Sie sind auf Seite 1von 9

Feature

Risky business?
Evaluating and managing risk on outsourcing

Mike Rebeiro and Radford Goodman of Norton Rose LLP review some
of the key risks on outsourcing, and how businesses can address and
manage such risks.
Illustration: Getty Images
The accounting fraud at Satyam Com-
puter Services (Satyam), where Satyams
chairman admitted that its accounts had
been overstated by some $1 billion, was
Indias biggest ever corporate scandal,
and shook the confidence both of in-
vestors and of companies outsourcing
their services (customers) in the offshore
outsourcing sector as a whole.

The affair has brought into sharp focus


the wider risks of outsourcing, particu-
larly in relation to supplier perform-
ance, and forced many businesses to ex-
amine the integrity of their outsourcing
arrangements. Outsourcing deals where
customers have taken an unrealistic ap-
proach to risk are more likely to end in
renegotiation or termination than those
with a more balanced approach to the
apportionment of risk and reward.

This article reviews some of the risks


inherent in outsourcing transactions
and considers how businesses undertak-
ing an outsourcing can evaluate, appor-
tion, price and manage such risks.

EVALUATING RISK
There are many types of risk which
should be addressed in any outsourcing
arrangement. For the customer, these
generally include: service failure; project
delay; business disruption; regulatory
risk; breach of security; data loss; dam-
age to reputation; employee liabilities
(for example, under the Transfer of Un- plier insolvency; damage to business re- ployee liabilities, see feature article
dertakings (Protection of Employment) lationships; damage to property; and Outsourcing: the commercial issues,
Regulations 2006 (SI 2006/246)); sup- loss of revenue (for background on em- www.practicallaw.com/1-201-8559).

PLC October 2009 www.practicallaw.com 39

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

In assessing risk, it is essential to iden-


tify those particular risks which are as- Risk evaluation: best practice
sociated with the outsourcing project
and to decide what level of risk is ac- Companies outsourcing their services should bear the following points in mind when
ceptable (see box Risk evaluation: best embarking on an evaluation of the risks inherent in any particular outsourcing:
practice). Customers must also gauge
the probability of identified risks occur- With the help of advisers, identify risks at the outset of the contract, before the invi-
ring and assess what their impact would tation to tender is issued. This is best achieved using a written risk register (see box
be on their business, as even if a risk is Risk register).
highly probable, its effect on the busi-
ness may be negligible. Once identified, evaluate the risks as to the likelihood of the risk arising and the
damage caused if the risk materialises.
Keeping track of risks identified and the
measures taken to mitigate them can be Consider allocating a risk manager to the project team.
difficult, particularly where the pace of
negotiations accelerates towards the end Once the contract has been executed, treat risk reporting as an integral part of proj-
of the procurement exercise. For this ect governance.
reason, it is vital that the parties main-
tain and update a risk register so that
each risk can be managed as negotia-
tions progress (see box Risk register). Security issues are closely tied to regula- Professional services firms are special-
tory risk: witness the Financial Services ists in understanding and evaluating in-
Sector-specific risk evaluation Authoritys imposition of substantial solvency risk and have a sophisticated
While suppliers often adopt similar ap- fines on banks and insurance firms approach to mitigating risk in this area.
proaches to the risks they face (for exam- which have lost client data. For exam- As a consequence, supplier insolvency is
ple, non-payment, recovery of costs, ple, in 2007, Nationwide Building Soci- not a risk which tends to rank as highly
damage to their reputation), an analysis ety was fined 980,000 over security as other risks.
of customer views across industry sec- breaches following the theft of a laptop
tors shows that customers do not all at- (www.practicallaw.com/8-242-0104) Communications, media and technol-
tach the same degree of importance to a and Norwich Union was fined 1.26 ogy. The communications, media and
particular type of risk. million for security lapses which lead to technology (CMT) sector has a client
its customers being subject to identity base which demands an uninterrupted
Banking and insurance. Insurance com- fraud. delivery of services. The impact of failure
panies and banks operate in a similar to deliver is therefore more immediately
business and regulatory environment, Professional services. While not subject felt, so that a CMT businesss failure to
and so have a similar approach to risk. In to the same extensive regulatory regime deliver consistently and on time will be
these sectors, customers rank security, as the financial services sector, profes- particularly damaging to its reputation.
regulatory issues and reputational dam- sional services firms are required to de- CMT customers also tend to be more fo-
age as the highest risks. Insurance com- liver to their own clients a discreet, se- cused on relationships with consumers
panies rate data loss as another primary cure and timely service. A failure to do rather than with other businesses.
risk, while banks also focus on loss of so could lead to irreparable damage to
revenue. their reputation. Transport. The main risks to transport
companies businesses are failure to
Both sectors need to be able to demon- Businesses in the professional services process orders and reservations, and fail-
strate to their regulators that any con- sector rank data loss, breach of security, ure to transport clients and goods safely
tractual arrangement for the provision of reputational damage and damage to and on time. As a result, this sector tends
outsourced services minimises opera- business relationships as primary risks. to rate service failure, project delay, repu-
tional risk (see box Regulatory frame- As with firms in the financial services tational damage and business disruption
work for banking and insurance out- sector, the risks faced by professional as its primary risks. Limiting risks aris-
sourcing). This is especially so in the services firms need to be minimised from ing from these issues is best done by
banking sector, where the effective man- the outset, starting with a thorough due maintaining a positive relationship with
agement of risk has a direct impact on diligence process. After that, they need the supplier, coupled with an effective
capital adequacy requirements under the the outsourcing contract drafted to en- service level agreement which details ob-
Basel II capital framework (for back- sure that operational risks are min- jective and quantifiable criteria expected
ground on these sectors, see feature arti- imised, and effective project governance from suppliers, and remedies for failure
cle Outsourcing: sector-specific issues, to ensure that any issues are picked up, to meet service levels that will adversely
www.practicallaw.com/0-201-9998). and dealt with, promptly. affect the customers business.

40 PLC October 2009 www.practicallaw.com

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

Industrial. Industrial customers tend to


view service performance failure as the Risk register
main threat to their business. If they are
not able to run their manufacturing or A risk register is an invaluable tool which allows both companies outsourcing their services
other facilities, this will have an immedi- (customers) and suppliers to identify risks and the strategies required to mitigate them. The
ate impact on their business: they will risk register should allow each party to:
suffer a loss of production, with a corre-
sponding downturn in revenue and Identify and work through the risks presented by an outsourcing project in some detail.
profit. Unlike all the other sectors, they
do not rank reputational damage and Consider and record desired risk allocations before contracts are drafted.
regulatory issues as key risks. Industrial
customers are less heavily regulated, and Consider and record both contractual and operational mitigation strategies against each
it is less likely that one event would cause risk.
catastrophic damage to their reputa-
tion. However, industrial customers do Record negotiation positions on each risk, together with the status (for example, in red,
regard supplier insolvency as a high risk amber and green) of the risk, with the objective of downgrading the status of high sever-
which reflects the nature of the supply ity risks throughout the procurement process by ensuring that such risks are properly
chain specific to this sector. managed.

APPORTIONING RISK More sophisticated risk registers operate electronically and produce reports on the position
Having ascertained what risks the cus- adopted against each risk, which may be presented to senior management. These registers
tomer faces, the parties must agree dur- may also create links from the recorded risk to the relevant clause in the draft contract,
ing negotiations who will be liable if a which facilitates easy access to the document and any changes which need to be made.
risk materialises and damage is suffered
as a result. Questions around the type A risk register allows customers to take a more informed view as to how risk should be man-
and level of liability to be accepted by aged and the value of including or omitting certain contractual provisions. It may also help
suppliers or customers are ultimately the project team to develop a more balanced long-term contractual relationship between
commercial questions that cannot be di- customers and suppliers.
vorced from the issues of risk and price
management.
age and back up) (see box Risk alloca- processes, and customers must consider
Customers in different industry sectors tion: checklist). how risks can be minimised and whether
are prepared to accept different levels of they are best placed to manage such risk.
risk (see above). In addition, customers PRICING RISK They can also ask suppliers to bid
and suppliers have different views on the Suppliers operate sophisticated models against different risk profiles during the
apportionment of risk; in some cases, for pricing risk. Asking them to accept tender process to obtain a clearer idea of
customers are prepared to take a greater an unbalanced proportion of risk will how different risk apportionment will
responsibility for the management of have a direct impact on the level of be priced (for background on the tender
more types of risk than suppliers would charges. For example, imposing five dif- process, see feature article Outsourc-
otherwise believe. ferent contractual remedies to manage a ing: the commercial issues, www.prac-
single risk where one remedy would suf- ticallaw.com/1-201-8559).
Customers must consider how risks can fice will inevitably lead to an increase in
be minimised and whether they or the the price imposed by the supplier. Like- RISK MANAGEMENT STRATEGIES
supplier are best placed to manage wise, the transfer to the supplier of Risk cannot be eliminated, but it can be
them, through appropriate contractual those risks which would be better man- properly managed. Customers have a va-
provisions and operational processes aged by the customer will also increase riety of risk management tools available
(see Risk management strategies be- the price. to them, and need to consider which are
low). Customers need to be realistic in the most appropriate. Over-reliance on
their approach to risk: there are some Having a good supplier understanding one risk management tool is unhelpful:
risks that should not simply be allotted of legal and operational risk is therefore spreading such tools can lead to the
to the supplier (for example, where the important to pricing contracts; suppli- avoidance of technical and business
risk is within the customers control, ers need to have an overview of relevant problems or their resolution at an early
such as the risk of infringing a third risks, the likelihood of the risk material- stage, saving both time and money.
partys intellectual property rights in re- ising and the resulting damage before However, it is only by working together
spect of materials provided by the cus- they can attribute a proper cost to carry- with the supplier that risk can be man-
tomer, or loss of data where the cus- ing such risk. This must be borne in aged effectively (see box Risk manage-
tomer retains responsibility for its stor- mind when customers run tender ment strategies: checklist).

PLC October 2009 www.practicallaw.com 41

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

