Hidden traps lurk in every outsourcing contract. Here are 12 big ones -- and how you can avoid them.
Computerworld - To a CIO, outsourcing contracts may look like other procurement and service agreements, but they're much riskier. "You're writing a contract for a service that's impossible to describe, that will change over time and need to be renegotiated, that will make you dependent on the service provider and for which termination is not an option," says Paul Roy, a partner at Mayer, Brown, Rowe & Maw LLP in Chicago, who has put together some of the largest outsourcing deals in history. "That's not an ideal negotiating position," he adds.
Roy and other attorneys who specialize in outsourcing have seen the challenges CIOs face when they sit down to negotiate outsourcing deals. Here's some advice on gotchas that can undo the unwary:
Problem: Unresolved issues. Amid the pressure to get the deal done, the outsourcer may push you to sign before pricing or service levels are nailed down, promising only minor adjustments later. "The supplier may say, 'This is standard; we do this all the time,' " says Bob Zahler, a partner in the outsourcing practice at Shaw Pittman LLP in Washington. "But in our experience, in every case that has produced a bad result."
Solution: "It's much better to resolve those things beforehand, even if it means delaying the signing," Zahler says. It takes many months to put together an outsourcing deal, he adds, so if you know you don't have sufficient data to establish service levels or pricing, start measuring immediately.
Problem: Fixed service levels and incentives can become antiquated over time.
Solution: Design the agreement to be flexible so you can add and remove service levels and set incentives so you can move from one service level to another, says Roy. Include a mechanism that allows you to ratchet up service levels to keep pace with the market, focus on things that create business value and adapt over time.
Problem: Fuzzy scope. The standard contract has voluminous descriptions of scope of service - often in excess of 100 pages, Zahler says -- but they're written by technical people who aren't as precise and detailed as they should be. "And clients don't read them," he adds.
Solution: Zahler's firm breaks IT into 77 detailed processes based on industry standards and creates a matrix with processes down the left side and the client's description of his IT group across the top. Then they color-code supplier and customer responsibilities. "It's easier to do a contract that way and it gets clients to focus on scope of service," he says.
Problem: Tasks missing from scope. No matter how careful you
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...