Main
Log in

Operations & Service Delivery

IT cost recovery is an ongoing issue for CIO’s as they try to regain the cost of providing IT services to the business. As illustrated by IBRS in previous publications, while there are a number of alternative cost recovery methodologies available to organisations not all methodologies are suited to all companies. This month, I will share with you the processes we apply when back charging for IT services. The methodology we use could be considered fairly unique; I certainly have not come across any other company utilising similar techniques. While I am by no means claiming our methods are any better or worse than others, they do have the advantage of being fairly simple both to understand and to administer, and most importantly, they work for us.

IT cost recovery is viewed as a necessary part of establishing a clear service relationship with business units, but by itself it will not reduce costs or increase efficiency. In fact the worst cost recovery systems, with IT-centric cost algorithms, reinforce the image of IT as a techno-jungle with no concept of business value, dealing in “funny money” (what do I get for a CPU second?). Misinterpretation of fixed versus variable costs can also lead to faulty decision-making.

IT Disaster Recovery and Business Continuity have always been issues that have figured prominently on our list of priorities but continually get pushed to the back of the queue, replaced by other operational issues that assume greater importance and that can be seen to return some immediate benefit. It is not that the company does not recognise its importance, its more of a “laissez faire” attitude that “nothing has gone wrong so far so we will continue to take a short to medium term risk on anything happening in the future”. It is typical of the approach to risk in the company where construction risk is everything and other risk is considered insignificant.

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles