Multi Use List for Various Security Compliance and Performance Review Services
Lodgement of Responses 2011
Responses are to be emailed to Contact Officer (Technical) on or before 12:00 noon local Canberra time on Monday 14 March 2011 (“the Response Closing Time”) to the following email address:
Ms Elena Gianquitto
Email: elena.gianquitto@defence.gov.au
Duration
5 years commencing from XX March/April 2009
Annual Review
Every 12 months during March companies will be invited to lodge a response to the ITR. The Multi Use List will be updated in March/April annually.
Lodgement Date Timeline
Monday 23 March 2009 - closed
Monday 15 March 2010 - closed
Monday 14 March 2011 - closed
Monday 13 March 2012 - to be confirmed
Monday 12 March 2013 - to be confirmed
Summary Requirement
The Department of Defence invites responses to ISIP ITR 2009/04 for a requirement to register for a Multi Use List to provide the various security compliance and performance review services.
Responses will be accepted for one, a combination or all of the following categories listed at Annex B of the ISIP ITR 2009/04 (attached below under documents):
- Security Compliance Reviews will primarily fall into four security categories:
- information, and communications technology security (ICT);
- physical, personnel and information security,
- handling and management of weapons, munitions and explosives (WME) throughout their lifecycle; and
- Other tasks that may be required include the development of:
- review methodology;
- performance review methodology;
- templates;
- review tracking;
- reporting mechanisms; and
- research of best practice security review.
- Security Performance Reviews will primarily fall into four security categories:
- Information, communications and technology (ICT) security; and
- Physical, personnel and information security;
- handling and management of weapons, munitions and explosives (WME) throughout their lifecycle; and
- Other tasks that may be required include the development of:
- review methodology;
- performance review methodology;
- templates;
- review tracking;
- reporting mechanisms; and
- research of best practice security review.
Documents
Security Compliance & Performance Review Multi Use List (MUL) [PDF-232 KB]
Approved Supplier List 2011 [MS-Word 40 KB]
FAQ [MS-Word-249 KB]