mind, this is very often not the case in


Regulatory framework for banking and insurance practice.
outsourcing
Too often, senior management and
There are various regulatory requirements which banking or insurance companies other members of the procurement team
should bear in mind when considering outsourcing: leave the negotiation of liability and ter-
mination provisions to lawyers, without
Notification. Banks and insurance companies must notify the Financial Services Au- input from the business. Moreover, one
thority (FSA) of proposed outsourcing arrangements and significant changes to out- cannot look at these clauses in isolation
sourcing arrangements (15.3.1R and 15.3.8G(1)(e), Supervision (SUP), FSA Hand- from the rest of the contract or the busi-
book). ness: only the business can assess what
effect a breach will have, what loss will
Systems and controls. If a bank is outsourcing critical functions, it must take reason- be suffered, and if (and how) such a
able steps to avoid undue operational risk. It must also not outsource important opera- breach can be remedied.
tional factors in such a way as to impair materially the quality of its internal control and
the FSAs ability to monitor the banks compliance with its obligations under the regu- Key performance indicators and service
latory system (8.1.1R, Senior Management Arrangements, Systems and Controls level agreements. It is essential to set the
(SYSC), FSA Handbook). Banks must also exercise due skill, care and diligence when standard of the services performed by
entering into, managing or terminating any arrangements for the outsourcing of criti- the supplier. Key performance indica-
cal or important functions (SYSC 8.1.7R), and ensure compliance with a number of tors (KPIs) and service level agreements
specific conditions set out in SYSC 8.1.8R. (SLAs) are terms which are often used in-
terchangeably, but are usually distin-
Where a bank outsources critical or important functions, it remains fully responsible guished by the type of remedy which ap-
for discharging all of its regulatory obligations and must comply with a number of con- plies if there is a failure to meet the KPI
ditions set out in SYSC 8.1.6R. It must have a written contract in place with the sup- or SLA. For instance, breach of an SLA
plier which clearly allocates the rights and obligations of each party (SYSC 8.1.9R). may trigger the requirement for a meet-
It must also make available to the FSA on request all information necessary to enable ing or a report, while breach of a KPI
the FSA to supervise the arrangements regulatory compliance. may trigger a service credit (a deduction
from the contract price payable by the
The outsourcing rules applicable to insurance companies are located mainly in SYSC customer in response to the suppliers
13 and 14. failure to meet a service level). Persistent
failure to meet an SLA may mean it is
promoted to being a KPI, while a persist-
Due diligence compensation (see Third party guaran- ent failure to meet a KPI may trigger a
Selecting the most appropriate supplier tees below). Moreover, in the current termination event.
for the project can reduce risk substan- market, some customers are also carry-
tially. It is incumbent on a customer to ing out due diligence on the key supplier KPIs and SLAs need to be identified at
devise a due diligence process that will personnel who will be involved in the the business case planning stage and
properly test and evaluate potential sup- outsourcing project. A project manager should be included in the invitation to
pliers. A successful due diligence exer- who has misrepresented his qualifica- tender (ITT). Suppliers can then be
cise should not be just a paper exercise: it tions may demonstrate a lack of in- scored against their ability to achieve
should involve visiting potential suppli- tegrity which could be fatal to a project. KPIs and SLAs. Customers should be
ers, testing technology and speaking to careful that they do not include unneces-
other customers of the supplier. It is also Contract sary KPIs and SLAs in the ITT as this
important for customers to consider soft The outsourcing contract itself is gener- may have an adverse impact on charges
issues such as cultural fit. ally regarded as the most effective risk (see Pricing risk above).
mitigation tool. However, in practice,
Since the Satyam scandal, the financial industry has become over-reliant on Service credits. Claiming service credits
aspects of due diligence are under standard form documents and provi- is often viewed as a last resort; in reality,
greater focus to ensure that the prospec- sions which do not bear any resemblance many customers doubt whether they of-
tive supplier is solvent, and will have the to the specific risks at hand. It is not pos- fer any substantive remedy from a busi-
resources to remain solvent during the sible to have a one size fits all out- ness perspective. Moreover, their inclu-
term of the contract. Supplier responses sourcing contract. While it may appear sion in the contract will increase price.
should be challenged and not accepted trite to say that the draftsman needs to While it is self-evident that suppliers do
at face value. Concerns may be resolved have a full understanding of the project- not wish to lose revenue through service
by the suppliers parent company guar- specific risks and that the contract credits, the requirement that the sup-
anteeing performance and/or financial should be drafted with those risks in plier make a payment to the customer

