Close

Sourcing Speak

Updated:

Applications Outsourcing Pricing – Part 2

As noted in our previous blog posting on the subject, the most prevalent model for pricing applications outsourcing services involves the following components: (1) a fixed monthly charge for applications maintenance; (2) a fixed monthly charge for a baseline number of application enhancements hours (typically included as part of the…

Updated:

Conflict Minerals: Are Purchases of Products for Internal Use Caught by the SEC Rules?

It has been six weeks since the SEC issued final rules relating to the reporting of conflict minerals. The rules apply to public companies that are subject to reporting requirements under the Securities Exchange Act of 1934 (so-called “issuers”). Issuers must report on the use of conflict minerals in their…

Updated:

Rethinking the Long Term Sourcing Deal

Historically, outsourcing agreements included terms typically lasting five to seven years or even longer – with additional years tacked on as options exercisable only by the customer. But several factors suggest that a customer should think twice and at least consider shorter term deals with its service providers: The Deteriorating…

Updated:

Applications Outsourcing Pricing – Part 1

The pricing structure of outsourcing transactions often reflects a balancing of competing objectives. In the case of applications outsourcing services, most customers want the pricing structure to provide predictability and proper financial incentives for the supplier to continually increase productivity and efficiency in service delivery. At the same time, both…

Updated:

Don’t Let Your Outsourcing Contract Become a Door Stop

Judging from my 25 years of experience as an outsourcing practitioner, I believe there is widespread consensus among suppliers and customers that, promptly upon their execution, outsourcing contracts should be locked away in a file cabinet never to be looked at again until it is time for them to be…

Updated:

UK Information Commissioner’s Office issues Guidance on the Deletion of Personal Data under the Data Protection Act 1998

On 16 August 2012, the ICO published guidance on deleting personal data under the Data Protection Act 1998 (DPA). The guidance describes how organisations can ensure compliance with the DPA when they delete or archive personal data, and explains what the ICO means by deletion and archiving and introduces the…

Updated:

Protecting Your Data When Your Subcontractor Hires a Subcontractor

When customers sign a contract with a service provider that will be holding the customer’s confidential data (for example, the customer’s business records, human resources data, personally identifiable information, protected health information, payroll data), in addition to laying out the service provider’s responsibility for protecting the data, customers focus on…

Contact Us