|
|||||||||
Tenders for BHEL are hosted selectively on BHEL e-Procurement portal https://bheleps.buyjunction.in . All vendors registered with the portal can participate in such tenders online through this portal. Vendors can download tender documents, submit priced bids and techno-commercial technical bids along with details of Tender Fee and EMD online from their desktops |
Top | ||||||||
|
|||||||||
|
|||||||||
Do I have to compulsorily submit my tender through the Internet? |
|
||||||||
Yes. Techno-commercial and Priced Bids for all the tenders published through e-procurement portal of BHEL have to be submitted online only. |
Top | ||||||||
|
|||||||||
1.
Vendor should have a valid User Id to access e-Procurement portal of
BHEL |
Top | ||||||||
How do I get a valid User Id to access BHEL e-Procurement portal? |
|
||||||||
You have to register your company in
eProcurement Portal of BHEL .While registering |
Top | ||||||||
|
|||||||||
If
you are having trouble downloading a softcopy of the tender document from the
portal, please contact our Help Desk Officers during Business Hours at: Email :eps.customercare@mjunction.in
|
Top | ||||||||
|
|||||||||
You can upload your tender documents directly from your PC in the designated folder created for you in On-line Bid form. Please refer the section on uploading various Tender documents in the help guide provided to you along with your tender documents or you can go through the Bidding Manual available in the home page at BHEL eProcurement site. |
Top | ||||||||
|
|||||||||
If
you need help while submitting your electronic tender, please contact our Help
Desk Officers during Business Hours at: Email :eps.customercare@mjunction.in
Or you can also contact as per the contact details in the Tender Documents. |
Top | ||||||||
What are the benefits in receiving / submitting tenders online? |
|
||||||||
Electronic
or Online Tendering is just carrying out the same traditional tendering
process in an electronic form, using the Internet. Using
Online Tendering, the Bidders can:
|
Top | ||||||||
|
|||||||||
BHEL- eProcurement portal
(https://bheleps.buyjunction.in) is a secure portal. The security features incorporated in the application ensures that all activities are logged and no unauthorized person has access to data. |
Top | ||||||||
|
|||||||||
A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that the individual sending the message really is who he or she claims to be. The Digital certificates used to create digital signatures are issued by a trusted certifying authority authorized by the Controller of Certifying Authorities of India. |
Top | ||||||||
|
|||||||||
The list of licensed CAs
along with their contact information is available on www.cca.gov.in
.You can also obtain your DSC from LRA (Licensed Registration Authority). |
Top | ||||||||
|
|||||||||
A
trusted third-party organization or company that issues digital certificates
used to create digital signatures and public-private key pairs. The role of
the CA in this process is to guarantee that the individual granted the unique
certificate is, in fact, who he or she claims to be. Usually, this means that
the CA has an arrangement with a financial institution, such as a credit card
company, which provides it with information to confirm an individual's claimed
identity. CAs are a critical component in data security and electronic
commerce because they guarantee that the two parties exchanging information
are really who they claim to be. |
Top | ||||||||
|
|||||||||
Prevents any non-authorized party from reading or changing data. The level of protection provided by encryption is determined by an encryption algorithm. In a brute-force attack, the strength is measured by the number of possible keys and the key size. For example, a Triple-Data Encryption Standard system (3 DES) uses 112-bit or 168-bit keys and, based on currently available processing power, is virtually immune to brute-force attacks. Business to Business VPNs (Extranets) share sensitive data with multiple organizations, so demand the highest level of security. This requires public key encryption and/or secure key exchange, both of which are designed to eliminate the risk of the key becoming known to an unauthorized party. | |||||||||
|
|||||||||
i) Web Browser : Internet explorer v6.0 or higher recommended . Java Runtime Environment version 1.6 and above must be installed . Acrobat Reader must be installed. Recommended Screen Resolution: 1024 by 768 pixels |
Top | ||||||||
Important points to remember: | |||||||||
|
|||||||||
Top |