Issue Date: 
Monday, January 11, 2016

7 security features when registering on the Central Supplier database    

At the moment the hottest topic in the South African tender environment is the Central Supplier Database (CSD). If you want to do business with the South African Government in the near future you will have to register.

Once you start working on the Central Supplier Database it is noticeable how many security features there are. The database starts of by requesting you to supply a very complicated password. The password must inter alia contain capital letters, numbers as well as special characters. There are a number of other security features but the CSD website list the following seven features that secure identity proofing:

  1. When registering on the CSD, not only is the email address confirmed but also a One Time Pin (OTP) sent as an SMS to the cell phone number provided when registering. This is called an 'Out of Band' method of adding an additional layer of identity proofing.
  2. When a new bank account is added or any existing bank accounts edited, an OTP will be sent to the supplier's preferred contact as well as an e-mail notification confirming that changes were made to the supplier's banking information. Email notifications are also sent when changes are submitted. Both of these are implemented to protect the supplier against malicious practices.
  3. The use of a CAPTHA functionality limits robots and crawlers to access certain areas of the CSD application.
  4. The CSD furthermore implemented role based access control per user per supplier and thus only the supplier's user(s) have access to the supplier information. The CSD does not have an administrative module and thus no single user can be a CSD administrator and access supplier information using the application.
  5. All passwords are encrypted on the CSD database. Any additional users the main user creates will only have secondary privileges, meaning they will not be able to create other users. This ensures that control remains with the main user.
  6. The communication channel between the CSD servers and the client's browser implements SSL security which means thas communication is encrypted and various other additional technical aspects have been implemented to limit other security breaches such as hacking and spam.
  7. The Supplier Summary Registration report can only be accessed by other users if you decide to share both your supplier number and security code with them.

As you can see the security is comprehensive and complext. Ensure that you are well prepared with all the necessary required info when you start the registering process.

www.how2tender.com

Learn to earn

When Must I Sub-Contract?

There seems to be a lot of confusion amongst entrepreneurs when it comes to tenders and sub-contracting. The Draft Preferential Procurement Regulations, have been gazetted and are currently up for review. However, these Regulations are the major cause for the confusion. Many entrepreneurs ask whether they should sub-contract or not whilst responding to a tender.

The Draft Preferential Procurement Regulations stipulates the following: 

  1. For contracts above R30 million, the tenderer MUST sub-contract a minimum of 30% of the value of the... Read More
Free Keyword search

Search all tender notices for FREE!

No subscription or registration required!

You can also search by the reference of the the tender.

Advanced search

Search by Issuer, Region or Sector, individually, or using any combination of the three.