Technology Outsourcing. Tools to Manage Technology Providers Performance Risk: Service Level Agreements
|
|
|
- Barnard Burns
- 10 years ago
- Views:
Transcription
1 Technology Outsourcing Tools to Manage Technology Providers Performance Risk: Service Level Agreements
2 Technology Outsourcing Tools to Manage Technology Providers Performance Risk: Service Level Agreements Federal Deposit Insurance Corporation th Street NW Washington, D.C
3 TOOLS TO MANAGE TECHNOLOGY PROVIDERS PERFORMANCE RISK: SERVICE LEVEL AGREEMENTS This document is intended to serve as a resource for banks in addressing specific challenges relating to technology outsourcing. The content was prepared not as examination procedures or official guidance but as an informational tool for community bankers. Introduction As community banks outsource more of their mission critical applications, properly managing the relationships between financial institutions and technology service providers 1 becomes increasingly important. This brochure discusses the Service Level Agreement (SLA) as an effective tool for managing the risks associated with technology outsourcing and describes practices for measuring and monitoring service providers performance. What Are Service Level Agreements? Service Level Agreements (SLAs) are contractually binding clauses documenting the performance standard and service quality agreed to by the bank and service provider. The SLA is a key component in structuring a successful outsourcing contract. The SLA ensures that the institution receives the services it wants at the 1 Technology service providers encompass a broad range of entities including but not limited to affiliated entities, nonaffiliated entities, and alliances of companies providing products and services. This may include but is not limited to: core processing; information and transaction processing and settlement activities that support banking functions such as lending, deposit-taking, funds transfer, fiduciary, or trading activities; Internet-related services; security monitoring; systems development and maintenance; aggregation services; digital certification services, and call centers. Other terms used to describe Service Providers include vendors, subcontractors, external service provider (ESPs) and outsourcers. 1
4 expected performance standard and price. As such, the SLA is a key component in managing the financial and operational risk involved with outsourcing contracts. It also can be one way to help mitigate risk. By specifying the measurement unit and service range for the selected category, the risk of poor service may be diminished because it becomes an area of focus and is designated as the service provider s responsibility. The SLA s primary purpose is to specify and clarify performance expectations, as well as establish accountability. Therefore, balancing the need for precise measurement standards with sufficient flexibility is important. A common pitfall is excessive oversight or micromanagement of the provider responsible for the service, which can also burden the bank employees charged with supervising the service provider relationship and monitoring the SLAs. A well-designed SLA will recognize and reward, or at least acknowledge, good service. It will also provide the measurement structure or performance metric to identify substandard service and trigger correction or cancellation provisions as warranted. In today s outsourcing environment, incentives or penalties in the SLA can be an effective tool for managing service. If services received do not measure up to expectations, direct consequences, such as reduced levels of compensation or a credit on future services, would result. Structuring and Developing SLAs A typical SLA includes the following components and is tailored to fit the nature of the outsourced service or application: Service category (e.g., system availability or response time). Acceptable range of service quality. Definition of what is being measured. Formula for calculating the measurement. Relevant credits/penalties for achieving/failing performance targets. Frequency and interval of measurement. Before an SLA is signed, the service provider and the institution should clarify and establish expectations. Unless these expectations are clearly measurable, the service category will be difficult to manage due to the bank s and the vendor s differing goals and perspectives. Developing a Successful SLA Involves Four Steps Determining objectives Reviewing the strategic business needs of the financial institution includes evaluating its day-to-day operating environment, risk factors, and market conditions. Consideration should be given to how the outsourced service fits into the bank s overall strategic plan. Defining requirements Identifying the operational objectives (e.g., the need to improve operating efficiency, reduce costs, or enhance security) will help the institution to define performance requirements. It will also help identify the levels of service the bank needs from the service provider to meet its strategic goals and objectives for the outsourced activity. Setting measurements Clear and impartial measurements - or metrics - can be developed once the strategic needs and operating objectives have been defined. The metrics are used to measure and confirm that the necessary service levels have been achieved 2
