Characteristics of a Robust Process

Similar documents
Incident Management Process

Project Selection. Request for information systems are typically motivated by one of the following three general objectives :

Incident Management Process

ISACA Systems Implementation Assurance February 2009

Estimating the Cost of Enterprise Software System Implementations: It s Often Buyer Beware. White Paper. Ben Harrison, MAVERICK Technologies

Introduction to Systems Analysis and Design

CHAPTER 7: BUSINESS SKILLS FOR TECHNICAL PROFESSIONALS

Organizing For Systems Management

a physicians guide to security risk assessment

Intro & Executive Summary

By Merit Solutions August, 2015

Process Scalability: Practical Approaches to Reducing Manual Effort and Risk in the Close, Consolidate and Reporting Cycle

Contract Management in the Age of Digital Transformation: Improve your Processes for Better Business Outcomes. A Frost & Sullivan White Paper

E2-E3: MANAGEMENT. CHAPTER-3 PROJECT MANAGEMENT (Date of creation: )

An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements

Microsoft REJ Framework: Step by Step

Understanding and Mitigating IT Project Risks BY MIKE BAILEY AND MIKE RIFFEL

BUSINESS INTELLIGENCE: IT S TIME TO TAKE PRIVATE EQUITY TO THE NEXT LEVEL

Benefits of a Service Level Agreement with Upfitters

Chapter 4 Project Management

Standards Development and Modification

THE FAST TRACK APPROACH PROCESS DOCUMENTATION , The Fast Track Group, LLC, All Rights Reserved

In Control: Getting Familiar with the New COSO Guidelines. CSMFO Monterey, California February 18, 2015

Information Technology Scope & Approach Instructions

Metrics-Based Approach to Achieving Sustainable Energy Conservation

The Benefits of a. PRO & CON ANALYSIS Service Level Agreement with an Upfitter BY MIKE ANTICH

A Guide for Writing S.M.A.R.T. Goals

Your committee: Evaluates the "tone at the top" and the company's culture, understanding their relevance to financial reporting and compliance

integrate 2 Business Process Redesign: Business Process Recommendations Position Description/Classification May 31, 2013

Vertex Enterprise for VAT Data Collection, Compliance and Analytics. 12 April :10 15:45 (CEST)

Sarbanes-Oxley Act of 2002 Can private businesses benefit from it?

OPPORTUNITY PROFILE Chief Operating Officer

Introduction. Table of Contents

CHAPTER 2: IMPLEMENTATION PHASES AND OFFERINGS

TECHNOLOGY SUPPORT SPECIALIST (12264)( )

Achieve greater efficiency in asset management by managing all your asset types on a single platform.

Measuring and Improving Process Capabilities Best Practices

System Development Life Cycle (SDLC) Project

In this unit we are going to speak about Business Process Reengineering and its relationship with Information Technologies Business Process

STREAMLINE YOUR WORKFLOW TO INCREASE EFFICIENCY

Project Management Advisory Board Deep Dive Study of Program Management

WHAT DO YOU NEED TO KNOW ABOUT SOFTWARE MAINTENANCE

White Paper. Managed IT Services as a Business Solution

It will also enable you to manage the expectations of your clients or management, as they will know exactly what to expect.

Ready, Willing and Able The front line change readiness model

Compliance Program Effectiveness Guide

SMART Goals: A How to Guide

METHOD DEVELOPMENT AND APPLICATION TO STANDARD TEST METHODS AN ANAL YTICAL APPROACH TO STANDARD PERFORMANCE TESTING OF PSA TAPES

ITSM Process/Change Management

Achieve Powerful Business Benefits by Streamlining Document Workflows

Quality Assurance / Quality Control Plan

Expert Team on Centre Audit and Certification. Wellington. 1 4 October 2018

TECHNOLOGY SUPPORT SPECIALIST (12264)( )

Quality Manual ISO 9001:2015 Quality Management System

Building a Business Intelligence Career

Are You a Modern Distributor?

MBF1413 Quantitative Methods

Customer Value Management

<Project Name> Business Case

BEST PRACTICES IN AP AUTOMATION

ISO 9001:2015. Quality Manual Template.

ROAD MAP. Road Map Avoiding 11 Pitfalls of System Conversions

CHAPTER 5 INFORMATION TECHNOLOGY SERVICES CONTROLS

Defining Requirements

Data Processing 101 Featuring: The First Ten Steps to Implementing Best Practices & The Five Major branches of IT Disciplines

IT Information Systems & Technology. BIT 1 ST YEAR SEMESTER 1 University of Colombo School of Com puting. Student Manual

Internal controls over Financial Reporting Key concepts. Presentation by Jayesh Gandhi at WIRC

VALUE FOCUSED DELIVERY

SOX 404 & IT Controls

Achieving Application Readiness Maturity The key to accelerated service delivery and faster adoption of new application technologies

22 ways to get the most out of OEE and lean manufacturing disciplines

Chapter 14: Systems Development

6. IT Governance 2006

Project Remedies Solution Set s Ability to Transform your IT Organization. A Selection of Use Cases from Project Remedies Inc.

