SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
itSM Solutions®
DITY™ Newsletter
Reprint
This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and
have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals
who want a workable, practical guide to implementing ITIL best practices -- without the hype.

become a member
(It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm)

Publisher
itSM Solutions™ LLC
31 South Talbert Blvd #295
Lexington, NC 27292
Phone (336) 510-2885
Fax (336) 798-6296
Find us on the web at: http://www.itsmsolutions.com.
To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com
For information on obtaining copies of this guide contact: sales@itsmsolutions.com
Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the
permission of the Controller of HMSO and the Office of Government Commerce.
Notice of Rights / Restricted Rights Legend
All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of
the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner
License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof
beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited.
Notice of Liability
This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not
limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor
itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused
directly or indirectly by the contents of this guide.
Trademarks
itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a
Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent
and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No.
0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be
trademarks or registered trademarks of their respective companies.
How To Prioritize Incidents

Subscribe

PDF Download

Vol. 3.1

Back Issues

JANUARY 3, 2006

How To Prioritize
Incidents
DITY Weekly Reader
The workable, practical guide to Do IT
Yourself
IT should work on those things that are of a critical nature first, not simply those things
people want done right away. The cold hard truth is that not every incident can or
should be Critical.
By Hank Marquis

We all know that every customers outages and issues are the #1 AAA top highest most
important things in their world, and they expect us within IT to respond appropriately—OR
ELSE!

hank
MARQUIS
Articles
E-mail
Bio

Of course we in IT get lots of these "we need it now" incidents, which most of us refer to as
"Urgent" requests. None of us have unlimited resources, so how can you balance response to
all these requests for critical assistance?
Clearly, some form of prioritization is required. But many times simply mentioning the word
"prioritize" in a meeting brings up bad feelings and posturing on both sides of the table—"us"
and "them."
I think part of the problem is using the term "Urgent" to describe a priority. It does not

http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (1 of 5)12/31/2006 10:38:34 AM
How To Prioritize Incidents

clearly communicate the nature of the situation. I prefer the term "Critical" to refer to the
most important thing IT can do instead. I think this also helps in the conversation with the business.
IT should work on those things that are of a critical nature first, not simply things people want done right
away. The cold hard truth is that not every incident can or should be Critical.
We have to establish a prioritization system that works, is fair, and takes into account true business need and
IT capability. Oh yes, and one the customer accepts and agrees to follow.
I find it helpful to use non-technical analogies to work with business people, especially when trying to get them
to understand something complicated. So, in order to come to a priority system that works, let’s start by
examining one we all have heard about—the use of "alarms" by your local fire department. You know, a "2
alarm fire" or a "4 alarm fire" and so on.
Once again, real fire fighters provide an excellent model for IT.

How Fire Fighters Do It
A priority code is a value assigned to a work request, like an incident record. The priority code establishes the
order in which jobs gets done and ensures the correct allocation of resources required to accomplish the work
the job requires in the timeframe permitted. Priority reflects the organizational response required for an
Incident. Simply put, an issue with a higher priority gets resolved sooner than a lower issue because we apply
more focus and more resource sooner.
Fire departments often have a priority system based on "alarms" to indicate priority. One department uses a
scheme that has 5 levels of priority—where priority means level of resource applied to the issue. More urgent
needs get more resources sooner in an escalating manner. It begins when an initial call is evaluated, and
assuming a credible report of fire; the response is 5 fire engines, 2 ladder trucks, one rescue squad and one fire
chief.
q

q
q
q

A 1-alarm fire is one confirmed by the initial responders; and one more engine, one more ladder truck, one
battalion fire chief and one ambulance are committed to the effort.
A 2-alarm fire brings 4 more engines, 2 more ladder trucks, 1 more fire chief and EMS equipment.
A 3-alarm fire gets 4 more engines and 2 more ladder trucks.
4-alarms signal a huge fire and the department sends all available equipment and personnel.

