SlideShare ist ein Scribd-Unternehmen logo
1 von 3
HOW TO DEVELOP AN IT CHANGE
MANAGEMENT PROGRAM
June 30, 2016
Social media, communication in the global computer networks. silhouette of a human head with
an interface icons.
Change Management Program (CMP), more commonly known as Change Control Process or Change
Control Management Process, is a formal process used to ensure that changes to a product or system
are introduced in a controlled and coordinated manner (as defined by ISO 20000). CMP should not
be confused with Organizational Change Management (OCM), which manages the impacts of new
business processes, including those stemming from system roll outs and IT initiatives, changes in
organizational structure, or cultural changes within an enterprise. In short, OCM manages the people
side of change.
The purpose of the CMP, is to ensure that the negative impact of changes to a company’s
Information Technology system is minimized by using a standardized process of governance. Some
changes are not optional. If, for example, the bar code standard is changing, you must adapt; if a tax
withholding structure changes, you must have a change. Nevertheless, all changes of this kind are
still subject to governance.
It must never be the case that ad-hoc changes are made to the system or to procedures without some
oversight. This idea must originate with senior management
Initiate the Development Project: Development of the change (including testing) is an IT-guided
function. In the event of an emergency change (server is down) those functions are typically
predetermined. When a new system is to be developed, there is a collaborative effort between the
business users and the IT team. The systems are designed by IT, the design is approved by the
business partners (users), developed by IT, tested by a combination of IT and the users, and the final
product is approved by both. Careful attention must be given to ancillary effects the new change may
have on existing systems.ent and be passed down, with no exceptions, to everyone in the company.
Without backing at the highest level, the CMP is a useless waste of time and money. With proper
backing, this program will save your company from some very costly errors.
1. Develop a Request for Change (RFC): This may originate from problem management where
an issue, or a series of related issues, is identified and a mitigating change is necessary to prevent
(or minimize) future effects. The RFC may also originate as a result of a business decision that
will require some modification (add, delete, change) to the supporting technology. An RFC may
also be necessary due to outside influences.
2. Obtain Business Change Acceptance: The decision to make a change is typically a business
decision where costs vs. benefits are weighed. Even in situations where the change is strictly
infrastructure oriented (component or system failure) the decision to spend money resides with
the business, not with the IT department. There are occasions when procedures are developed in
advance to preauthorize changes such as emergency system maintenance, but regardless of the
timing of the authorization, the decision still rests with the business management.
3. Initiate the Development Project: Development of the change (including testing) is an IT-
guided function. In the event of an emergency change (server is down) those functions are
typically predetermined. When a new system is to be developed, there is a collaborative effort
between the business users and the IT team. The systems are designed by IT, the design is
approved by the business partners (users), developed by IT, tested by a combination of IT and
the users, and the final product is approved by both. Careful attention must be given to ancillary
effects the new change may have on existing systems.
4. Pass the Change Management Gate: The Change Advisory Board (CAB) reviews all
changes before they can be put into production. Normally, the CAB will consist of a group of
people with different perspectives, backgrounds and areas of expertise. Their function is to
review the change from a process and governance standpoint to assure that all foreseeable risks
have been identified and mitigated, and that compensatory techniques are in place for any
elements of exposure (things that could go wrong). The development team and the change
sponsor will present the change to the CAB. Evaluation of risk will be the focus. Implementation
strategies, communication to affected stakeholders, backup plans and post-implementation
monitoring are elements on which the CAB is required to focus. The CAB is not responsible for
determining if the change is appropriate – that decision has already been made. The CAB is also
not responsible for determining if the change is cost effective. Again, that is strictly a business
decision.
5. Implement the Change: If the CAB does not approve the change, the reasons are listed (this
is always because certain risks have not been mitigated or communications have not been
planned) and the development team will be given time to fix those issues and reschedule a
meeting before the CAB. If the change is approved, the implementation is scheduled. It is not
normally the case that the CAB is represented at implementation although it is possible that some
members of the CAB have expertise that is necessary during the implementation, but they will
not be present as official CAB representatives, but rather as subject matter experts (SME). How
the change is implemented, the checklist and steps, are predefined and were presented to and
approved by the CAB. The entire process must be thoroughly documented and the approved
process must be precisely followed.
6. Report the Results: Either the change was implemented successfully with no issues, the
change was implemented with issues that were corrected during implementation, the change was
implemented with issues that were deemed acceptable, issues arose that were unacceptable and
the change was rolled back, or in the worst case the change was implemented with unacceptable
issues and could not be rolled back. Whatever the result, that is documented and returned to the
CAB. The CAB is then responsible for distributing that information to the stakeholders and for
storing and maintaining those results in the Change Management system (that may either be an
automated database or a paper filing system, but the documents must be maintained for audit
purposes)
7. Link Problem Management to Changes: Issues that arise should be compared to the CAB
documentation of changes so any unanticipated adverse effects of a change can be isolated. It is
often the case that undesirable effects of a change are not noticed immediately, but are identified
by the emergence of problems in ancillary systems. For example, the addition of several fields to
a database might not have a direct negative effect on the users but could impact network
performance that would be apparent to other users who are not directly involved with the
modified system.
8. Periodically Audit the CMP: At least once each year an audit of the CMP should be
conducted to assure that all change documentation is maintained and available. Every change
approval document should be examined to assure that the proper signatures are in place and that
the results of the implementation are properly documented.

