Your browser does not support JavaScript!

Chapter 2 - How Is Procuring Information Technology Different?

2.2 Critical factors in IT procurement

The Commonwealth can maximize the value it receives from technology and reduce the risk of supplier and technology failures by using smart sourcing and contract strategies. Listed below are examples of IT sourcing and contract strategies to mitigate some potential IT procurement difficulties:

Challenge

Impact/risk

IT sourcing principles to employ

IT contract approaches to mitigate

Complexity of business functions, technology and legal issues make procurement long and difficult

major omissions from a business, technical or legal standpoint are anticipated and prevented

use a structured IT acquisition process that provides a framework to ensure all areas are part of the screening and selection process

draft a clear, easy-to-use contract that documents the business relationship, and includes only mandatory and specialized IT terms and conditions and the essence of the deal

Industry consolidation/ monopoly suppliers

key products lie with powerful suppliers

use solution-based solicitations that focus on business problems and solutions, not technical specifications or requirements

adopt meaningful service level agreements (SLAs) and business performance commitments and measurements to monitor solution continues to meet business need

assign incentives/remedies in the contract to incentivize Supplier performance

Products and solutions are intangibles

difficult to specify and evaluate products

collaborate in an evaluation process that incorporates all areas needed for successful IT solution: business, technical, legal and financial

include subject matter experts (SMEs) on evaluation team who will only evaluate their area(s) of expertise

provide contract template with solicitation, not prepared after selection

incorporate offeror response to contract template as part of the evaluation

use strong warranty language with significant business remedies

give significant attention to intellectual property rights and alternatives to ensure the right to use, access, transfer to other Commonwealth entities

Rapid and planned obsolescence

versions out of date

new entrants into market

conduct market research to evaluate market risk

evaluation based on value-to-cost ratio

include total life cycle costs in evaluation

tie contractual commitments to providing solution, not product

provide support of version and upgrades for appropriate period of time

Significant barriers to exit

customer is locked in to products or services

ensure that evaluation and contract negotiation are part of commitment to strong balanced decision-making process

anticipate transitions/exit strategies

provide system data, back-up; ownership of work product or perpetual license to work product, including third party products needed to run systems/solutions

provide a strong transition/exit plan for agency

Complexity of IT products and services

difficult selecting the best from value solution due to complexity of needed IT good or service

collaborate in a team-based process to ensure all necessary requirements are appropriately evaluated

address all project, security, data privacy and cost risk factors

use data-driven evaluation processes to coalesce many different perspectives

base contract on solutions, not buying of specific product or version

include protections against product splitters or bundling

include risk mitigation project activities and contract language to align with risk potentialities

IT must support business function

evaluation criteria focused on business value and needs; not specification- driven process

use solution-based solicitations that focus on solving business problems and incentivizing Suppliers to offer solutions, not just meet technical specifications

include meaningful SLAs and performance commitments and measures to monitor solution continues to meet business need

assign incentives/remedies in the contract

Solutions being procured are highly interdependent

no accountability for full solution

the weakest component will drive your risk profile

take a full supply chain view of solutions

evaluate suppliers and components on strength of solution, both independently and collectively

give prime contractor accountability for performance, but also allow Commonwealth to reach through to subcontractors to maintain services

Contracts must protect Commonwealth data and systems

compromise of sensitive Commonwealth data

unauthorized disablement of Commonwealth data and citizen services

understand the data sensitivity of the procurement/project

collaborate with your business owner, project manager, information security officer and other SMEs

include protective contract terms to cover data privacy and security.

require supplier to perform specific actions, to have special insurance coverages and to comply with Commonwealth data, architecture and security standards 

require supplier to undergo a security assessment of their cloud solution (SaaS application) prior to agency making an award

VITA SCM has cloud terms available if the procurement is for Software as a Service

Agency may inquire at: scminfo@vita.virginia.gov

A structured IT sourcing process provides a comprehensive framework to ensure agencies that:

  • omissions from a business, technical or legal standpoint are anticipated and prevented
  • the costs and resources for the IT sourcing process are appropriate and are efficiently deployed
  • the business case in support of the IT procurement is reaffirmed prior to selecting a solution
  • across the board executive buy-in to the new system or technology is measurable as a result of user group involvement throughout the IT sourcing process

Regardless of the nature of the anticipated IT procurement, its size, cost and complexity, the following core principles of IT sourcing apply:

  • Use a structured solicitation process which incorporates multiple complex domains, e.g., legal, technical, business functionality, financial.
  • Sourcing should be a data-driven business process, which incorporates and balances concerns across multiple domains.
  • Contract formation and negotiation are part of the decision process. It is critical to include an appropriate contract in the solicitation. If the supplier is not committed to providing the Commonwealth with value through the negotiation process, the Supplier should be evaluated accordingly.
  • Business needs must be supported in the solicitation requirements and any statement of work. Focus less on specification-driven solicitations for major systems/solutions and write solicitations that are structured for IT suppliers to offer innovative and cost effective solutions.
  • The sourcing evaluation process should include a comprehensive cost analysis that includes the total cost of ownership and all cost components including maintenance and not just the price of software or hardware.
  • Long-term issues such as obsolesce, technology replacement and compatibility must be part of the evaluation, negotiation and decision-making process.
  • Negotiations must be conducted prior to the selection of a particular IT solution or supplier.
  • Intangible rights, software ownership and other critical terms and conditions must be considered in evaluation and negotiation.
  • Risk analysis and trade-offs must consider the security of Commonwealth systems/data and continuity of operations for the Commonwealth and the solution and/or supplier's potential impact on the Commonwealth's ability to protect Commonwealth assets and service its citizens without interruption.

Search the manual by key words or common terms.