., troubleshooting, configuration, parameter settings) necessary to ensure continued operation of all covered resources. Key components of this service is timely monitoring of vendors security notifications, system advisories on problems to address potential problems before they impact day to day operations www.census.gov/econ/census02/naics/sector54/541513.htmwww.bbb.org/connecticut /.../computer-facilities-management-service
12.10. Computer Hardware Servicing, Repair and Maintenance
This includes the following services: PC troubleshooting and repair, hardware/software upgrades, PC tune up/ PC Health Check up and Preventive Maintenance www.engineering.uodiyala.edu.iq/.../computer%20dep/.../
12.11. Contact Center Services
Makes customer satisfaction more affordable by aligning the right resources, technology and processes with client needs and end customers expectations www.mpccallcenters.com/
12.12. Contingency Planning and Disaster Recovery Support Services
This service covers the provision of a comprehensive disaster recovery plan to recover from an unplanned event in a minimal amount of time. In creating the plan, the following elements are considered: loss of information loss of personnel , loss of equipment, loss of access to information and facilities and the design of a contingency program around all main activities the business performs. www.contingency-planning-disaster-recovery-guide.co.uk/
12.13. Data Conversion/Encoding
Information and Communications Technology Office Page 72 Manual of Procedures for Procurement of ICT This service covers the conversion of data from paper format to digital form. It is divided into two main groups: (1) encoding and (2) transcription through a digital dictation system www.data-processing.hk/ www.outsource2india.com/services/data_conversion.asp
12.14. Data Processing Services
This service covers subjecting digital data input into a programmed set of instructions to transform data into user readable information to support human decisions / activities. data-entry.outsourcing-services-india.com/data-processing.php
12.15. Hardware, Software and Network Evaluation
Activities covered in the Software and Hardware Evaluation procedures:
IT Asset Assessment Plan IT Asset Scan Documentation and Distribution Nonconformance handling IT Asset Records Update Ref.: ISO 17788:2005 Code of Practice for Information Security Management, clause 5 (Asset Classification and Control) Sarbanes -Oxley Act of 2002
12.16. Hosting and ICT Infrastructure Provisioning Services (IaaS)
Offers Utility Hosting- to provide immediate access to virtual servers and storage based on a hardware platform shared with other customers
Dedicated Hosting A range of highly secured server platforms that are dedicated to customer usage
Hosted Security Services with Dedicated Hosting, you can choose cost effective 24/7 managed protection to proactively prevent threats against your network and infrastructure from the internet,
Backup as a Service (BaaS) a flexible and secure method to store data to ensure business continuity or comply with industry regulations.
Information and Communications Technology Office Page 73 Manual of Procedures for Procurement of ICT 12.17. ICT Backup Storage Services
Provides a choice of both Shared and Dedicated Managed Storage platforms that offers a wide range of storage tiers to suit various performance, capacity and budget requirements from ultra high performance SSD to cost effective SATA storage technologies for increased reliability and storage efficiency http://www.interoute.com/unified-ict/computing/
Storing backed-up data with an off-site data storage facility. In case of a data loss, data can be returned quickly and efficiently http://www.backupstorage.co.za/
Technical Evaluation Criteria:
Create a low cost, highly scalable storage tier http://www.riverbed.com/us/products/
Cost-savings Considerable storage demands Part of new service design and improvement of existing services. Expertise in this area to maintain relevancy. The solution must be scalable: The overhead associated with security auditing of the external system and the new body of operations must be dramatically outweighed by the benefits. It must be secure: Storing data off-premises must not put the information at risk. It must be integrated: Cloud storage is only relevant if it is tightly coupled with the application or service that leverages the data to deliver value.
