Generic Risk Mitigation Framework for Business Process Outsourcing

Size: px
Start display at page:

Download "Generic Risk Mitigation Framework for Business Process Outsourcing"

Transcription

1 Generic Risk Mitigation Framework for Business Process Outsourcing Nanayakkara B.S 1, Hirano.M 2, Waseda Business School Abstract Business process outsourcing risk mitigation is a popular topic among the outsourcing companies as well as service providers. While the BPO and ITES market is well positioned for rapid and continuous growth, the widespread fear about its inherent risks can be detrimental to the success of this multibillion dollar industry. As many developed and developing nations place a significant emphasis on the BPO industry as a major contributing factor of their economies, BPO risk mitigation has become a priority in the national level too. However, identifying risks alone is insufficient to safeguard the healthy growth of the BPO industry. A systematic method to mitigate the risks is mandatory and is a timely requirement of the BPO/ITES industry today. The objective of this paper is to present one such generic BPO risk mitigation framework. Keywords: BPO, ITES, Risk Mitigation 1. Introduction BPO risks are numerous and their management is complicated. This complexity in risk management affects SMEs more than large corporations because of their ability to absorb potential losses due to risks without too much damage. Rather than following a reactive approach to manage risks and losses, companies will be better positioned in the outsourcing environment if they have access to a proactive risk mitigation framework to use in the BPO lifecycle. In the work that follows, one such generic risk mitigation framework is presented, which can be easily customized to the nature of the outsourced business function. The framework can help both the outsourcing company as well as the service providers for maintaining a successful and healthy BPO relationship. 2. Setting up an Effective BPO Project Team The project team is responsible for the analysis of opportunities presented by the outsourcing initiative and drive the outsourcing decision especially during the beginning of a BPO venture. According to the studies conducted in this research, we found that most of the outsourcing organizations either do not employ a project team or vest the sole responsibility of the project in a few individuals selected from relevant departments without a sound criterion. The BPO project team that we propose consists of all required elements in the organization hierarchy who has a direct stake in the BPO venture. Therefore, the strategic level management should be a part of this team in the capacity of a top-level steering group. The steering group is responsible for initiating the outsourcing venture, justifying the alignment of the BPO decision with the corporate strategy and overall supervision to ascertain the delivery of expected project goals. Ideally, strategic level managers from HR, Finance and IT should fill this steering group. A BPO analysis team which reports to the top level steering committee is also required in order to critically investigate the benefits of outsourcing an internal process and to provide the results of the investigation to the steering committee in an unbiased manner. AT&T has used this approach to outsource its HR function to Aon Consulting, which now provides AT&T with HR administrative, transaction and payroll services [1]. The BPO analysis team at AT&T asked respective HR managers why their activity should continue to function as an in-house operation. This approach lets managers view their functions in a critical manner, convince them of the benefits of BPO, makes them less adversarial to the BPO strategy and creates new project champions to take the word to the dissenting employees. Beside the steering and analysis teams, the most important role in a BPO venture is played by the project management team. The project management team should be responsible for the overall progress of the BPO initiative. Further, the responsibility of risk mitigation and the handling of the risk mitigation framework presented in section 3 are significant duties of the project management team. Other parts that 1

2 comprise the proposed BPO team are the provider selection team and provider side interfacing team. The proposed team layout is illustrated in figure 1. Top Level Steering Group Business Analysis Team Provider Selection & Monitoring Team Provider Side Interfacing Team Project Mgmt Team Figure 1: BPO Project Team Structure 3. Proposed Risk Mitigation Framework The objective of this section is to present the proposed generic risk mitigation framework in the light of the BPO project team structure (the users of the framework) described earlier. In the abstract level, the framework works in five steps. The abstract representation of the framework is shown in figure 2. Risk Identification & Assessment Device Risk Management Strategy Implement Risk Mitigation Methods Monitor Risk Mitigation Processes Evolve Risk Mitigation Processes Figure 2: Main Steps of the Risk Mitigation Framework Even though not shown in the figure, the risk identification and assessment should be preceded by the all important exercise of setting BPO goals and objectives. This is the responsibility of the top level steering group. Steps two to five are carried out by the project management team relying on the information received from the provider selection and monitoring team. In the first step, risk identification could be dealt with simple process classification [2] and assessment could be realized through risk-probability matrices. A sample risk-probability matrix is given in figure 3. Risk Probability Cost Mitigation Tactics Implementation Time Overrun 95% 10% Bonus Plan Key Staff Turnover 60-70% 2% Retention Program, Training Hardware & Software 30-40% 5-8% Vendor Agreement to Absorb Cost Inadequacies Customer Dissatisfaction 10-15% 5% Customer Training, Vendor Monitoring Legal Issues 2-5% 10-15% Empowering the Legal Team Mission Critical Data Loss 1% NA Quality Control, Backups Political Instability <1% 50% Disaster Recovery Methods Figure 3: BPO Risk-Probability Matrix [5] The determination of the risk management strategy (step 2) has to be inline with the categorization of BPO risks. Although there are a number of classification schemes for BPO risks [2], this study uses a seven segment BPO risk classification scheme. The seven segments are HCM, Project, IP, legal, provider s organizational, business value and external environmental risks. Potential risk management strategies include avoidance, abatement, retention, transfer and allocation. Risk avoidance and abatement are self explanatory. Out of the five risk management strategies, risk transfer is being used by many outsourcers [3]. Risk transfer is shifting the risk burden from one party to another which is mainly realized through insurance schemes and guarantees in the contract with providers. Risk retention is in fact a fall back strategy when it is impossible to transfer a risk. Moreover in certain instances the expenditure to transfer a 2

