01.05.2017 Views

632598256894

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Companies are becoming increasingly concerned with protecting their intellectual property and<br />

ensuring that they do not infringe upon others‟ intellectual property. When outsourcing IT<br />

development, companies need to be vigilant about any third-party software that is included within the<br />

software being developed. Even open source code requires licensing of one sort or another. The<br />

mistake of infringing upon another company‟s intellectual property can be very expensive to litigate<br />

and can ultimately result in having to pay millions of dollars in licensing fees. Also, how do<br />

companies ensure that whatever trade secrets or other IP a third party is exposed to is not stolen?<br />

Intellectual property laws in many countries are lax. Can you imagine how to stop an employee of a<br />

company in Asia from selling your trade secrets?<br />

In this day of the Internet, where companies‟ Web sites and networks are being attacked daily by<br />

various viruses and other hacking attempts from both within the United States and offshore, it is<br />

important for companies to be ever vigilant. Especially when software is being developed offshore,<br />

companies must ensure that backdoors are not left open to enable uninvited hacking. When software is<br />

developed, quality assurance generally tests to ensure that it conforms to the design specification.<br />

Exhibit 18.2 Verifying application software: Testing doesn’t versus shouldn’t.<br />

Refer to Exhibit 18.2. The nonoverlap area to the left represents gaps between the design<br />

specification and the actual program. However, equally important is the nonoverlap area to the right,<br />

which represents features in the programs that were not in the original specification. While testing<br />

reveals the area to the left, very few companies test for the area to the right. The area to the right<br />

represents the potential backdoor for security weakness and hacking. Outsourcing providers usually<br />

are known for their high level of quality; however, companies that outsource software development<br />

have to be aware of the potential for security backdoors to be left open.<br />

Organizational morale is an issue that needs to be addressed when contemplating outsourcing a<br />

function or project. When an entire function (e.g., human resources management) is being outsourced,<br />

frequently as part of the negotiations the outsourcing provider will hire the employees from the<br />

company. However, while this may sound like a win-win situation for both companies, it also presents<br />

its own challenges. Issues include potentially relocating transferred employees or reconciling the<br />

benefits offered by the two companies. Even those employees who remain in the old company might<br />

resent the treatment of any employees let go. In situations where projects require no layoffs but where<br />

functions are outsourced, employees might resent that the contracted employees are earning more than<br />

they are or are being given an opportunity to work on a new project that they would have preferred.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!