Check out our COVID-19 dedicated page for tenders related to medical equipment needs.
The Conference on the Future of Europe is your chance to share your ideas and shape the future of Europe. Make your voice heard!
United Kingdom-Liverpool: IT services: consulting, software development, Internet and support
Section I: Contracting authority
Section II: Object
Technology Services 3
Crown Commercial Service as the contracting authority is putting in place a Pan Government Collaborative Framework Agreement for use by UK public sector bodies identified at VI.3) (and any future successors to these organisations), which include Central Government Departments and their Arm’s Length Bodies and Agencies, Non Departmental Public Bodies, NHS bodies and Local Authorities.
Public sector bodies have a need for a technology service framework agreement, which will deliver local, regional and national technology service provides for the range of service outlined below.
The agreement will include but not be limited to the following tech support services:
• Hardware Management and Support;
• Software Management and Support;
• Network Management and Support;
• Data Management;
• Enterprise Security (Security Operations Centre — SOC services);
• Tech Service Discovery;
• Tech Service Disaggregation;
• Transition and Transformation of Existing Tech Services;
• Tech Strategy and Service Design.
If during standstill we receive a substantive challenge to our decision to award and the challenge is for a certain lot, we reserve the right, to conclude a framework agreement with successful bidders for the lot(s) that have not been challenged.
Technology Strategy and Service Design
The buyer can award a call-off contract via either completion of a further completion procedure or by applying the direct award criteria to the supplier’s catalogue.
Where requested by the buyer, suppliers will provide a range of services and to deliver full technology strategic design to buyer. Services which may include but are not limited to:
— Capability analysis — identification of current business capability (as is) and that which will be needed for the future state (to be).
Enterprise architecture using the open group architecture framework (TOGAF) or similar.
— Technology gap assessments — the assessment and recommendation of the right technology to plug the capability gap between the as-is and the to-be.
— Business models — identification of the correct commercial and operational models to deliver the technology strategy (insourced, outsourced or multi-sourced models).
— Architectures — identification of the correct technology architecture to deliver the technology strategy (in-house hosted, private cloud, hybrid or public cloud).
— Road-mapping — the development of technology roadmaps to co-ordinate the delivery of the technology strategy.
— IT financial management — development of an IT financial management approach to support the technology strategy, in order to manage investment and costs and obtain business benefit from any investments.
Where requested by the buyer, suppliers will provide a range of services to deliver full technology service design to buyer. Services which may include but are not limited to:
— Operational service design - working with customers and end users in order to design a service delivery model that meets the current and future business needs and demand.
— Demand management — capacity planning processes and systems.
— Service levels, performance design — developing service levels and KPI’s for services in scope, their measurement and reporting and how service provider(s) may work to achieve and maintain them.
— Service availability — designing monitoring, assurance and continuity of service processes and systems to meet current and future business needs.
— Risk — ensuring proactive risk identification, mitigation and management to deliver service continuity.
— Security — appropriate security protection in line with business needs.
— Supply chain — designing, integration and management of commercial processes to ensure service integration and efficient operation in a multi supplier eco system.
— Applications — identification and specification of any appropriate databases, applications or toolsets to deliver the services.
Transition and Transformation
Where requested by the buyer, suppliers will provide a range of services to deliver full technology service transition and transformation to buyer. Services which may include but are not limited to:
— the identification of the transition/transformation success factors and their measurement;
— risk analysis and risk management;
— audit and due diligence activities for the present customer estate;
— project and programme management, including planning, delivery and reporting;
— implementing and managing the transition/transformation process and coordination of resources, potentially across a multi supplier environment;
— post transition/transformation review to identify if the objectives, success factors and benefits have been met and realised;
— legacy service decommissioning and disposal, including planning, delivery and coordination of activities.
Operational Services — End User Services
End user support
Where requested by the buyer, suppliers will provide a range of services to deliver full end user support to buyer. Services which may include but are not limited to:
— product support capabilities, including elements of hardware and software support;
— logging of problems;
— reporting and proactive results analysis of problem trends to suggest permanent fixes;
— the dispatch of service technicians and/or parts;
— end user training coordination and other technology related issues;
— end user computing and device management.