3 risk can be higher than the cost of the damage due to that risk. Therefore, retaining the risk and absorbing the damage is a better option than trying to transfer it. Risk allocation is a viable option for the business receiving party (provider) to share the risk burden by further outsourcing the received business process to a third party. However, the outsourcers should be extra careful about such level two outsourcing arrangements that introduce further risks, even though such arrangements can mitigate risks for their service providers. The step three deals with implementing risk mitigation methods according to the selected strategies. Human capital risk mitigation methods first have to address the change that is taking place internally. Seeking ways to overcome resistance by effective communication [4], establishing changes and reestablishing Standard Operating Procedures (SOPs) are some of the tasks of change management related to BPO. Then project risks prevent the outsourcer from achieving the cost savings, productivity improvements and certain strategic advantages [2]. Project risks arise mainly due to two reasons; incorrect assessment of the BPO project and unrealistic expectations of the top level steering group. Some risk mitigation methods that address project risks can be structured as shown in figure 4. Project Risk Category Mitigation Method The project management team ensures that the Incorrect assessment 1. Assess readiness to outsource steering group and the top level executives of the of BPO readiness 2. Appoint a strong BPO champion 3. Step by step transition organization are well-informed of project risks, Unrealistic 1. Upward expectations mgmt costs and mitigation strategies. Downward expectations 2. Downward expectations mgmt 3. Horizontal expectations mgmt expectations management focuses on employees, 4. External expectations mgmt Figure 4: Project Risk Mitigation Methods horizontal expectations management handles the expectations of managers in non-outsourced processes and external expectations management deals with customers, suppliers and other stakeholders. Risk mitigation methods for countering IP and legal aspects can be graphically illustrated as shown in figure 5. IP Check Complaince with Industry Specific Guidelines Legal Set service specification & performance standards Establish administrative safeguards (documented policies for daily ops) Document SLAs Establish physical safeguards (protection of data, IS and equipment) Design clear project termination scenarios Establish technical safeguards (how to use technology to control access) Communicate legal obligations and penalties to the provider OR Outsource IP and Legal risk mgmt to a third party provider Figure 5: Methods to Counter IP and Legal Risks Devising provider organizational risk mitigation methods is the responsibility of the service provider, although the outsourcer could exert pressure on the provider to adopt good industry practices. These methods can also be interpreted as operational risk mitigation techniques [2] that deal with people, technology and process of the provider. Some of these risk mitigation methods are given in figure 6. The sixth segment of the BPO risk classification scheme is business value risks. Due to inherent problems of any given BPO venture, achieving the expected business value maybe difficult and hence methods should be formulated to mitigate this risk. One method is to manage projected outcomes of the project which may seem as a hard line cost-cutting approach to many. Another method is to empower the project management team to leverage opportunities that spawn during the BPO lifecycle [5]. This is called the pressing the value model. Sometimes, the project management team should try to outsource further non-core functions to existing providers under this method. Business value risks can arise in the case of 3

4 providers who overstate potential values and value delivery time frames. In such circumstances, effective SLA negotiation, implementation and SLA management can help. In fact many service providers have Risk Mitigation Method People 1. Constant stream of new recruits 2. Fast track training programs 3. Bonus plans and incentive packages 4. Clear career advancement paths etc Technology 1. Seamless ICT infrastructure 2. Adequate and easy to maintain software applications portfolio etc Process 1. Customer satisfaction surveys 2. Set targets to increase throughput etc Figure 6: Provider Organizational Risk Mitigation already adopted extreme value risk mitigation techniques. Then the seventh segment of the risk classification scheme, external environmental risks are extremely difficult to tackle. For example, political instability could be predicted using the history of events in the BPO service provider s locale. The risk mitigation plan in such cases should address what, how, who, when and where questions pertaining to relocation and continuation of outsourced services. Not only political instability, but also natural disasters, outbreaks of pandemics and global economic fluctuations should also be taken into consideration. The fourth step of the framework in figure 2 addresses the monitoring aspect of risk mitigation exercises. The purpose of introducing a risk mitigation monitoring phase is to measure the effectiveness and applicability of employed strategies and techniques since risk mitigation itself is a useful, yet costly process. The monitoring and benchmarking of many types of risk management strategies are not so difficult thanks to intelligent and automated continuous monitoring systems available today. These systems provide improved consistency, coverage, sophistication, timeliness and additional controls and can monitor risks in real time. In essence, these risk monitoring solutions can be generalized as decision support systems for BPO ventures. The last step of the framework ensures that the risk mitigation processes are evolved over time, learning by previous mistakes and successes. 4. Conclusion and Future Work In this paper, a generic risk mitigation framework for BPO/ITES industries was presented. The target users of the framework are the BPO project team from the outsourcing company s end and the outsourcing account managers and their teams from the service provider s end. The framework which works in five steps as explained in the paper equips the concerned parties with effective risk mitigation strategies to handle scenarios ranging from HCM related issues to external environmental risks. As a next step, the framework is to be presented together with a questionnaire to a selected group of outsourcing companies and their service providers to measure its applicability and effectiveness. References [1] Stone.L, Brown R.H, AT&T's Relationship with Aon Is an Exemplar of Comprehensive Human Resources Business Process Outsourcing, Gartner Research, 2004 [2] Nanayakkara B.S, Hirano.M, Business Process Outsourcing Risk Mitigation, In the proc. of Japan Society for Management Information, 2009 (Autumn) [3] Downey J.M, Risk of outsourcing applying risk management techniques to staffing methods, Facilities Journal, 1995 [4] Offshore outsourcing management - How to manage your business for successful outsourcing, Outsource to India, [5] Duening T.N, Click R.L, Essentials of Business Process Outsourcing, John Wiley & Sons, Inc,

5 Generic Risk Mitigation Framework for Business Process Outsourcing Nanayakkara B.S 1, Hirano.M 2, Waseda Business School Abstract Business process outsourcing risk mitigation is a popular topic among the outsourcing companies as well as service providers. While the BPO and ITES market is well positioned for rapid and continuous growth, the widespread fear about its inherent risks can be detrimental to the success of this multibillion dollar industry. As many developed and developing nations place a significant emphasis on the BPO industry as a major contributing factor of their economies, BPO risk mitigation has become a priority in the national level too. However, identifying risks alone is insufficient to safeguard the healthy growth of the BPO industry. A systematic method to mitigate the risks is mandatory and is a timely requirement of the BPO/ITES industry today. The objective of this paper is to present one such generic BPO risk mitigation framework. Keywords: BPO, ITES, Risk Mitigation 1. Introduction BPO risks are numerous and their management is complicated. This complexity in risk management affects SMEs more than large corporations because of their ability to absorb potential losses due to risks without too much damage. Rather than following a reactive approach to manage risks and losses, companies will be better positioned in the outsourcing environment if they have access to a proactive risk mitigation framework to use in the BPO lifecycle. In the work that follows, one such generic risk mitigation framework is presented, which can be easily customized to the nature of the outsourced business function. The framework can help both the outsourcing company as well as the service providers for maintaining a successful and healthy BPO relationship. 2. Setting up an Effective BPO Project Team The project team is responsible for the analysis of opportunities presented by the outsourcing initiative and drive the outsourcing decision especially during the beginning of a BPO venture. According to the studies conducted in this research, we found that most of the outsourcing organizations either do not employ a project team or vest the sole responsibility of the project in a few individuals selected from relevant departments without a sound criterion. The BPO project team that we propose consists of all required elements in the organization hierarchy who has a direct stake in the BPO venture. Therefore, the strategic level management should be a part of this team in the capacity of a top-level steering group. The steering group is responsible for initiating the outsourcing venture, justifying the alignment of the BPO decision with the corporate strategy and overall supervision to ascertain the delivery of expected project goals. Ideally, strategic level managers from HR, Finance and IT should fill this steering group. A BPO analysis team which reports to the top level steering committee is also required in order to critically investigate the benefits of outsourcing an internal process and to provide the results of the investigation to the steering committee in an unbiased manner. AT&T has used this approach to outsource its HR function to Aon Consulting, which now provides AT&T with HR administrative, transaction and payroll services [1]. The BPO analysis team at AT&T asked respective HR managers why their activity should continue to function as an in-house operation. This approach lets managers view their functions in a critical manner, convince them of the benefits of BPO, makes them less adversarial to the BPO strategy and creates new project champions to take the word to the dissenting employees. Beside the steering and analysis teams, the most important role in a BPO venture is played by the project management team. The project management team should be responsible for the overall progress of the BPO initiative. Further, the responsibility of risk mitigation and the handling of the risk mitigation framework presented in section 3 are significant duties of the project management team. Other parts that 1

