No real ‘SAFE-Harbour’ rules exist? Do they?

Following the revelations on 12 March 2015 on the Radio 4 Today programme by Hazel Blears of the UK Intelligence and Security Committee of Parliament, our question today is this simple one:  “Does any Information Security Safe-Harbour rule actually in practice exist?“   We might just as well tear up or bin all existing IT… Read More

End to End (Life-cycle) design for Business Process Outsourcing – Part 2

  In part 1 we introduced the basic techniques of Process Mapping and Cost and Benefit Analysis as part of the tool-sets to utilise in considering outsourcing and designing the Outsourced Business Processes future state. The next step in the process of defining and designing the appropriate Business Processes to outsource or at the very… Read More

End to End (Life-cycle) design for Business Process Outsourcing – Part 1

Thinking about the potential of outsourcing one of your critical Business Processes?   Business Process Re-engineering Cycle (Photo credit: Wikipedia)   Some of the key considerations must the the opportunity to redesign and re-engineer processes via process mapping and thorough cost and benefit analysis techniques.   Non of these techniques are new or too difficult to… Read More