Weitere ähnliche Inhalte

Was ist angesagt?

Closed Loop Corrective Action
Closed Loop Corrective ActionClosed Loop Corrective Action
Closed Loop Corrective Actionahmad bassiouny
 
ChangeManagementTraining
ChangeManagementTrainingChangeManagementTraining
ChangeManagementTrainingMichael Perry
 
Change Management - ITIL
Change Management - ITILChange Management - ITIL
Change Management - ITILconnorsmaureen
 
Commandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 ActCommandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 ActAdam Tallinger
 
PECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysisPECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysisPECB
 
Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...
Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...
Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...Cognizant
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Sreekanth Narendran
 
Presentation maintenence management
Presentation maintenence managementPresentation maintenence management
Presentation maintenence managementVaisakh S Babu
 
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Sreekanth Narendran
 
Information Technology in Controlling
Information Technology in ControllingInformation Technology in Controlling
Information Technology in ControllingAvadhesh Solanki
 
Business continuity management (case study)
Business continuity management (case study)Business continuity management (case study)
Business continuity management (case study)Wissam Abdel Baki
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5Gewurtz
 
Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)Service Desk Institute
 
Lean Itil Event Management
Lean Itil Event ManagementLean Itil Event Management
Lean Itil Event ManagementMd Imran
 

Was ist angesagt? (20)

Closed Loop Corrective Action
Closed Loop Corrective ActionClosed Loop Corrective Action
Closed Loop Corrective Action
 
ChangeManagementTraining
ChangeManagementTrainingChangeManagementTraining
ChangeManagementTraining
 
Change Management - ITIL
Change Management - ITILChange Management - ITIL
Change Management - ITIL
 
Ch14
Ch14Ch14
Ch14
 
Commandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 ActCommandalot Ugm Pmac 2010 Act
Commandalot Ugm Pmac 2010 Act
 
PECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysisPECB Webinar: The importance of business impact analysis
PECB Webinar: The importance of business impact analysis
 
Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...
Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...
Legacy Enterprise Systems Modernization: Five Ways of Responding to Market Fo...
 
Numara change & approval mgmt
Numara change & approval mgmtNumara change & approval mgmt
Numara change & approval mgmt
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 
Presentation maintenence management
Presentation maintenence managementPresentation maintenence management
Presentation maintenence management
 
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
 
Itil prc review
Itil prc reviewItil prc review
Itil prc review
 
Information Technology in Controlling
Information Technology in ControllingInformation Technology in Controlling
Information Technology in Controlling
 
Control
ControlControl
Control
 
Q3edge Case Study
Q3edge Case StudyQ3edge Case Study
Q3edge Case Study
 
Business continuity management (case study)
Business continuity management (case study)Business continuity management (case study)
Business continuity management (case study)
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5A Top Down Business Impact Analyses Method V5
A Top Down Business Impact Analyses Method V5
 
Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)Problem Management with Glen Allen, Borama (webinar)
Problem Management with Glen Allen, Borama (webinar)
 
Lean Itil Event Management
Lean Itil Event ManagementLean Itil Event Management
Lean Itil Event Management
 

Ähnlich wie P2 how to develop an it change management program

293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...kndnewguade
 
Change_Management (1).ppt
Change_Management (1).pptChange_Management (1).ppt
Change_Management (1).pptrajuhaveri1
 
Change_Management.ppt
Change_Management.pptChange_Management.ppt
Change_Management.pptrajuhaveri1
 
Change_Management.ppt
Change_Management.pptChange_Management.ppt
Change_Management.pptrajuhaveri1
 
BCS 307 Lecture 8.pdf
BCS 307 Lecture 8.pdfBCS 307 Lecture 8.pdf
BCS 307 Lecture 8.pdfJohn119649
 