6 comprise the proposed BPO team are the provider selection team and provider side interfacing team. The proposed team layout is illustrated in figure 1. Top Level Steering Group Business Analysis Team Provider Selection & Monitoring Team Provider Side Interfacing Team Project Mgmt Team Figure 1: BPO Project Team Structure 3. Proposed Risk Mitigation Framework The objective of this section is to present the proposed generic risk mitigation framework in the light of the BPO project team structure (the users of the framework) described earlier. In the abstract level, the framework works in five steps. The abstract representation of the framework is shown in figure 2. Risk Identification & Assessment Device Risk Management Strategy Implement Risk Mitigation Methods Monitor Risk Mitigation Processes Evolve Risk Mitigation Processes Figure 2: Main Steps of the Risk Mitigation Framework Even though not shown in the figure, the risk identification and assessment should be preceded by the all important exercise of setting BPO goals and objectives. This is the responsibility of the top level steering group. Steps two to five are carried out by the project management team relying on the information received from the provider selection and monitoring team. In the first step, risk identification could be dealt with simple process classification [2] and assessment could be realized through risk-probability matrices. A sample risk-probability matrix is given in figure 3. Risk Probability Cost Mitigation Tactics Implementation Time Overrun 95% 10% Bonus Plan Key Staff Turnover 60-70% 2% Retention Program, Training Hardware & Software 30-40% 5-8% Vendor Agreement to Absorb Cost Inadequacies Customer Dissatisfaction 10-15% 5% Customer Training, Vendor Monitoring Legal Issues 2-5% 10-15% Empowering the Legal Team Mission Critical Data Loss 1% NA Quality Control, Backups Political Instability <1% 50% Disaster Recovery Methods Figure 3: BPO Risk-Probability Matrix [5] The determination of the risk management strategy (step 2) has to be inline with the categorization of BPO risks. Although there are a number of classification schemes for BPO risks [2], this study uses a seven segment BPO risk classification scheme. The seven segments are HCM, Project, IP, legal, provider s organizational, business value and external environmental risks. Potential risk management strategies include avoidance, abatement, retention, transfer and allocation. Risk avoidance and abatement are self explanatory. Out of the five risk management strategies, risk transfer is being used by many outsourcers [3]. Risk transfer is shifting the risk burden from one party to another which is mainly realized through insurance schemes and guarantees in the contract with providers. Risk retention is in fact a fall back strategy when it is impossible to transfer a risk. Moreover in certain instances the expenditure to transfer a 2

7 risk can be higher than the cost of the damage due to that risk. Therefore, retaining the risk and absorbing the damage is a better option than trying to transfer it. Risk allocation is a viable option for the business receiving party (provider) to share the risk burden by further outsourcing the received business process to a third party. However, the outsourcers should be extra careful about such level two outsourcing arrangements that introduce further risks, even though such arrangements can mitigate risks for their service providers. The step three deals with implementing risk mitigation methods according to the selected strategies. Human capital risk mitigation methods first have to address the change that is taking place internally. Seeking ways to overcome resistance by effective communication [4], establishing changes and reestablishing Standard Operating Procedures (SOPs) are some of the tasks of change management related to BPO. Then project risks prevent the outsourcer from achieving the cost savings, productivity improvements and certain strategic advantages [2]. Project risks arise mainly due to two reasons; incorrect assessment of the BPO project and unrealistic expectations of the top level steering group. Some risk mitigation methods that address project risks can be structured as shown in figure 4. Project Risk Category Mitigation Method The project management team ensures that the Incorrect assessment 1. Assess readiness to outsource steering group and the top level executives of the of BPO readiness 2. Appoint a strong BPO champion 3. Step by step transition organization are well-informed of project risks, Unrealistic 1. Upward expectations mgmt costs and mitigation strategies. Downward expectations 2. Downward expectations mgmt 3. Horizontal expectations mgmt expectations management focuses on employees, 4. External expectations mgmt Figure 4: Project Risk Mitigation Methods horizontal expectations management handles the expectations of managers in non-outsourced processes and external expectations management deals with customers, suppliers and other stakeholders. Risk mitigation methods for countering IP and legal aspects can be graphically illustrated as shown in figure 5. IP Check Complaince with Industry Specific Guidelines Legal Set service specification & performance standards Establish administrative safeguards (documented policies for daily ops) Document SLAs Establish physical safeguards (protection of data, IS and equipment) Design clear project termination scenarios Establish technical safeguards (how to use technology to control access) Communicate legal obligations and penalties to the provider OR Outsource IP and Legal risk mgmt to a third party provider Figure 5: Methods to Counter IP and Legal Risks Devising provider organizational risk mitigation methods is the responsibility of the service provider, although the outsourcer could exert pressure on the provider to adopt good industry practices. These methods can also be interpreted as operational risk mitigation techniques [2] that deal with people, technology and process of the provider. Some of these risk mitigation methods are given in figure 6. The sixth segment of the BPO risk classification scheme is business value risks. Due to inherent problems of any given BPO venture, achieving the expected business value maybe difficult and hence methods should be formulated to mitigate this risk. One method is to manage projected outcomes of the project which may seem as a hard line cost-cutting approach to many. Another method is to empower the project management team to leverage opportunities that spawn during the BPO lifecycle [5]. This is called the pressing the value model. Sometimes, the project management team should try to outsource further non-core functions to existing providers under this method. Business value risks can arise in the case of 3

