信息详情

Communication Exploitation Data Tool (CEDT)

2025-01-27

中文

英语 (English)

所属地区: --

所属机构: --

抱歉,该信息暂无中文翻译信息,为您显示项目原文信息。

Published date: 27 January 2025

Open future opportunity - This means that the buyer is not yet ready to invite bid applications but early notification has been provided and some dialogue may be possible.

Watch this notice Print this notice
Approach to market date: 20 February 2025

Contract summary

Industry

  • Miscellaneous software package and computer systems - 48900000

  • Location of contract

    United Kingdom

    Value of contract

    £900,000

    Procurement reference

    2025/S 000-002077

    Published date

    27 January 2025

    Approach to market date

    20 February 2025

    Contract start date

    1 September 2025

    Contract end date

    31 August 2029

    Procedure type

    Restricted procedure (above threshold)

    What is a restricted procedure (above threshold)?

    A two-stage procedure, where the first stage is used to select suppliers, who are then invited to bid in the second stage.

    This procedure can be used for procurements above the relevant contract value threshold.

    Contract is suitable for SMEs?

    Yes

    Contract is suitable for VCSEs?

    Yes


    Description

    Taken from PIN

    Must requirements:

    The solution must cleanse raw communications data, including radio frequency data, and transform it into standardised, usable format suitable for intelligence analysis.

    The solution must support importing and process data from multiple file formats, including but not limited to; CSV, ANPR data, Drone Data, Zipcar records, Uber Ride Data, Uber Eats delivery Data.

    The supplier's solution should be zero deployment and accessible via a browser to be suitable.

    The solution shall be accessible via a standard internet browser - i.e. Microsoft Edge and Google Chrome.

    The supplier's solution must ensure that all data is: Encryption in-transit, using secure protocols (e.g., Transport Layer Security (TLS) TLS1.2, higher, comparable). Encrypted at rest, utilising industry-standard encryption algorithms (e.g., AES-256).

    The supplier's solution must implement robust access control mechanisms, including Role-Based Access Control (RBAC) to restrict access based on user roles and responsibilities.

    Supplier shall provide training and training material to the Authority for the tool.

    Supplier shall be fully responsible for the support and maintenance of their servers.

    This notice intends to inform the marketplace of a potential upcoming tender opportunity. The procurement documentation will be made available following the publication of the Contract Notice, which will mark the start of the procurement process. This is anticipated to be late February 2025.

    Procurement documentation will be accessible via the URL link referenced in I.3 section.


    More information

    Spend profile

    This table displays the spend profile of the notice
    Financial year Budget
    2025/2026 £300,000

    How to apply

    Follow the instructions given in the description or the more information section.


    About the buyer

    Address

    New Scotland Yard
    LONDON
    NW66LT
    England

    Email

    NCTPHQMailbox-.Commercial@met.police.uk

    Website

    www.met.police.uk


    Share this notice

    Is there anything wrong with this page?

    温馨提示:

    本网站为您提供准确和及时的招投标信息,但招投标信息存在着变更的可能,请您务必在交易前向招标代理机构或招标人咨询投标详细要求,有关招标的具体要求及情况以招标代理机构或招标人的解释为准。
           如果您对这篇招标信息有任何补充或修改建议,请告知我们。

    猜你喜欢