Appendix Project Management Templates

Building a Winning Business Case for HCM SaaS

CHAPTER 1. Business Process Management & Information Technology

Management Update: The Sourcing Life Cycle Can Be Key to Business Operations

CERT Resilience Management Model, Version 1.2

ISO 9001:2000 Drives Process Changes at Siemens

Test your Understanding-The Answers

Risk Advisory SERVICES. A holistic approach to implementing effective governance, managing risk and maintaining compliance

Solution Evaluation. Chapter Study Group Learning Materials

THE BEST POS FOR GUN STORES AND RANGES!

Introduction to IT Governance. IT Governance CEN 667

8 Critical Success Factors When Planning a CMS Data Migration

Crowe Caliber. Using Technology to Enhance AML Model Risk Management Programs and Automate Model Calibration. Audit Tax Advisory Risk Performance

Management Information Systems. B14. Acquiring IT Applications and Infrastructure

Thomson Learning DOCUMENTING ACCOUNTING SYSTEMS LEARNING OBJECTIVES

TABLE OF CONTENTS DOCUMENT HISTORY

CENTRE (Common Enterprise Resource)

pwc.co.uk Enterprise Risk Management

WHITE PAPER. The Business Architecture Practice. February Whynde Kuehn, S2E Consulting Inc., USA

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

ROAD MAP TO CONFIDENT PROCESS MAPPING USING FLOW CHARTS

Accelerating Open Solutions Inc. TCBS/TCCUS Processing through Enhanced Automation

Tips for Reducing the Total Cost of Ownership of Oracle E-Business Suite

Testing 2. Testing: Agenda. for Systems Validation. Testing for Systems Validation CONCEPT HEIDELBERG

The most commonly applied model for designing and auditing internal

Internal Audit Policy and Procedures Internal Audit Charter

Transcription:

Characteristics of a Robust Process By Rich Schiesser: In Conjunction with Harris Kern s Enterprise Computing Institute One of the distinctions that separate world-class infrastructures from those that are just marginal is the robustness of their processes. In this article we examine how to develop robust (well-designed) processes for maximum effectiveness. What a process being truly robust exactly means and what characteristics are inherent in such a process? In the Table below we list 24 of the most common attributes of a robust process and then discuss each of them in detail. We discuss in detail the 24 characteristics common to any well-designed robust process. Characteristics of a Robust Process 1. Process Objective Identified 2. Executive Sponsor Identified and Involved 3. Process Owner Identified; Given Responsibility For and Authority Over the Process 4. Process Inputs Identified 5. Process Suppliers Identified and Involved 6. Key Customers Identified and Involved 7. Secondary Customers Identified and Consulted 8. Process Outputs Identified 9. Process is Described by a Sound Business Model 10. Process Hierarchy is Understood 11. Execution is Enforceable 12. Designed to Provide Service Metrics 13. Service Metrics Recorded and Analyzed, Not Just Collected 14. Designed To Provide Process Metrics 15. Process Metrics Recorded and Analyzed, Not Just Collected 16. Documentation is Thorough, Accurate, and Easily Understood 17. Process Contains All Required Value-Added Steps 18. Process Eliminates All Non-Value-Added Steps 19. Process Guarantees Accountability 20. Process Provides Incentives for Compliance, and Penalties for Avoidance or Circumvention 21. Process is Standardized Across All Appropriate Departments and Remote Sites 22. Process is Streamlined As Much As Possible and Practical 23. Process is Automated Wherever Practical But Only After Streamlining 24. Process Integrates With All Other Appropriate Processes