Best Practices for Global MES Rollouts
Best Practices for Global MES RolloutsBest Practices for Global MES Rollouts
Best Practices for Global MES RolloutsCognizant
 
Governing Your PPM Solution Post Implementation
Governing Your PPM Solution Post ImplementationGoverning Your PPM Solution Post Implementation
Governing Your PPM Solution Post ImplementationDavid J Rosenthal
 
SDLC Control
SDLC ControlSDLC Control
SDLC Controlbenji00
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesNetwrix Corporation
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptxTadeseBeyene
 
6 I need the overall earned value analysis.  (That is, overall i.docx
6 I need the overall earned value analysis.  (That is, overall i.docx6 I need the overall earned value analysis.  (That is, overall i.docx
6 I need the overall earned value analysis.  (That is, overall i.docxalinainglis
 
Whitepaper-Minimising Customer Impact on Bank Mergers
Whitepaper-Minimising Customer Impact on Bank MergersWhitepaper-Minimising Customer Impact on Bank Mergers
Whitepaper-Minimising Customer Impact on Bank MergersSinjo Alex
 

Ähnlich wie P2 how to develop an it change management program (20)

293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
 
PACE-IT: Basics of Change Management
PACE-IT: Basics of Change ManagementPACE-IT: Basics of Change Management
PACE-IT: Basics of Change Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
Dit yvol4iss08
Dit yvol4iss08Dit yvol4iss08
Dit yvol4iss08
 
Change_Management (1).ppt
Change_Management (1).pptChange_Management (1).ppt
Change_Management (1).ppt
 
Change_Management.ppt
Change_Management.pptChange_Management.ppt
Change_Management.ppt
 
Change_Management.ppt
Change_Management.pptChange_Management.ppt
Change_Management.ppt
 
BCS 307 Lecture 8.pdf
BCS 307 Lecture 8.pdfBCS 307 Lecture 8.pdf
BCS 307 Lecture 8.pdf
 
Best Practices for Global MES Rollouts
Best Practices for Global MES RolloutsBest Practices for Global MES Rollouts
Best Practices for Global MES Rollouts
 
Dit yvol4iss27
Dit yvol4iss27Dit yvol4iss27
Dit yvol4iss27
 
Dit yvol4iss49
Dit yvol4iss49Dit yvol4iss49
Dit yvol4iss49
 
Governing Your PPM Solution Post Implementation
Governing Your PPM Solution Post ImplementationGoverning Your PPM Solution Post Implementation
Governing Your PPM Solution Post Implementation
 
SDLC Control
SDLC ControlSDLC Control
SDLC Control
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy Changes
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptx
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Effective Change Management
Effective Change ManagementEffective Change Management
Effective Change Management
 
6 I need the overall earned value analysis.  (That is, overall i.docx
6 I need the overall earned value analysis.  (That is, overall i.docx6 I need the overall earned value analysis.  (That is, overall i.docx
6 I need the overall earned value analysis.  (That is, overall i.docx
 
Whitepaper-Minimising Customer Impact on Bank Mergers
Whitepaper-Minimising Customer Impact on Bank MergersWhitepaper-Minimising Customer Impact on Bank Mergers
Whitepaper-Minimising Customer Impact on Bank Mergers
 

Mehr von IT-Toolkits.org

Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsIT-Toolkits.org
 
Information Technology & Its Role in the Modern Organization
Information Technology & Its Role in the  Modern OrganizationInformation Technology & Its Role in the  Modern Organization
Information Technology & Its Role in the Modern OrganizationIT-Toolkits.org
 
It Organization Management : Revisiting Centralization
It Organization Management : Revisiting CentralizationIt Organization Management : Revisiting Centralization
It Organization Management : Revisiting CentralizationIT-Toolkits.org
 
25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support toolsIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
The basics of managing i.t
The basics of managing i.tThe basics of managing i.t
The basics of managing i.tIT-Toolkits.org
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templatesIT-Toolkits.org
 
What is value added- it management_ - it management templates
What is  value added- it management_ - it management templatesWhat is  value added- it management_ - it management templates
What is value added- it management_ - it management templatesIT-Toolkits.org
 
7 steps to business and it alignment it management templates
7 steps to business and it alignment   it management templates7 steps to business and it alignment   it management templates
7 steps to business and it alignment it management templatesIT-Toolkits.org
 
