• 430 likes • 566 Views
Information System (e-Government) Implementation· Operation Guideline By NIA/MoSPA Korea. Table of Contents. A brief Overview 2. Structure of the guideline 3. The Body Chapter 2 Development of Project Plan Chapter 3 Procurement of ICT Project
E N D
Information System(e-Government) Implementation·OperationGuidelineBy NIA/MoSPA Korea
Table of Contents • A brief Overview 2. Structure of the guideline 3. The Body • Chapter 2Development of Project Plan • Chapter 3Procurement of ICT Project • Chapter 4Selection of Provider and Contract • Chapter 5Project Implementation • Chapter 6Software Secure coding • Chapter 7Audit andOperation
Overview • history • Establishment(‘`11.9.5) • Improvement of procurement and contract system • Reflection of the change of other related laws and orders . Change about 30 kinds of contents applicable to all stages of ICT project (plan‧ procurement‧ contract‧ implementationetc.) • 1’stRevision(‘`12.3.6) • To decrease the side-effect of preventing big business from attending to IT project • To make an environment friendly to the good small and medium business • 2’ndRevision(‘`12.6.27) • To enhance SW secure coding
E-Gov Act Law E-gov Decree Guideline for building & operation of IS Order Manual for writing RFP Legal structure Parliament President Decree Minister order Manual for Ensuring Security Manual Manual Manual for Interoperability Training Training Development of Textbook Training of government officials
Chap. 2. Development of Project Plan • Standard of HW and SW Acquisition(Sec.6.) • Refer to “Guide tor HW Capacity Estimation” for HW Acquisition • Check the availability of existing commercialSW products before SW development • Obligation of the use of existing commercial SW products • Exception) extraordinary high expenses, difficulty in fulfilling the required functions and maintenance etc. • Modify technology evaluation plan to reflect this requirement • Priority to the products developed by small & medium business
Chap.2. Development of Project Plan • Ref) Technology Application plan/result and Technology evaluation Business Plan (Sec.7) RFP (Sec.16) Proposal Implementation (Sec.43) Auditing (Sec.50) Operation (Sec.52) Procedure Technology Evaluation Documents Technology Application Plan Technology Application Result Person In charge Owner Operator Auditor Owner
Chap.2. Development of Project Plan • Exam.) Technology application plan/result (attached form)
Chap.2. Development of Project Plan • Exam.) Technology evaluation (attached form)
Chap. 2. Development of Project Plan • Technology Application Planning and Technology Evaluation of Interoperability(Sec.7) • Perform Technology Evaluation prior to the final Business Plan • Big project and national security related project need a special evaluation of technology application in the planning stage • Reflect the result of evaluation to Business Plan and RFP • Make Technology Application Planning when owners make Business Plan and RFP • Bidding participant must summit Technology Application Plan when submitting a Proposal and it should be re-submitted when implementing the Project
Chap. 2. Development of Project Plan • Security Review and Management(Sec.8) • In the time of making or modifying Information System, Request security review by NIS(National Intelligence Service) according to“Guide to National Information Security” • Development security countermeasures applicable in the process of procurement, management, and operation of ICT project etc. • Develop countermeasure for protecting personal information • Devise SW Vulnerability countermeasure and let business operator comply it • Budget and Estimation(Sec.9) • Refer to“Guide to Estimation of SW business expense ” • Acquisition expense of HWandcommercial SW • 1. the price which is registered at the public procurement service • 2. the newest purchase price • 3. the lowest price among 3 estimates
Chap. 2. Development of Project Plan • The lowest limit of business expenses which big SW business can participate(Sec.10) • State clearly in RFP • ※ sales of big business more than 800billion: 8 billion • sales of big business less than800billion: 4billion • Separate Order of SW(Sec.11) • Refer to“the objects of Separate Order of SW” • ※ more than 1 billion of business expense & more than 50million of SW price • Compensation of Proposal(Sec.12) • Refer to“Operation regulation for compensation of SW proposal” • ※ compensate for the good proposal with money
Chap. 2. Development of Project Plan • Audit(Sec.13) • Refer to “IT Audit Standard” • ※audit scope, procedure and obligation, registration of audit firm, • qualification and education of ITauditor etc. • → Sec.50. auditing • Advance Consultation(Sec.14) • Refer to “regulation to Advance consultation for e-government business” • ※ Main purpose is to filter the duplication among systems
Chap. 3.Order • Requirement Disambiguation of RFP(Sec.15) • State the requirement of RFP clearly though Function list and requirement specification etc. • In the time of ISP, Make the requirement of RFP through the business operator of ISP and Apply them to RFP • Refer to “The guide to make requirements of RFP” • → Sec.16. Making RFP • Sec.45. Changing Tasks • Sec.46. Procedure of Changing Tasks • Sec.47. Payment of Changing Tasks
Chap. 3.Order • Making RFP(Sec.16.) • Include below contents to RFP • 1. Tasks and requirements • 2. Contract condition • 3. Evaluation item and method • 4. Size of Proposal sheet·summit method·biding type • 5. Compensation of Proposal • 6. Items which business operators must comply • a. State Price for a subcontract clearly to RFP • b. propriety of subcontract • c. Technology Application Plan • d. SW secure coding compliance • e. Obligation of proposal presentation by PM • f. Making and submit of standard documents
Chap. 3.Order • RFP Security(Sec.17) • Consider not to include security issues in RFP • 1. IP address of Information systems • 2. system diagram and current condition of systems like vendors, versions etc. • 3. configuration information of systems • 4. access authority like user id, password etc. • 5. analysis report of system vulnerability • 6. current status of information protection products like FirewallㆍIPS etc. and NW devices like routerㆍswitchetc. • 7. closed objects according to“Public information act” • 8. personal information • 9. confidential items etc.
