Feeds

No IT budget for faster SME payments

Gov tightens fists

High performance access to file storage

The government is not allocating funding to upgrade payment systems to meet the prime minister's commitment to pay small suppliers faster during the credit crunch.

The Department for Business, Enterprise and Regulatory Reform (BERR), which is coordinating payment changes to help small and medium enterprises (SMEs), said that no budget has been allocated for administrative and IT changes, but that the cost to the exchequer of bringing forward £8bn worth of payments to 10 days would be about £16m in lost or added interest.

The process of change has already begun, according to BERR, and departments are reviewing their systems with the aim of driving up their payments performance.

The prime minister told the House of Commons on 8 October 2008 that cash flow is a particular problem for small companies during this critical time for the economy. Late payment problems, Brown said, have intensified, with all firms lengthening the time they take to pay their suppliers.

"The government can ease the situation, and we can help cash flow through prompt payment. The government has already agreed to move its procurement rules from payments within 30 days to a commitment to pay as soon as possible.

"In the current climate, we need to go further with a harder targets. We will therefore aim to make SME payments within 10 days. The government will pick up the cost of that, but it is a small price to pay for greatly increasing cash flow associated with £8bn of contracts with SMEs."

A range of measures to help departments to achieve this will be introduced by BERR. They include:

  • Standard guidance to suppliers on how to submit invoices
  • Ready access to guidance within the supplier's terms and conditions and on all public facing websites
  • A common standard for establishing when an invoice is received
  • A common standard for counting elapsed days

"Most departments will also need to invest in their internal compliance procedures to ensure that managers generate purchase orders and authorise payments correctly and speedily," a spokesperson for BERR told GC News.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.