8 providers who overstate potential values and value delivery time frames. In such circumstances, effective SLA negotiation, implementation and SLA management can help. In fact many service providers have Risk Mitigation Method People 1. Constant stream of new recruits 2. Fast track training programs 3. Bonus plans and incentive packages 4. Clear career advancement paths etc Technology 1. Seamless ICT infrastructure 2. Adequate and easy to maintain software applications portfolio etc Process 1. Customer satisfaction surveys 2. Set targets to increase throughput etc Figure 6: Provider Organizational Risk Mitigation already adopted extreme value risk mitigation techniques. Then the seventh segment of the risk classification scheme, external environmental risks are extremely difficult to tackle. For example, political instability could be predicted using the history of events in the BPO service provider s locale. The risk mitigation plan in such cases should address what, how, who, when and where questions pertaining to relocation and continuation of outsourced services. Not only political instability, but also natural disasters, outbreaks of pandemics and global economic fluctuations should also be taken into consideration. The fourth step of the framework in figure 2 addresses the monitoring aspect of risk mitigation exercises. The purpose of introducing a risk mitigation monitoring phase is to measure the effectiveness and applicability of employed strategies and techniques since risk mitigation itself is a useful, yet costly process. The monitoring and benchmarking of many types of risk management strategies are not so difficult thanks to intelligent and automated continuous monitoring systems available today. These systems provide improved consistency, coverage, sophistication, timeliness and additional controls and can monitor risks in real time. In essence, these risk monitoring solutions can be generalized as decision support systems for BPO ventures. The last step of the framework ensures that the risk mitigation processes are evolved over time, learning by previous mistakes and successes. 4. Conclusion and Future Work In this paper, a generic risk mitigation framework for BPO/ITES industries was presented. The target users of the framework are the BPO project team from the outsourcing company s end and the outsourcing account managers and their teams from the service provider s end. The framework which works in five steps as explained in the paper equips the concerned parties with effective risk mitigation strategies to handle scenarios ranging from HCM related issues to external environmental risks. As a next step, the framework is to be presented together with a questionnaire to a selected group of outsourcing companies and their service providers to measure its applicability and effectiveness. References [1] Stone.L, Brown R.H, AT&T's Relationship with Aon Is an Exemplar of Comprehensive Human Resources Business Process Outsourcing, Gartner Research, 2004 [2] Nanayakkara B.S, Hirano.M, Business Process Outsourcing Risk Mitigation, In the proc. of Japan Society for Management Information, 2009 (Autumn) [3] Downey J.M, Risk of outsourcing applying risk management techniques to staffing methods, Facilities Journal, 1995 [4] Offshore outsourcing management - How to manage your business for successful outsourcing, Outsource to India, [5] Duening T.N, Click R.L, Essentials of Business Process Outsourcing, John Wiley & Sons, Inc,

THE IMPACT AND PROSPECTS OF HUMAN RESOURCE OUTSOURCING ( HRO) IN INDIA

THE IMPACT AND PROSPECTS OF HUMAN RESOURCE OUTSOURCING ( HRO) IN INDIA THE IMPACT AND PROSPECTS OF HUMAN RESOURCE OUTSOURCING ( HRO) IN INDIA * Mr. Syed Abeduddin, Assistant Professor, Millennium Institute of Management, Aurangabad. INTRODUCTION A contractual agreement between

More information

Whitepaper. IT Strategies for HR Transformation YOUR SUCCESS IS OUR FOCUS. Published on: Feb 2006 Author: Madhavi M

Whitepaper. IT Strategies for HR Transformation YOUR SUCCESS IS OUR FOCUS. Published on: Feb 2006 Author: Madhavi M YOUR SUCCESS IS OUR FOCUS Whitepaper IT Strategies for HR Transformation Published on: Feb 2006 Author: Madhavi M 2009 Hexaware Technologies. All rights reserved. Table of Contents 1. Executive Summary

More information

Department of Human Resources

Department of Human Resources Workforce Services Workforce Policy and Planning Department Management/ Human Resource Information Systems Employee Relations Employment Compensation and Workforce Analysis Employee Benefits Organizational

More information

A guide to strategic human resource planning

A guide to strategic human resource planning A guide to strategic human resource planning By Workinfo.com, www.workinfo.com 1. Introduction A comprehensive Human Resource Strategy plays a vital role in the achievement of an organisation's overall

More information

Retail. White Paper. Driving Strategic Sourcing Effectively with Supply Market Intelligence

Retail. White Paper. Driving Strategic Sourcing Effectively with Supply Market Intelligence Retail White Paper Driving Strategic Sourcing Effectively with Supply Market Intelligence About the Author Devaraj Chithur Devaraj is part of the Supply Chain group within Tata Consultancy Services (TCS)

More information

ENTELEC 2000 SCADA Outsourcing A Business Case Abstract. By Gerald E. Snow UTSI International Corporation

ENTELEC 2000 SCADA Outsourcing A Business Case Abstract. By Gerald E. Snow UTSI International Corporation This paper was first presented at the ENTELEC 2000 Technical Session, sponsored by the Energy Telecommunications and Electrical Association, Inc. This document may not be copied, in whole or in part, without

More information

Managed Services Is It Time? How to determine if it s right for your company

Managed Services Is It Time? How to determine if it s right for your company LOGICA OGICAL Managed Services Managed Services Is It Time? How to determine if it s right for your company Presented by:lorimaxwel COE M anager The Need for Managed Services Extending the Enterprise Linking

More information

The Why & How of Managed Services

The Why & How of Managed Services SOLUTIONS Cut Costs While Improving Productivity The Why & How of Managed Services What are Managed Services? CIOs all face similar challenges: cost containment, reliability of systems and keeping pace

More information

Project Management Office Best Practices

Project Management Office Best Practices Project Management Office Best Practices Agenda Maturity Models (Industry & PMO) PMO Areas of Expertise (Scale & Scope) Project Management Office Process Model Project Management Framework PMO Implementation

More information

Managed Services - Driving Business Value in Banking

Managed Services - Driving Business Value in Banking White Paper Managed services for credit solutions: Driving business value in banking Business solutions through information technology Entire contents 2005 by CGI Group Inc. All rights reserved. Reproduction

More information

Project and Operational processes, Key differences. Gotchas when deploying projects into operations

Project and Operational processes, Key differences. Gotchas when deploying projects into operations Project and Operational processes, Key differences. Gotchas when deploying projects into operations Purpose of this Presentation Assist the smooth implementation of projects into production I ve heard

