Feeds

Procurement classification system under scrutiny

The commission consults

Combat fraud and increase customer satisfaction

The European Commission today launched a consultation on a proposed update to the Common Procurement Vocabulary (CPV), which is the EU-wide classification system for public procurement contracts.

The CPV helps all EU businesses and SMEs to easily identify public procurement contracts offered by any EU public authority, irrespective of the original language of the tender notice.

It works by allowing businesses to insert the relevant CPV code corresponding to their products or services into the Tenders Electronic Daily (TED) database, where all calls for tender in the EU are published. The system is able to describe contract types in 20 EU languages.

The updated version of the CPV will take account of recent market developments and new possibilities offered by electronic procurement, such as structuring and analysis of expenditure and compilation of statistics. The results of the consultation, which is in the form of an online questionnaire, will contribute to the final version of the updated CPV.

"The CPV classification system has become a vital day-to-day business tool for companies that supply hospitals, utilities, governments, local councils, railways or universities - to name just some of the vast array of sectors covered by public procurement rules," internal market and services commissioner Charlie McCreevy said.

"It boosts cross-border competition for public contracts, brings down language barriers, and means better value for money for taxpayers. But the classification isn't set in stone. When market conditions change, the CPV needs to change too. Public authorities now have the opportunity to give us their views and help us ensure the new classification reflects today's needs."

See: the consultation 

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Combat fraud and increase customer satisfaction

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.