|Treasurer’s Instruction No||1123|
|Title||Government Information Technology Conditions|
|Effective date||18 December 2015|
|Objective and Background||Details the additional contract documentation and processes that agencies must use for the purchase of Information Technology goods and services.|
Black letter (or bold) items within these Instructions are mandatory and other plain font items are instructional or for the purpose of providing guidance only.
(1) This instruction applies only to the procurement of goods and services and is to be read in conjunction with other Instructions relating to goods and services which are contained in the 1100 series of the Treasurer's Instructions.
Further information on goods and services procurement, including a definition of "goods and services", can be located at www.purchasing.tas.gov.au> Buying for Government.
For information on building and construction and roads and bridges procurement, refer to the 1200 series of the Treasurer's Instructions.
(2) Subject to clauses (3) and (4) below, agencies entering into agreements or contracts for the supply of Information Technology (IT) goods and services must use the Government Information Technology Conditions (GITC).
The GITC Order forms for the purchase of IT goods and services under a GITC Head Agreement, and other information and guidelines, can be found on the Purchasing website at www.purchasing.tas.gov.au>Contracts>GITC.
(3) Clause (2) above does not apply in the case of software acquisitions which do not involve any on-site service component (such that there are no public liability or personal injury risks to service providers or third parties), provided:
(a) a proper risk management assessment of the acquisition has been carried out which demonstrates that the risks to the Crown of the acquisition are either negligible or can be properly managed by the agency. The risk management assessment must be certified by the agency’s relevant IT Manager, and be made available for inspection by officers of Crown Law or the Department of Treasury and Finance upon request; and
(b) the agency puts in place proper risk management strategies to prevent any loss or damage to the Crown; and
(c) the software product:
(i) is to be used for a discrete purpose only and is not to be connected to other government computer systems; or
(ii) can be separated from, or have its use properly risk managed in relation to, other Government computer systems, to prevent risk of damage to those other systems.
(4) Clause (2) above does not apply in the case of hardware acquisitions and related services purchased under the Information, Communications and Technology Hardware (C150) Contract.