5 and the objectives and strategic intent have been met. Establishing accountability It is useful to develop and adopt a framework that ensures accountability after the measurement units (i.e., the metrics) have been clearly defined. The service provider rarely owns accountability and responsibility for all tasks. Establishing this accountability usually includes a clear statement of the outcome if the level of service is exceeded or if the expected service fails to meet the stated standard. The SLA development process and each of the four steps are discussed in further detail in Appendix 1. A sample SLA is provided in Appendix 2. Representatives from the institution (management, legal counsel, and information technology staff) and the service provider typically meet to ensure that performance metrics and targets are properly addressed when developing SLAs. Bank management may also consider interviewing some of the system users to help identify important criteria to incorporate into the SLAs. Reaching agreement on specific SLAs may involve significant discussion and negotiation between the bank and the service provider. The bank may wish to consult with peer institutions and trade associations about useful benchmarks for performance standards. This information may be helpful in the contract negotiation process and assist the bank in determining if the service levels offered by the provider are reasonable and standard. Drafting Successful Service Level Agreements Sufficient time and resources should be devoted to preparing SLAs. The agreement will be the primary document governing the procurer and vendor of services that may have a significant impact on the bank s performance. The following items are important reminders for institutions drafting SLAs and selecting the metric(s) to be used to measure vendor performance: Focus on the most important areas. Financial institutions should identify the performance and risk factors that are most crucial to the success of the outsourced function. The institution should invest its time drafting strong SLAs for these areas. Areas with minimal effect on the process will be of less importance and, accordingly, should have less prominence in the contracting process. Make sure that performance metrics measure what the bank wants them to measure. Verify that the metrics used to govern the SLA appropriately represent the functions that the bank intends to measure. The metrics should measure the performance the service provider is giving the bank and not be based on the performance the vendor is delivering in aggregate to all its customers. Ensure that SLAs are focused on institutional goals. Avoid the trap of creating agreements that are focused on the success of the individual process without regard for the how the process addresses a corporate goal. Each measurement should logically support a requirement that is linked to a strategic goal. Be specific. Ensure that all parties involved in the SLA understand the terms spelled out in the agreement. Terms should be clearly defined to avoid different 3
6 interpretations. Spending extra time defining terms when creating an agreement can prevent misunderstandings and loss of time and money caused by differing interpretations of the intent of the SLA. Managing SLAs It is worthwhile for the institution to provide for ongoing management of the agreement when a SLA is established. The SLA management process usually goes beyond performance measurement to ensure success. Generally, the measurement process should be kept as simple as possible, emphasizing timely identification of deviations from agreed upon performance metrics. Ongoing communication between the bank and the service provider is also important. The following four-phase methodology is based on observed industry practices that can help banks manage SLAs effectively: Measure service activity results against defined service levels. Examine measured results to identify problems and determine causes. Take appropriate action to correct failed activities, functions, and/or processes. SLA management is an ongoing process, and is viewed as an integral component of the outsourcing relationship. A suggested practice is to include periodic review and change provisions in the SLA to ensure that service level goals and performance measurements can meet the changing business and technology needs of the institution. Summary Service Level Agreements are tools to measure, monitor, and control the operational and financial risks associated with outsourcing technology services. Essential to this process is establishing realistic performance metrics and continuous problem tracking and resolution. The bank should consider working closely with service providers to identify, verify, and correct problems; perform root-cause analysis; and make process modifications to prevent problems from recurring. As the outsourcing relationship progresses, SLAs should reflect the evolution of services provided. Accordingly, they should be updated to facilitate continued service improvement. Well-constructed SLAs are an effective tool for managing service provider performance and ensuring that the bank receives the quality of service that it needs and expects. Continuously guide service providers through feedback sessions based on objectively measured performance metrics. Before signing an outsourcing contract, the bank may find it beneficial to verify that important performance requirements have been addressed, risks have been identified, and each service level is defined. Each measurement should be defined clearly and concisely. This will provide the foundation for effectively managing service levels throughout the four phases of the SLA management process. 4