Relevant it – it solutions to bridge the gap between business and it it man...
Relevant it – it solutions to bridge the gap between business and it   it man...Relevant it – it solutions to bridge the gap between business and it   it man...
Relevant it – it solutions to bridge the gap between business and it it man...IT-Toolkits.org
 
Finding a common ground between finance and it it management templates
Finding a common ground between finance and it   it management templatesFinding a common ground between finance and it   it management templates
Finding a common ground between finance and it it management templatesIT-Toolkits.org
 
How to write your company's it security policy it-toolkits
How to write your company's it security policy   it-toolkitsHow to write your company's it security policy   it-toolkits
How to write your company's it security policy it-toolkitsIT-Toolkits.org
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...IT-Toolkits.org
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkitsIT-Toolkits.org
 
Email policies tools to govern usage, access and etiquette it-toolkits
Email policies  tools to govern usage, access and etiquette   it-toolkitsEmail policies  tools to govern usage, access and etiquette   it-toolkits
Email policies tools to govern usage, access and etiquette it-toolkitsIT-Toolkits.org
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkitsIT-Toolkits.org
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkitsIT-Toolkits.org
 
Help desk ticket categories create help desk ticket classification it-tool...
Help desk ticket categories  create help desk ticket classification   it-tool...Help desk ticket categories  create help desk ticket classification   it-tool...
Help desk ticket categories create help desk ticket classification it-tool...IT-Toolkits.org
 
Help desk mission and vision statements. it-toolkits
Help desk mission and vision statements.   it-toolkitsHelp desk mission and vision statements.   it-toolkits
Help desk mission and vision statements. it-toolkitsIT-Toolkits.org
 

Mehr von IT-Toolkits.org (20)

Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management Systems
 
Information Technology & Its Role in the Modern Organization
Information Technology & Its Role in the  Modern OrganizationInformation Technology & Its Role in the  Modern Organization
Information Technology & Its Role in the Modern Organization
 
It Organization Management : Revisiting Centralization
It Organization Management : Revisiting CentralizationIt Organization Management : Revisiting Centralization
It Organization Management : Revisiting Centralization
 
25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
The basics of managing i.t
The basics of managing i.tThe basics of managing i.t
The basics of managing i.t
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templates
 
What is value added- it management_ - it management templates
What is  value added- it management_ - it management templatesWhat is  value added- it management_ - it management templates
What is value added- it management_ - it management templates
 
7 steps to business and it alignment it management templates
7 steps to business and it alignment   it management templates7 steps to business and it alignment   it management templates
7 steps to business and it alignment it management templates
 
Relevant it – it solutions to bridge the gap between business and it it man...
Relevant it – it solutions to bridge the gap between business and it   it man...Relevant it – it solutions to bridge the gap between business and it   it man...
Relevant it – it solutions to bridge the gap between business and it it man...
 
Finding a common ground between finance and it it management templates
Finding a common ground between finance and it   it management templatesFinding a common ground between finance and it   it management templates
Finding a common ground between finance and it it management templates
 
How to write your company's it security policy it-toolkits
How to write your company's it security policy   it-toolkitsHow to write your company's it security policy   it-toolkits
How to write your company's it security policy it-toolkits
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
Email policies tools to govern usage, access and etiquette it-toolkits
Email policies  tools to govern usage, access and etiquette   it-toolkitsEmail policies  tools to govern usage, access and etiquette   it-toolkits
Email policies tools to govern usage, access and etiquette it-toolkits
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
 
Help desk ticket categories create help desk ticket classification it-tool...
Help desk ticket categories  create help desk ticket classification   it-tool...Help desk ticket categories  create help desk ticket classification   it-tool...
Help desk ticket categories create help desk ticket classification it-tool...
 
Help desk mission and vision statements. it-toolkits
Help desk mission and vision statements.   it-toolkitsHelp desk mission and vision statements.   it-toolkits
Help desk mission and vision statements. it-toolkits
 

