e Tendering
e Tendering
• Audit trail
• Reduction in procurement cycle
• the time interval between publication of tender and closing of the bid has been reduced by an
average of ten days. Further, time required in compilation of comparative statement of
financial and techno commercial bids and its checking by the associated finance has been
reduced from average of 26 days to NIL
• 24*7 availability
• Wider choice of suppliers
Challenges & Issues
• Providing interface with MMIS
• Managing bidder database
• Standardization of processes
• Addressing the issue of diverse requirements and local practices
• Change management
• affecting power shift in the organization
• Educating users
• Purchasers & Bidders
• dedicated helpdesk
• Regulatory Compliance
• SHA1 to SHA256
• increase in length of public /private key with effect from Jan 01, 2012
Prerequisite
• Basic knowledge of Computers
• Use of Browsers, their types
• Google Chrome
• Opera/Safari
• Mozilla Firefox
• Internet Explorer
• Microsoft Edge
This module tracks the log of all queries raised by different users and
log of replies sent by help desk users to the raisers
Department Admins
• Depending on the Functions, Privileges and Responsibilities, Railway
users are divided into two categories namely:
• Department Administrators and,
• Standard Railway Users
• Schedule
• Item Breakup
• Eligibility Criteria
• Compliance
• Documents
• Firms
• Publish Tender
BID Module
• Bidding, Evaluation, etc.: The Bid module contains the process of
payments for Tender Document Cost (TDC) and Earnest Money
Deposit (EMD),
• Submission of Techno-Commercial and Financial Bids, Uploading of
Documents,
• Tender Box Opening,
• Generation of Comparative Statements, Automatic Ranking of Bids
and Creation of Briefing Notes.
• All firms who get themselves registered on the IREPS website
through an online registration process, and who are authorized to
bid against a tender can submit their bid against the tender through
the IREPS application
Searching Tenders
Tender Document
Corrigendum
View Offers
• TD home page
Previously finalized tender decisions
• Class II
• This level is relevant to environments where risks and consequences of data compromise
are moderate. This may include transactions having substantial monetary value or risk of
fraud, or involving access to private information where the likelihood of malicious access is
substantial.
• Class III
• This level is relevant to environments where threats to data are high or the consequences
of the failure of security services are high. This may include very high value transactions or
high levels of fraud risk.
• Aadhar eKyc-OTP
• This level is relevant to environments where OTP based Aadhaar-eKyc authentication is
acceptable method for credential verification prior to issuance of DSC. Certificate holder's
private keys are created on hardware and destroyed immediately after one time usage at
this assurance level.
THANK YOU