NBN final report in, but government is gagged

 

The Federal Government will get its first detailed look at the NBN proposals on the table after the 'expert panel' handed over its final report today.

Broadband Minister Stephen Conroy said that while the government ‘will give this serious and detailed report careful consideration’ it would not be commenting on the report’s highly anticipated contents.

“Until this point, the evaluation of proposals received in the National Broadband Network process has proceeded at arm’s length from the Government,” said Conroy.

“The Government had not seen the contents of any proposal, nor had it received detailed briefings on any proposals from the Panel of Experts.”

“The disclosure of the contents of the panel’s report before the completion of the process, particularly any negotiation phase, has the potential to prejudice the outcome of the process,” said Conroy.

The NBN process and associated probity requirements ‘remained active’, Conroy said.

Conroy did, however, state that the panel had made an invaluable contribution to the ‘realisation’ of the Government’s commitment to the rollout of the NBN.

Conroy also acknowledged the ACCC ‘which had provided its own report as input to the Panel’s consideration’.

No guidance was provided on when the government is expected to reveal details of the final report, or when the report would be released to the public.

NBN final report in, but government is gagged
 
 
 
Top Stories
CIO exits as Coles steps up offshoring
Updated: Engages Accenture in Manila; staff to learn of their fate today.
 
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 788

Vote