6. Challenges, Risks and Failure
|
|
- Emery Fox
- 7 years ago
- Views:
Transcription
1 6. Challenges, Risks and Failure Summary Learning Objectives: Challenges in BPO Addressing challenges Infrastructure specific challenges and types Risks in BPO Risk Mitigation Risk Analysis and Management Reasons for failure Do s and Don ts Challenges in BPO: Some challenges specific to the BPO industry can be outlines as follows: 1) Attrition: The attrition rate in a BPO is higher compared to other industries. 2) Training and Development: is a challenge given the cultural and language disparity added with customer specific business and timings. 3) Work Pressure: Night shifts with long hours and stretched targets and deadlines create a lot of work pressure in this industry. a. Physical consequence development of stress related diseases like high blood pressure, diabetes; respiratory problems and other effects such as ulcer, decalcification, fatigue, muscle tension and headaches. b. Emotional consequence leading to depression, demotivation, rigidity, helplessness, lack of self-confidence, anxiety and fearfulness. c. Behavioural consequence resembling addictive behaviours, drugs, alcohol and over-eating. It is important to have proper health management and help employees cope better with stress. Imtiaz Surve 1
2 Addressing Challenges: Understanding the hidden risks have a thorough understanding of all the linkages of outsourcing in the organization to mitigate any hidden risks. Meeting operational performance targets apart from SLA s the operations should also be linked to customer service goals. Achieving end-user satisfaction assess the needs of other key business process stakeholders in trying to achieve end-user satisfaction. Achieving the promised cost savings quantify and communicate the true value generated out of the outsourcing engagement. Infrastructure Specific Challenges and Types: The various infrastructure related challenges are categorised as follows: 1) Hardware infrastructure: Integration and compatibility of both the buyer and vendor systems can pose a huge challenge. The systems infrastructure and architecture is likely to be distinct and needs to be reviewed and managed. 2) Software infrastructure: During operations, service related transactions generate new information and business data. This has to be made available to both the buyer and the vendor through a common database. Data mining can subsequently be used to analyse the same. 3) Knowledge Infrastructure: Knowledge is defined as analyzed and applied information that helps the organization compete and grow. Business critical information is shared with BPO vendors which is not only prime for operations but also of very high importance to competitors. This criticality results in two key areas of concern; a) Maintaining information integrity prevent corruption/reconfiguration. b) Maintaining information security prevent data integrity and leakage. The following on internet security policies points should be considered: Limit access Establish granting privileges Imtiaz Surve 2
3 Streamline hardware and software Develop a password policy Have procedures for data backup and disaster recovery Have procedures for responding to security breaches Have the security policy audited. Backup process are also a key area and Scheduling of backups, Tape rotation and Tape restoration should be considered. The backup can be full, differential or incremental based on a set schedule. 4) Training and Support Infrastructure: Adequate training should be provided to all concerned on the new workflow, systems, procedures set in place and the responsibilities. General guidelines that can be followed are: a) Develop a clear set of standard operating procedures (SOPs) b) The training program should revolve around the SOP c) Conduct multiple training sessions d) Adhere to the training schedule and check progress The training should be modular so as to build in flexibility and depth. Risks in BPO: There are multiple challenges and risks associated in an outsourcing engagement that need to be properly managed. Risks can be classified as: 1) Quantitative risks deal with efficiency and effectiveness. 2) Qualitative risks deal with the quality aspect and may also relate to customer satisfaction issues. Risks can also be specifically categorised as: 1) Financial stability risk covers the vendor s financial stability/performance. 2) Project planning and management risk deals with issues of project management. Usage of tools like PERT, CPM and Gantt charts is advised. 3) Assessment of project risk mitigation requires continuous evaluation of the project in relation to the set goals and objectives. Imtiaz Surve 3
4 4) Service Provider Selection Risk stresses the importance of selection of the right vendor and contractual engagement. 5) Contract and Negotiation Risk - the contract should be legally vetted 6) Transition Risk Budgets and Schedule are key during transition. Insufficient planning and allocation of resources may hamper smooth transition of the process. First time issues may surface during transition. 7) People Risk personnel turnover and employee resistance are key metrics on the people front. Absenteeism, loss in morale and productivity is common during transition of complex processes. 8) Technology Risk interconnectivity with systems at both the vendor and buyer end is essential and hence mitigating technology risk becomes crucial. 9) Performance Standards Risks there should be adequate monitoring and review on the performance metrics defined to avoid any related risks. 