12.18. ICT Infrastructure and Network Management Services
Activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems http://en.wikipedia.org/wiki/Network_management
12.19. Internet Service Provider
Access provider to the Internet. Can be either community-owned and non-profit, or privately owned and for-profit. Employ a range of technologies to enable consumers to connect to their network. If users and small businesses, traditional options include: dial-up, DSL (typically Asymmetric Digital Subscriber Line, ADSL), broadband wireless, cable modem, fiber to the premises (FTTH), and Integrated Services Digital Network (ISDN) (typically basic rate interface). For customers with more demanding requirements, such as medium-to-large businesses, or other ISPs, DSL (often Single- Pair High-speed Digital Subscriber Line or ADSL), Ethernet, Metropolitan Ethernet,
Information and Communications Technology Office Page 74 Manual of Procedures for Procurement of ICT Gigabit Ethernet, Frame Relay, ISDN (B.R.I. or P.R.I.), ATM (Asynchronous Transfer Mode) and upload satellite Internet access. Sync-optical cabling (SONET) is more likely to be used. Many access providers also provide hosting and email services. http://en.wikipedia.org/wiki/Internet_service_provider
12.20. Multimedia and Graphics Design
Multimedia designer is a specialized graphic designer, they may do collaborative work with senior print graphic designers, web designers. Multimedia and web designers are often doing very similar production and technical work. Multimedia designer, needs more in depth understanding of audio, video, animation, motion, along with interactivity, presentation. Multimedia designers work on dynamic web sites, kiosk, computer based training, high end presentations. larger corporate clients or museum installations are clients, higher budget can be required, but some amazing innovation occurs on difficult budget. Common traits of graphic designer and multimedia designer: passion for project, ability to sketch ideas, thumbnails, roughs, tights, and final sketch, story-boards, indicating type, color (transmissive vs reflective), and color profiles and color sync, file formats for images, sound, video. http://www.indeed.com/forum/job/Graphics-Designer/Multimedia-Designer-VS- Graphic-Designer/t76384
12.21. Network Penetration Testing
ICT Service that prevents networks to be compromised and the systems within to obtain access to confidential data and critical resources. This includes complete details on the systems and network identified, exploitation results, and both tactical and strategic recommendations.
External Network Penetration Testing
The core ideal around the Network Penetration Testing methodology is to organize and to iteratively test the target environment from the most general components to the most specific. In this way one can effectively model attack scenarios that highlight risk from the largest, most complex environments down to the most simple, and anywhere in between. The entire testing process is primarily manual to limit generic results from scanners and checklist methods used in general vulnerability assessments. It can focus the engagement on directed attack logic based testing against systems and networks.
Internal Network Penetration Testing
Internal threats comprise the greatest risk facing many organizations today. Internal corporate LAN/WAN environments are structured to allow users greater amounts of access with fewer security controls. As layers of security between a would-be attacker and sensitive data are removed the risk of compromise greatly increases. It structures
Information and Communications Technology Office Page 75 Manual of Procedures for Procurement of ICT an internal penetration test in a way that meets your business needs, and creates minimal business impact.
12.22. Network Systems Design, Development, Installation and Testing
This service provides the preparation and design work to configure and plan the network migration, upgrade or deployment. Surveys network capacity measurements to enable the business to proactively manage existing network capacity and to plan for future network requirements while ensuring customer satisfaction.
IT ensures a timely and project-driven network installation and integration. Provide flexible engineering solutions for the transition, deployment, and migration of Voice, Data, or Wireless network.
It manages and maintains every part of the network environment and allows the user to choose from simple network monitoring and reporting, to event management, fault management, performance and capacity monitoring as well as analysis. It places maintenance and support responsibility. It monitors the network 24/7 and have field technician dispatched to arrive along with the replacement at the premises to perform the physical component exchange. http://www.intellispring.com/networking/Main.aspx
12.23. Platform-as-a-Service (PaaS)
Cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying computer and storage resources scale automatically to match application demand such that cloud user does not have to allocate resources manually. http://en.wikipedia.org/wiki/Infrastructure_as_a_service#Service_models
Category of cloud computing services that provide a computing platform and a solution stack as a service. Along with SaaS and IaaS, it is a service model of cloud computing. In this model, the consumer creates the software using tools and/or libraries from the provider. The consumer also controls software deployment and configuration settings. The provider provides the networks, servers, storage and other services. PaaS offerings facilitate the deployment of applications without the cost and complexity of buying and managing the underlying hardware and software and provisioning hosting capabilities. There are various types of PaaS vendor; however, all offer application hosting and a deployment environment, along with various integrated services. Services offer varying levels of scalability and maintenance.
Information and Communications Technology Office Page 76 Manual of Procedures for Procurement of ICT PaaS offerings may also include facilities for application design, application development, testing and deployment as well as services such as team collaboration, web service integration and marshalling, database integration, security, scalability, storage, persistence, state management, application versioning, application instrumentation and developer community facilitation. These services are generally provisioned as an integrated solution over the web. http://en.wikipedia.org/wiki/Platform_as_a_service
12.24. PKI Subscription Services
The PKI infrastructure is the standard for public-key cryptographic security, which is used to ensure the security of digital certificates. With the PKI infrastructure, digital certificates can provide the trusted infrastructure for security-rich transactions over the Internet.
PKI Services allows the user to establish a PKI infrastructure and serve as a certificate authority for its internal and external users, issuing and administering digital certificates in accordance with its own organizations policies.
The public key infrastructure (PKI) provides applications with a framework for performing the following types of security-related activities: Authenticate all parties that engage in electronic transactions Authorize access to sensitive systems and repositories Verify the author of each message through its digital signature Encrypt the content of all communications http://www-03.ibm.com/systems/z/os/zos/features/pki/
12.25. Risk/Vulnerability Assessment
Process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields. Vulnerability assessment has many things in common with risk assessment.
Assessments are typically performed according to the following steps: 1. Cataloging assets and capabilities (resources) in a system.
Information and Communications Technology Office Page 77 Manual of Procedures for Procurement of ICT 2. Assigning quantifiable value (or at least rank order) and importance to those resources 3. Identifying the vulnerabilities or potential threats to each resource 4. Mitigating or eliminating the most serious vulnerabilities for the most valuable resources http://en.wikipedia.org/wiki/Vulnerability_assessment
12.26. Software-as-a-Service (SaaS)
"on-demand software", is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser. SaaS has become a common delivery model for many business applications, including accounting, collaboration, customer relationship management (CRM), management information systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. SaaS has been incorporated into the strategy of all leading enterprise software companies. One of the biggest selling points for these companies is the potential to reduce IT support costs by outsourcing hardware and software maintenance and support to the SaaS provider. http://en.wikipedia.org/wiki/Software_as_a_Service
In this model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. This eliminates the need to install and run the application on the cloud user's own computers simplifying maintenance and support. What makes a cloud application different from other applications is its elasticity. This can be achieved by cloning tasks onto multiple virtual machines at run-time to meet the changing work demand. Load balancers distribute the work over the set of virtual machines. This process is inconspicuous to the cloud user who sees only a single access point. To accommodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud based application software with a similar naming convention: desktop as a service, business process as a service, test environment as a service, communication as a service. The pricing model for SaaS applications is typically a monthly or yearly flat fee per user, so price is scalable and adjustable if users are added or removed at any point. http://en.wikipedia.org/wiki/Infrastructure_as_a_Service#Infrastructure_as_a_service _.28IaaS.29
12.27. Telecommunication Infrastructure Design, Installation and Testing
Telecommunications infrastructure services provide setup, maintenance and consulting for data and voice communications technologies. Examples of telecommunications infrastructure services include optical fiber installation, cell
Information and Communications Technology Office Page 78 Manual of Procedures for Procurement of ICT tower site location, radio antenna testing, and the installation standard phone equipment and data networks. Telecommunications infrastructure service providers include satellite companies, phone companies and the Internet service providers (ISP). Most telecommunications infrastructure services can help customers determine their telecommunications infrastructure requirements. The cost of telecommunications infrastructure design varies widely and depends upon the scope of the service provided.