Where requested by the buyer, suppliers will provide a range of services to deliver full end user computing and device management to buyer. Services which may include but are not limited to:
— support for the full life cycle management of desktop, laptop, tablet, thin-client, handheld and peripheral assets;
— device acquisition, deployment, maintenance, change management as well as disposal;
— the hardware, software, disaster recovery and personnel required to perform the technical support, planning, process management and administration of the service.
Operational Services – Operational Management
IT operations and technology estate service management
Where requested by the buyer, suppliers will provide a range of services to deliver full IT operations and technology estate service management to buyer. Services which may include but are not limited to:
— support for various operating models including fully centralised, fully decentralised or ‘federated’ (hybrid);
— day-to-day system management responsibility for the technology infrastructure;
— systems operation, integration, support, administration, and performance monitoring;
— technical diagnostics/troubleshooting;
— configuration management;
— system repair;
— disposal management;
— production of management reports.
Exclusions are provision of physical premises for location of information and communications technology, including but not limited to data centres, server rooms, colocation and hosting.
Where requested by the buyer, suppliers will provide a range of services to deliver full security management to buyer. Services which may include but are not limited to:
— managed firewall,
— identity and access management,
— intrusion detection,
— virtual private networks,
— vulnerability scanning,
— anti-viral/anti-phishing services,
— Security Operations Centre (SOC).
Operational Services — Technical Management
Network infrastructure management
Where requested by the buyer, suppliers will provide a range of services to deliver full network infrastructure management to buyer. Services which may include but are not limited to:
— planning, delivering, operating, managing (including security), supporting and monitoring the on-premise local area network infrastructure (LAN) and/or its assets;
— fixed and wireless devices;
— routers and switches;
— fibre optic equipment;
— Network Operations Centre (NOC).
Exclusions are telephony, mobile voice and data services, video-conferencing, audio-conferencing services, integrated communications and wide area network provisioning and connectivity.
Hardware and software asset management
Where requested by the buyer, suppliers will provide a range of services to deliver full hardware and software asset management to buyer. Services which may include but are not limited to:
— hardware and software acquisition and disposal decisions that identify and eliminate unused or infrequently used assets;
— consolidation of software licenses or proposals for new licensing models;
— accurate accounting of technology asset lifecycle costs and risks;
— processes to maximise the business value of technology and sourcing decisions.
Operational Services — Application and Data Management
Data warehouse, database and data management
Where requested by the buyer, suppliers will provide a range of services to deliver data warehouse, database, and data management to buyer. Services which may include but are not limited to:
— data, database and middleware management and integration practices;
— architectural techniques and tools;
— installation, configuration, management and support (first or third party) of databases;
— data extraction, translation, transfer, conversion and backup and recovery;
— applications management, development and support.
Where requested by the buyer, suppliers will provide a range of combined or separate services delivering application development, management, and support to the buyer. Services which may include but are not limited to:
— processes and methodologies for maintaining, enhancing, managing and supporting custom or enterprise applications, packaged software applications, ESCROW or network-delivered applications including cloud platforms;
— development of new and existing applications as part of a complete application management and support solution;
— continuous and whole software lifecycle management using DevOps and Agile methodologies, to deliver further iterative application functional and non-functional changes, IT operations; and
— other activities in-line with buyer requirements and priorities;
— the process workflows, testing and quality assurance, deployment, and delivery that support continuous software lifecycle management;
— management of any third party suppliers involved in application development and support for the buyer to ensure smooth integration onto their estate.
Major Services Transformation Programmes
The buyer can only award a call-off contract through completing a further competition procedure.
Where requested by the buyer, suppliers will provide a range of services to deliver major services transformation programmes to buyer. Services which may include but are not limited to:
— service strategy and design (as per Lot 1);
— transition and transformation (as per Lot 2);
— operational management (as per Lot 3);
— programme and/or project management;
— risk management;
— issues management;
— financial management;
— resource management;
— support for either single entity (single sourced) or multiple-entities (multi-sourced) programme delivery.
