Customs shortlists seven for £4bn lorry road use plan

HM Customs and Excise has shortlisted seven suppliers to go through to the next stage of its procurement process for a £4bn...

HM Customs and Excise has shortlisted seven suppliers to go through to the next stage of its procurement process for a £4bn scheme to charge haulage firms for their road usage.

Technology under consideration includes road-side detectors, in-vehicle transmitters and satellite-based systems.

The Lorry Road-User Charge (LRUC) contract is designed to deliver the Government's election manifesto commitment, of ensuring that all lorries using UK roads, irrespective of nationality, contribute towards the costs they impose.

The procurement is divided into three main parts: charging data services, enforcement services and central services.

Serco, Siemens and T-Systems International have been selected to supply bids for the charging data services contract.

Autostrade, Serco and the TraCS consortium are the three bidders for the enforcement services contract.

Capita Group, IBM and Siemens have been selected to bid for the central services contract.

Customs and Excise will be responsible for managing the LRUC, which is expected to come into force in 2007/08.

Last month the IT procurement was delayed at the request of bidders.

Customs and Excise was due to announce a shortlist of six contracts to run three service packages that would build an IT infrastructure for the Lorry Road User Charge scheme.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close