7 APPENDIX 1 DEVELOPING SLAS Four-Step Process While many factors determine how the bank and its service provider will agree to manage the quality of service, the four-step process 2 outlined below may be helpful in developing successful SLAs. This process facilitates identifying essential requirements for the outsourced service and translating the requirements into measurable and accountable performance standards. Determining objectives. Defining requirements. Setting measurements. Establishing accountability. Determining Objectives The first step in creating an SLA is determining the standards the outsourced activity needs to meet in order to assist the bank in attaining its strategic goals. The bank should consider the criticality of the activity to the bank s mission and weigh the impact success or failure will have on the bank s operations or reputation. The institution also needs to consider the relationship of the outsourced activity to other systems, applications, and functions in the bank and take into account any critical interdependencies. Based on this analysis, the bank can identify the objectives that are critical in ensuring the success of the function. For each activity, function, and process, a clear objective is needed to understand what constitutes success. 2 The Four Steps for developing SLAs are based, in part, on research from the Gartner Group entitled Key Factors in SLA Development. Defining Requirements In order to attain strategic goals, it is important to identify how the institution is going to achieve the objectives that have been set. To establish these requirements, the institution can break the objectives down into specific activities that must be undertaken to achieve the goal. While the objectives refer to broad statements geared toward attaining success, the performance requirements are targeted at the specific activities that the bank can require from the service provider to ensure the strategic objective is met. Setting Measurements In formulating an agreement, the bank can identify specific measurements that indicate if the prescribed requirements are being met. The measurements - or metrics - that correspond to the performance requirements represent tangible or quantifiable deliverables that bank management can monitor and discuss with the service provider, as appropriate. Target metrics should be objective and clearly linked to the bank s business needs and risk management requirements. Metrics should be established based on specific tolerance levels and the minimum acceptable levels of service. A minimum acceptable level of service also should be set to define the point of significant failure. The following table provides two examples of strategic objectives and related performance requirements, along with target metrics. The first objective pertains to system security and may be appropriate for an outsourced activity involving sensitive data or applications. The second objective addresses certain reliability and availability needs that may be associated with an outsourced system that processes or stores information essential for bank employees or customers. The corresponding performance 5
8 requirements and measurements provide the means to quantify and document service provider performance. Establishing Accountability Clear definitions of accountability are important to ensure that both the bank and the service provider understand their roles and responsibilities for each service level requirement. However, beyond simply designating a role or activity, accountability should also be established by specifying the consequences if a given service level is not met. Incentives and penalties can play a key role in establishing accountability. Incentives can be used to motivate a service provider to meet or exceed specified service levels by offering a reward. Rewards should generally be attractive enough to motivate the provider, but less than the actual financial value provided by the service. Penalty clauses also should be considered and bank management should have the right to exercise these penalties for any defined service delivery failures. When negotiating incentives and penalties into an SLA, it is helpful to consider: The importance of the performance measure to the bank This will help the bank determine how to weight the associated incentives/ penalties as well as the frequency for monitoring performance. Each party s expectations for quality and consistency These factors, coupled with prior experiences, may help the bank determine the best method for motivating the provider toward desired performance. The severity of the consequences to the bank if key performance measures are not met The effect on the institution should be a TABLE 1 EXAMPLES OF OBJECTIVES, REQUIREMENTS, AND MEASUREMENTS Measurement Copies of intrusion scan reports to be sent at pre-determined frequency. Copies of independent security assessment reports to be provided at pre-determined frequency. Regular incident reports (frequency will depend upon system criticality). Specified requirement for system uptime (e.g., 99.9%). Specified requirement or parameters for capacity (e.g., 1,000 transactions processed per minute). Performance Requirement Regular checks for intrusions or other security breaches. Periodic security assessments, tests, or reviews. Strategic Objective Sensitive system and bank/customer data must be protected with strong security. Timely reporting of incidents and follow up to bank management. System downtime must be minimal. The system must be able to support certain volumes of activity at a given time. Mission critical systems must be reliable and accessible. 6
9 motivating factor for the institution when determining whether compensation clauses or other remedies should be provided. APPENDIX 2 SAMPLE SERVICE LEVEL AGREEMENT (Note: This SLA is for illustration purposes only, and not to be relied upon as a model contract for any specific service agreement. Actual SLAs will vary widely depending on the services contracted. Additional provisions or an increase in the scope of this SLA will be necessary to govern other aspects of the relationship, such as security. Consult with bank legal counsel for specifics of contract clauses and formation advice.) Purpose: This agreement is between Buyer and Vendor. This document outlines the service level roles, responsibilities, and objectives of Buyer and Vendor in support of the given functional area. Scope of Services: Vendor will house, manage, and operate all hardware and software necessary to provide Internet banking applications to Buyer. Service Category: This SLA addresses application availability. Acceptable Range of Service Quality: The Internet banking application shall be available at least 99.5% of each week. Definition of What is Being Measured: Availability will be measured as the percentage of minutes each day that the Internet banking application will be able to receive and respond to messages from the Internet. The server s ability to receive messages will be ascertained using time-check availability software. 7
