Books
in black and white
Main menu
Home About us Share a book
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Information Technology Outsorcing Transaction - Halvey K.J.

Halvey K.J. Information Technology Outsorcing Transaction - Wiley Publishing, 2005. - 649 p.
ISBN-10 0-471-45949-6
Download (direct link): informationoutsourcingtransactions2005.pdf
Previous << 1 .. 2 < 3 > 4 5 6 7 8 9 .. 116 >> Next

7.2 Due Diligence 359
(a) Employees Affected by Transition 359
(b) Compensation and Benefits Analysis 363
(c) Review of Severance/Redundancy Policies 363
(d) Outplacement Benefits 364
(e) Laws and Regulations 364
(f) Due Diligence Checklist 365
7.3 The Employment Offer 367
(a) Employees to Be Transitioned 367
(b) Vendor vs. Subcontractor Hiring 368
(c) Start Date 368
(d) Hiring Requirements 368
(e) Vendor Employment Agreement 369
(f) Base Salary 369
(g) Positions 369
(h) Minimum Employment Period 370
(i) Health Care Benefits 370
(j) Deductible/Co-payment Reimbursement 370
(k) Vacation 370
(l) Savings Plans 371
(m) Pension Plans 371
(n) Retiree Medical Benefits 371
(o) Severance/Redundancy 371
(p) Service Credit 372
(q) Tuition Aid 372
(r) Location 372
(s) Miscellaneous Benefits 373
(t) Work Hours 373
(u) Dress Code 373
(v) Performance Appraisals 373
(w) Replacements 373
(x) Human Resources Representative 373
(y) Administrative and Financial Responsibility 374
7.4 Communication and Transition Plan 374
7.5 Contract-Related Issues 375
(a) Representations and Warranties 375
(b) Indemnities 375
357
Contents xi
(c) Rights upon Termination of the Outsourcing Contract 375 7.6 Stay Incentives 376
Chapter 8 Information Privacy and Security Issues 383
8.1 Introduction 384
8.2 Selected Information Privacy Laws 385
(a) Background 385
(b) Services to the Financial Industry 386
(c) Services to the Health Care Industry 389
(i) HIPAA Privacy Rule 390
(ii) HIPAA Security Rule 392
(iii) HIPAA Penalties 394
(iv) HIPAA Business Associates Agreements and Outsourcing Issues 395
(d) Web Sites Collecting Information about Children 395
(e) Outsourcing Human Resource Functions 397
(f) Marketing and Customer Relations 399
(g) Monitoring Electronic Communications 400
8.3 Selected Information Security Laws 402
(a) Sarbanes-Oxley Act 402
(b) Required Security Practices: California Information Security Law 402
(c) Breach of Security: California’s Identity Theft Law 403
8.4 Company Privacy Policies 405
(a) Complying with Published Policies 405
(b) Restrictions to Transfer of Databases 406
(c) Federal Trade Commission and State Attorney General Offices 408
8.5 Outsourcing and Global Companies 409
(a) European Union and European Economic Area 410
(b) Restrictions to the Transfer of Databases 411
(c) Model Contracts: U.S. Safe Harbor 412
(i) Model Contracts 413
(ii) Safe Harbor as an Alternative to Use of Model Clauses 413
(iii) Binding Corporate Rules 414
(d) Information Privacy and Security Outside the EU and the EEA 414
8.6 Offshore Outsourcing 415
8.7 Practice Tips 417
(a) Evaluate the Needs and Potential Legal Liabilities 417
(b) Draft Appropriate Agreement 418
(c) Monitor Legal Developments 418
Chapter 9 Measuring Performance 419
9.1 Overview 419
9.2 Service Levels 419
(a) Objectives for Using Service Levels 420
(b) Establishing Service Levels 421
(c) Service-Level Agreements 422
(d) Excused Performance 423
(e) Innovative Service Levels 423
xii Contents
(f) Reporting 423
(g) Adjustment of Service Levels 423
(h) Remedies 424
9.3 Benchmarking 425
(a) Scope of Benchmark 425
(b) Organizations Used for Comparison 426
(c) Benchmarker 427
(d) The Process 429
(i) Timing 429
(ii) Underlying Data 429
(iii) The Results 429
(iv) Reports 429
(v) Dispute Resolution 429
(e) Alternatives to Benchmarking 430
(i) Technology/Price Indexing 430
(ii) Most-Favored-Customer Provision 430
(iii) Notification of New Technologies 430
(iv) Right to Competitively Bid 430
9.4 Customer Satisfaction 431
9.5 Gainsharing 431
Chapter 10 Transformational Outsourcing 441
10.1 Moving from A to C 441
10.2 Internal Considerations 443
10.3 Project Definition 445
10.4 Maintaining Multiple Environments 447
10.5 Using Subcontractors 447
10.6 Contract Terms 449
(a) Project Definition 449
(b) Project Plan 449
(c) Customer Responsibilities 449
(d) Implementation Schedule 450
(e) Right to Reprioritize or Delay 450
(f) Change Orders 452
(g) Installation 452
(h) Risk of Loss 452
(i) Cutover/Parallel Environments 453
(j) Acceptance Testing 453
(k) Failure to Pass Acceptance Tests 454
(l) Incentives 454
(m) Staffing 456
(n) Project Management 456
(o) Progress Meetings and Reports 456
(p) Hardware and Software 457
(q) Software and Data Conversion 457
(r) Documentation 457
(s) Training 457
(t) Payment 458
(u) Warranties 458
(v) Indemnities 458
(w) Proprietary Rights 458
(x) Third-Party Licenses 459
Contents xiii
(y) Right to Compete 459
(z) Marketing Arrangements 460
(aa) Additional Units 460
Chapter 11 Global Transactions 461
11.1 Overview 461
11.2 Contract and Legal Issues 464
(a) Preparing the Contract 464
(i) Contract Structure 464
(ii) Defining the Scope of Services 464
(iii) Identifying Service Locations 465
(iv) The Effective Date 465
(v) Liability 465
(b) Contract Governance and Approval Procedures 465
(i) Customer Governance 465
(ii) Vendor Governance 466
Previous << 1 .. 2 < 3 > 4 5 6 7 8 9 .. 116 >> Next