Feeds

G-Cloud: Please excuse our 'overlapping' frameworks

We've moved beyond 'traditional' contracts, mmm'kay?

Gartner critical capabilities for enterprise endpoint backup

The G-Cloud team says that in a move away from traditional frameworks, it is setting up "multiple overlapping frameworks" which it says are each compliant with the Official Journal of the European Union process.

A blog post on the G-Cloud website explains that bidding for G-Cloud contracts can become "unusual" – and that once the G-Cloud programme has gone through the OJEU process and set-up framework "we go and do it all over again".

The G-Cloud blog says that the market for cloud services changes all the time and the G-Cloud programme wants to keep up.

"And no, it's not a dynamic procurement system (DPS), it's a way of using frameworks to give some of the properties of a DPS without being one, " the blog insists.

The post goes on to explain to buyers that they need to have a set of criteria against which to judge suppliers. The message for suppliers is that they cannot switch from what has already been tendered. Although there is nothing to stop a buyer talking to suppliers, all they can do is clarify.

"No negotiation can occur as the offer on the CloudStore is fixed," the G-Cloud blog says. "In a simple case where two or more services meet the criteria the buyer must select the cheapest one. This way a buyer has fulfilled all they legally need to do to make a least cost decision."

This article was originally published at Government Computing.

Government Computing covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.