Kürzlich hochgeladen

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 

Kürzlich hochgeladen (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

P2 how to develop an it change management program

  • 1. HOW TO DEVELOP AN IT CHANGE MANAGEMENT PROGRAM June 30, 2016 Social media, communication in the global computer networks. silhouette of a human head with an interface icons. Change Management Program (CMP), more commonly known as Change Control Process or Change Control Management Process, is a formal process used to ensure that changes to a product or system are introduced in a controlled and coordinated manner (as defined by ISO 20000). CMP should not be confused with Organizational Change Management (OCM), which manages the impacts of new business processes, including those stemming from system roll outs and IT initiatives, changes in organizational structure, or cultural changes within an enterprise. In short, OCM manages the people side of change. The purpose of the CMP, is to ensure that the negative impact of changes to a company’s Information Technology system is minimized by using a standardized process of governance. Some changes are not optional. If, for example, the bar code standard is changing, you must adapt; if a tax withholding structure changes, you must have a change. Nevertheless, all changes of this kind are still subject to governance. It must never be the case that ad-hoc changes are made to the system or to procedures without some oversight. This idea must originate with senior management Initiate the Development Project: Development of the change (including testing) is an IT-guided function. In the event of an emergency change (server is down) those functions are typically predetermined. When a new system is to be developed, there is a collaborative effort between the business users and the IT team. The systems are designed by IT, the design is approved by the
  • 2. business partners (users), developed by IT, tested by a combination of IT and the users, and the final product is approved by both. Careful attention must be given to ancillary effects the new change may have on existing systems.ent and be passed down, with no exceptions, to everyone in the company. Without backing at the highest level, the CMP is a useless waste of time and money. With proper backing, this program will save your company from some very costly errors. 1. Develop a Request for Change (RFC): This may originate from problem management where an issue, or a series of related issues, is identified and a mitigating change is necessary to prevent (or minimize) future effects. The RFC may also originate as a result of a business decision that will require some modification (add, delete, change) to the supporting technology. An RFC may also be necessary due to outside influences. 2. Obtain Business Change Acceptance: The decision to make a change is typically a business decision where costs vs. benefits are weighed. Even in situations where the change is strictly infrastructure oriented (component or system failure) the decision to spend money resides with the business, not with the IT department. There are occasions when procedures are developed in advance to preauthorize changes such as emergency system maintenance, but regardless of the timing of the authorization, the decision still rests with the business management. 3. Initiate the Development Project: Development of the change (including testing) is an IT- guided function. In the event of an emergency change (server is down) those functions are typically predetermined. When a new system is to be developed, there is a collaborative effort between the business users and the IT team. The systems are designed by IT, the design is approved by the business partners (users), developed by IT, tested by a combination of IT and the users, and the final product is approved by both. Careful attention must be given to ancillary effects the new change may have on existing systems. 4. Pass the Change Management Gate: The Change Advisory Board (CAB) reviews all changes before they can be put into production. Normally, the CAB will consist of a group of people with different perspectives, backgrounds and areas of expertise. Their function is to review the change from a process and governance standpoint to assure that all foreseeable risks have been identified and mitigated, and that compensatory techniques are in place for any elements of exposure (things that could go wrong). The development team and the change sponsor will present the change to the CAB. Evaluation of risk will be the focus. Implementation strategies, communication to affected stakeholders, backup plans and post-implementation monitoring are elements on which the CAB is required to focus. The CAB is not responsible for determining if the change is appropriate – that decision has already been made. The CAB is also
  • 3. not responsible for determining if the change is cost effective. Again, that is strictly a business decision. 5. Implement the Change: If the CAB does not approve the change, the reasons are listed (this is always because certain risks have not been mitigated or communications have not been planned) and the development team will be given time to fix those issues and reschedule a meeting before the CAB. If the change is approved, the implementation is scheduled. It is not normally the case that the CAB is represented at implementation although it is possible that some members of the CAB have expertise that is necessary during the implementation, but they will not be present as official CAB representatives, but rather as subject matter experts (SME). How the change is implemented, the checklist and steps, are predefined and were presented to and approved by the CAB. The entire process must be thoroughly documented and the approved process must be precisely followed. 6. Report the Results: Either the change was implemented successfully with no issues, the change was implemented with issues that were corrected during implementation, the change was implemented with issues that were deemed acceptable, issues arose that were unacceptable and the change was rolled back, or in the worst case the change was implemented with unacceptable issues and could not be rolled back. Whatever the result, that is documented and returned to the CAB. The CAB is then responsible for distributing that information to the stakeholders and for storing and maintaining those results in the Change Management system (that may either be an automated database or a paper filing system, but the documents must be maintained for audit purposes) 7. Link Problem Management to Changes: Issues that arise should be compared to the CAB documentation of changes so any unanticipated adverse effects of a change can be isolated. It is often the case that undesirable effects of a change are not noticed immediately, but are identified by the emergence of problems in ancillary systems. For example, the addition of several fields to a database might not have a direct negative effect on the users but could impact network performance that would be apparent to other users who are not directly involved with the modified system. 8. Periodically Audit the CMP: At least once each year an audit of the CMP should be conducted to assure that all change documentation is maintained and available. Every change approval document should be examined to assure that the proper signatures are in place and that the results of the implementation are properly documented.