10) Service Level Agreement Risk The Service Level Agreement should be properly defined and documented to avoid any misunderstanding. 11) Regulatory Risk BPO s are subject to tax benefits from the government and need to comply with the regulatory requirements. Regulatory requirements may also cover right to privacy, information technology and security requirements. 12) Intellectual Property Risks safeguarding of intellectual property can be done through use of legal indemnification procedures. 13) Hidden Costs there may be costs which are not explicitly defined in the contract and which attribute to hidden costs. 14) Conflicting Objectives Risks these include conditions of demand v/s product design issue, flexibility v/s stability issues etc. BPO is a catalyst of significant changes and the associated risks should be adequately categorised and mitigated. Risks Mitigation: 1) Human Capital Risk Mitigation: Imtiaz Surve 4
5 A good mitigation strategy is through scrutiny of vendor labour practice, HR policies and procedures during selection phase. Minimal acceptable labour standards can be included in the BPO contract. 2) Project Risk Mitigation: Such risk can be mitigated by doing a thorough assessment of the BPO initiative. The assessment may include organizations ability to adapt to change, possible transition challenges, infrastructure and time required. A good technique is also the development of a BPO risk probability matrix. 3) Intellectual Property / Information Security Risks Mitigation: Information security risk can be mitigated by adoption of best practise and standards. 4) Legal Risk Mitigation: A strategy followed is of splitting up contracts for different deliverables. A robust and strong contract with clearly defined SLA also helps in mitigation. 5) Vendor Organizational Risks Mitigation: These can be mitigated through detailed vendor assessment, verifying vendor claims and checking customer references. Vendor country labour laws and practise should also be thoroughly checked. 6) Value Risks Mitigation: Such risks can be mitigated by managing the projected outcomes. A continuous assessment can help in seeking opportunities to leverage the outsourcing relationship. 7) Force Majeure Risk Mitigation: Although difficult to quantify, these can however be mitigated through contingency plans, disaster recovery plans and business continuity plans. Risk Analysis and Management: Outsourcing Risk analysis is generally performed before vendor selection. A risk ranking of the providers is developed by comparing through a set of established risk criteria. Outsourcing Risk Management consists of service provider management, service level agreement and billing accuracy. Imtiaz Surve 5
6 Service provider management tracks statistics of the outsourcing relationship over time. The service level agreement defines the requirements and is updated periodically as defined in the contract. The billing is review continuously to ensure compliance with the terms of the contract. Reasons for Failure: Some reasons for failure of an outsourcing arrangement are: a) Outsourcing a broken function business requirements cannot be adequately communicated for broken processes and it is essential to fix a process before outsourcing. b) Lack of understanding of the total cost structure and savings it is possible that certain assumption on cost valid during engagement may not hold good during operations or there may arise instances of hidden costs. c) Misunderstanding the service levels there is possibility of misunderstanding of the SLA s. d) Contracts/Agreements the understanding, design, negotiation, management and execution terms should be well drafted in the contract. A poorly drafted contract is a common reason for failure. Do s and Don ts: Do s: Be transparent and objective Ensure clarity of scope, boundaries and document included processes Define clear, acceptable and measurable service levels Invest in relationship management and strong governance Ensure corporate commitment Identify multiple suppliers who are historically successful Use supplier competition to get the best Don ts: Focus solely on cost Imtiaz Surve 6
7 Fail to carefully delineate the exact process being outsourced Neglect due diligence on supplier capabilities Ignore external communication Under-estimate the time required for buy-in across the organization Imtiaz Surve 7
THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s
MANAGING THIRD PARTY RISK T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s Experis -- a different kind of talent company. Experis Tuesday, January 08,
More informationCost of Poor Quality:
Cost of Poor Quality: Analysis for IT Service Management Software Software Concurrent Session: ISE 09 Wed. May 23, 8:00 AM 9:00 AM Presenter: Daniel Zrymiak Key Points: Use the Cost of Poor Quality: Failure
More informationT31: Before, During and After Outsourcing David Fong, BlackRock
T31: Before, During and After Outsourcing David Fong, BlackRock Before, During and After Outsourcing David Fong, CISA, CPA Objective o Explore reasons why some organizations choose to outsource o Understanding
More informationGrowing Vendor Management
V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor
More informationWhite Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
More informationDigital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
More informationInformation Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
More information3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
More informationsecurity policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.
Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,
More information1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268
Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 10 Global, Ethics, and Security Management 1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Diff:
More informationServices Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
More informationWHITE PAPER. Mitigate BPO Security Issues
WHITE PAPER Mitigate BPO Security Issues INTRODUCTION Business Process Outsourcing (BPO) is a common practice these days: from front office to back office, HR to accounting, offshore to near shore. However,
More informationProgram Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).
Overview Certified in Data Protection (CDP) is a comprehensive global training and certification program which leverages international security standards and privacy laws to teach candidates on how to
More informationVENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
More informationWhat s the Path? Information Life-cycle part of Vendor Management
Disclaimer The materials provided in this presentation and any comments or information provided by the presenter are for educational purposes only and nothing conveyed or provided should be considered
More informationOUTSOURCING DUE DILIGENCE FORM
OUTSOURCING DUE DILIGENCE FORM SERVICE TO BE OUTSOURCED 1. Type of service to be outsourced: Accounting/Finance: Compliance Consulting: Legal Services: Administrative Functions: Information Technology:
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationShow your value, grow your business:
Show your value, grow your business: A SUPPLIER GUIDE TO MOVE FROM A TRANSACTIONAL PROVIDER TO A STRATEGIC PARTNER KAREN A. CALINSKI INTRODUCTION /02 At KellyOCG we take a holistic approach to talent sourcing
More informationBUSINESS PROCESS TRANSITION
BUSINESS PROCESS TRANSITION Managing a Successful Business Process Transition in a Multinational Organization Andrew Tattersall, Director United Kingdom, ISG www.isg-one.com INTRODUCTION Selecting a service
More informationAnatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault
Anatomy of an IT Outsourcing Deal Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault 3656867 Agenda Key Considerations for IT Outsourcing Decision Anatomy of an Outsourcing
More informationVendor Management. Minimizing Value Leakage. Deloitte Consulting LLP. November 19, 2013
Vendor Management Minimizing Value Leakage Deloitte Consulting LLP November 19, 2013 Vendor Management is a rapidly emerging business practice in the outsourcing industry Define sourcing strategy Assess
More informationPresentation title Partnering in the Delivery of IT Services in Parliaments
Presentation title Partnering in the Delivery of IT Services in Parliaments House of Commons / CANADA Mr. Soufiane Ben Moussa Chief Technology Officer 2 The House of Commons Context 308 Members of Parliament
More informationOBLIGATION MANAGEMENT
OBLIGATION MANAGEMENT TRACK & TRACE: CONTRACTUAL OBLIGATIONS Better Visibility. Better Outcomes RAMESH SOMASUNDARAM DIRECTOR, IT VENDOR MANAGEMENT SERVICES MARCH 2012 E N E R G I C A Governance Matter
More information7Seven Things You Need to Know About Long-Term Document Storage and Compliance
7Seven Things You Need to Know About Long-Term Document Storage and Compliance Who Is Westbrook? Westbrook Technologies, based in Branford on the Connecticut coastline, is an innovative software company
More informationWORKPLACE STRESS: a collective challenge WORLD DAY FOR SAFETY AND HEALTH AT WORK 28 APRIL 2016
WORKPLACE STRESS: a collective challenge WORLD DAY FOR SAFETY AND HEALTH AT WORK 28 APRIL 2016 WHAT IS WORK-RELATED STRESS? Stress is the harmful physical and emotional response caused by an imbalance
More informationi) Question Type The following are guidelines on the type of questions and their approximate weightings:
Purpose Information Systems Strategy [MS2] Examination Blueprint 2014/2015 The Information Systems Strategy [MS2] examination has been constructed using an examination blueprint. The blueprint, also referred
More informationPROJECT MANAGEMENT PLAN CHECKLIST
PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,
More informationWHITE PAPER Third-Party Risk Management Lifecycle Guide
WHITE PAPER Third-Party Risk Management Lifecycle Guide Develop and maintain compliant third-party relationships by following these foundational components of a best-practice assessment program. Third
More informationGUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY
GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY INTENT: 1. To ensure due diligence and consistency is followed in the solicitation, selection, contract
More informationBANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994
BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 Ref: BR/14/2009 OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994 INTRODUCTION
More informationBusiness Logistics Specialist Position Description
Specialist Position Description March 23, 2015 MIT Specialist Position Description March 23, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
More information---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
More informationOutsourcing Performance Management
Outsourcing Performance Management June 2005 - Sam S. Adkins According to a study conducted in April 2004 by the Conference Board, only 9 percent of companies are entirely against outsourcing some or all
More informationHappily Ever After: Project Management Tips and Tricks for the SAMHSA Grantee
Happily Ever After: Project Management Tips and Tricks for the SAMHSA Grantee Lloyd Potter, PhD, MPH SPRC Tarsha M. Wilson, MSW SAMHSA/CMHS December 10-12, 2007 GLSMA Grantee Meeting Portland, OR Project
More informationISO 20000-1:2005 Requirements Summary
Contents 3. Requirements for a Management System... 3 3.1 Management Responsibility... 3 3.2 Documentation Requirements... 3 3.3 Competence, Awareness, and Training... 4 4. Planning and Implementing Service
More informationKeys to a Successful Outsourcing Transition
Keys to a Successful Outsourcing Transition finance.arvato.com Getting it Right the First Time: Keys to a Successful Outsourcing Transition A large part of success in outsourcing depends on a seamless
More informationYour Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
More informationSTSG Methodologies and Support Structure
STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its
More informationISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
More informationPMP Examination Tasks Puzzle game
PMP Examination Tasks Puzzle game Here is a great game to play to test your knowledge of the tasks you will be tested on in the actual examination. What we have done is take each of the domain tasks in
More informationOPERATIONAL RISK RISK ASSESSMENT
OPERATIONAL RISK RISK ASSESSMENT 1 OVERVIEW Inherent Risk Risk Management Composite or Net Residual Risk Trend 2 INHERENT RISK Definition Sources Identification Quantification 3 Definition OPERATIONAL
More informationAudit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland
Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of
More informationEssential Elements for Any Successful Project
In this chapter Learn what comprises a successful project Understand the common characteristics of troubled projects Review the common characteristics of successful projects Learn which tools are indispensable
More informationIT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationCloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
More informationIT Governance Regulatory. P.K.Patel AGM, MoF
IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation
More informationSoftware as a Service: Guiding Principles
Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially
More informationA CASE STUDY ON SOFTWARE PROJECT MANAGEMENT IN INDUSTRY EXPERIENCES AND CONCLUSIONS
A CASE STUDY ON SOFTWARE PROJECT MANAGEMENT IN INDUSTRY EXPERIENCES AND CONCLUSIONS P. Mandl-Striegnitz 1, H. Lichter 2 1 Software Engineering Group, University of Stuttgart 2 Department of Computer Science,
More informationSaaS Adoption Lifecycle in Life-Sciences Companies
www.arisglobal.com A White Paper Presented By ArisGlobal SaaS Adoption Lifecycle in Life-Sciences Companies by Achal Verma, Associate Director - Program Delivery, Cloud Services Abstract With increasing
More informationProject and Operational processes, Key differences. Gotchas when deploying projects into operations
Project and Operational processes, Key differences. Gotchas when deploying projects into operations Purpose of this Presentation Assist the smooth implementation of projects into production I ve heard
More information1 Introduction to Outsourcing and BPO
1 Introduction to Outsourcing and BPO Summary Learning Objectives: Internet ISP and its types. Concept of Make or Buy and Outsourcing. Reasons for outsourcing. Concept of a virtual organization. Business
More informationCHAPTER 2: IT ENABLED SERVICES AND EMERGING TECHNOLOGIES... 2 PART 1: IT ASSURANCE SERVICES AND ROLE OF CAs IN BPO-KPO... 2 Learning Objectives...
CHAPTER 2: IT ENABLED SERVICES AND EMERGING TECHNOLOGIES... 2 PART 1: IT ASSURANCE SERVICES AND ROLE OF CAs IN BPO-KPO... 2 Learning Objectives... 2 1.1 Introduction... 2 1.2 Opportunities for CAs... 3
More informationSamples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages.
Samples of Management Consulting Assignments Performed by DCAG are Provided in the following pages. Thomas Bronack 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Cell: (917) 673-6992 Email:
More informationDirector, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
More informationNEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
More informationVendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
More informationpm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS
pm4dev, 2007 management for development series The Project Management Processes PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage
More informationRisk management and the transition of projects to business as usual
Advisory Risk management and the transition of projects to business as usual Financial Services kpmg.com 2 Risk Management and the Transition of Projects to Business as Usual Introduction Today s banks,
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More informationCDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
More informationCLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
More informationInstitutional Data Governance Policy
Institutional Data Governance Policy Vanderbilt University and Medical Center Effective Date: 07/09/2014 Revision Date: N/A DOCUMENT CONTROL Document Title Institutional Data Governance Policy Summary:
More informationWhat Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.
What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model
More informationAdvisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management
Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationHedge fund launch considerations Reaching new boundaries. Investment Management
Hedge fund launch considerations Reaching new boundaries Investment Management There are people who make things happen, there are people who watch things happen, and there are people who wonder what happened.
More informationContract and Vendor Management Guide
Contents 1. Guidelines for managing contracts and vendors... 2 1.1. Purpose and scope... 2 1.2. Introduction... 2 2. Contract and Vendor Management 2.1. Levels of management/segmentation... 3 2.2. Supplier
More informationCritical Issues in Software Licensing. William A. Tanenbaum Chair, Technology, Intellectual Property & Outsourcing Group
Critical Issues in Software Licensing William A. Tanenbaum Chair, Technology, Intellectual Property & Outsourcing Group Key Factors for Successful Software Agreements Clear description of services to be
More informationThe PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
More informationGeneric Risk Mitigation Framework for Business Process Outsourcing
Generic Risk Mitigation Framework for Business Process Outsourcing Nanayakkara B.S 1, Hirano.M 2, Waseda Business School Abstract Business process outsourcing risk mitigation is a popular topic among the
More informationStrategies to Help Vendors Optimize Their Long-term Global Contracts
THE INDUSTRIAL PERSPECTIVE Strategies to Help Vendors Optimize Their Long-term Global Contracts May 2010 KPMG INTERNATIONAL HAVE YOU CONSIDERED ALL THE ISSUES? The following questions may help vendors
More informationEssential Elements of FFIEC Vendor Due Diligence
Essential Elements of FFIEC Vendor Due Diligence Essential Elements of FFIEC Vendor Due Diligence Overview of the Whitepaper This CBIZ Credit Risk Advisory Group whitepaper was written for lenders, financial
More informationSolvency II Own risk and solvency assessment (ORSA)
Solvency II Own risk and solvency assessment (ORSA) Guidance notes MAY 2012 Contents Introduction Page Background 3 Purpose and Scope 3 Structure of guidance document 4 Key Principles and Lloyd s Minimum
More informationTips To Select and Implement CRM To Improve Your Bottom Line
Tips To Select and Implement CRM To Improve Your Bottom Line January 7, 2010 Eric Kimberling, President Panorama Consulting Group www.panorama-consulting.com 303-256-6253 About Panorama Consulting Niche
More informationHR Shared Services. Service Level Agreement. Effective 5/1/2008
HR Shared Services HR Shared Services Service Level Agreement Effective 5/1/2008 Service Level Agreement Contents GENERAL INFORMATION... 3 Purpose... 3 Vision... 3 SERVICE PERFORMANCE... 4 Mission... 3
More informationCLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
More informationHow to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
More informationHow to achieve excellent enterprise risk management Why risk assessments fail
How to achieve excellent enterprise risk management Why risk assessments fail Overview Risk assessments are a common tool for understanding business issues and potential consequences from uncertainties.
