Bangladesh: Introducing

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Steps towards E-Government in Syria
Everyone can access. Contents Mer-links context The route of decision-making What is Mer-link? Lessons Learned.
The Digital Business is the present and the future
A case of Armenia: Legal framework for E-procurement in Public Procurement Sector Mr Karen Brutyan, PhD, PFM and PP EBRD Consultant, Wolf Theiss 1-2 December.
-Gunjandeep Singh Khera. C1India (security Features) Digital Signature: The solution includes capturing Digital Signature Authorized and certified by.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
A presentation on e-Procurement
Public Procurement in Albania in the framework of recent reforms PUBLIC PROCUREMENT AGENCY 1.
Submitted by- Mr. Avinash Sadaphule 20 November 2009 Management Trainee, MKCL.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
Information Security Policies and Standards
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Chapter 19 Security.
Strengthening Public Finance Management Through Computerization of Procurement Management System High Level Forum on Procurement Reforms in Africa Tunisia.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Public Key Infrastructure Ammar Hasayen ….
Delivering Procurement Performance: Success Stories Bangladesh
Smart Connect – Supplier Portal Training Module 1 – System Overview.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Design, Implementation & Roll-out of e-Procurement May 2013 Kang-il Seo | Deputy Director, International Cooperation Division Public Procurement Service.
Securing Information Systems
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Public Procurement Authority Electronic Public Procurement Platform (EPPP) , Tiran H.Onur CEBECİ Project Director Overview of EPPP and Related.
Confidential and proprietary to U.S. Bank 1 Corporate Payment Systems Adwebportal Training.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Internet Security for Small & Medium Business Week 6
Main Achievements in Public Procurement in Ministry of Finance of the Republic of Moldova Public Procurement Agency Batumi, 2015.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Core Issues in Linking e-GP and Procurement Reform Ram. SM, Project Manager National Institute for Smart Government 18 th May 2006.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
POVT Managing Authority A sound Internal Control System A challenge for the period.
P UBLIC P ROCUREMENT IN THE K YRGYZ R EPUBLIC MINISTRY OF FINANCE OF THE K YRGYZ R EPUBLIC.
IMPLEMENTATION OF ACTION PLAN FOR SUMMARY CPV REGULATION & IMPLEMENTATION Using of CPV codes became mandatory in Europe from December 16, 2003.
1 Strategies for Enhancing Procurement Reforms: Monitoring Results & Involvement of Civil Society: Bangladesh Case Zafrul Islam Lead Procurement Specialist.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
PUBLIC PROCUREMENT INFORMATION TECHNOLOGIES IN THE REPUBLIC OF TAJIKISTAN PUBLIC PROCUREMENT AGENCY UNDER THE GOVERNMENT OF THE REPUBLIC OF TAJIKISTAN.
2015 NetSymm Overview NETSYMM OVERVIEW December
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Information Marketing Group, Inc. Preparing to Open iParent.
Reforms in the Albanian Public Procurement System 7 th Regional Public Procurement Forum Tbilisi, Georgia May 16-19, 2011 PUBLIC PROCUREMENT AGENCY 1.
Transforming Procurement E- GP Planning and change management Action Plan for E- GP implementation in Kenya Jerome Ochieng Public Procurement Oversight.
E-Procurement : Towards Transparency and Efficiency in Public Service Delivery.
ELECTRONIC – GOVERNMENT PROCUREMENT SYSTEM (E-GP) ELECTRONIC – GOVERNMENT PROCUREMENT SYSTEM (E-GP)
Electronic Records Management Alan Cameron Records Management Consultant.
Forth South Asia Regional Public Procurement Conference 2017
Chapter 17 Risks, Security and Disaster Recovery
Inter operability of e-GP System
Introducing Digital Transformation in Small States
Smart Connect – Supplier Portal Training
Unit 8 Network Security.
Manish Bhattarai, Director Public Procurement Monitoring Office (PPMO)
Electronic Payment Security Technologies
MTENDER DIGITAL PROCUREMENT - MOLDOVA
Sixth South Asia Region Public Procurement Conference: Professionalization of Public Procurement for Better Performance.
ELECTRONIC – GOVERNMENT PROCUREMENT SYSTEM (E-GP)
Presentation transcript:

Bangladesh: Introducing e-Government Procurement (e-GP) Abdus Sobhan Sikder Secretary, IMED, MOP Amulya K Debnath Director General, Central Procurement Technical Unit (Washington D.C.; December 10, 2008)

Session Key Parts Legislations e-GP readiness & Implementation Status Expected Outcomes Challenges

Legislations IT Act 2006 in place IT Rules (at approval stage) E-GP provisions in Public Procurement Act 2006 (PPA) & Public Procurement Rules 2008 (PPR) E-GP Guidelines/ Rules (at drafting stage)

Legislative Readiness Provisions in Public Procurement Act – 2006 for the uptake of e-GP The Act includes a specific Section for e-Government Procurement (e-GP). It has fully allowed all kinds of online transactions resulting to online procurement by government agencies. Chapter Eight Use of Electronic Processing System in Public Procurement, etc. 65. e-Government Procurement 1. For carrying out the purposes of this Act, any or all government procurement under this Act may be undertaken using electronic processing system. 2. The electronic processing system and the principles governing such system shall be prescribed by the government Explanation: For the purposes of this section, ‘Electronic Processing System’ means the online processing of data through a website. Public Procurement Act -2006

