Software // Information Management
News
7/6/2005
03:25 PM
Connect Directly
RSS
E-Mail
50%
50%

Integrate Data From Business Process Outsourcing

Outsourcing can sink your reputation. Get a grip on the risks.

Over the last five years, corporate America has increasingly turned to outsourcing and offshoring to gain efficiency. Companies assumed that outsourcers could integrate people, processes and systems more efficiently and cost-effectively than they could achieve this integration on their own. In retrospect, however, many of these companies discovered that they didn't fully consider the risks of these relationships, even if they put stringent service-level agreements (SLAs) in place.

Perhaps processes were outsourced because the management and execution activities were viewed as undifferentiating. Yet as mundane or complex as they may seem, your business processes are often directly connected to the brand value and reputation of your company. Many seemingly isolated processes actually touch crucial business relationships or can impair your ability to live up to corporate legal responsibilities. In some cases, processes can actually define your position in an industry.

Outsourcing can damage shareholder value and your business reputation because it shifts responsibility to a third party and introduces risk. Commonly outsourced processes and functions include accounts payable and receivables, outbound call centers, return merchandise authorization, service activation and service, and new product sales, to name just a few. Once these roles and tasks are no longer under your control, you may have a problem long before you realize it. Accountability is far more difficult to achieve when outsourcing is in place—SLAs notwithstanding.

In an example that points to a potential impact on brand value, Dell—which has one of the most efficient supply chains in the world—has outsourced aspects of its account management and purchase requisition processes to an offshore service provider. The simplest tasks of consolidating accounts and invoices and processing address changes are now sent overseas to India. These seemingly innocuous changes have introduced delays and made it more difficult for Dell to maintain its reputation for high-quality customer service.

In some cases, regulation makes outsourcing particularly risky. Laws such as HIPAA, for example, require greater process oversight to protect medical information. Health care providers are outsourcing tasks such as medical transcription, and insurers are outsourcing claims processing, predominately to India, yet there are no requirements for these service providers to comply with U.S. regulations under Indian law. How can this data be monitored and securely integrated into a single enterprise view if the underlying processes are outsourced?

Most organizations that outsource don't have visibility into and don't require notification of critical events within their outsourced business processes. Nor do most outsourcers offer BI systems with performance metrics that can be shared. Worse still, data management and integration activities required for business or regulatory reasons are often inefficient or missing. In fact, in most cases, the data provided from an outsourcer is manually assembled and transmitted or shipped as an extract. Sometimes the data is copied, pasted and manipulated in spreadsheets. This, of course, is a significant problem because there's no insight into where the data originated or what happened to it once it was placed in the spreadsheet. This is a common problem in order fulfillment, customer service resolution and even accounting processes that are outsourced.

Business process outsourcing is here to stay, so we can only focus on improving its performance and on understanding related risks. How can you ensure that you've considered and addressed the risks? Start by committing more time and resources to gaining direct insight into your outsourced business processes. Reassess SLAs and technology infrastructures to ensure visibility, and reexamine the outsourcers themselves to identify financial and business risks. Your efforts will be well worth it.

Use an independent consultant to assess your service provider's systems, your own systems and your data integration practices. In particular, determine your current service level and whether your operational data and metrics are accurate and secure. Lastly, take more direct responsibility for your business processes and for the secure integration of data back into your information systems. The ability to monitor and measure processes inside and outside the enterprise is strategic—and vital—to your business and its reputation.

Mark Smith is CEO and Senior Vice President of Research at Ventana Research. Write to him at mark.smith@ventanaresearch.com.

Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.