Feeds

AGIMO suspends govt supplier application process

Is anyone using Oz government's multi-use lists of approved suppliers?

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

The Australian Government Information Management Office (AGIMO) has suspended its Multi Use Lists (MULs) for consultants and general ICT suppliers, possibly because no-one is using them.

The lists contain vendors approved to supply goods and services to Australian federal government agencies.

A blog post announcing the suspension of new applications says “[The Department of] Finance is undertaking a review … to understand further the effectiveness and patronage of these two ICT-based multi use lists.”

There's no indication in AGIMO's post of the reason for the suspension, but the missive does offer suppliers and vendors a survey to complete. Those surveys hint strongly at worries about whether anyone is using the lists.

The survey offered to agencies, for example, asks if they have ever used a supplier from an MUL, and if so which one and how often it is used. The quiz for vendors asks which list they're on, whether they get any inquiries from the lists and if so how much business it delivers.

The survey also looks hastily-cobbled-together, as it is provided in Excel files. Given that AGIMO oversaw Australia's Gov 2.0 taskforce, it's odd (to say the least) that it cannot erect a web form to gather opinions.

The Reg is not aware of any particular complaints about the lists' operations, but AGIMO's procurement plans have been criticised as favouring larger vendors capable of allocating resources to the application process. Australia's Small Business Commissioner, for example, has wondered if AGIMO's procurement panels are helpful ways to achieve a policy aim of ensuring small business gets access to government IT work.

AGIMO hopes agencies and suppliers alike will return surveys before September 14th and promises to complete its review before October 5th, when applications for the lists will resume. ®

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.