Hidden traps lurk in every outsourcing contract. Here are 12 big ones -- and how you can avoid them.
Computerworld - To a CIO, outsourcing contracts may look like other procurement and service agreements, but they're much riskier. "You're writing a contract for a service that's impossible to describe, that will change over time and need to be renegotiated, that will make you dependent on the service provider and for which termination is not an option," says Paul Roy, a partner at Mayer, Brown, Rowe & Maw LLP in Chicago, who has put together some of the largest outsourcing deals in history. "That's not an ideal negotiating position," he adds.
Roy and other attorneys who specialize in outsourcing have seen the challenges CIOs face when they sit down to negotiate outsourcing deals. Here's some advice on gotchas that can undo the unwary:
Problem: Unresolved issues. Amid the pressure to get the deal done, the outsourcer may push you to sign before pricing or service levels are nailed down, promising only minor adjustments later. "The supplier may say, 'This is standard; we do this all the time,' " says Bob Zahler, a partner in the outsourcing practice at Shaw Pittman LLP in Washington. "But in our experience, in every case that has produced a bad result."
Solution: "It's much better to resolve those things beforehand, even if it means delaying the signing," Zahler says. It takes many months to put together an outsourcing deal, he adds, so if you know you don't have sufficient data to establish service levels or pricing, start measuring immediately.
Problem: Fixed service levels and incentives can become antiquated over time.
Solution: Design the agreement to be flexible so you can add and remove service levels and set incentives so you can move from one service level to another, says Roy. Include a mechanism that allows you to ratchet up service levels to keep pace with the market, focus on things that create business value and adapt over time.
Problem: Fuzzy scope. The standard contract has voluminous descriptions of scope of service - often in excess of 100 pages, Zahler says -- but they're written by technical people who aren't as precise and detailed as they should be. "And clients don't read them," he adds.
Solution: Zahler's firm breaks IT into 77 detailed processes based on industry standards and creates a matrix with processes down the left side and the client's description of his IT group across the top. Then they color-code supplier and customer responsibilities. "It's easier to do a contract that way and it gets clients to focus on scope of service," he says.
Problem: Tasks missing from scope. No matter how careful you
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...