More information

THE WHY & HOW OF MANAGED SERVICES

THE WHY & HOW OF MANAGED SERVICES SOLUTIONS CUT COSTS WHILE IMPROVING PRODUCTIVITY THE WHY & HOW OF MANAGED SERVICES WHAT ARE MANAGED SERVICES? CIOs all face similar challenges: cost containment, reliability of systems and keeping pace

More information

Keys to a Successful Outsourcing Transition

Keys to a Successful Outsourcing Transition Keys to a Successful Outsourcing Transition finance.arvato.com Getting it Right the First Time: Keys to a Successful Outsourcing Transition A large part of success in outsourcing depends on a seamless

More information

Making the Transition to MSP 2.0

Making the Transition to MSP 2.0 PERSPECTIVE ARTICLE Making the Transition to MSP 2.0 From Implementation Impressario to Innovation Incubator Is Your MSP a Strategic Partner or a Tactical Solutions Provider? A discussion on the changing

More information

Outsourcing. Introduction:- Type of Outsourcing:- Technology Services Outsourcing. Business Process Outsourcing

Outsourcing. Introduction:- Type of Outsourcing:- Technology Services Outsourcing. Business Process Outsourcing Outsourcing Introduction:- Offsourcing or Offshoring refers to outsourcing both goods and services i.e. materials and manpower to another country i.e. offshore. Offsourcing or Offshoring is a relatively

More information

The Keys to Successful Service Level Agreements Effectively Meeting Enterprise Demands

The Keys to Successful Service Level Agreements Effectively Meeting Enterprise Demands A P P L I C A T I O N S A WHITE PAPER SERIES SYNTEL, A U.S.-BASED IT SERVICE PROVIDER WITH AN EXTENSIVE GLOBAL DELIVERY SERVICE, SUGGESTS SPECIFIC BEST PRACTICES FOR REDUCING COSTS AND IMPROVING BUSINESS

More information

Build versus Buy. Small Business Resources. Canadian Western Bank 2014 Created by Business Plans Canada

Build versus Buy. Small Business Resources. Canadian Western Bank 2014 Created by Business Plans Canada Build versus Buy Small Business Resources The material in this document is intended to provide only general information to Canadian Western Bank s clients and the public, and not for the purposes of providing

More information

Department of Human Resources

Department of Human Resources Workforce Services Workforce Policy and Planning Department Management/ Human Resource Information Systems Employee Relations Employment Compensation and Workforce Analysis Employee Benefits Organizational

More information

LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE

LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE The Comptroller s Economic Development and Analysis (EDA) Division provides education and direct assistance to local governments, helping

More information

Human Resources Department 203.6 FTE s

Human Resources Department 203.6 FTE s 27 Human Resources Human Resources Department 203.6 FTE s General Manager Human Resources 4 FTE's Director Labour Relations 2 FTE's Director Organizational Effectiveness 2 FTE's Director Compensation,

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

SAP ERP HUMAN CAPITAL MANAGEMENT SOLUTION OVERVIEW

SAP ERP HUMAN CAPITAL MANAGEMENT SOLUTION OVERVIEW SAP ERP HUMAN CAPITAL MANAGEMENT SOLUTION OVERVIEW HUMAN CAPITAL ASSETS ARE VITAL With SAP E-Recruiting, we can improve personnel selection while maintaining a high level of efficiency in our back-office

More information

TECHNOLOGY STRATEGY AUDIT

TECHNOLOGY STRATEGY AUDIT TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series

More information

IMPROVE YOUR ODDS OF FINDING THE RIGHT OUTSOURCING PARTNER Product No. 10049

IMPROVE YOUR ODDS OF FINDING THE RIGHT OUTSOURCING PARTNER Product No. 10049 IMPROVE YOUR ODDS OF FINDING THE RIGHT OUTSOURCING PARTNER Improve Your Odds of Finding the Right Outsourcing Partner Abstract Customer contact outsourcing can be a complex and challenging task. Are you

More information

MARKETING: THE NEXT GROWTH AREA FOR OUTSOURCING IN HIGH TECHNOLOGY COMPANIES

MARKETING: THE NEXT GROWTH AREA FOR OUTSOURCING IN HIGH TECHNOLOGY COMPANIES MARKETING: THE NEXT GROWTH AREA FOR OUTSOURCING IN HIGH TECHNOLOGY COMPANIES Created by: Stage 4 Solutions, Inc. Tel: (408) 868-9739 Web site: www.stage4solutions.com August 2006 Copyright 2006 Stage 4

More information

Clearing the Hurdles to Energy Management Centralization

Clearing the Hurdles to Energy Management Centralization Clearing the Hurdles to Energy Management Centralization December 2010 By Jackie Cobb, Marketing Specialist Schneider Electric USA, Inc. Make the most of your energy Introduction Centralizing the energy

More information

COM-18-7559 J. Holincheck

COM-18-7559 J. Holincheck J. Holincheck Research Note 3 December 2002 Commentary Leveraging HCM Technologies to Control Labor Costs Large human capital management application suite purchases will be few and far between in 2003.

More information

The following sections describe each of these benefits in detail. Reduce and define operating costs

The following sections describe each of these benefits in detail. Reduce and define operating costs Organizational ability in the marketplace will determine which companies survive and which don t. In an effort to retain that agility, Fortune 500 companies like Kodak and General Motors and even IT innovators

More information

mysap ERP mysap ERP HUMAN CAPITAL MANAGEMENT

mysap ERP mysap ERP HUMAN CAPITAL MANAGEMENT mysap ERP mysap ERP HUMAN CAPITAL MANAGEMENT mysap ERP: YOUR INDUSTRY. YOUR BUSINESS. YOUR FUTURE. mysap ERP is the world s most complete solution to support the foundation of your business, enabling adaptive

More information

Driving Profits from Loyalty

Driving Profits from Loyalty Driving Profits from Loyalty Overview 1 P a g e 5 Steps to Driving Profit from Loyalty 1. Customer Portfolio Analysis This is the first step on the road to customer profitability where we can begin to

More information

Growing Vendor Management

Growing Vendor Management V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor

More information

Service Desk Recruitment Strategy

Service Desk Recruitment Strategy Recruitment Strategy This paper seeks to outline an approach to recruiting staff for Service Desks and the various considerations that an organisation may want to consider. It focuses on two key points;

More information

Making the Business Case for HR Investments During Economic Crisis

Making the Business Case for HR Investments During Economic Crisis I D C V E N D O R S P O T L I G H T Making the Business Case for HR Investments During Economic Crisis March 2009 Adapted from Putting Performance at the Hub of the Talent Universe by Lisa Rowan, IDC #214468