42 PLC October 2009 www.practicallaw.com

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

not, the costs of managing their applica-


Risk allocation: tion could outweigh their benefit. Risk management
checklist strategies: checklist
Liquidated damages. Liquidated dam-
When deciding how to allocate risk, ages are a determined sum which the When considering risk management
customers should: parties agree will be payable on the spec- strategies, customers should:
ified default of one party. Under English
Before engaging in a tender law, they must be a genuine pre-estimate Once risks have been identified,
process, clearly identify the risks of a customers loss (Dunlop Pneumatic consider how these can be man-
associated with the project. Con- Tyre Co ltd v New Garage and Motor aged and which risk management
sider the risks arising at each stage Co ltd [1915] AC 79). tools are most appropriate. Risk
of the tender, contract negotiation analysis can be shared with the
and delivery. In outsourcing contracts, liquidated supplier.
damages are used most commonly as an
Maintain a risk register throughout incentive for timely performance; if a Conduct thorough due diligence on
the project, identifying how risk project (such as the implementation of a their sourcing partners financial,
can be mitigated as the project service or a computer system) runs late, legal and, most importantly, opera-
continues (see Risk register). liquidated damages will become payable tional status.
for the period of the delay. If a delay in
Consider whether risk can be best the project would lead to severe prob- Not underestimate the importance
managed by the customer or sup- lems, liquidated damages may be a tool of good project management. En-
plier; take a realistic view of risk al- to mitigate such risk. sure good governance and project
location. management is in place with the
It is not possible to simplify the process right skill sets for the role.
Not focus on a deal-breaking posi- by simply guessing the likely loss and in-
tion on risk, if the overall risk pro- cluding this figure: if the estimate is not Limit financial commitments by
file of the arrangement is low. genuine, the court will classify it as a using appropriate payment plans
penalty and it will not be enforceable. tied to performance and delivery.
Focus on risk which is real and im- While this does not mean an estimate of
portant to the business. Where risk loss has to be precise, it does require cus- Ensure a contract is in place which
is not important, take a realistic tomers to make a genuine attempt to is properly aligned with the under-
and commercial view in negotia- forecast the loss that might occur. Cus- lying business plan but also reflects
tions. tomers should also retain the basis on an appropriate sharing of risk.
which they made their estimate in case
Remember that risk will be priced this is needed as evidence to rebut the Focus on those risk tools which they
into the contract. suppliers claim that the liquidated dam- regard as effective for their busi-
ages are in fact a penalty and therefore ness, and not waste time, money
unenforceable. and resources negotiating around
can be more effective than just setting off tools which will not be used.
the service credit incurred against the Some customers regard liquidated dam-
amount payable by the customer. No ages as being useful, not because they
project manager on the supplier side represent adequate compensation but Audit rights. The right to audit entitles
wants to write a cheque that might re- because customers feel it is the most ef- the customer to carry out its own investi-
quire authorisation from his line manger fective way of ensuring that a supplier gations as to the suppliers compliance
and prompt a difficult discussion about delivers on time. However, their inclu- with the terms of the outsourcing con-
why the contact is not maximising rev- sion may represent the customers sole tract. It may also extend to other mat-
enue. remedy for delay, as suppliers will resist ters, such as the suppliers compliance
the inclusion of other remedies and with relevant regulations or the sup-
However, a well-structured service sanctions if liquidated damages are in- pliers solvency.
credit regime, which focuses solely on cluded. It might also drive contract costs
those areas of risk which have a real and higher as suppliers build the costs of The effectiveness of audit rights is deter-
detrimental effect on a customers busi- paying out liquidated damages into their mined by the limitations the supplier
ness, could help in managing a suppliers price. Because of this and the difficulties places on access to information. In many
performance. The threat of having to in pre-estimating loss, there is an in- cases, suppliers will restrict the extent to
pay credits in itself should encourage creasing disillusionment with the effec- which customers can carry out investi-
good behaviour, but only where the serv- tiveness of liquidated damages as a risk gations by withholding information
ice credits are material: where they are mitigation tool. which they deem to be confidential, such

