{"id":62,"date":"2007-06-08T23:23:00","date_gmt":"2007-06-08T23:23:00","guid":{"rendered":"http:\/\/mayanktrivedi.net\/technotes\/2007\/06\/08\/it-outsourcing-decisions-concerns\/"},"modified":"2022-04-06T20:23:49","modified_gmt":"2022-04-06T20:23:49","slug":"it-outsourcing-decisions-concerns","status":"publish","type":"post","link":"http:\/\/mayanktrivedi.net\/technotes\/2007\/06\/08\/it-outsourcing-decisions-concerns\/","title":{"rendered":"IT Outsourcing Decisions &#8211; Concerns"},"content":{"rendered":"<div>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">Outsourcing of IT Services is the trend of today, and why not it helps an organization in focusing towards its core business where the strength lies.  Why should an organization spend the time, effort and other resources where it does not specialize and which is not its core area of operations.  <o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">The first and foremost thing that is considered while taking the step of outsourcing is the selection of the right company.  Yes, it is very important to select the right company to execute the outsourced job and in the manner and with the effect as the outsourcing organization would prefer it to be conducted.  But is it the only requirement in outsourcing scenario?  May be most out there would say \u2018Yes\u2019, but there is a difference somewhere, somewhere we are lagging.  Why shall we just focus on the efficiency of the outsourced Company\u2019s delivery mechanism and why not address the some other issues?  Other than the effective and efficient delivery mechanism followed by the Outsourced Company, there are other areas that are more important and rather critical to the success of the Outsourcing Model being followed.  These issues are rather related to the mechanism followed by the Outsourced Company to address the security risks involved in the overall outsourcing model.<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">For instance lets\u2019 have a look at the <st1:place st=\"on\"><st1:country-region st=\"on\">US<\/st1:country-region><\/st1:place> market that is one of the biggest market for the Outsourced Business Process concept.  The organizations there are increasingly outsourcing their IT divisions including their IT Security set-up.  Certainly to manage the growing cost of managing the IT establishment and at the same time to focus on the more profitable Business Divisions\/Processes.  <o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">But then there is a flip side of the decision and that might have more of impact than the benefits.  The flip side is for the obvious risks associated in outsourcing the IT function; the function that deals with processing and storage of the information that even includes critical and business sensitive information.<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">Now, coming from an Outsourcee background and being and being one of the Lead Consultants on the Outsourced jobs for my company, I would be one of those in the bandwagon to support the Outsourcing trend.  Why should not I and why should I ever oppose it? After all I get my bread and butter from the outsourced jobs.  <o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">But just because I am an Outsourcee I should defy the fact that there is no risk in the Outsourcing models and approach as being followed?  Should I just try to conceal the fact that when an Organization outsource a process to a third-party, be it for desktop support, security testing or network monitoring, the more accessible the electronic assets are and the <\/span><\/span>greater is the risk of something bad happening. There is always a potential for loss increases given the seemingly endless amount of data stored processed and transmitted through so many different devices. <o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">Though it might seem to be but it would not be a wild statement to say, \u201cWhile most IT consultants are trustworthy and responsible, some might not.  Seemingly not so bad people are doing bad things on computers all the time \u2013 and often the company who hired them doesn&#8217;t even realize it.\u201d<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">Let us examine the various risks that are associated with the outsourcing decision and then we can look into the aspects or steps that would help us in making the appropriate decision on outsourcing and what to outsource.<o:p><\/o:p><\/span><\/span><\/p>\n<h2><span style=\"font-family:Verdana;font-size:130%;\"><span lang=\"EN-IN\"  style=\"font-size:14;\">Concerns of Outsourcing<o:p><\/o:p><\/span><\/span><\/h2>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">As every aspect of business has inherent concerns and the related risks, so is with the decision to outsource.  