More information

BPO Case Study: Infosys: transforming Philips shared service centers

BPO Case Study: Infosys: transforming Philips shared service centers BPO Case Study: Infosys: transforming Philips shared service centers Summary This F&A BPO case study illustrates a number of aspects. It shows that: Infosys, then an emerging Indian FAO player, has been

More information

Process Compliance to Business Excellence A Journey

Process Compliance to Business Excellence A Journey Process Compliance to Business Excellence A Journey November 2010 This paper discusses the approach to Quality in India s BPO s from the inception years to the current scenario and also offers an insight

More information

The ITO and BPO Offering Continuum

The ITO and BPO Offering Continuum Markets, K. Harris Research Note 9 May 2003 Outsourcers in India Set Their Sights on Insurance BPO Vendors in India are targeting the insurance business process outsourcing market. Evaluation of vendor

More information

Sr. Management Engineer Intermountain Healthcare 1034 North 500 West Provo, Utah 84604 Email: Jared.LeBaron@imail.org Phone: 801-357-4080

Sr. Management Engineer Intermountain Healthcare 1034 North 500 West Provo, Utah 84604 Email: Jared.LeBaron@imail.org Phone: 801-357-4080 RECRUITING CHANGE: PROCESS AND PRODUCTIVITY IMPROVEMENT IN HUMAN RESOURCES Jared LeBaron Sr. Management Engineer Intermountain Healthcare 1034 North 500 West Provo, Utah 84604 Email: Jared.LeBaron@imail.org

More information

Services Provided. PO Box 5057 Amman 11953, Jordan Telefax: + 962 6 585 12 19 info@shareek-hr.com www.shareek-hr.com

Services Provided. PO Box 5057 Amman 11953, Jordan Telefax: + 962 6 585 12 19 info@shareek-hr.com www.shareek-hr.com At a time when service-oriented businesses are fast outnumbering all other types of businesses, more and more organisations are citing human resources as their number one asset. Having said that, it only

More information

Managed Solution. for Staffing Industry

Managed Solution. for Staffing Industry Managed Solution for Staffing Industry Abstract As staffing industries are being challenged with revenue growth, the focus area for them is to reduce their back office costs continually, streamline the

More information

Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper

Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield,

More information

Outsourcing HR: Advantages for Small Businesses

Outsourcing HR: Advantages for Small Businesses Outsourcing HR: Advantages for Small Businesses Are you thinking about how to increase operational efficiency of the business or the HR department? Then this e- book is for you! Learn more about outsourcing

More information

October 7, 2011. Presented to. The PMI Washington DC Chapter. Pedro Agosto. Director of Client Services, XA Systems, LLC. pedro.agosto@xasystems.

October 7, 2011. Presented to. The PMI Washington DC Chapter. Pedro Agosto. Director of Client Services, XA Systems, LLC. pedro.agosto@xasystems. October 7, 2011 Presented to The PMI Washington DC Chapter By Pedro Agosto Director of Client Services, XA Systems, LLC pedro.agosto@xasystems.com Introduction Re-evaluating IT Services Today s Challenges

More information

Building Your Strategic Business Case for HR Technology. Speaker: Kristie Evans Managing Principal HR Project Manager PM Instructor

Building Your Strategic Business Case for HR Technology. Speaker: Kristie Evans Managing Principal HR Project Manager PM Instructor Building Your Strategic Business Case for HR Technology Speaker: Kristie Evans Managing Principal HR Project Manager PM Instructor Agenda Today s Goals HR Value Outcomes Break 10 am Methodologies Business

More information

Helping Midsize Businesses Grow Through HR Technology

Helping Midsize Businesses Grow Through HR Technology Helping Midsize Businesses Grow Through HR Technology As a business grows, the goal of streamlining operations is increasingly important. By maximizing efficiencies across the board, employee by employee,

More information

Management Services Organizations: Efficiency in Payer Engagement. Today s Discussion

Management Services Organizations: Efficiency in Payer Engagement. Today s Discussion Management Services Organizations: Efficiency in Payer Engagement Ohio Association of Community Health Centers July 2014 Contact Us Andrew Principe andy@starlingadvisors.com Amanda Stangis, MPH amanda@starlingadvisors.com

More information

Outsourcing Performance Management

Outsourcing Performance Management Outsourcing Performance Management June 2005 - Sam S. Adkins According to a study conducted in April 2004 by the Conference Board, only 9 percent of companies are entirely against outsourcing some or all

More information

Closed blocks outsourcing How life insurers can reduce cost and improve focus

Closed blocks outsourcing How life insurers can reduce cost and improve focus Closed blocks outsourcing How life insurers can reduce cost and improve focus Introduction Life insurance is a business in which customers are serviced long after the sale. Servicing includes policy administration,

More information

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0 ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key

More information

Dr. Gad J. Selig, PMP, COP

Dr. Gad J. Selig, PMP, COP The Critical Role of the Project Manager in Executing Successful Strategic Sourcing and Outsourcing Initiatives: Major Trends, Critical Success Factors and Lessons Learned Abstract: Dr. Gad J. Selig, PMP,

More information

CAN T WE JUST OUTSOURCE IT? Outsourcing has its place. Know what it takes to get it right.

CAN T WE JUST OUTSOURCE IT? Outsourcing has its place. Know what it takes to get it right. leading thoughts / nov 2013 CAN T WE JUST OUTSOURCE IT? Outsourcing has its place. Know what it takes to get it right. By Lori Bocklund, Strategic Contact Inc. Pipeline Articles www.contactcenterpipeline.com

More information

How To Design An Invoice Processing And Document Management System

How To Design An Invoice Processing And Document Management System WIPRO CONSULTING SERVICES Business Methods Series Source to Pay: Transforming Processing and Document Management Paulo Jose Freixa Calhau Preto Senior Manager, Finance & Accounting Transformation Practice,

More information

WHITE PAPER. iet ITSM Enables Enhanced Service Management

WHITE PAPER. iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted

More information

S T R A T E G I C P A R T N E R S H I P D A T A, N E T O W R K S P E O P L E, P R O C E S S, T E C H N O L O G Y, Europe

S T R A T E G I C P A R T N E R S H I P D A T A, N E T O W R K S P E O P L E, P R O C E S S, T E C H N O L O G Y, Europe S T R A T E G I C P A R T N E R S H I P WHERE INNOVATION BEGINS Web-enabled, transparent, optimized business processes, extensive data analytics, continuously innovated business solution for the P&C /

More information

WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services

WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services

More information

Procurement Outsourcing and. Shared Service Centers. SANFORD INTERNATIONAL I Global Sourcing I Supply Chain I Procurement I. www.sanfordint.com.

