IPS shortlists eight for e-ID cards, e-passports

The Identity and Passport Service (IPS) has shortlisted eight suppliers from which five will be chosen in May 2008 to enter a framework agreement to supply systems for the government's National Identity Scheme.

The Identity and Passport Service (IPS) has shortlisted eight suppliers from which five will be chosen in May 2008 to enter a framework agreement to supply systems for the government's National Identity Scheme.

The eight are: Accenture, BAE Systems, Computer Sciences Corporation, EDS, Fujitsu, IBM, Steria, and Thales. IPS earlier received 11 responses to its invitation to tender.

Bill Crothers, IPS commercial director, said, "The announcement today of the shortlist of eight bidders represents another important milestone towards delivering the National Identity Scheme.

"We now have a solid core of eight 'prime bidders' who will go forward to the next stage of the procurement process. Of course involvement in the procurement process is not restricted to just the eight companies we have announced today. Each prime bidder has their own network of sub-contractors."

EDS is in dispute with HM Revenue & Excise over unpaid compensation. A Home Office spokesman said there is still a long way to go before the final five suppliers are chosen.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT for small and medium-sized enterprises (SME)

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close