Posted

The details are not the details. They make the design.” – Charles Eames

Indiana vs. IBM

In 2006 Indiana awarded IBM a contract for more than $1 billion to modernize Indiana’s welfare case management system and manage and process the State of Indiana’s applications for food stamps, Medicaid and other welfare benefits for its residents. The program sought to increase efficiency and reduce fraud by moving to an automated case management process. After only 19 months into the relationship, while still in the transition period, it became clear to Indiana that the relationship was not going as planned. The expected levels of automation were not being realized. Instead, the program reverted back to a caseworker process, and performance was consistently slower than agreed to levels.

Posted
By

In Part 3 of “It’s 2013. Do You Know Where Your BYOD Policies Are?” we will address developing BYOD trends and best practices. Please check out Part 1 and 2 of this 3-part series addressing employee and employer concerns, respectively.

Recent Findings: Widespread Adoption, Lagging Management

Recent studies show that security practices and corporate policies are struggling to keep pace with the popularity of BYOD. As mentioned in Part 1, a recent Cisco study found that 90% of full-time American workers use their personal smartphones for work purposes. Surprisingly, widespread adoption is reported in industries handling highly sensitive and regulated data: banking at 83.3%, and healthcare at 88.6%.

Posted

Steve Farmer recently published an article in World Data Protection Report titled “Personal Data Transfers from the European Economic Area: Time to Consider Binding Corporate Rules 2.0.”

What exactly is the ‘”best” solution for an international business needing to handle and transfer personal data across borders?

This has become an increasingly important and common question as business becomes more global and companies grow, reorganise or merge.

Posted
By

In Part 2 of “It’s 2013. Do You Know Where Your BYOD Policies Are?” we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best practices for BYOD policy drafting and implementation.

The Employer’s Perspective on BYOD

While BYOD provides employees with enhanced user experience, their employers welcome BYOD for cost savings, increased productivity, and improved employee satisfaction. Yet, these benefits come with certain costs, primarily data security risk, as well as regulatory compliance risk.

Posted
By

Imagine you grab your phone only to find it locked, with all of your applications, pictures, and contacts permanently deleted. Imagine your employer’s IT department remote-wiped your phone because they mistakenly believed it was stolen. Better yet, imagine your Angry-Birds-obsessed child triggered an auto-wipe with too many failed password attempts (don’t laugh – it’s based on a true story!). Can your employer really do this to your phone?

Imagine instead that you are the CIO responsible for protecting sensitive corporate and third party information. How can you ensure information security when your employees carry sensitive data in their pocket everywhere they go, and let their friends and family play with these devices?

The use of user-selected personal mobile devices for work (often called “Bring Your Own Device” or “BYOD”) is undoubtedly delivering benefits for employers and employees alike. Yet, competing employee-employer interests and related risks must not be ignored. Remarkably, only 20.1% of companies surveyed globally have implemented signed BYOD policies according to a recent study (Ovum Research Shows U.S. Ahead of Other Countries in Asking Employees to Sign BYOD Agreements). This three-part series will outline competing interests and risks, and will suggest that the best way to manage these risks is through the drafting and enforcement of proper BYOD policies.

Posted

Many years ago, I walked through a client’s IT development organization where all the “Onshore” resources from the client’s ADM provider sat in a sea of cubicles. I was there to identify the causes of some issues that had been troubling the relationship and recommend solutions. Having reviewed the contract before the walkthrough, I wasn’t surprised to see a large supplier team present at the client. What did surprise me was how all of the “Onshore” resources appeared to be from the same offshore location where the supplier was based.

Prior to this encounter, my previous experience was that “Onshore” rates typically applied to the client’s former US-based, rebadged resources or other U.S. based employees assigned to the client’s account by the supplier. But something was different this time. It turned out to be my first introduction to “Landed” resources – foreign workers performing onsite work under short term visas.

Given the cost of transportation, visas and temporary living arrangements, I assumed that in order to compete with U.S. Based resources, the supplier must be paying a lot less for these resources. Otherwise, why would 100% of the resources be from offshore? When I asked about the salary cost differential, the supplier said that there wasn’t any and that “by law” they had to pay a prevailing comparable salary.

Posted

In a previous post, TUPE: Service Provision Change, we discussed that the UK Government had issued a Call for Evidence to review the current Transfer of Undertakings (Protection of Employment) Regulations 2006 (“TUPE 2006”) as part of its wider review of reforms to UK employment laws. The Call for Evidence concluded in 2012 and the UK Government has now launched a consultation on its proposal to amend TUPE 2006, which it believes will improve and simplify the regulations for all parties involved.

The Proposed Changes

The Government’s proposed changes to TUPE 2006 include:

Posted

Why do you need to act urgently even if you feel your data handling is compliant?

If you are a US headquartered company do you need to bother with these new EU laws and significant changes proposed?

2013 has already seen the frenetic pace of change from last year continue regarding new data laws and fines that will affect how all companies, regardless of business sector, use employee or customer data. The European Union, confirmed in the January 2013 Albrecht report, is indeed planning to dramatically amend its EU Data Protection Directive with a new Regulation.

Posted

2013 began with a flurry of articles about companies insourcing work or rethinking their sourcing strategies. The reasons for this vary by company, but often include a perception that outsourcing has not delivered the cost savings, innovation or other value the companies had hoped to realize, particularly in information technology outsourcing (ITO). In contrast, we continue to see high levels of satisfaction among companies that have outsourced facilities management and other real estate functions. This makes us think the ITO industry might benefit from some of the best practices used in FMO deals.

First, let’s define what we mean by FMO. FMO involves the outsourcing of functions necessary to keep a company’s leased and owned buildings operating. FMO deals typically include core functions like maintaining building systems, performing repairs, and handling custodial and landscaping work. They will often also include higher value services like energy demand management and procurement, space planning and support for critical facilities like data centers and lab space. They may also be part of larger outsourcing relationships in which a company outsources responsibility for managing construction projects, lease administration or brokerage transaction management. For companies with sizable real estate portfolios, the annual spend covered by an FMO deal can be in the tens of millions of dollars.

Now let’s outline some of the key reasons we think FMO deals seem to have a relatively high success as compared to other types of outsourcing.

Posted

When customers decide to outsource part of their operations there are many factors to be considered and decisions to be made over the course of the initiative. Getting to the “right price” is obviously one of the key objectives in any outsourcing transaction. Nobody wants to pay too much for a particular service and, while it might seem nice at first blush, nobody really wants to pay substantially below market price for a service because of the problems that will ensue later in the relationship. However, once the right price has been determined, then a decision must be made as to how to structure the payment of this right price.

The Dead-Band Method: For some customers, especially those with little variance in their monthly usage, having a consistent invoice amount from month to month may be more important than perhaps squeezing that last dollar of cost savings out of the operations. For such customers, paying the same amount for volumes that are within some small percentage (up or down) of the original baseline volumes can be a preferred way to structure the payment.

With the Dead-Band Method, the amount the customer pays each month doesn’t change within a small percentage of volume changes (e.g., +/- 5%). In addition to the stability in amount paid, this method can also reduce the angst created by conflicts with the supplier over the accuracy of volume counts. Counting issues often arise in the early days of outsourcing relationships as volumes that have been loosely measured in the past suddenly take on far greater importance. If the invoice price doesn’t change until the dead-band is passed, then small changes in volumes can be validated and worked through without the pressure of an aging supplier invoice. Ideally, by the time the dead-band limit is reached, the counting issues have been worked out.