Qantas/IBM – Transition phase of the outsourcing lifecycle Presented by Goh Kok Min Kelvin Tan Yuean Soo Ho Wee Ming Tan Wei Liang Wang Geng.

Slides:



Advertisements
Similar presentations
Project Cycle Management
Advertisements

Lesson 15: Closing the Project Topic 15A: Close Project Procurements Topic 15B: Close the Project or Phase Administratively.
How we work with you. Infrastructure savings Pay only for what you use Labour Costs Match job functions with skill sets Financial Technology Efficient.
Welcome to the Contract Lifecycle Management (CLM) module To move from one screen to the next please click the Next button on the bottom of the page or.
Outsourcing Contract Negotiations Writing an SLA
Leaders in Asset Management Managing by Metrics Valerie Rovine Sunflower Systems.
Page 2 Agenda Page 3 History –Blue Print, 2000 –GIS Process 1.2, 2001 (training only) –GIS Process 2.0, (ITIL based - not implemented) –Supply/Demand.
Buying Better Outcomes Workshop 4 Equalities and Contract Management If you do not take it seriously, why should the supplier?
Implementation: SLA & SOP Processes Purpose Strategy Foundation We Deliver Competitive Advantage to our Customer's Global Supply Chain.
1 Meeting On The Management Of Statistical Information Systems (MSIS), Oslo, May 18-20, 2009 Shri Narayanan, Economic Systems, TGS Jola Stefanska, STA.
Professional Behaviour
Training & research for academic newcomers A project of the King Baudouin Foundation © 2013 Gabriella Calderari1.
BRC Storage & Distribution Safety and Quality Management System Training Guide
Contractor Management and ISO 14001:2004
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Best Practices – Overview
March 28, 2011 | Monday | 1:00-2:30pm | 6 Story St. IT Services Transition Weekly Program Management Meeting.
Crown Commercial Service Commercial Contract and Supplier Management
Report on Internal Audit and Investigation activities
INTERNAL CONTROLS. Session Objectives Understand why an organization should have internal controls Understand the key components of internal controls.
Session 3 – Information Security Policies
Business Acquisition Process Implementation & transition Closing Negotiation of the transaction Due Diligence Engagement TargetIdentification.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
How To Prepare To Sell Your Business: Steps To Take Now Susan Wissink Fennemore Craig.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
This material was produced under grant number SH SH-1 from the Occupational Safety and Health Administration, U.S. Department of Labor. It does not.
 A project is “a unique endeavor to produce a set of deliverables within clearly specified time, cost and quality constraints”
The Evergreen, Background, Methodology and IT Service Management Model
Module CC3002 Post Implementation Issues Lecture for Week 4 AY 2013 Spring.
Staff Structure Support HCCA Special Interest Group New Regulations: A Strategy for Implementation Sharon Schmid Vice President, Compliance and.
PMP® Exam Preparation Course
G17: Recordkeeping for Business Activities Carried out by Contractors Patrick Power, Manager Government Recordkeeping Programme Archives New Zealand.
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
INDUSTRY FORUM PROGRESS UPDATE PRESENTATION PRESENTED BY: ALAN MORGAN Technical Committee.
Module CC3002 Post Implementation Issues Lecture for Week 1 AY 2013 Spring.
James Aiello PricewaterhouseCoopers Africa Utility Week 06 International Good Practice in Procurement.
Roles and Responsibilities
UQ Drupal Support Service and Transition
NEYNL WDC “Implementing a VLE:reality,challenges and benefits” Angie Clarke, Knowledge Manager, NEYNL WDC NEYNL MLE:
Service Transition & Planning Service Validation & Testing
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Strategic Alliances How to Structure, Negotiate, and Implement Successful Alliances February 11, 2003 Debra J. Dorfman Copyright © 2003 by Hale and Dorr.
Outsourcing Partnership Shared Perspectives. Introduction This is a presentation based around an outsourcing project I have participated in within the.
Guide - Recordkeeping for business activities carried out by contractors Natalie Dewson Senior Advisor Government Recordkeeping Programme Archives New.
Developing a Sustainable Procurement Policy and Strategy EAUC – EAF Programme.
Programme Board – 100 Day Plan 10 th March 2011 working days left
WSSB Capacity Enhancement Workshops 1 Session 2: Legal & Institutional Background for Management of Small-Town Water Systems.
IT SERVICE MANAGEMENT (ITSM). ITIL\ITSM OVERVIEW  ITIL Framework.
InfoSecurity and Outsourcing 17 March 2009 Colin Dixon Head of Risk and Compliance.
RTW Self Assessment using the 5 Steps
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
State of Georgia (GTA) Asset Management Services Overview IBM Global Services December 11, 2008 © 2008 IBM Corporation Catherine Seats Asset Management.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
CLOSE PROJECT OR PHASE CLOSING PROCESS GROUP PROJECT INTEGRATION MANAGEMENT.
Illuminating Britelite’s Internal Services for Success Strategy for Process Improvement.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
Protecting your Managed Services Practice: Are you at Risk?
Illuminating Britelite’s Internal Services for Success Strategy for Process Improvement.
Deloitte Consulting LLP Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative Bi-weekly Statewide Working Group Discussion.
1 QUALITY MANAGEMENT SYSTEM PRESENTATION TO BOTSWANA DRUG ADVISORY BOARD MEMBERS 13 th – 17 th AUGUST 2007.
The Law Offices of Sheila Deselich Cohen. Generally subject to the Employee Retirement Income Security Act of 1974 (“ERISA”). Two main types of plans:
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Business Continuity Planning 101
Shared Services and Third Party Assurance: Panel May 19, 2016.
1 Balanced Scorecard Philosophy, Basics, Fundamentals, and Functions.
BLOCK Health Funding Arrangement Presented by __________________ FNIHB-AB June 15, 2016.
CMMI for Services, Version 1.3 Speaker: Business Excellence Date:
IS4680 Security Auditing for Compliance
Sustainable Transition / Handover of malaria TB and HIV Global Fund Grants Generic 2018.
Presentation transcript:

Qantas/IBM – Transition phase of the outsourcing lifecycle Presented by Goh Kok Min Kelvin Tan Yuean Soo Ho Wee Ming Tan Wei Liang Wang Geng

Agenda Background Objectives Transition Plan ◦ Disruption Minimization Strategy ◦ Staffing Arrangement ◦ Communication Strategy ◦ Knowledge Management Asset & Contract Management Summary

Background 10 year $446 million outsourcing deal Manage Qantas’ IT Infrastructure ◦ Help-desk support svc ◦ Security ◦ Change management Transition of Staff Resources ◦ 178 Qantas staff will be offered employment at IBM

Objective Carry out the transition plan smoothly Ensure a smooth transfer of ◦ Staff ◦ Assets ◦ Third party contracts Minimize risk to business operations ◦ Performance measurement ◦ Proper knowledge transfer

Transition Plan Disruption Minimization Strategy Staffing Arrangement Communication Strategy Knowledge Management Asset & Contract Management

Disruption Minimization Strategy Technology o Technology risks are present throughout Quantas and must be addressed as a whole. o Technology risk management strategy can be developed and implemented to handle the risks o Key Performance Indicator (KPI) o Update actual baseline KPI’s achieved prior to handover. o It provides us a service level baseline against which to gauge IBM. o Service level agreement with IBM will be signed on improving benefits such as competitiveness and reducing risk.

Disruption Minimization Strategy Process o The process risks are all dependent on both Quantas and IBM to ensure that the system works. o Our customer is the highest priority o Identifying problem escalation procedures o Identifying coordination and resolution procedures o Documentation of the process.

Disruption Minimization Strategy People

Staffing Arrangement Staff control ◦ Negotiated transfer People transition ◦ Create new organizational chart ◦ Redraft job descriptions ◦ Reassign accountabilities ◦ Conduct training

Communication strategy Steering Committee ◦ Communication protocol ◦ Track transition status ◦ Dispute resolution Mode of Communication ◦ Weekly / monthly meetings ◦ Informal ◦ Video Conferencing

Knowledge Management Knowledge Transfer ◦ Conduct workshops ◦ Standard operating procedure (SOP) ◦ Database of information ◦ Documentation

Asset and Contract Management Asset Transfer ◦ Transfer of Ownership Intellectual Property protection and security provisions ◦ Secure movement of assets Ownership of 3 rd party contracts

Summary Plan ahead as early as possible Governance Framework ◦ Review meetings, evaluations & audits Ensure continuous business operations ◦ Risk Management ◦ Service Level Agreement (SLA)

Q & A Thank You !