Procurement Outsourcing and. Shared Service Centers. SANFORD INTERNATIONAL I Global Sourcing I Supply Chain I Procurement I. www.sanfordint.com. Procurement Outsourcing and Shared Service Centers 3rd Floor Jonsim Place 228 Queen's Road East Wan Chai Hong Kong Telephone: (852) 2861 2222 Fax: (852) 2861 2266 www.sanfordint.com.hk INTRODUCTION Procurement

More information

Vendor Management Program Office Onshore or offshore?

Vendor Management Program Office Onshore or offshore? Vendor Management Program Office Onshore or offshore? Deloitte s previous article 1 discusses the five most common challenges which have prohibited clients from optimizing their Vendor Management (VM)

More information

EFFECTIVE VENDOR MANAGEMENT: REAPING LONG-TERM BENEFITS FROM YOUR VENDOR RELATIONSHIPS

EFFECTIVE VENDOR MANAGEMENT: REAPING LONG-TERM BENEFITS FROM YOUR VENDOR RELATIONSHIPS EFFECTIVE VENDOR MANAGEMENT: REAPING LONG-TERM BENEFITS FROM YOUR VENDOR RELATIONSHIPS TERRA FIRMA, AUGUST 2013 Leading organisations have understood for some time that active vendor management, as opposed

More information

Business Logistics Specialist Position Description

Business Logistics Specialist Position Description Specialist Position Description March 23, 2015 MIT Specialist Position Description March 23, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

COMMUNIQUE. Information Technology (IT) Governance Guidance

COMMUNIQUE. Information Technology (IT) Governance Guidance COMMUNIQUE 14-COM-002 July 14, 2014 Information Technology (IT) Governance Guidance The Credit Union Prudential Supervisors Association (CUPSA) has established an IT Risk Working Group to focus on IT governance

More information

Recruiting Recovery Finding Hidden Budget Dollars in Optimized Recruiting Practices

Recruiting Recovery Finding Hidden Budget Dollars in Optimized Recruiting Practices Recruiting Recovery Finding Hidden Budget Dollars in Optimized Recruiting Practices HRsmart October 3, 2012 2 Introduction Carl Kutsmode Partner Talent Acquisition Management Consultant with over 18 years

More information

Global Strategic Sourcing Services

Global Strategic Sourcing Services where experience counts Global Strategic Sourcing Services Capabilities Overview Prepared For: Our Current and Future Valued Clients Our Strategic Sourcing Capabilities Sourcing Strategy Deciding whether

More information

EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam

EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q Number: EX0-001 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: EX0-001 Exam Name: ITIL Foundation (syllabus

More information

Institutional Maturity Model: A tool to fill gaps in measuring development of procurement systems. Jeanmarie Meyer

Institutional Maturity Model: A tool to fill gaps in measuring development of procurement systems. Jeanmarie Meyer Institutional Maturity Model: A tool to fill gaps in measuring development of procurement systems Jeanmarie Meyer 1 How good is a Public Procurement System? What will make it better? Why are these questions

More information

HCL Member Experience Management

HCL Member Experience Management HCL Member Experience Management Author: Ajit Sahai Saxena ADDITIONAL INPUTS: RAM ANANTHASUBRAMONY, HEALTHCARE (PAYER) PRACTICE whitepaper dec 2013 MEMBER EXPERIENCE MANAGEMENT STRATEGIZE AND IMPLEMENT

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

Telecom Expense Management Options Internal versus Outsourcing Return on Investment View

Telecom Expense Management Options Internal versus Outsourcing Return on Investment View Telecom Expense Management Options Internal versus Outsourcing Return on Investment View By Todd Calman, President - Tariff Affiliates, Inc. There are over 6,000 cell phone plans in the US and over 1,000

More information

Transforming to the Mailroom of the Future Today: Digital Imaging and Automation Lower Costs and Improve Quality

Transforming to the Mailroom of the Future Today: Digital Imaging and Automation Lower Costs and Improve Quality Transforming to the Mailroom of the Future Today: Digital Imaging and Automation Lower Costs and Improve Quality The Outsourcing Institute Year-after-year growth is good news for a company's profit centers.

More information

Introduction to ITIL: A Framework for IT Service Management

Introduction to ITIL: A Framework for IT Service Management Introduction to ITIL: A Framework for IT Service Management D O N N A J A C O B S, M B A I T S E N I O R D I R E C T O R C O M P U T E R O P E R A T I O N S I N F O R M A T I O N S Y S T E M S A N D C

More information

Cloud Call Centre. itouch Vision. This document gives an overview of the cloud call Centre and discusses the different features and functionality.

Cloud Call Centre. itouch Vision. This document gives an overview of the cloud call Centre and discusses the different features and functionality. itouch Vision Cloud Call Centre This document gives an overview of the cloud call Centre and discusses the different features and functionality. For further information, about implementation and pricing

More information

ORGANIZED FOR BUSINESS: BUILDING A CONTEMPORARY IT OPERATING MODEL

ORGANIZED FOR BUSINESS: BUILDING A CONTEMPORARY IT OPERATING MODEL ORGANIZED FOR BUSINESS: BUILDING A CONTEMPORARY IT OPERATING MODEL Time is running out for the traditional, monopolistic IT model now that users have so many alternatives readily available. Today s enterprises

More information

How to Avoid the Headache of User Mailbox Quotas

How to Avoid the Headache of User Mailbox Quotas How to Avoid the Headache of User Mailbox Quotas Email Archiving Top Four Storage Management Challenges and Solutions Executive Summary Corporate email contains business critical information which is relied

More information

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency WHITE PAPER SERVICES Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency Brocade monitoring service delivers business intelligence to help IT organizations meet SLAs,

More information

Oracle ERP Support Benchmark Findings

Oracle ERP Support Benchmark Findings Appendix K Oracle ERP Support Benchmark Findings City of Virginia Beach ComIT Master Technology Plan (Appendix K) 1 City of Virginia Beach Oracle ERP Support Benchmark Findings 23 September 2013 Prepared

More information

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper Right-Sizing Electronic Discovery: The Case For Managed Services A White Paper 1 2 Table of Contents Introduction....4 An Overview of the Options...4 Insourcing: Bringing E-Discovery Processes In-House....4

More information

WHITE PAPER. Steps to select the right Outsourcing Vendor

WHITE PAPER. Steps to select the right Outsourcing Vendor WHITE PAPER Steps to select the right Outsourcing Vendor INTRODUCTION The process of selecting an outsourcing vendor implies a complex multistage process to evaluate not only what the provider can do,

More information

SEBESTA BLOMBERG Providing Technical & Business Solutions! " #! $%&'&()'%*(

SEBESTA BLOMBERG Providing Technical & Business Solutions!  #! $%&'&()'%*( ! " #! $%&'&()'%*( 0 + 1 Facilities management balances four essential elements: 2 Quality and continuous improvement High Performance Staffing Workforce learning and performance Knowledge management Cross-utilization

More information

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

Talent DNA that drives your business

Talent DNA that drives your business Talent DNA that drives your business Align your talent DNA and business strategy to achieve real success Accelerate your business with a strategic HCM solution that turns your human capital investment

More information

Point of view* Shared Service Center - the 2nd Generation Taking the next step to reach a more efficient level of evolution.