Legislative Readiness Public Procurement Rules – 2008 Public Procurement Rules, enacted from January 31, 2008 clearly spells out the mandatory requirement of publishing the procurement information from different stages of procurement cycle to the CPTU website and also offers the strong basis for online procurement transactions.

e-GP Readiness E-GP readiness assessment conducted in 2006 No. Component Level of readiness 1 Government Leadership 3 2 Infrastructure and Web Services Human Resource Planning 4 Standards 5 Planning and Management 2 & 3 6 Private Sector Integration 7 Policy 8 Systems 9 Legislation and Regulation 3 & 3

e-GP Implementation Status Public Procurement Reform Project II (PPRPII) has one specific component to introduce e-GP on a pilot basis with the central database in the Central Procurement Technical Unit (CPTU), the nodal procurement policy unit of the Government . Existing MIS (PROMIS) of CPTU has few features of e-GP (IFB publication, contract award publication, etc.) Existing MIS will be enhanced to form first phase of e-GP for its piloting in four key target agencies (RHD, LGED, BWDB & REB)

e-GP Implementation Status Contd…. Hardware for four target agencies and connectivity for selected procuring entities of those agencies are under procurement e-GP system is under design/ development stage, with features in conformity with MDB Guidelines Selected Procuring entities’ staff will undergo e-GP training. Piloting of e-GP by June 2009

Key Featured of e-GP System Actors

Modules in e-GP System Centralized Registration of Contractors/ Suppliers/ Consultants Workflow Management e-Tendering (e-Publishing/e-Advertisement, e-Lodgement, e-Evaluation, e-Contract award) e-Contract Management (e-CMS) e-Payments Procurement Management Information System (PROMIS)

Security Features Presentation Layer Security Login/Password (email as Unique ID) CAPTCHA : Verification code has to be entered as appeared in the ‘CAPTCHA’ and this is used to avoid automatic creation of users and to ensure that users are created manually. Session level security Transmission/Transaction Layer Security Secured Socket Layer (SSL – 128 bit encryption) Domain/Server level Session security Electronic Signature/ Digital Signature based authenticity Application Layer Security Web services will be used to access different processes and services offered by different modules of the applications Message will be transferred using XML packets through SOAP. Automated virus scan RAID 5 - Striping disks for performance and fault tolerance. RAID - Redundant Array of Independent Disks RAID Levels RAID 0 - Speed (Widely Used) RAID level 0 is disk striping only, which interleaves data across multiple disks for performance. Widely used for gaming, RAID 0 has no safeguards against failure. RAID 1 - Fault Tolerance (Widely Used) Uses disk mirroring, which provides 100% duplication of data. Offers highest reliability, but doubles storage cost. RAID 1 is widely used in business applications. RAID 2 - Speed Instead of single bytes or groups of bytes (blocks), bits are interleaved (striped) across many disks. The Connection Machine used this technique, but this is rarely used because 39 disks are required. RAID 3 - Speed and Fault Tolerance Data are striped across three or more drives. Used to achieve the highest data transfer, because all drives operate in parallel. Using byte level striping, parity bits are stored on separate, dedicated drives. RAID 4 - Speed and Fault Tolerance Similar to RAID 3, but uses block level striping. Not often used. RAID 5 - Speed and Fault Tolerance (Widely Used) Data are striped across three or more drives for performance, and parity bits are used for fault tolerance. The parity bits from two drives are stored on a third drive and are interspersed with user data. RAID 5 is widely used in servers. RAID 6 - Speed and Fault Tolerance Highest reliability because it can recover from a failure of two disks, but not widely used. Similar to RAID 5, but performs two different parity computations or the same computation on overlapping subsets of the data. RAID 10, RAID 100 - Speed and Fault Tolerance RAID 10 is RAID 1 + 0. The drives are striped for performance (RAID 0), and all striped drives are duplicated (RAID 1) for fault tolerance. RAID 100 is RAID 10 + 0. It adds a layer of striping on top of two or more RAID 10 configurations for even more speed.

Security Features (continued…) Database Layer Security Bitwise encryption while streaming to and from database (bid box) Confidential data like identity information will be tagged by MD5 for integrity SQL injection proof data access codes will be written Hardware Layer Security 2 layer Firewalls to protect e-GP System access from Internet Database will be kept in Intranet IP class behind firewall and application server will be kept in Public IP class Database will be clustered Hard drive will use RAID 5 hot swappable storage technology Daily Data backup process will be automated Mirror server will be hosted Workflow based Security Only authorized and authenticated users will have access to specific level of workflow. Procuring Entity will have rights to manage users as per their needs

Expected Outcomes Centralized database of Public Procurement Community (Procuring entities and Contractors/ Suppliers/ Consultants) Standard way of carrying out the procurement with Standard document templates Efficiency gain with the Procurement Workflow still keeping the same or with minimum optimization Compliance to the PPA-2006 & PPR-2008 Effective Monitoring and Evaluation Platform

Future Challenges Bidding Communities Preparedness and Readiness (infrastructure & HR) Finalization of e-GP guidelines/ rules Enroot Trust on online transaction and e-Signature

THANK YOU. (CPTU website: www. cptu. gov THANK YOU !!!!! (CPTU website: www.cptu.gov.bd; Email: info@cptu.gov.bd)