PLC October 2009 www.practicallaw.com 43

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

find a suitable comparator because serv-


Audit rights: case studies ices are rarely standard. For others, a
benchmarking exercise might damage
In an outsourcing within the financial services sector, audit rights were used exten- the relationship between the parties,
sively following a loss of data by the supplier. The customer was able to exercise its which might lead to a decline in the sup-
right to audit the suppliers processes and systems, to identify how the data was lost pliers standard of performance. Never-
and to satisfy itself that the breach was a one-off and not part of a systemic failure to theless, some customers are clear advo-
keep data secure. cates for benchmarking, particularly
when it has led to an improvement in the
In an outsourcing in the communications, media and technology sector, the customer suppliers performance.
had concerns regarding the amounts it was being charged. The customer and supplier
had agreed to charge for the suppliers services on a cost plus basis (meaning the cus- There are merits in including bench-
tomer was charged for the costs of providing the outsourced services plus a profit mar- marking provisions in long-term out-
gin). The audit revealed extensive overcharging for services, including charges for sourcing contracts; in particular, a
costs incurred by the supplier for its other customers. Following the audit, the supplier benchmarking regime is very useful for
agreed to repay the amount overcharged and contributed to the cost of the audit. measuring value for money. However, its
worth will ultimately depend on the as-
sociated sanctions where the bench-
as information which relates to its other gone live and, accordingly, a general dis- marking demonstrates that the service
customers or its profit margins. The cost satisfaction with the outsourcing offering is not competitive either in price
of an audit can also be prohibitive; many arrangements. or quality.
customers do not have sufficient re-
sources to carry out their own audit and Customers must consider from the out- Step-in rights. A step-in right is the right
the costs of hiring the services of a pro- set the likely causes of change, and agree for a customer to step in and manage the
fessional audit team can outweigh the with the supplier how any change will be contract in place of the supplier. It is
benefit the customer expects it will de- implemented and at what, and whose, normally exercisable as a precursor to
rive from the audit. cost. However, it is unrealistic for cus- termination for breach. Many cus-
tomers to expect that the costs of all tomers do not consider step-in rights
As such, audit rights are often not changes will be borne by the supplier. particularly effective, feeling that if the
ranked as highly as other risk manage- Similarly, it is unrealistic for suppliers to outsourcing project is not successful, it
ment tools. However, given the require- view change as a cash cow. The best should be terminated and a new supplier
ment of many financial services regula- change control mechanisms allow engaged. In addition, customers often
tors to include extensive audit rights in change to be delivered at a fair price. do not have the skills required to manage
outsourcing contracts, greater emphasis the contracts themselves. While it is un-
is placed on audit rights and their imple- A mechanism in isolation will not solve likely that customers will ever exercise
mentation in the financial services sec- the inherent risks of change. Both the such rights, they are usually included in
tor (see Banking and insurance supplier and the customer must manage contracts as a remedy of (almost) last re-
above). Equally, in sectors such as pro- change by adhering to the change sort. In practice, such rights are likely to
fessional services, where the customer process. Good governance is key to man- be of less value where the supplier is off-
may have the ability and resources to aging change (see box Change control: shore, as:
carry out its own audit, there is often a case study).
greater appetite to secure audit rights The costs of step-in may be prohibi-
than in other industry sectors (see box Benchmarking. Benchmarking is the tive due to geographical restrictions.
Audit rights: case studies). comparison of the suppliers offering
against other solutions in the market- It may be difficult to manage a busi-
Change control. No business environ- place. It is designed to manage the risk ness function in a foreign jurisdiction
ment remains static, and without the that the suppliers pricing is not the best and in a different time zone.
ability to make changes, the outsourcing value for money when compared with
arrangements risk becoming obsolete. that of other suppliers, or that the sup- There may be inherent political, cul-
The contract should therefore contain a plier is providing substandard services tural, legal and business risks in the
mechanism for managing contractual to the customers clients as against other offshore location of which the cus-
and operational change. However, the providers of the same service. tomer is unaware.
process of change and attendant risks
are rarely given sufficient focus in the ne- In practice, there are mixed views about However, step-in rights can be a useful
gotiation of large-scale contracts. This the merits of benchmarking. For some, tool where extreme measures are neces-
can often result in unanticipated costs benchmarking does not work with out- sary (see box Step-in and exit: case
being incurred once the outsourcing has sourcing projects, as it can be difficult to study). Clearly, step-in will not be a so-