10 Formula for Calculating the Measurement: System availability shall be measured as the number of minutes per day that the Buyer s Internet banking application is capable of receiving and responding to messages from the Internet divided by 1,440 (the total number of minutes in a day). A 30-minute period from 2:00 AM to 2:30 AM shall be excluded from the calculation because Vendor will be performing system maintenance at this time each day. Relevant Credits/Penalties for Achieving/Failing Performance Targets: If Vendor is unable to provide this service level to Buyer, Vendor will provide priority support to Buyer until performance levels are met. Service below the prescribed level will result in a rebate of 50% of the monthly fee for the month in which the exception takes place. If Vendor fails to provide the agreed upon service level for more than two consecutive months, Buyer shall have the right to renegotiate the contract and/or terminate this agreement. Frequency and Interval of Measurement: The system s availability shall be measured daily by Vendor using the time-check availability software. Vendor shall submit monitoring reports generated by this program to Buyer on a weekly basis. Vendor s Responsibilities: Vendor shall assume responsibility for customer communications at the point that customer messages leave the Internet service provider. Vendor shall ensure that all messages are processed in a timely fashion. (Be sure to define the specifics of timely standards.) Vendor shall ensure that the system shall be able to accept and respond to 1,200 inquiries per minute. (Include any other items that Vendor will need to do to provide the prescribed level of service to Buyer.) Escalation Guidelines: In the event that Vendor is unable to meet the terms of this agreement, the CIO of Buyer and IT Manager of Vendor shall discuss resolution of the situation. If Vendor will be unable to provide service for more than two hours, Vendor s contingency operating plan shall be invoked. Renegotiations: Authorized representatives of Buyer and Vendor must mutually agree upon changes to this SLA. All changes must be made and agreed to in writing. Either party may request review of this SLA at any time. Each party will review the SLA annually and advise the other party of any desired changes. Buyer s Responsibilities: Buyer shall review all monitoring reports and advise Vendor of any deviations from this agreement in a timely manner. (Include any other items that Buyer will need to do so that Vendor may perform its tasks.) 8
Technology Outsourcing. Effective Practices for Selecting a Service Provider
Technology Outsourcing Effective Practices for Selecting a Service Provider Technology Outsourcing Effective Practices for Selecting a Service Provider Federal Deposit Insurance Corporation 550 17th Street
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP
Outsourced Third Party Relationship Management/ Vendor Management TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP 1 Risk Management Guidance 2 3 Appendix J: 4 - Key Elements Third Party Management
Outsourcing Technology Services A Management Decision
Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships
Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault
Anatomy of an IT Outsourcing Deal Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault 3656867 Agenda Key Considerations for IT Outsourcing Decision Anatomy of an Outsourcing
<[Z[hWb <_dwdy_wb?dij_jkj_edi ;nwc_dwj_ed 9ekdY_b
FFIEC TABLE OF CONTENTS INTRODUCTION 1 BOARD AND MANAGEMENT RESPONSIBILITIES 2 RISK MANAGEMENT 3 Risk Assessment and Requirements 4 Quantity of Risk Considerations 4 Requirements Definition 5 Service Provider
Vendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
The Task. First things first what is a Service Level Agreement?
The Task If you are reading this, then you ve probably decided to or been asked to implement an SLA. Questions are starting to run through your head like what s all the fuss about? How is this going to
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
<[Z[hWb <_dwdy_wb?dij_jkj_edi ;nwc_dwj_ed 9ekdY_b
FFIEC Table of Contents Introduction 1 Board and Management Responsibilities 2 Risk Management 3 Risk Assessment and Requirements 4 Quantity of Risk Considerations 5 Requirements Definition 6 Service Provider
Business Logistics Specialist Position Description
Specialist Position Description March 23, 2015 MIT Specialist Position Description March 23, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
Outsourcing Technology Services OT
Federal Financial Institutions Examination Council FFIEC Outsourcing Technology Services OT JUNE 2004 IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND MANAGEMENT RESPONSIBILITIES...
Tips on How to Negotiate Contracts with Vendors and Service Providers for IT
Tips on How to Negotiate Contracts with Vendors and Service Providers for IT Contract managers must know how to structure healthy vendor contracts and relationships. Managers should take the key steps
ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0
ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key
Critical Success Factors in Selecting an IT Infrastructure Provider
white paper: IT solutions Critical Success Factors in Selecting an IT Infrastructure Provider Start by Doing Your Homework....................................... 2 One Last Thing to Consider...................................................