Chap. 3.Order • Evaluation Scale(Sec.18) • In the time of negotiated contact, technology : price = 90:10 • Exception) technology : price = 80:20 • 1. HW ratio is more than 50% • 2. business expense is less than 0.1 billion etc.
Chap. 3.Order Execution Order Selection and Contract stage • Ref) subcontracting management request of price for a subcontract (Sec.19) Review of price for a subcontract(Sec.36) Approval Application(Sec.37) Approval(Sec.38) Check list Management (Sec.40) Person In charge Owner Operator Owner
Chap. 3.Order • Price for a subcontract(Sec.19) • State Direct labor cost, overhead expense, and engineering fee clearly in RFP • 1. direct labor cost : 100% of unit wages • 2. overhead expense + engineering :more than 20% of direct labor cost • ※ example • The Owner pays for a subcontract directly or • Business operator pays for a subcontract within 15 days
Chap. 3.Order • Price for a subcontract(Sec.19) • → Sec.36. Technique and Price Negotiation • Sec.37. Approval Application of subcontracting • Sec.38. Subcontracting Approval • Sec.40. Subcontracting Management
Chap. 3.Order • Proposal Presentation(Sec.21) • PM must make a presentation by himself • Technical Evaluation Standard(Sec.21) • Refer to“SW Technology evaluation standard” • designate at least 6 Relative evaluation items for discrimination of technology • Enlarge evaluation ratio for small & medium business consortium • Furnishing of Predetermined Price(Sec.22) • Determine Predetermined price before proposal submit • Seal it and Keep it in secrete • Predetermined Price Determination Standard(Sec.23) • Refer to “National Contract Act”for determination standard and procedure etc.
Chap. 3.Order • Advance Publication of RFP(Sec.24) • Make public on National procurement service “ww.g2b.go.kr” and homepage of each organization for 5 days (3dyas in urgent case) • 1. business name • 2. organization name • 3. budget • 4. expiration date of comment • 5. contact number and name • 6. delivery deadline • 7. RFP etc. • Exception of advance publication • 1. in case of no time for competition and special appointment contract • 2. in case of security products • 3. product whose estimated price is less than 0.1 billion • 4. in case of second time of publication of RFP • → Sec.25. Review on comment of Advance Publication
Chap. 3.Order • Review on comment of Advance Publication(Sec.25) • Review the comment and inform the result to the offerer • reflect accepted comment to RFP • Composite a committee for the fair review
Chap. 3.Order • RFP issue and Reading(Sec.26) • Refer to“standard for negotiated contract” • Bid Announcement Period (Sec.27)
Chap. 3.Order • Presentation Meeting about RFP(Sec.28) • Host Presentation meeting for bidders(option) • State date & time, place etc. in RFP • Proposal Submission(Sec.29) • Bidders submit RFP and a price bid separately • Seal the price bid and and Keep them in secrete until unsealing a bidding price and Evaluation • → Sec.35(unsealing a bidding price and Evaluation)
Chap. 4.Selection and Contract • Composition of Evaluation Committee(Sec.30) • Composite the evaluation committee with experts from public officials, professors, researchers, industrial experts • Appoint public officials as committee members within 50% • Advance Distribution of Proposal(Sec.31) • In case of detailed review, distribute proposals toe evaluation committee members in advance • Make security policy to prevent from leakage of proposals
Chap. 4.Selection and Contract • Proposal Evaluation(Sec.32) • Evaluate with proposals • Check the identity of presenter • ※ if the presenter is not PM, he can’t make a presentation • Review Time of Proposal and Adjustment of Evaluation Score(Sec.33) • Make Review time of Proposal • 1. Less than 1 billion business : 90 Min. • 2. Less than 2 billion business : 120 Min. • 3. Less than 4 billion business : 150 Min. • 4. more than 1 billion business : 180 Min. • Adjust Evaluation Score in case of suspicious situation
Chap. 4.Selection and Contract • Publication of Technology Evaluation Result(Sec.34) • In case of more than 2 billion business, make public the evaluation result • unsealing a bidding price and Evaluation(Sec.35) • After the technology evaluation, unseal a bidding price and evaluate it without delay • Technology and Price Negotiation(Sec.36) • Refer to “National Contract Act” • In case of changing the task, consider price for a subcontract also.