Types of Telecommunications Infrastructure Services:
There are many types of telecommunications infrastructure services. For example, a traditional telecommunications infrastructure service helps to build, manage, and operate voice networks. A telecommunications cabling infrastructure service or telecommunications fiber optics infrastructure installs standard cables or fiber optics in large office buildings or factories. Telecommunications infrastructure services that specialize in telecommunications infrastructure development or telecommunications infrastructure design may offer a variety of planning, implementation and testing services. Telecommunications infrastructure development helps in the growth of IT software and various technologies like global system for mobile communication (GSM) and code division multiple access (CDMA). Telecommunications infrastructure design considerations help to design long optical fiber cabling that is done at various locations and buildings. Telecommunications infrastructure design converge the voice and data with voice over IP and they are used in telephone lines, connecting internet, call recording, and for call management. http://beta.globalspec.com/learnmore/engineering_services/telecommunications_infra structure_services/telecommunications_infrastructure_services
12.28. Total ICT Systems Solution Integration
Provides a comprehensive range of ICT Technologies, including design, management and deployment relevant to a business needs to reduce costs and increase competitiveness in today's global economy and position the business on an efficient and productive edge. http://www.allict.com.my/
A full system integrator providing solutions for complex information systems as well as designing and developing standard application software for finance, distribution, manufacturing and equipment maintenance management. We offer a full spectrum of services including strategic consulting, communication and network services, system design and development, Internet/intranet services, implementation and customer education. http://www.allict.com.my/sysintegration.html
12.29. Website Design
Information and Communications Technology Office Page 79 Manual of Procedures for Procurement of ICT A broad term covering many different skills and disciplines that are used in the production and maintenance of websites. The different areas of web design include; web graphic design, interface design, authoring; including standardized code and proprietary software, user experience design and search engine optimization. Often many individuals will work in teams covering different aspects of the design process, although some designers will cover them all. The term web design is normally used to describe the design process relating to the front-end (client side) design of a website including writing mark up, but this is a grey area as this is also covered by web development. Web designers are expected to have an awareness of usability and if their role involves creating mark up then they are also expected to be up to date with web accessibility guidelines. http://en.wikipedia.org/wiki/Web_design
12.30. Web Hosting
A type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for other servers located in their data center, called co-location.
The scope of web hosting services varies greatly. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or a Web interface. The files are usually delivered to the Web "as is" or with minimal processing. Many Internet service providers (ISPs) offer this service free to subscribers. Individuals and organizations may also obtain Web page hosting from alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or inexpensive. Business web site hosting often has a higher expense.
Single page hosting is generally sufficient for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, or ASP.NET). These facilities allow customers to write or install scripts for applications like forums and content management. Also, Secure Sockets Layer (SSL) is typically used for e-commerce.
The host may also provide an interface or control panel for managing the Web server and installing scripts, as well as other modules and service applications like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce), which are commonly used by larger companies that outsource network infrastructure.
http://en.wikipedia.org/wiki/Web_hosting_service
12.31. WebBased Programming
Information and Communications Technology Office Page 80 Manual of Procedures for Procurement of ICT
Web Site Programming is the practice of writing applications that run on a web server and can be used by many different people. Many applications work really well as a web application. Some examples of popular web applications include Flickr, Gmail, and Google Maps. The user is able to upload and view pictures, send email and lookup directions using these web applications and they are all made possible through web site programming. http://www.host-shopper.com/what-is-web-programming.html
Technical Evaluation Parameters:
Deploy security mechanism, caching, style sheets, distributed indexing, and other technologies. And on the horizion, there are mobil agents, realtime interaction, and virtual reality. http://www.w3.org/People/Connolly/technologies
12.32. Infrastructure as a service (IaaS)
In this most basic cloud service model, cloud providers offer computers, as physical or more often as virtual machines, and other resources. The virtual machines are run as guests by a hypervisor, such as Xen or KVM. Management of pools of hypervisors by the cloud operational support system leads to the ability to scale to support a large number of virtual machines. Other resources in IaaS clouds include images in a virtual machine image library, raw (block) and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. Amies, Alex; Sluiman, Harm; Tong IaaS cloud providers supply these resources on demand from their large pools installed in data centers. For wide area connectivity, the Internet can be used orin carrier clouds -- dedicated virtual private networks can be configured. http://en.wikipedia.org/wiki/Infrastructure_as_a_service#Service_models