BITS GUIDE TO CONCENTRATION RISK
BITS GUIDE TO CONCENTRATION RISK IN OUTSOURCING RELATIONSHIPS BITS A DIVISION OF THE FINANCIAL SERVICES ROUNDTABLE 1001 PENNSYLVANIA AVENUE, NW SUITE 500 SOUTH WASHINGTON, DC 20004 202-289-4322 WWW.BITS.ORG
Project Knowledge Areas
From Houston S: The Project Manager s Guide to Health Information Technology Implementation. Chicago: HIMSS; 2011; pp 27 39. This book is available on the HIMSS online bookstore at www. himss.org/store.
The New Third-Party Oversight Framework: Trust but Verify kpmg.com
Financial Services Regulatory Point of View The New Third-Party Oversight Framework: Trust but Verify kpmg.com The New Third-Party Oversight Framework: Trust but Verify 1 Financial services regulatory
Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
Infrastructure Technical Support Services. Request for Proposal
Infrastructure Technical Support Services Request for Proposal 15 May 2015 ISAAC reserves the right to reject any and all proposals, with or without cause, and accept proposals that it considers most favourable
Outsourcing in the Financial Services Industry: Finding Opportunities and Managing Risk. New York. OCC and FRB Guidance on Managing Third-Party Risk
March 24, 2014 If you have any questions regarding the matters discussed in this memorandum, please contact the following attorneys or your regular Skadden contact. Stuart D. Levi New York / 212.735.2750
TECHNOLOGY STRATEGY AUDIT
TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL September 24, 2010 AUDIT SERVICES FINAL ALERT MEMORANDUM TO: Danny Harris Chief Information Officer Office of the Chief Information Officer
Vendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Statement of Guidance: Outsourcing All Regulated Entities
Statement of Guidance: Outsourcing All Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1. 1.2. 1.3. 1.4. This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on
Third Party Relationships
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B D INTRODUCTION AND PURPOSE Background Yes/No Comments 1. Does the credit union maintain a list of the third party
Enterprise Risk Management
Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's
B o a r d of Governors of the Federal Reserve System. Supplemental Policy Statement on the. Internal Audit Function and Its Outsourcing
B o a r d of Governors of the Federal Reserve System Supplemental Policy Statement on the Internal Audit Function and Its Outsourcing January 23, 2013 P U R P O S E This policy statement is being issued
Managing Outsourcing Arrangements
Guidance Note GGN 221.1 Managing Outsourcing Arrangements 1. This Guidance Note provides further detail on the requirements for managing material outsourcing arrangements (refer Prudential Standard GPS
JOB PROFILE DEBT RECOVERY ASSOCIATE
JOB PROFILE DEBT RECOVERY ASSOCIATE OVERVIEW It s about you Do you enjoy working independently? Are you able to identify solutions and negotiate terms that will meet both the organization s and client
Mandatory Provident Fund Schemes Authority COMPLIANCE STANDARDS FOR MPF APPROVED TRUSTEES. First Edition July 2005. Hong Kong
Mandatory Provident Fund Schemes Authority COMPLIANCE STANDARDS FOR MPF APPROVED TRUSTEES First Edition July 2005 Hong Kong Contents Glossary...2 Introduction to Standards...4 Interpretation Section...6
QUALITY MANAGEMENT SYSTEM REQUIREMENTS
QUALITY MANAGEMENT SYSTEM REQUIREMENTS FOR BUILDERS 2014 400 Prince George s Blvd. Upper Marlboro, MD 20774 800.638.8556 HomeInnovation.com TABLE OF CONTENTS Introduction... iii Notes... iii 1 General...1
STATEMENT OF WORK 1. BACKGROUND:
STATEMENT OF WORK 1. BACKGROUND: The Center for Talent Services (CTS) under the U.S. Office of Personnel Management s (OPM) Human Resources Products and Services Division (HRPS) is a fully reimbursable
How To Deal With Cloud Computing
A LEGAL GUIDE TO CLOUD COMPUTING INTRODUCTION Many companies are considering implementation of cloud computing services to decrease IT costs while providing the flexibility to scale usage on demand. The
Contracting Guidelines with EHR Vendors
Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written from the perspective of the software company. You can request language
What is the Role of an Application Service Provider (ASP)/Host?
