230 likes | 377 Vues
This document outlines the implications of technological sovereignty on the acquisition policies within the ICTEC sector, emphasizing the need for domestic industry promotion in India. It discusses the categorization of capital equipment acquisition, eligibility of both Indian and foreign vendors, and the importance of indigenous content in procurement. Furthermore, it addresses the low participation levels of domestic industries in joint ventures and the necessity for technology transfer to enhance local manufacturing capabilities. The aim is to strengthen India’s defense and telecom capabilities while ensuring security and efficiency.
E N D
TECHNOLOGICAL SOVEREIGNTY IN ICTEC Implication on Acquisition Policy Additional Director General Telecom Dte Gen of Signals Integrated HQ of MoD (Army) 11 Oct 2012
MANIFESTATION OF TECHNICAL SOVEREIGNTY “Domestic industry is lagging behind in this initiative and needs to be promoted”
CATEGORISATION • TECHNOLOGY NOT AVAILABLE. • BOTH INDIAN AND FOREIGN VENDORS ELIGIBLE. BUY GLOBAL BUY • FOR LOW TO MEDIUM TECHNOLOGY. • ADEQUATE KNOW HOW IN INDIGENOUS INDUSTRY. • MINIMUM 30% INDIGENOUS CONTENT. BUY INDIAN OFFSET TURNKEY • HIGH TECHNOLOGY CRITICAL AND ESSENTIAL. • PROCUREMENT IN LARGE QUANTITIES. • FROM FOREIGN VENDORS ONLY. • AFTER INITIAL BUY, SUBSEQUENT LICENSED INDIGENOUS PRODUCTION THROUGH ToT. BUY AND MAKE BUY AND MAKE • PARTICIPATION BY INDIAN VENDORS OR JOINT VENTURE • INDIGENISATION : COLLABORATION / JV WITH ToT. • MINIMUM 50 % INDIGENOUS CONTENT. BUY AND MAKE (INDIAN) • STRATEGIC COMPLEX SECURITY SENSITIVE SYSTEMS.- BY DRDO • LOW TECH, MATURE SYSTEMS – BUY INDIAN • HIGH TECH, COMPLEX SYSTEMS- DPSUs / OFB / INDIAN INDUSTRY/RUR MAKE
INDIGENISATION : CAUSAL LOOP Import S S O Vulnerability to Cyber Attacks Demand for ICTEC Infra O S O R System Performance R Trustworthiness ICT and ITES S S S B Need Network Sovereignty SUCCESS TO THE SUCCESSFUL Indigenisation Economy S S Jobs S Manufacturing Facilities