1. Objective Identified The overall objective of the process needs to be stated, written down, shared with all appropriate parties, and agreed to and clearly understood by all process design participants. The objective should answer the questions of what problem will the process solve, which issues will it address and how will the process add value and quality to the environment. 2. Executive Sponsor Identified and Involved Each process needs to have an executive sponsor who is passionate about the successful design and ongoing execution of the process. This person provides support, resources, insight and executive leadership. Any required participation or communication with other groups, either inside or outside of the infrastructure, is typically arranged by the executive sponsor. This individual is often the manger of the process owner. 3. Process Owner Identified; Given Responsibility For and Authority Over the Process This person will lead the team that designs the process, identifies the key customers and suppliers of it, and documents its use. On an ongoing basis the process owner will execute, communicate, and measure the effectiveness of the process. 4. Key Customers Identified and Involved Key customers are those individuals who are the immediate users and direct beneficiaries of the process. For example, suppose you designing processes to request the re-print of a report or the restoration of a file. Key customers for these processes may be users who are most likely to request these services on a regular basis. Their involvement in developing the process is important to ensure practical design and ease of use. 5. Secondary Customers Identified and Consulted Secondary customers are those that may use a process less frequently than primary customers, or may be the eventual rather than immediate beneficiaries of the process. In the above example, if administrative assistants are making the original requests for re-prints or restorations, then their managers are likely to be the secondary customers of the process. Their consultations can be helpful since they may be the ultimate users of the process. 6. Process Outputs Identified These are the specific deliverables or services being provided to the primary and secondary customers. The quality of the delivery and content of these outputs is usually measured with Service Metrics. 7. Process Inputs Identified These are the specific input entities required by the process. They may take the form of soft inputs such as data, information or requests, or may be hard inputs such as diskettes, tapes, or other physical entities. 8. Process Suppliers Identified and Involved Process suppliers are the individuals who provide the specific inputs to a process. These suppliers may be internal to an IT infrastructure such as data entry departments. They may be external to an IT infrastructure but internal to IT as with a development group inputting change requests. They may be external to IT but internal to a company as with an outside user group supplying report modification information. Process suppliers may also be external to a company such as hardware and software vendors who may provide details about how an upgrade is to be performed.

9. Process is Described by a Sound Business Model In simple terms, a robust process should make common business sense. The benefits of using the process should exceed the cost and efforts expended to design, execute and maintain the process. The business side of a robust process sometimes involves leasing agreements, maintenance agreements, and Service Level Agreements (SLAs). 10. Process Hierarchy is Understood Some processes have secondary, or sub-processes, underneath them. Individuals who are developing well-designed robust processes know and understand the relationships between the primary and secondary processes. 11. Execution is Enforceable Most any process, regardless of design, needs to be enforced to be effective. Whenever possible and practical, software techniques such as passwords, authorizations, audit trails, or locks, should be used to enforce compliance with a process. When technical enforcement is not practical, management support, review boards, metrics or other procedural techniques should be used to ensure enforcement.. 12. Designed to Provide Service Metrics Most processes measure something associated with its output. Often it involves a quantitative measure such as transactions processes per second or jobs completed per hour. In addition to these, a robust process also focuses on qualitative measures that are oriented toward the end-user. These metrics show the relative quality of the service being provided. For example, service metrics involving a report delivery process may include not only how often the report is delivered on time, but also whether it was delivered to the right individual, in the correct format, with accurate content, and on the proper media. Service metrics should measure the benefits of the process to the end-users in their own terms. The metrics should be customer-oriented and focused on measuring right thing; in a word, these metrics should exhibit effectiveness. 13. Service Metrics Compiled and Analyzed, Not Just Collected Mediocre infrastructures often invest a fair amount of time, energy and cost to collect and compile metrics, but do little to analyze them. The real value of meaningful measurements come from thoroughly and consistently examining them for trends, patterns and relationships, and then applying the results of the analysis to improve the effectiveness of the particular service being measured. 14. Designed To Provide Process Metrics Robust processes not only have service metrics associated with them but process metrics as well. The key difference between a service metric and a process metric is that a service metric focuses on how effective a process is in regards to a customer, while a process metric focuses on how efficient a process is in regards to a supplier. A process metric indicates the productivity of a procedure by measuring such things as resources consumes or cycle times. The frequency that reports are delivered on time is a service metric since it measures the end-result of the process. The number of times the report had to be re-printed to obtain acceptable quality is a process metric since it measures the amount of effort required to produce the end product. Abnormal ending

of job processing, re-routing of problems, rerunning of jobs, reprinting of reports and restoring of files are common examples of process metrics. This characteristic reinforces the notion that process metrics should be supplier-oriented and focused on measuring the entity right rather than measuring the right entity. In a word, these metrics determine efficiency. The Table below summarizes the differences between service and process metrics. Differences Between Service and Process Metrics Service Metric Process Metric Focuses on the Customer Focuses on the Supplier Measures Levels of Effectiveness Measures Levels of Efficiency Deals with the Quality of Output Deals with the Quality of Input Examples include: Examples include: - system availability - job and transaction throughput - response times - elapsed cycle times - accuracy of content - quantity of resources consumed - ontime delivery - abnormal job terminations - network access - re-routing of problems - database integrity - reruns, reprints, restores 15. Process Metrics Compiled and Analyzed, Not Just Collected Just as service metrics need to be compiled and analyzed, so also do process metrics. The importance of analyzing missed process metrics is often overlooked when the associated service metrics are met. This could be the case in terms of a service metric involving output delivery being met even though numerous re-processing of the job and its output were required. As with service metrics, the real value of meaningful process metrics come from thoroughly and consistently examining them for trends, patterns and relationships, and then applying the results of the analysis to improve the efficiency of the particular service being measured 16. Documentation is Thorough, Accurate, and Easily Understood Documentation is one of the fundamentals that clearly separate mediocre infrastructures from truly world class ones. Well-written documentation facilitates the training, maintenance and marketing of key processes. Progressive shops hold appropriate staffs accountable to reading and understanding key documentation by making it part of their performance reviews. These shops also have new employees test the clarity and readability of the writing while ensuring that senior analysts and technical leads have validated the accuracy of the material. Thorough documentation eases the tasks of verifying that all required valueadded steps are present and that all non-value-added steps have been eliminated.