More informationOutsourcing especially offshore outsourcing continues
Copyright 2005 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. Outsourcing A Risk Management Perspective By Nicholas A. Benvenuto, CISA, CDP, CSP, ABCP, and David
More informationBig Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
More informationVENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
More informationCrosswalk Between Current and New PMP Task Classifications
Crosswalk Between Current and New PMP Task Classifications Domain 01 Initiating the Project Conduct project selection methods (e.g., cost benefit analysis, selection criteria) through meetings with the
More informationWhite Paper. The Hidden Benefits of Human Resource Business Process Outsourcing (HR BPO) SOURCING ANALYTICS
Helping Companies Optimize Their HR/ Benefits/Payroll Service Partnerships White Paper The Hidden Benefits of Human Resource Business Process Outsourcing (HR BPO) Contents Executive Overview 3 About the
More informationMNLARS Project Audit Checklist
Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?
More informationIT STARTS WITH CHANGE MANAGEMENT
TRANSFORMING ORGANIZATIONS IT STARTS WITH CHANGE MANAGEMENT THE POWER TO TRANSFORM In today s globalized and inter-connected economy, organizations deal with continually shifting market conditions, customer
More informationCredit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
More informationGAIN CLARITY CRITICAL ISSUES. Your Data in the Cloud : Benefits & Risks GAIN CONTROL. berrydunn.com
GAIN CLARITY CRITICAL ISSUES Your Data in the Cloud : Benefits & Risks berrydunn.com AGENDA Defining Cloud Services Benefits and Risks Core Requirements Myths about Clouds Is Your Data in the Cloud Secure?
More informationWHITE PAPER. Steps to select the right Outsourcing Vendor
WHITE PAPER Steps to select the right Outsourcing Vendor INTRODUCTION The process of selecting an outsourcing vendor implies a complex multistage process to evaluate not only what the provider can do,
More informationMCDONOUGH COUNTY, ILLINOIS MANAGEMENT LETTER. For the Year Ended November 30, 2014
MCDONOUGH COUNTY, ILLINOIS MANAGEMENT LETTER For the Year Ended November 30, 2014 July 23, 2015 To the Members of the County Board, the Circuit Clerk and Management McDonough County, Illinois One Courthouse
More informationI S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
More informationBlind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationBusiness Continuity Management
Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective
More informationRisk management systems of responsible entities
Attachment to CP 263: Draft regulatory guide REGULATORY GUIDE 000 Risk management systems of responsible entities July 2016 About this guide This guide is for Australian financial services (AFS) licensees
More informationFor Articulation Purpose Only.
E328 Project Management (4 Modular Credits) This document addresses the content related abilities, with reference to the module. Abilities of thinking, learning, problem solving, team work, communication,
More informationCyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
More informationBuilding Your Strategic Business Case for HR Technology. Speaker: Kristie Evans Managing Principal HR Project Manager PM Instructor
Building Your Strategic Business Case for HR Technology Speaker: Kristie Evans Managing Principal HR Project Manager PM Instructor Agenda Today s Goals HR Value Outcomes Break 10 am Methodologies Business
More informationBusiness Process Outsourcing on the rise in wealth management. Patrick Laurent Partner Technology & Enterprise Application Deloitte
Business Process Outsourcing on the rise in wealth management Pascal Martino Partner Strategy, Regulatory & Corporate Finance Deloitte Patrick Laurent Partner Technology & Enterprise Application Deloitte
More information