Attacking 'value leakage' in vendor contract negotiations
IT contracts can be hamstrung by outdated performance metrics
Computerworld - CAMBRIDGE, Mass. -- IT managers who help negotiate contracts with vendors often end up with less than they had hoped for, largely due to the process by which contracts are agreed to and delivered upon.
During contract negotiations, "customers often come up with great ideas to tie value to performance," said Todd Larson, director of application development at Eaton Vance Management, a mutual fund company in Boston. But by the time a contract is signed, said Larson, "most of those ideas have dissipated."
Larson was one of the attendees who discussed contract management issues at a conference held here by Cutter Consortium, an IT consulting firm in Arlington, Mass.
Stuart Kliman, a senior consultant at Cutter and a partner at Boston-based Vantage Partners LLC, said one of the big problems that leads to what he described as contract "value leakage" is a lack of coordination within technology vendors.
"There are big gaps between vendor salespeople, contract managers and the people who deliver [products and services]," Kliman said.
Contract negotiations are beset by other problems, said Kliman. "In practice, most organizations believe there's a trade-off that has to occur between obtaining either a good working relationship [with vendors] or obtaining good business results," he said. When confronted with such a choice, most IT contract negotiators opt for good business results instead of making organizational changes to try to accommodate both.
Another option, Kliman said, would be to present these choices to end users and other stakeholders, let them prioritize the most important goals of a project "and then present their interests at the negotiation table."
IT contracts are often hamstrung by outdated performance measurement metrics, said Michael Mah, another Cutter Consortium consultant. "We're in a knowledge society, but we're using industrial economy metrics," such as output per unit cost, to measure performance, said Mah, who is also a partner at QSM Associates Inc. in Pittsfield, Mass.
"The relationship is the most important thing in an outsourcing deal," said Joseph Imbimbo, vice president of IS technology operations at Tufts Health Plan in Boston. Imbimbo, who helped negotiate a seven-year, $20 million applications outsourcing deal with Keane Inc. four years ago, said, that "you can't get to know a vendor" sufficiently under a request-for-proposal bidding process. He said he spent a year working with Keane, a business and IT outsourcing firm based in Boston, to craft the applications outsourcing deal for Tufts.
Imbimbo said he spent a lot of time during precontract due diligence considering all of the things that could go wrong under the pact and how or whether Tufts wouldbe able to extricate itself should Keane fail to meet performance targets.
Martha Crow, managing director of the New England region for Keane, said many of the contracts the consulting firm now signs contain an "above-and-beyond clause," where the two companies agree in writing that they will share the benefits of any innovation that Keane delivers.
Read more about IT Careers in Computerworld's IT Careers Topic Center.
- Mission Critical: Managing Mobile Applications & Content Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All IT Careers White Papers | Webcasts
Our 28th annual survey results show which IT skills are in high demand and which are cooling off. Also, see how your salary stacks up to peers' with our Smart Salary Tool.