Service Integration and Management
Where requested by the buyer, suppliers will provide a range of services to deliver service integration and management strategy, design, and transition to buyer. Services which may include but are not limited to:
— the design of SIAM strategy using the most appropriate methodology;
— capability analysis;
— identification of appropriate commercial and operational business models;
— road-mapping development to coordinate the delivery of the SIAM strategy;
— IT financial management;
— identification and design of the SIAM including resources, processes and assets to meet customer and/or end user service needs;
— auditing of current service provision, continuous service improvement and development of new services;
— operational service design;
— development of service levels and key performance indicators;
— service availability design and assurance;
— supply chain design, integration and management;
— supporting application identification and specification;
— audit and due diligence activities;
— project and programme management;
Section III: Legal, economic, financial and technical information
Candidates will be assessed in accordance with section 5 of the 2015 Public Contract Regulations (implementing the directive) on the basis of information provided in response to an invitation to tender (ITT) registering for access.
Section IV: Procedure
Section VI: Complementary information
The services covered by this procurement have been subdivided into eight lots, namely:
Lot 1: Technology Strategy and Services Design;
Lot 2: Transition and Transformation;
Lot 3a: Operational Services — End User Services;
Lot 3b: Operational Services — Operational Management Services;
Lot 3c: Operational Services — Technical Management;
Lot 3d: Operational Services — Application and Data Management;
Lot 4: Major Services Transformation Programmes;
Lot 5: Service Integration and Management.
Bidders have the opportunity to bid for all or a combination of lots.
You will be eligible for a place on lot 4 if you have been successful on lots 1, 2, 3a, 3b, 3c and 3d.
Crown commercial service reserves the right for an electronic auction to be held by contracting authority(s) during further competition among the parties to the framework agreement(s).
As part of this contract notice the following documents can be accessed at: https://www.contractsfinder.service.gov.uk/Notice/ecfc2bfc-ac6d-4741-893f-e77be73075f6
1) contract notice transparency information for the agreement;
2) contract notice authorised customer list;
3) rights reserved for CCS framework.
On 2 April 2014 Government introduced its Government Security Classifications (GSC) scheme which replaced Government Protective Marking Scheme (GPMS). A key aspect is the reduction in the number of security classifications used. All bidders should make themselves aware of the changes as it may impact this requirement. This link provides information on the GSC at: https://www.gov.uk/government/publications/government-security-classifications
Cyber Essentials is a mandatory requirement for Central Government contracts which involve handling personal information or provide certain ICT products/services. Government is taking steps to reduce the levels of cyber security risk in its supply chain through the Cyber Essentials scheme. The scheme defines a set of controls which, when implemented, will provide organisations with basic protection from the most prevalent forms of threat coming from the internet. To participate in this procurement, bidders must be able to demonstrate they comply with the technical requirements prescribed by Cyber Essentials, for services under and in connection with this procurement.
CCS reserve the right to award a framework to any bidder whose final score is within 1 % of the last position.
Registering for access:
This procurement will be managed electronically via the eSourcing suite. This will be the route for sharing all information and communicating with bidders. If you have recently registered on the eSourcing suite for another CCS procurement you can use the same account for this new procurement. If not, you will first need to register your organisation on the portal.
Use the following link for information on how register and use the eSourcing tool: https://www.gov.uk/government/publications/esourcing-tool-guidance-for-suppliers
For assistance please contact the eSourcing Help desk operated by email at help@eSourcingsolution.co.uk or call 0800 069 8630.
Some purchases under this framework agreement may have requirements that can be met under this framework agreement but the purchase of which may be exempt from the Procurement Regulations (as defined in Attachment 1 — About the framework within the Invitation to Tender documentation). In such cases, call-offs from this framework will be unregulated purchases for the purposes of the procurement regulations, and the buyers may, at their discretion, modify the terms of the framework and any call-off contracts to reflect that buyer’s specific needs.