CHAPTER 9 What is the Role of an Application Service Provider (ASP)/Host? There are many areas you should consider when determining if application outsourcing is the best approach for your business. This
IT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q Number: EX0-001 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: EX0-001 Exam Name: ITIL Foundation (syllabus
Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004
Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 1. INTRODUCTION Financial institutions outsource business activities, functions and processes
Third Party Security Guidelines. e-governance
for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Contracting Guidelines with EHR Vendors
Doctors Office Quality - Information Technology (DOQ-IT) Project Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
UoD IT Job Description
UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management
How Cisco IT Improved Strategic Vendor Management
How Cisco IT Improved Strategic Strategic sourcing for vendor management results in flexibility, simplicity, and reduced costs. Cisco IT Case Study / Business Management / : This case study describes the
MISSION VALUES. The guide has been printed by:
www.cudgc.sk.ca MISSION We instill public confidence in Saskatchewan credit unions by guaranteeing deposits. As the primary prudential and solvency regulator, we promote responsible governance by credit
Invitation to Tender
Invitation to Tender Provision of Training in Technology Transfer and Related Areas for The Southern Africa Innovation Support Programme 1. Drawing up the tender The tender must be submitted in writing
Navigating Vendor Management Issues in Today s Regulatory Environment
Navigating Vendor Management Issues in Today s Regulatory Environment May 6, 2015 Elizabeth E. McGinn, Partner Moorari K. Shah, Counsel 1 Disclaimer The information contained herein is for informational
California Dept. of Technology AT&T CALNET 3. Service Level Agreements (SLA) 7.3 Network Based Managed Security
California Dept. of Technology AT&T CALNET 3 Level Agreements (SLA) Subcategory 7.3 Network Based Managed Security Page 1 Trouble Ticket Stop Clock Conditions The following conditions shall be allowed
Credit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
Introduction to the ITS Project Management Methodology
Introduction to the ITS Project Management Methodology In September 1999 the Joint Legislative Committee on Performance Evaluation and Expenditure Review (PEER) produced a report entitled Major Computer
COMPLIANCE CHARTER 1
COMPLIANCE CHARTER 1 Contents 1. Compliance Policy Statement... 2 2. Purpose... 2 3. Mission and objective of the Directorate: Compliance... 2 3.1 Mission... 2 3.2 Objective... 3 4. Compliance risk management...
IT Services Management
IT Services Management A Description of a Service Catalog White Paper Prepared by: Rick Leopoldi June 19, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content
CONTRACTING FOR SERVICES
Tool QQ Early Childhood Iowa CONTRACTING FOR SERVICES This tool provides an overview of the components of a contract. If your ECI area board currently uses contracts to purchase services, use this tool
Bringing wisdom to ITSM with the Service Knowledge Management System
Processes 415 Bringing wisdom to ITSM with the Service Knowledge Management System 7.3 Bringing wisdom to ITSM with the Service Knowledge Management System nowledge is a process of piling up facts; wisdom
Using Metrics in Outsourcing
Using Metrics in Outsourcing Using Metrics In Outsourcing- What Works/What Doesn t Barbara Beech AT&T Services, Inc. Group Manager IT Sourcing Vendor Management 908-824-9018 [email protected] Topics What
SaaS Terms & Conditions
SaaS Terms & Conditions These SaaS Terms and Conditions ( SaaS Terms ) are part of the Serraview Services Agreement ( Agreement ) which governs Client s (also referred to herein as you or your ) use of
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
Oracle ERP Support Benchmark Findings
Appendix K Oracle ERP Support Benchmark Findings City of Virginia Beach ComIT Master Technology Plan (Appendix K) 1 City of Virginia Beach Oracle ERP Support Benchmark Findings 23 September 2013 Prepared
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
ISO 20000-1:2005 Requirements Summary
Contents 3. Requirements for a Management System... 3 3.1 Management Responsibility... 3 3.2 Documentation Requirements... 3 3.3 Competence, Awareness, and Training... 4 4. Planning and Implementing Service
Understanding the Software Contracts Process
Understanding the Software Contracts Process By John Seidl, Partner Tompkins Associates More and more often, companies are purchasing supply chain software from commercial software vendors rather than
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
Workplace-As-A-Service SLA 1
Workplace-As-A-Service SLA 1 SPRINT WORKPLACE-AS-A-SERVICE ( Workplace ) SERVICE LEVEL AGREEMENT Effective: September 16, 2015 1. POLICY. As one indicator of Sprint s service commitment, Sprint provides
BMC Software Consulting Services. Fermilab Computing Division Service Catalog & Communications: Process and Procedures
BMC Software Consulting Services Service Catalog & Communications: Process and Procedures Policies, Client: Date : Version : Fermilab 02/12/2009 1.0 GENERAL Description Purpose This document establishes
Software as a Service Decision Guide and Best Practices
Software as a Service Decision Guide and Best Practices Purpose of this document Software as a Service (SaaS) is software owned, delivered and managed remotely by one or more providers [Gartner, SaaS Hype
IT Service Provider and Consumer Support Engineer Position Description
Engineer Position Description February 9, 2015 Engineer Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level Definitions...