44 PLC October 2009 www.practicallaw.com

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

lution in each case. However, in the right


circumstances, and with the right skills Change control: case study
on the customers part, step-in can work.
Problems arose in an outsourcing in the financial services sector where a supplier was
Exit planning. Proper exit planning is vi- engaged to build an IT system designed to operate the integral parts of a customers
tal. Nevertheless, exit is too often over- business. As the system was being built, the supplier began making changes to the de-
looked in the procurement process. It is sign based on discussions with the customer at project meetings. However, many of
all too easy to underestimate the time it these changes were not authorised by the customers senior management. Further, in
will take to transfer the service to an al- respect of changes which the customer approved in principle, the supplier made the
ternative supplier (a process which will changes without first agreeing the price for the change.
take even longer when the supplier is off-
shore, as it may be difficult to repatriate At no stage was the contractual change management process followed by either party.
services quickly and gain access to tech- The parties soon became involved in a dispute, with the supplier arguing that, since
nology, assets and key personnel). As neither party had adhered to the change control procedure, the customer could not
part of the contracting process, the par- subsequently rely on the suppliers non-compliance to justify withholding payment for
ties should focus on the implications of change, as the customer had, in effect, waived its rights to deal with change under the
termination and mitigating the disrup- procedure. The customer argued that it had not agreed to the change, whether under
tion to business that could occur, and the procedure or otherwise, and rejected the suppliers submission that the suppliers
should include a comprehensive exit delays in building the system were justified because of the extra time needed to imple-
plan in the contract. ment the changes.

