Computerworld - A large majority of IT development projects end up as failures, in terms of missed deadlines, blown budgets and dissatisfied users. And while many of the IT projects carried out by external vendors do have the contractual equivalent of a prenuptial agreement that covers how the two sides would "divorce," neither party ever seems prepared for the messy legal aftermath of a failed project. When I tell project managers that litigation costs in large IT organizations will likely exceed the cost of coding, they're shocked. And well they should be, for while they have often devoted great care and attention to coding (along with all the other technical activities associated with systems development), they tend to ignore the legal issues until a lawsuit is staring them in the face. By that time, it's usually too late to prevent the
consequences of mistakes that occurred throughout the project.
Reasons for this include ignoring or excluding lawyers during the negotiating and contracting stages of an IT project; asking them to draft elaborate provisions for technical issues that they don't understand; or letting them create contracts whose terms and conditions turn out to be unworkable from the beginning and that both parties proceed to ignore without bothering to inform their legal advisers. While there are exceptions to this dismal assessment, the prevailing situation is that the conduct of the project takes place - often over a period of months or years - without any legal review, oversight or guidance. Then, when things blow up at the end, and the vendor and customer angrily blame each other for having caused the problem, it's often an entirely new set of attorneys who are brought in to serve as hired guns to help orchestrate a legal punishment on the other side.
Interestingly, the resulting lawsuits tend to focus on very esoteric, sophisticated technical issues, such as the question of whether the vendor succeeded in delivering a system whose "cyclomatic complexity" (the amount of decision logic in a single software module) exceeded industry norms, even though neither party had ever heard of this metric of software maintainability before the lawsuit was filed (see www.mccabe.com/products/qa_method. htm for more details, if you're curious). And while the lawyers, the jury and the judge are all grappling with the nuances of this technical buzzphrase, the real problem usually turns out to be far more basic: There was no contract at all; there were no tangible, objective acceptance criteria that described when the project could be considered finished; or the contract was emasculated and renegotiated
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts