skip to navigation skip to content skip to footer

Multi Use List for Various Security Compliance and Performance Review Services

Lodgement of Responses 2011

Responses are to be emailed to Contact Officer (Technical) on or before 12:00 noon local Canberra time on Monday 14 March 2011 (“the Response Closing Time”) to the following email address:

Ms Elena Gianquitto

Email: elena.gianquitto@defence.gov.au

Duration  

5 years commencing from XX March/April 2009

Annual Review 

Every 12 months during March companies will be invited to lodge a response to the ITR. The Multi Use List will be updated in March/April annually.

Lodgement Date Timeline

Monday 23 March 2009 - closed

Monday 15 March 2010 - closed

Monday 14 March 2011 - closed

Monday 13 March 2012 - to be confirmed

Monday 12 March 2013 - to be confirmed

Summary Requirement

The Department of Defence invites responses to ISIP ITR 2009/04 for a requirement to register for a Multi Use List to provide the various security compliance and performance review services.

Responses will be accepted for one, a combination or all of the following categories listed at Annex B of the ISIP ITR 2009/04 (attached below under documents):

  1. Security Compliance Reviews will primarily fall into four security categories:
    1. information, and communications technology security (ICT);
    2. physical, personnel and information security,
    3. handling and management of weapons, munitions and explosives (WME) throughout their lifecycle; and
    4. Other tasks that may be required include the development of:
      • review methodology;
      • performance review methodology;
      • templates;
      • review tracking;
      • reporting mechanisms; and
      • research of best practice security review.
  2. Security Performance Reviews will primarily fall into four security categories:
    1. Information, communications and technology (ICT) security; and
    2. Physical, personnel and information security;
    3. handling and management of weapons, munitions and explosives (WME) throughout their lifecycle; and
    4. Other tasks that may be required include the development of:
      • review methodology;
      • performance review methodology;
      • templates;
      • review tracking;
      • reporting mechanisms; and
      • research of best practice security review.

Documents

Security Compliance & Performance Review Multi Use List (MUL) [PDF-232 KB]

Approved Supplier List 2011 [MS-Word 40 KB]

FAQ [MS-Word-249 KB]