Point of view* Shared Service Center - the 2nd Generation Taking the next step to reach a more efficient level of evolution. Point of view* Shared Service Center - the nd Generation Taking the next step to reach a more efficient level of evolution. Shared Service Center - the nd Generation Improving Shared Service business

More information

PH.D THESIS ON A STUDY ON THE STRATEGIC ROLE OF HR IN IT INDUSTRY WITH SPECIAL REFERENCE TO SELECT IT / ITES ORGANIZATIONS IN PUNE CITY

PH.D THESIS ON A STUDY ON THE STRATEGIC ROLE OF HR IN IT INDUSTRY WITH SPECIAL REFERENCE TO SELECT IT / ITES ORGANIZATIONS IN PUNE CITY ABSTRACT OF PH.D THESIS ON A STUDY ON THE STRATEGIC ROLE OF HR IN IT INDUSTRY WITH SPECIAL REFERENCE TO SELECT IT / ITES ORGANIZATIONS IN PUNE CITY SUBMITTED TO THE UNIVERSITY OF PUNE FOR THE AWARD OF

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

Resource Management as a Service (RMaaS)

Resource Management as a Service (RMaaS) RTM Consulting Resource Management as a Service (RMaaS) The Case for Outsourcing Resource Management Marc Lacroix Managing Partner RTM Consulting 2 2012-2014. All rights reserved. Overview Every professional

More information

Succession Planning Process

Succession Planning Process Planning Process INTRODUCTION planning is a systematic approach to: Building a leadership pipeline/talent pool to ensure leadership continuity Developing potential successors in ways that best fit their

More information

Information Governance & Records Management for Today's World

Information Governance & Records Management for Today's World May 19-22, 2014, Toronto ON Canada Information Governance & Records Management for Today's World Presented by Colin Cahill LI22 5/20/2014 1:15 PM - 2:45 PM The handouts and presentations attached are copyright

More information

Bringing wisdom to ITSM with the Service Knowledge Management System

Bringing wisdom to ITSM with the Service Knowledge Management System Processes 415 Bringing wisdom to ITSM with the Service Knowledge Management System 7.3 Bringing wisdom to ITSM with the Service Knowledge Management System nowledge is a process of piling up facts; wisdom

More information

WHITE PAPER. SAS IT Intelligence. Balancing enterprise strategy, business objectives, IT enablement and costs

WHITE PAPER. SAS IT Intelligence. Balancing enterprise strategy, business objectives, IT enablement and costs WHITE PAPER SAS IT Intelligence Balancing enterprise strategy, business objectives, IT enablement and costs Table of Contents Executive summary... 1 SAS IT Intelligence leaping tactical pitfalls... 2 Resource

More information

Infor CloudSuite HCM. Make more informed decisions. Modernize your HR technology

Infor CloudSuite HCM. Make more informed decisions. Modernize your HR technology HCM Brochure Infor CloudSuite HCM Make more informed decisions Infor CloudSuite HCM is a cloud-based solution for human capital management (HCM) that is more complete than any other. You get the HR and

More information

CISM Certified Information Security Manager

CISM Certified Information Security Manager CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective

More information

Achieving Workforce Optimization: Merging Strategy and Technology

Achieving Workforce Optimization: Merging Strategy and Technology Achieving Workforce Optimization: Merging Strategy and Technology The healthcare industry is experiencing unprecedented change, and leaders are facing some of the most difficult challenges in the history

More information

Predicts 2004: Supplier Relationship Management

Predicts 2004: Supplier Relationship Management Strategic Planning, D. Hope-Ross Research Note 17 November 2003 Predicts 2004: Supplier Relationship Management Enterprises using technology to improve supplier relationships should pay attention to changes

More information

Job Description. Job Title: Network Services Manager. Department: INFORMATION TECHNOLOGY MAIN PURPOSE OF JOB: MAIN DUTIES AND RESPONSIBILITIES:

Job Description. Job Title: Network Services Manager. Department: INFORMATION TECHNOLOGY MAIN PURPOSE OF JOB: MAIN DUTIES AND RESPONSIBILITIES: Job Description Job Title: Network Services Manager Department: INFORMATION TECHNOLOGY Responsible to: ICT/IS Manager Number of people directly managed: No direct permanent HHL reports: - Supervision of

More information

A Roadmap for Modernizing the Health Care Revenue Cycle

A Roadmap for Modernizing the Health Care Revenue Cycle A Roadmap for Modernizing the Health Care Revenue Cycle 1 March 2016 Timothy Panks Senior VP, Finance and Revenue Management Douglas Hires Senior VP, Strategic Client Relationships Conflict of Interest

More information

Final Audit Report. Audit of the Human Resources Management Information System. December 2013. Canada

Final Audit Report. Audit of the Human Resources Management Information System. December 2013. Canada Final Audit Report Audit of the Human Resources Management Information System December 2013 Canada Table of Contents Executive summary... i A - Introduction... 1 1. Background... 1 2. Audit objective...

More information

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013 The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee

More information

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis

Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt. Programme, Project & Service Management Analysis Skatteudvalget 2014-15 (2. samling) SAU Alm.del Bilag 48 Offentligt Programme, Project & Service Management Analysis Table of Content 1 Executive Summary... 3 1.1 Scope of Work... 3 1.2 Methodology for

More information

Successful Offshore Outsourcing for Small to Mid-size Businesses. By K. Kumar

Successful Offshore Outsourcing for Small to Mid-size Businesses. By K. Kumar Successful Offshore Outsourcing for Small to Mid-size Businesses By K. Kumar Table of Contents Executive Summary...1 Introduction...2 Outsourcing Challenges for SMBs...2 Strategic Challenges...2 Lack of

More information

The Fast Track Project Glossary is organized into four sections for ease of use:

The Fast Track Project Glossary is organized into four sections for ease of use: The Fast Track Management Glossary provides a handy reference guide to the fast track management model, encompassing the concepts, steps and strategies used to manage successful projects even in the face

More information