The exit plan for an offshore outsourc- Ultimately, the parties settled the dispute but not before they had expended signifi-
ing will differ materially from an on- cant time, effort and resources in retrospectively validating the legitimacy of changes
shore plan in that: made, all of which could have been avoided at the outset by managing the change
through the change control procedure.
On termination, employees will be
unlikely under the local laws to
transfer to the customers employ- carrying out a final audit on exit to en- supplier management and are not suffi-
ment. sure that arrangements have been fully ciently knowledgeable about the terms
implemented. However, in the event of a of the contract. The skills required by
The customer may not be able to en- supplier failing to comply with its exit the retained team are often very differ-
gage the suppliers key employees di- obligations, it is unlikely that a court ent from the actual skill set of most
rectly, as they may not be eligible for would make an order for specific per- management staff left behind in an
the necessary work visas. formance (see box Step-in and exit: outsourcing arrangement.
case study).
The customer will probably not wish Operational processes
to buy IT assets located offshore. Project management Customers need to consider carefully
Good project management and gover- what operational processes they can
The customers key assets to be trans- nance is vital. A project team compris- adopt to minimise risk. These will differ
ferred from the supplier will be intel- ing representatives both of the supplier from business to business, but may in-
lectual capital and know-how (but and the customer is best placed to moni- clude:
the customer should place an obliga- tor the provision of outsourced services
tion on the supplier to record and de- on a daily basis, identify any problems Allocating risk managers to individ-
liver know-how throughout the term, early and work together to resolve such ual outsourcing projects to evaluate
rather than just on exit). problems before serious issues arise. risk on an ongoing basis.
However, the resources and skill re-
The customer will be anxious to en- quired to ensure good governance are Comprehensive project governance
sure that it can enforce obligations often seriously underestimated. procedures to identify problems early
for the supplier to delete confidential and escalate them for resolution.
information and know-how post ter- The effectiveness of project manage-
mination, which may prove more dif- ment as a risk management tool is Regular contract reviews to ensure
ficult in an offshore arrangement. wholly dependent on the quality and that the contracts remain fit for pur-
calibre of the individuals tasked with pose.
Once the exit plan has been agreed, it is project management or governance re-
important that the customer regularly sponsibilities. Suppliers often raise con- Whatever the processes adopted, they
checks the suppliers compliance with its cerns that the customer project man- will only be effective if both customer and
obligations to facilitate exit, as well as agers do not have the necessary skills for supplier are fully engaged in their use.

PLC October 2009 www.practicallaw.com 45

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

point subcontractors. This is because


Step-in and exit: case study they feel they are best placed to manage
the subcontractors and that customers
In an outsourcing where the customer and supplier were in dispute, the supplier threat- should not micro-manage these rela-
ened to turn off the services, abandon the contract and ignore its exit obligations. tionships. Of course, there will be an as-
sociated cost for the supplier in manag-
The customer sought an interim injunction for specific performance to force the sup- ing the risks of such arrangements and
plier to continue provision of the services. However, it faced a low prospect of success relationships.
in securing the injunction, as specific performance will not be ordered if there is un-
certainty over the nature of the obligations to be performed or the obligations are com- Generally, customers agree with this ap-
plex, as they often are in outsourcing arrangements (Vertex Data Science Ltd v Power- proach, preferring to deal with just one
gen Retail Ltd [2006] EWHC 1340 (Comm)). In that situation, step-in rights provided supplier on the basis that dual and
an alternative solution for the customer. multi-sourcing can create its own risks;
if the suppliers and subcontractors do
not work together and the project fails, it
may be difficult to attribute fault specifi-
Technology Project personnel need to be properly cally to one party. Nevertheless, where
The selection and use of the correct trained in relationship management, to such subcontractors are key, it is prudent
technology may serve to reduce risks. ensure that they properly manage their to carry out the same level of due dili-
For example, data loss is a common suppliers and outsourcings. Customers gence on them as the customer would on
problem: if this is a serious risk then a can monitor their supplier to ensure that the prime contractor. This would re-
technical solution is to back up data on the necessary training is conducted by quire co-operation by the supplier, for
a regular basis. Similarly, where security carrying out audits such as an annual se- example, by arranging access to its sub-
breaches are considered a threat, the curity audit, requiring the supplier to contractors premises.
customer should ensure that the sup- sign a declaration that staff have com-
plier has state of the art protection sys- pleted the required training and to Third party guarantees
tems in place. However, use of the arrange or provide the relevant training Customers often have concerns about
proper technology to address the cus- to the supplier. dealing with subsidiaries of corporate
tomers specific risks will only materi- groups. In such circumstances, cus-
alise where the outsourcing solution is Insurance tomers may wish the parent company to
properly specified, and the risks have It is possible to insure against many stand behind its subsidiary and guaran-
been fully identified. risks. However, this can prove expensive, tee performance and/or financial com-
and for certain risks customers choose pensation. However, the practicalities of
Training to self-insure by setting aside funds enforcing such guarantees mean that the
All too often, human error is the cause of which can be called on to cover losses use of parent company guarantees may
failure in outsourcing. Loss of customer suffered by the business. Further, insur- drive costs up but be ineffective. This is
data by individuals working on unen- ance will only compensate the claiming especially so where, having secured a
crypted laptops which are stolen or mis- party in monetary terms. Consequently, judgment from an English court to en-
placed is a prime example. Both suppli- if the main risks to the business cannot force a guarantee, there is no reciprocal
ers and customers need to invest in train- be adequately compensated by a finan- arrangement with the jurisdiction in
ing their staff, particularly in highly cial payment (for example, loss of repu- which the guarantor is established.
regulated industries such as financial tation), insurance on its own will not be
services, where particular emphasis an adequate risk management tool. Insolvency contingency planning
must be placed on compliance (see In the light of Satyam, businesses need to
Banking and insurance above). Dual/multi-sourcing focus on insolvency risk, review contrac-
If the functions outsourced are business tual arrangements and have contingency
The procurement team should be prop- critical, customers may consider diversi- plans in place, so that damage is min-
erly trained in current best practice to fying and appointing more than one sup- imised if a key supplier ceases to trade.
ensure that they secure the same best plier. While there is a noticeable trend
practice from the supplier (for example, towards multi-sourcing, customers now However, dealing with financially inse-
ensuring that the supplier is compliant recognise that there are difficulties and cure suppliers is sometimes unavoidable.
with the ISO 27001 security manage- risks associated in managing and inte- For example, a supplier may have exclu-
ment standard, which aims to provide a grating multiple suppliers, and such in- sive technology or may only run into dif-
model for establishing, implementing, tegration can be costly. ficulties after the contract has been en-
operating, monitoring, reviewing, tered into. In such instances, exposure
maintaining and improving an informa- Unsurprisingly, suppliers tend to prefer may be minimised by including contrac-
tion security management system). a prime contractor model where they ap- tual protections such as:

46 PLC October 2009 www.practicallaw.com

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200
Feature

Limiting the amount of money paid


in advance (if possible, paying in ar- Related information
rears for services, or subject to deliv-
ery and acceptance in the case of sys- Links from www.practicallaw.com and the web
tem development). This article is at www.practicallaw.com/3-500-1941

Audit rights. Topics


Outsourcing www.practicallaw.com/0-202-2707
Frequent provision of deliverables
which the supplier has contracted to Practice notes
provide, such as documents or soft- Outsourcing: overview www.practicallaw.com/2-202-1226
ware, so the customer has the latest Offshore outsourcing www.practicallaw.com/6-216-7962
version of the technology. Due diligence in outsourcing www.practicallaw.com/2-381-2359
Outsourcing in the financial services sector www.practicallaw.com/8-212-2982
Where relevant, placing source codes Service levels and service credit
into escrow, with insolvency being a schemes in outsourcing www.practicallaw.com/1-211-9964
trigger release event.
Previous articles
Customers must draw up a contingency Outsourcing: the commercial issues (2006) www.practicallaw.com/1-201-8559
plan which sets out the steps they need to Outsourcing: sector-specific issues (2006) www.practicallaw.com/0-201-9998
take to secure the services and/or tech- Outsourcing: ensuring ongoing
nology if the supplier is no longer able to competitiveness (2003) www.practicallaw.com/0-102-2845
perform or has become insolvent. This
plan should be reviewed and updated External links
throughout the contract term and will A smart approach to sourcing
be integral to the exit planning process. www.nortonrose.com/knowledge/publications/pdf/file17648.pdf?lang=en-gb

If the supplier becomes insolvent, a cus- For subscription enquiries to PLC web materials please call +44 207 202 1200
tomer generally has four options avail-
able:

Source the services from a third party Buy the insolvent business from the Mike Rebeiro is a partner and head of
(although in many offshore relation- relevant insolvency office holder. sourcing and Radford Goodman is a
ships, the ability to switch supplier in partner in dispute resolution at Norton
the timeframe required will be lim- The contingency plan may include pro- Rose LLP.
ited). visions to facilitate one, or a combina-
tion, of these options. It should be noted Norton Rose LLP recently conducted an
Bring the services back in-house. that a suppliers insolvency may not au- international survey of suppliers and
tomatically constitute a breach of con- customers of outsourced services (see A
Fund the supplier or the relevant in- tract entitling the customer to termi- smart approach to sourcing, www.
solvency office holder to continue nate; the right to terminate should be ex- nortonrose.com/knowledge/publica-
supplying the services. pressly included. tions/pdf/file17648.pdf?lang=en-gb).

PLC October 2009 www.practicallaw.com 47

Legal and Commercial Publishing Limited 2009. Subscriptions +44 (0)20 7202 1200

Das könnte Ihnen auch gefallen