Chap. 5.Execution • Approval Application of subcontracting(Sec.37) • The Business operator summit to get approval for subcontracting • Include approval application of subcontracting, detailed calculation report, business fulfillment plan of subcontracting(include detailed schedule) etc. • Subcontracting Approval(Sec.38) • Check price for a subcontract • In case of less than the standard of price for a subcontract, refuse it • Notice it clearly within 14 days, or It regards as approval
Chap. 5.Execution • Lunching and Report(Sec.39) • The Business operator summit business lunching report within 10 days after contract • In case of complementary, complement it within 7 days • Ask lunching meeting, if it needs • Subcontracting Management(Sec.40) • The Subcontractor summits compliance report of subcontracting • In case of unfulfilling, report it to Fair Trade Commision
Chap. 5.Execution • Workplace(Sec.41) • Decide workplace with the business operator • Prepare workplace, if budget don’t include the expense for workplace • Consider Remote place development, if it is possible • Human Resource Management(Sec.42) • In case of FP, don’t use head-counting management • Compliance of Technology Application Planning(Sec.43) • The business operator comply with Technology Application Plan and summit the result
Chap. 5.Execution • Standard Documents(Sec.44) • Receive standard documents and keep them consistency to use in the time of operation and maintenance • Changing Tasks(Sec.45) • Change task, if it is necessary • Procedure of Changing Tasks(Sec.46) • Comply the procedure according to to “industrial development act” and “general condition of service contract” • Payment of Changing Tasks(Sec.47) • Adjust the business expense according to “Enforcement decree of national contract act”
Chap. 5.Execution • Integration Management of Information Resource(Sec.48) • Register information resource to “National EA portal (www.geap.go.kr)” • Use the system to manage the status and statistics information resource • Auditing(Sec.49) • Follow up the action plan for audit according to audit report • Auditors write the compliance result between Technology application plan and the result
Chap.6.Software Secure Coding • Principal of SW Secure Coding(Sec.50) • Comply with SW secure coding • In case of new development : all sw codes • In case of maintenance : modified sw codes • Activity of SW Secure Coding(Sec.51) • In time of proposal evaluation, evaluate reasonability of the tools, procedures, method etc. • Refer to “SW secure coding guide” • developers/programmers are trained with secure coding
Chap.6.Software Secure Coding • Diagnosis standard of Security Weakness (Sec.52) • Refer to mandatory diagnosis item • Diagnosis Procedure of Security Weakness(Sec.53) • Diagnose to remove the security weakness • Include diagnosis to Audit check list • Use the tool to remove the security weakness • Business operators verify to remove the security weakness • Diagnostician(Sec.54) • Qualified experts • Registered in Ministry of Security and Public Administration • Management of Diagnostician
Chap.7. Examination and Operation • Compensation of Deferment(Sec.55) • Calculate it according to “general condition of service contract” • Examination(Sec.56) • Examine it according to “general condition of service contract” • Check the compliance between Technology application plan and the result • Check the non-conformity of Audit report to be corrected • Private Application of Information Resource(Sec.58) • share information resource with the private through “public data portal(www.data.go.kr)”or your own Information system
Chap.7. Examination and Operation • Operation and Maintenance(Sec.59) • In case of modification of systems, make consistency between systems and documents • Make manual of operation and maintenance though the business operator • Attribution of Intellectual Property and Deposit of Technical Data(Sec.60) • Refer to“general condition of service contract”
Ref2) Flow of CBD documents Design Analysis Implementation Definition and analysis of requirement tio Source Class Component Unit test result code Class design component design Requirement Defintiion RFP Proposal Business Fulfillment plan Meeting result … Database Conversion Database Database table Data conversion and initial data design Entity relationship description Screen Use case Specification user interface design Test Database design Testing Training Test Integration Test result User manual System test scenario Architecture architecture design Operator manual System test result test plan Integration Test scenario Interface Interface design Unit test case Installation Acceptance Acceptance Test Scenario System Installation result Acceptance Test result Requirement trace Requirement trace