Effective documentation can come in various forms and can be evaluated in various ways. Some of these forms include online and hardcopy narrative procedures, diagramed illustrations such as flowcharts or bubblecharts, and web-enabled help menus. 17. Process Contains All Required Value-Added Steps Using a legal analogy, value-added steps are to a robust process just as truths are to a credible witness s testimony. The process should contain the value-added steps, all of the value-added steps, and nothing but the value-added steps. Two key attributes of a robust process are those of effectiveness and efficiency. Process effectiveness means that all existing steps are adding value to the end result. Key customers, suppliers and process owners should meet prior to and after development of the documentation to identify all value-added steps and to ensure they are all appropriately inserted within the final process. 18. Process Eliminates All Non-Value-Added Steps If a step is not directly contributing value to the overall objective of the process, it should be eliminated. This attribute is critical to eventually automating the process. Two activities are required to completely eliminate all non-value-added steps. First, all steps in a process, regardless of how small and even if previously undocumented, need to be identified. This comprehensive list of the exact steps of a procedure is commonly referred to as the informal process. The next section discusses the differences and significances between a formal and informal process. Second, an extremely critical evaluation of each of these steps needs to be conducted with an eye toward eliminating any steps not directly contributing to the desired output of a process. 19. Process Guarantees Accountability Process metrics, performance charts and trending reports should be used to quickly identify when a department or an individual is not following the prescribed procedure, with direct feedback to, and consequences from, management. In order for this to work the process designers and owners need to provide management sufficient tools to carry out their enforcement. Management, in turn, needs to follow up with fair, timely and appropriate actions to ensure process compliance in the future. 20. Process Provides Incentives for Compliance, and Penalties for Avoidance or Circumvention One of the most effective incentives for compliance is efficiency. If going around a process takes more effort and a longer time than going through it, most employees will follow the shortest and simplest path and use the process. The challenge is to remove the obstacles normally associated with using a process, and to insert roadblocks for circumvention. Properly streamlining and then automating a process can encourage its use. Security measures such as passwords and locks, and management measures such as exception reports and accountability, can discourage circumvention. 21. Process is Standardized Across All Appropriate Departments and Remote Sites Some processes may have been developed at different remote sites at different times and consequently have slightly different standards of implementation. For example, one of my clients had an older change management process at a remote site based on an email system and a newer version at the central site based on an Access database system. Before either process could be optimized an agreed standard needed to be reached which it was. Non-standard processes often came into play as a result of acquisitions,

mergers or takeovers. Implementing an agreed upon standard is often a much easier technical challenge than the more difficult political challenge of actually reaching consensus. 22. Process is Streamlined As Much As Possible Streamlining a process involves removing all non-value-added steps, eliminating redundant steps, placing the steps in the most efficient sequence possible, and streamlining individual steps as much as possible. For long established processes this may be difficult to accomplish due to users being deeply entrenched in inefficient practices. Three of the most common responses to the question as to why a particular process cannot or should not be changed is are: We ve always done it that way. It seems to work most of the time so why bother changing it. Analyst X designed this process and only he or she can change it. (even after analyst X has left the department) These explanations are not adequate justifications for keeping a process the same when improvements through streamlining are clearly warranted. Once non-value-added steps are removed, streamlining should proceed by eliminating redundant steps, placing the steps in the most efficient sequence possible and streamlining individual steps as much as possible. 23. Process is Automated Wherever Practical But Only After Streamlining Automation can end up being either beneficial or detrimental depending on how the automation is designed and implemented. Due to the importance and complexity of this attribute, it is discussed in more detail in the next section. 24. Process Integrates With All Other Appropriate Processes Several processes within Systems Management are naturally complimentary to each other. For example, problem and change management are separate disciplines but often rely on each other for optimum effectiveness. Similarly, performance/tuning and capacity planning are almost always closely related to each other.