Making a decision with the knowledge of these inherent risks makes life easier as we would be ready to take steps to avoid any materialization of these risks and avoid any adverse impact of the business profitability.<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\">So what are the risks? and where they exist? are the main questions to be known.  Let\u2019s have a closure look at the risks that exist with the decision to outsource \u2013 <o:p><\/o:p><\/span><\/span><\/p>\n<p style=\"margin-left: 0.75in;\"><!--[if !supportLists]--><span style=\"font-family:Wingdings;font-size:78%;\"><span style=\";font-family:Wingdings;font-size:9;\"  lang=\"EN-GB\" ><span style=\"\">n<span style=\"font-family:Times New Roman;font-size:78%;\"><span style=\";font-family:&quot;;font-size:7;\"  >        <\/span><\/span><\/span><\/span><\/span><!--[endif]--><span lang=\"EN-GB\">Loss of Control<\/span><span lang=\"EN-GB\"><o:p><\/o:p><\/span><\/p>\n<p style=\"margin-left: 0.75in;\"><!--[if !supportLists]--><span style=\"font-family:Wingdings;font-size:78%;\"><span style=\";font-family:Wingdings;font-size:9;\"  lang=\"EN-GB\" ><span style=\"\">n<span style=\"font-family:Times New Roman;font-size:78%;\"><span style=\";font-family:&quot;;font-size:7;\"  >        <\/span><\/span><\/span><\/span><\/span><!--[endif]--><span lang=\"EN-GB\">Availability v\/s Quality<\/span><span lang=\"EN-GB\"><o:p><\/o:p><\/span><\/p>\n<p style=\"margin-left: 0.75in;\"><!--[if !supportLists]--><span style=\"font-family:Wingdings;font-size:78%;\"><span style=\";font-family:Wingdings;font-size:9;\"  lang=\"EN-GB\" ><span style=\"\">n<span style=\"font-family:Times New Roman;font-size:78%;\"><span style=\";font-family:&quot;;font-size:7;\"  >        <\/span><\/span><\/span><\/span><\/span><!--[endif]--><span lang=\"EN-GB\">Mutual Trust<\/span><span lang=\"EN-GB\"><o:p><\/o:p><\/span><\/p>\n<p style=\"margin-left: 0.75in;\"><!--[if !supportLists]--><span style=\"font-family:Wingdings;font-size:78%;\"><span style=\";font-family:Wingdings;font-size:9;\"  lang=\"EN-GB\" ><span style=\"\">n<span style=\"font-family:Times New Roman;font-size:78%;\"><span style=\";font-family:&quot;;font-size:7;\"  >        <\/span><\/span><\/span><\/span><\/span><!--[endif]--><span lang=\"EN-GB\">Costs \u2013 Real and Uncertain<\/span><span lang=\"EN-GB\"><o:p><\/o:p><\/span><\/p>\n<p style=\"margin-left: 0.75in;\"><!--[if !supportLists]--><span style=\"font-family:Wingdings;font-size:78%;\"><span style=\";font-family:Wingdings;font-size:9;\"  lang=\"EN-GB\" ><span style=\"\">n<span style=\"font-family:Times New Roman;font-size:78%;\"><span style=\";font-family:&quot;;font-size:7;\"  >        <\/span><\/span><\/span><\/span><\/span><!--[endif]--><span lang=\"EN-GB\">Knowledge Transfer<\/span><span lang=\"EN-GB\"><o:p><\/o:p><\/span><\/p>\n<p style=\"margin-left: 0.75in;\"><!--[if !supportLists]--><span style=\"font-family:Wingdings;font-size:78%;\"><span style=\";font-family:Wingdings;font-size:9;\"  lang=\"EN-GB\" ><span style=\"\">n<span style=\"font-family:Times New Roman;font-size:78%;\"><span style=\";font-family:&quot;;font-size:7;\"  >        <\/span><\/span><\/span><\/span><\/span><!--[endif]--><span lang=\"EN-GB\">Shared v\/s Dedicated Operations<\/span><span lang=\"EN-GB\"><o:p><\/o:p><\/span><\/p>\n<p style=\"margin-left: 0.75in;\"><!--[if !supportLists]--><span style=\"font-family:Wingdings;font-size:78%;\"><span style=\";font-family:Wingdings;font-size:9;\"  lang=\"EN-GB\" ><span style=\"\">n<span style=\"font-family:Times New Roman;font-size:78%;\"><span style=\";font-family:&quot;;font-size:7;\"  >        <\/span><\/span><\/span><\/span><\/span><!--[endif]--><span lang=\"EN-GB\">Legal and regulatory Compliance<\/span><span lang=\"EN-GB\"><o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\"><o:p> <\/o:p><\/span><\/span><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Outsourcing of IT Services is the trend of today, and why not it helps an organization in focusing towards its core business where the strength lies. Why should an organization spend the time, effort and other resources where it does not specialize and which is not its core area of operations. The first and foremost &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[72,75],"tags":[],"class_list":["post-62","post","type-post","status-publish","format-standard","hentry","category-it-security","category-it-security-outsourcing-it-outsourcing","entry entry-center"],"_links":{"self":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/62","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":1,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/62\/revisions"}],"predecessor-version":[{"id":203,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/62\/revisions\/203"}],"wp:attachment":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/media?parent=62"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/categories?post=62"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/tags?post=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}