Outsourcing has become an increasingly fraught activity, with a number of high-profile events such as the collapse of Carillion dominating the news cycle in recent months. The launch of the Government Outsourcing Playbook is in part an acknowledgment of, and a response to, the heightened scrutiny that is being applied to outsourcing practices in general and public sector outsourcing in particular. It also coincides with updates and releases of a number of other sourcing-related guidance notes and recent tweaks to the well-known Model Services Contract to address matters related to interpretation of EU law post-Brexit. Continue reading
Tag: sourcing strategies
Many people believe that we are currently witnessing a fourth industrial or technological revolution, with the advent and increasing use of a wave of disruptive technology. Over the past fi ve years, the market has seen the arrival of a range of new technologies that have transformed the sourcing market and delivery models for both IT and business process service offerings. These include: multitenanted platform provision, such as cloudbased services; robotic process automation (RPA); machine learning; artifi cial intelligence (AI); the internet of things; blockchain and distributed ledger technology (DLT); and smart contracts.
Increasingly, organisations are having to think like technology companies as they look to explore and assess the opportunities, as well as the commercial and legal risks, presented by these technologies and alternative delivery
As a result, conversations around technology driven transformation and sourcing strategies are now board-level agenda items. These conversations are closely aligned with two other critical executive concerns: data protection and data use following the recent entry into force on 25 May 2018 of the General Data Protection Regulation (679/2016/EU); and cyber security risk with the entry into force on 10 May 2018 of the Network and Information Security Directive (2016/1148/EU) (NIS Directive) (also known as the Cybersecurity Directive).
Click here to read the full article.
This article first appeared in the July 2018 issue of PLC Magazine.