Metropolitan Police to replace outdated ICT system
The Metropolitan Police Service (MPS) has launched a tender worth up to £150m to replace its outdated and fragmented ICT system.
The tender, launched last week, is seeking suppliers for an integrated system managing the entire police process from investigation and intelligence, through to custody and case management.
The business case for the new system, published in February, said that current systems fail to meet national standards on information management.
It said: “The MPS’s current IT systems are standalone, old and fail to support operational requirements especially around intelligence and investigation.
“The MPS core policing technology and applications have constantly evolved and shifted in response to differing demands across MPS departments.”
Home Office plans new database to help police fight crime
The intelligent Cloud: From information to innovation
The new procurement covers services including:
- Integrated licences for investigation, custody, intelligence and prosecution;
- Provision of support call handling and management system;
- Implementation and data migration;
- Development of interfaces and APIs;
- Training planning, administration and delivery;
- Product changes and configuration services for the MiPS system;
The MPS will consider two hosting options – either from MPS nominated data centres or through secure cloud servers.
The value of the contract is estimated at between £80m and £150m and will be provided by around five suppliers.
Share this page
CONTRIBUTIONS FROM READERS
Please login to post a comment or register for a free account.
Public Accounts Committee warns that lack of support could imperil delivery
Departments look to sign joint deal with a software provider and a system integrator
MPs found that ‘inefficient’ manual processes contributed to a pandemic backlog of driving licence applications from those with notifiable medical needs
Department began piloting limited use of online system in October 2020
Related Sponsored Articles
The traditional reactive approach to cybersecurity, which involves responding to attacks after they have occurred, is no longer sufficient. Murielle Gonzalez reports on a webinar looking at...