4.3 Risk management in service and
support
The demand of the enterprise is not immutable and
frozen, the business objectives change along with its
own development, the contractors need to carry out
the efficient data tracking, meet the needs of
enterprises as far as possible in the premise of
ensuring feasibility, timely improve and optimize the
related issues in the development plan. First,
tracking the level of outsourcing services, the
business organizations of the enterprise sign relevant
agreements with outsourcing service providers, thus
to ensure that enterprise and service provider to
maintain consistency in business needs, priorities
and other aspects. The service level agreement
relates to the specific expectations of the business
organization for the system, in detail, the agreement
makes clear provisions on the service level
reporting, service level measurement, the cost and
other performance levels. Signing operation level
agreement with suppliers is to ensure that each
organization can obtain the most advanced
technology, so as to better meet the needs of the
service level. Enterprises need to organize regular
inspection activities to check the accuracy of the
service level agreement, so as to ensure the relevant
contents could effectively adapt to changes of
demand. Second, the continuous management for
outsourcing services, developing IT continuity plans
to prevent business disruptions due to system crash.
The plan needs to involve every key function of the
system, as well as the recovery priority of each
function, recovery methods and damage tolerance.
Information technology corresponds to kinds of
contract content and methods, such as the
development of information system, completion of
system delivery, the enterprise should be able to
independently ensure the orderly operation of the
system, etc. But if it comes to some special
industries, such as the financial sector, once the
system is in trouble, and even if only a very short
period of time, it still will cause incalculable
damage.
4.4 Risk management in supervision
and evaluation
After the implementation of information technology
outsourcing project, the security and availability of
the system has to be ensured, the information related
to the system is the valuable resource in the process
of enterprise’s operation. The internal audit is the
audit agency of information system built by the
enterprise in its interior, internal auditors can strictly
inspect and evaluate the security and stability of
electronic information system, and timely report the
final evaluation results to the management of the
enterprise. Internal audit institution of information
system is independent from every functional
department of the enterprise. The establishment of
COBIT-based management and audit model of
information system could help people to better
analyze and understand the information system, play
an important guidance role in building relevant
mechanism for people, and place all of the
construction of information system and application
in a certain control range. It can help the investment
and management staff of information system to
achieve the balance of investment and risk in
unpredictable conditions. By the management
control and audit, etc. it could provide effective
security and service activities for staff using
information systems. As for the auditor, it could
provide strong help and support on the audit trail, so
that the identification of the audit staff could be
more persuasive.
5 CONCLUDING REMARKS
In summary, we have known that, in the background
of current rapid development of information
technology, the demand of enterprise for information
technology continues to increase, in order to better
carry out various business work, enterprises could
choose to outsource the information technology,
which could not only effectively meet the
enterprises’ constantly updated needs for
information technology, but also reduce their own
business workload, so that it can focus more on the
core business activities. We deeply analyzed the
risks of COBIT-based information technology
outsourcing, and finally put forward the risk
management measures for specific risk, which are
expected to effectively meet the needs of enterprise
for information technology, and promote the further
development of the enterprise.
REFERENCES
Qianglin Z., Liping S., Risk management Information of
technology outsourcing based on COBIT. Technology
and Innovation Management. (5)572-575, 2010
Kun H., Risk management of whole life cycle of
information technology outsourcing project. Social
Science. (12) 44-49,2010
Risk Management of Information Technology Outsourcing based on Cobit
365