Business Process Outsourcing

745 Words2 Pages

Risk are a major disadvantage with the Business Process Outsourcing. Outsourcing of Information Systems such as may cause security risks both from the perspective of the privacy and communication. The risks and threats of outsourcing must be managed to achieve any benefits. There is main threat IS / IT outsourcing threat in order to according to their significance.

The hidden costs

When the reducing the cost is the objective of outsourcing, there is usually the early promise to cash flow interest and the long term of cost savings. There is two tendencies, however, that are of concern. Firstly, companies underestimating the costs associated with the identifying and assessing suitable IT vendors such as including the relocation of the setup costs, costs, maintenance costs in parallel or handoff more longer than expected and relocation costs.Secondly, companies with the management may be under the estimated costs. Some of the companies does not ever expected with the time and management resources, thus the costs must be put in. Companies are rarely record management costs.The cost of resulting from the disruption and lack of skill on the part of the vendor to respond in the fast. In appropriate ways, as the internal IS departments did at the start period of the contract is cost-shifting as well.The cost is associated with the control of the supplier and coordination the largest possible the hidden costs, such as those are implied examine that suppliers meet their contractual obligations and negotiating any of the necessary changes with them. In addition, after the outsourcing transition costs upon outsourcing contract expires and the client firm has decided to implement an internal IT activities again or change the supplier.

Los...

... middle of paper ...

...il attachments

E-mail is increasingly critical to the normal conduct of business. Organizations need policies for e-mail to help employees use e-mail properly, to reduce the risk of intentional or inadvertent misuse, and to assure that official records transferred via e-mail are properly handled. Even if you're certain they don't contain viruses, email attachments can cause you to lose data. Think about it: if you receive a document with the same name as one on your drive, and your email software is set to save attachments in the same location, you run the risk of overwriting the file that's already there. This often happens when you're collaborating on a document and send it via email. So make sure you set your email program to save attachments in a unique location, or, barring that, make sure you think twice before saving an email attachment on your hard drive.

Open Document