Feeds

No IT budget for faster SME payments

Gov tightens fists

Security for virtualized datacentres

The government is not allocating funding to upgrade payment systems to meet the prime minister's commitment to pay small suppliers faster during the credit crunch.

The Department for Business, Enterprise and Regulatory Reform (BERR), which is coordinating payment changes to help small and medium enterprises (SMEs), said that no budget has been allocated for administrative and IT changes, but that the cost to the exchequer of bringing forward £8bn worth of payments to 10 days would be about £16m in lost or added interest.

The process of change has already begun, according to BERR, and departments are reviewing their systems with the aim of driving up their payments performance.

The prime minister told the House of Commons on 8 October 2008 that cash flow is a particular problem for small companies during this critical time for the economy. Late payment problems, Brown said, have intensified, with all firms lengthening the time they take to pay their suppliers.

"The government can ease the situation, and we can help cash flow through prompt payment. The government has already agreed to move its procurement rules from payments within 30 days to a commitment to pay as soon as possible.

"In the current climate, we need to go further with a harder targets. We will therefore aim to make SME payments within 10 days. The government will pick up the cost of that, but it is a small price to pay for greatly increasing cash flow associated with £8bn of contracts with SMEs."

A range of measures to help departments to achieve this will be introduced by BERR. They include:

  • Standard guidance to suppliers on how to submit invoices
  • Ready access to guidance within the supplier's terms and conditions and on all public facing websites
  • A common standard for establishing when an invoice is received
  • A common standard for counting elapsed days

"Most departments will also need to invest in their internal compliance procedures to ensure that managers generate purchase orders and authorise payments correctly and speedily," a spokesperson for BERR told GC News.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Forget silly privacy worries - help biometrics firms make MILLIONS
Beancounter reckons dabs-scanning tech is the next big moneypit
Microsoft's Office Delve wants work to be more like being on Facebook
Office Graph, social features for Office 365 going public
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.