CONTRACT MANAGEMENT POLICY POLICY ADOPTED BY COUNCIL ON???? AT ITEM C.????
CONTRACT MANAGEMENT POLICY POLICY ADOPTED BY COUNCIL ON???? AT ITEM C.???? 1 1. PRE-AMBLE All transactions undertaken by the Cape Winelands District Municipality involves a contract whether explicitly
NASA PROCUREMENT TENETS
NASA PROCUREMENT TENETS Introduction: The goal of procurement is to ensure the Agency executes its mission successfully by effectively and efficiently managing the acquisition process. NASA spends approximately
Front Metrics Technologies Pvt. Ltd. Capacity Management Policy, Process & Procedures Document
Pvt. Ltd. Capacity Management Policy, Process & Procedures Document Client: Pvt. Ltd. Date : 03/04/2011 Version : 0.6 GENERAL Description Purpose Applicable to Supersedes This document establishes a Capacity
How To Manage A Financial Institution
BUSINESS CONTINUITY MANAGEMENT GUIDELINE April 2010 Table of Contents Preamble...3 Introduction...4 Scope...5 Coming into effect and updating...6 1. Continuity and resumption of business...7 2. Sound and
William F Crowe, CISA,CRISC, CISM, CRMA, MBA September 2013
William F Crowe, CISA,CRISC, CISM, CRMA, MBA September 2013 16 years experience in Information Security, Risk Management, Third Party Oversight and IT Audit Vice President Business IT Risk Management JPM
[name of project] Service Level Agreement
[name of project] Service Level Agreement Policies and Procedures Posting: Nov.2008 Rev# xxx CIO Sign-Off: Approved and Reviewed By: Date: Document ID: SLA Revision 001 Authors: Disclaimer: Document sign-off
ITIL Essentials Study Guide
ITIL Essentials Study Guide Introduction Service Support Functions: Service Desk Incident Management Problem Management Change Management Configuration Management Release Management Service Delivery Functions:
CONTRACT MANAGEMENT POLICY
CONTRACT MANAGEMENT POLICY Section Finance Approval Date 25/08/2014 Approved by Directorate Next Review Aug 2016 Responsibility Chief Operating Officer Key Evaluation Question 6 PURPOSE The purpose of
The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service.
(SLA) The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service. Network Internal Network The internal network includes cables, switches, routers, and firewalls
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
REQUEST FOR PROPOSALS. 403(b) Retirement Plan Investment Analysis and Consulting. July 2012
REQUEST FOR PROPOSALS 403(b) Retirement Plan Investment Analysis and Consulting July 2012 I. Investment Analysis and Consulting The Corporation for Public Broadcasting ( CPB ) is seeking proposals for
QUALITY ASSURANCE SURVEILLANCE PLAN (QASP)
Attachment 5 SOL09000002 QUALITY ASSURANCE SURVEILLANCE PLAN (QASP) for the Federal Communications Commission Washington, DC TABLE OF CONTENTS 1.0 INTRODUCTION... 2 1.1 PURPOSE... 2 1.2 PERFORMANCE MANAGEMENT
Supporting Effective Compliance Programs
October 2015 Supporting Effective Compliance Programs The Oversight Roles of the Board Audit and Risk Committees in Regulatory Compliance By Paul Osborne, CPA, CAMS, AMLP, and Peggy Sepp, CIA To be effective,
Supervisory Guidance on Operational Risk Advanced Measurement Approaches for Regulatory Capital
Supervisory Guidance on Operational Risk Advanced Measurement Approaches for Regulatory Capital Draft Date: July 2, 2003 Table of Contents I. Purpose II. Background III. Definitions IV. Banking Activities
Business Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