Stay with me here! Fire fighting is a pretty well established business, and the schemes used have been proven.
They know how and when to respond, and what resources they need to apply. Key points to notice here
include:
q The response level (e.g., priority or "alarms") is described in terms of how the support organization
responds and not the scope or criticality of the situation
q There are 5 types of response (initial, to 4 alarms), each indicating increased managerial and technical
commitment
q For each type of response there is a pre-defined resource allocation and process
q Technical evaluation of the situation determines the response type
q Few situations immediately receive a "4-alarm" response
q Escalation provides more technical and managerial focus and resources

How You Can Do It
Fire fighting is actually a pretty good model for how IT might respond to incidents. It all begins by defining
what resources you have available and how you want to deploy them. This requires a framework for evaluation
and escalation. I am going to leave the topic of escalation for later, and focus on priority establishment.

http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (2 of 5)12/31/2006 10:38:34 AM
How To Prioritize Incidents

It is very important to separate a priority from the establishment of that priority. A priority code, for example
Critical, defines how the organization will respond. It is separate from the reasons an event or incident is
handled Critically. This is a crucial distinction to understand. Many otherwise well intentioned priority coding
system run amuck due to confusing this fact. Practically, this means that establishing a priority coding system
requires two major parts:

1. definitions of organizational response (e.g., Critical, High, Medium, Low, etc.)
2. a method for determining which response to apply to any given incident
ITIL presents an example (and it is just an example) of a 2-part priority coding system with five priority levels
or tiers: 1-Critical, 2-High 3-Medium, 4-Low and 5-Planning. It then offers a simple matrix with impact on the
top, and urgency on the side to select the priority.
Thus, establishing priority is a matter of mostly two things: impact and urgency. Impact is what will happen if
the job does not get done and urgency is a measure of how quickly a job has to get done. A third element,
resource allocation, can also be used and relates to scope, in other words, how many "fires" you want to be able
to fight at once.
Of course, as is most often the case with ITIL, necessarily left completely up to the practitioner is the definition
of impact and what constitutes urgency. This makes the next big question "how do impact and urgency get
determined?"
Start by defining what a Critical priority (code 1) means in terms of how the IT organization will respond to it.
Here is one set of definitions taken in part from an actual organizations stated policies:
CRITICAL priority means an immediate and sustained effort using all available resources until
resolved. On-call procedures activated, vendor support invoked.
Note how the priority describes how the IT organization will respond. It is not a description of some customer
outage, affected users, or litany of services. Instead, it establishes the basis for servicing the customer. Any
reasonable customer would now understand that given such definition of Critical (priority 1) issues, many socalled "urgent" or "critical" requests are not truly urgent or critical after all. How can the IT department apply
"all available resources" (internal and external) to every issue? They can't and should not have to either.
The number of priority definitions, and how long it has to respond, should be worked and agreed with the
business and take into account any service catalogs and service level agreements.
Next describe the rest of your levels:
HIGH priority means technicians respond immediately, assess the situation, may interrupt other staff
working low or medium priority jobs for assistance.
MEDIUM priority means responding using standard procedures and operating within normal
supervisory management structures.
LOW priority means responding using standard operating procedures and as time allows.
After defining the responses, we now have to develop a workable matrix (in conjunction with the business) to
choose which response will be used for any given incident. One example considers several impact aspects in
addition to urgency, and assigns a numeric point value to a variety of applications, customers, situations, and
so on. Figure 1 shows three aspects: Scope (number of affected users), Goodwill (visibility), and Operations
(functional interference). Note that the number of impact aspects should be worked and agreed with the

http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (3 of 5)12/31/2006 10:38:34 AM
How To Prioritize Incidents

business. Don't have too many impact aspects or scoring an incident becomes troublesome.
In figure 1, each IMPACT and URGENCY column can get earn from 0 to 3 points. For example, an Incident
may have a Scope impact of 3, a Goodwill impact of 0, an Operations impact of 1, and an urgency of 2, and thus
score a 6:
Points
3 points each

IMPACT
Scope
Affects > 50% of
users

IMPACT
Goodwill
Areas outside of the
company will be
affected negatively
OR positively

2 points each

Affects >10 but < 50 The company will be
affected negatively
users OR no more
than 50% of all users OR positively

1 point each

Affects < 10 users OR Business unit will be
no more than 25% of affected negatively
all users
OR positively

0 points each

Affects a single user

Goodwill unchanged

IMPACT
Operations
Interferes with core
business functions OR
loss or potential loss
of mission critical data

URGENCY
Event underway and
it cannot be stopped
or changed AND
immediate action
could resolve the issue
Interferes with nonEvent scheduled to
core activities OR
occur but enough
functions that do not time remains to
affect the entire
respond without
company
impacting event
Event can be
Interferes with
normal completion of postponed OR is far
enough away in time
work OR tasks are
more difficult but not to allow response
impossible to complete without loss of
productivity
Interferes with
No scheduled
recreational OR non- completion time is
business related use required and normal
work can continue
until responding

Figure 1. Priority Scoring Matrix

We then go back to the priority codes (Critical, High, Medium, Low) and establish a value range for each. In
this case a score of 12 means Critical; 9-11 means High; 5-8 means Medium; and 0-4 means Low. You will also
need to establish the timeframes within which each priority code will occur. Such a matrix would look like
figure 2. Following our example with a score of 6, this incident would be receive a priority of Medium:
Score
12

Priority
Code
Critical

9-11

High

5-8

Medium

0-4

Low

Response
An immediate and sustained effort using all
available resources until resolved. On-call
procedures activated, vendor support invoked.
Technicians respond immediately, assess the
situation, may interrupt other staff working low
or medium priority jobs for assistance.
Respond using standard procedures and
operating within normal supervisory
management structures.
Respond using standard operating procedures
as time allows.

Timeframes
Immediate action/resolution as
soon as possible.
Action within 1 hour/resolution
within 1 business day.
Action within 2 hours/resolution
within 2 business days.
Action within 2 business days/
resolution within 10 business days.

Figure 2. Priority Assignment Matrix

To use the system, the agent will simply score the incident by adding up the conditions met in figure 1 to come
to a total, and then choosing the appropriate priority code from figure 2!

Summary
Incident priority defines how the organization will respond. It takes into account multiple aspects of impact (e.
g., scope, application, service, reputation, environment, business, etc.) and urgency (e.g., how much time IT

http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (4 of 5)12/31/2006 10:38:34 AM
How To Prioritize Incidents

has to get the job done.)
1. Define your priority codes working with the business and as many unique Customers or representatives of

departments or business units as possible. (They will soon realize that not everything can be Critical!)
2. Agree to definitions of what resources you will bring to bear (e.g., how you will respond) BEFORE you agree
3.
4.
5.
6.

timeframes.
Agree to timeframes BEFORE you attempt to determine the business impact/urgency matrix.
Select, define and agree the impact columns, and an urgency column.
Develop, agree, and share your incident priority system with the business.
Train service desk staff, and then deploy. (Be sure to provide copies to customers and users so that they
understand how decisions on priority will be made from now on.)

A sound prioritization scheme like the one presented here can help you stabilize your day to day operations,
make you less reactive and more even in your responses. It improves reporting, and since you developed it in
conjunction with the business it lets you align more closely with customers and users, bridging the "IT
Business chasm."
You might even find that in time, you get less and less of the "we need it now" from customers. We in IT can all
learn something from people who really fight fires!
-Where to go from here:
q Subscribe to our newsletter and get new skills delivered right to your Inbox, click here.
q Download this article in PDF format for use at your own convenience, click here.
q Browse back-issues of the DITY Newsletter, click here.

Related articles:
q
q
q

How to Classify Incidents explains how to establish Incident classification systems.
9 Steps to Better Incident Classification explains Incident classification.
Scripted Success for more on creating and using diagnostic scripts.

Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved.

http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (5 of 5)12/31/2006 10:38:34 AM

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (11)

Dit yvol4iss34
Dit yvol4iss34Dit yvol4iss34
Dit yvol4iss34
 
Dit yvol6iss23
Dit yvol6iss23Dit yvol6iss23
Dit yvol6iss23
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Open it sm solutions final
Open it sm solutions   finalOpen it sm solutions   final
Open it sm solutions final
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
 
Dit yvol4iss19
Dit yvol4iss19Dit yvol4iss19
Dit yvol4iss19
 
Dit yvol2iss49
Dit yvol2iss49Dit yvol2iss49
Dit yvol2iss49
 
Dit yvol2iss3
Dit yvol2iss3Dit yvol2iss3
Dit yvol2iss3
 
Dit yvol3iss7
Dit yvol3iss7Dit yvol3iss7
Dit yvol3iss7
 
Dit yvol4iss46
Dit yvol4iss46Dit yvol4iss46
Dit yvol4iss46
 
Dit yvol4iss14
Dit yvol4iss14Dit yvol4iss14
Dit yvol4iss14
 

Mehr von Rick Lemieux

Mehr von Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 
Dit yvol5iss20
Dit yvol5iss20Dit yvol5iss20
Dit yvol5iss20
 

Kürzlich hochgeladen

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 

Kürzlich hochgeladen (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 

Dit yvol3iss1

  • 1. itSM Solutions® DITY™ Newsletter Reprint This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals who want a workable, practical guide to implementing ITIL best practices -- without the hype. become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm) Publisher itSM Solutions™ LLC 31 South Talbert Blvd #295 Lexington, NC 27292 Phone (336) 510-2885 Fax (336) 798-6296 Find us on the web at: http://www.itsmsolutions.com. To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com For information on obtaining copies of this guide contact: sales@itsmsolutions.com Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the permission of the Controller of HMSO and the Office of Government Commerce. Notice of Rights / Restricted Rights Legend All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited. Notice of Liability This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused directly or indirectly by the contents of this guide. Trademarks itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies.
  • 2. How To Prioritize Incidents Subscribe PDF Download Vol. 3.1 Back Issues JANUARY 3, 2006 How To Prioritize Incidents DITY Weekly Reader The workable, practical guide to Do IT Yourself IT should work on those things that are of a critical nature first, not simply those things people want done right away. The cold hard truth is that not every incident can or should be Critical. By Hank Marquis We all know that every customers outages and issues are the #1 AAA top highest most important things in their world, and they expect us within IT to respond appropriately—OR ELSE! hank MARQUIS Articles E-mail Bio Of course we in IT get lots of these "we need it now" incidents, which most of us refer to as "Urgent" requests. None of us have unlimited resources, so how can you balance response to all these requests for critical assistance? Clearly, some form of prioritization is required. But many times simply mentioning the word "prioritize" in a meeting brings up bad feelings and posturing on both sides of the table—"us" and "them." I think part of the problem is using the term "Urgent" to describe a priority. It does not http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (1 of 5)12/31/2006 10:38:34 AM
  • 3. How To Prioritize Incidents clearly communicate the nature of the situation. I prefer the term "Critical" to refer to the most important thing IT can do instead. I think this also helps in the conversation with the business. IT should work on those things that are of a critical nature first, not simply things people want done right away. The cold hard truth is that not every incident can or should be Critical. We have to establish a prioritization system that works, is fair, and takes into account true business need and IT capability. Oh yes, and one the customer accepts and agrees to follow. I find it helpful to use non-technical analogies to work with business people, especially when trying to get them to understand something complicated. So, in order to come to a priority system that works, let’s start by examining one we all have heard about—the use of "alarms" by your local fire department. You know, a "2 alarm fire" or a "4 alarm fire" and so on. Once again, real fire fighters provide an excellent model for IT. How Fire Fighters Do It A priority code is a value assigned to a work request, like an incident record. The priority code establishes the order in which jobs gets done and ensures the correct allocation of resources required to accomplish the work the job requires in the timeframe permitted. Priority reflects the organizational response required for an Incident. Simply put, an issue with a higher priority gets resolved sooner than a lower issue because we apply more focus and more resource sooner. Fire departments often have a priority system based on "alarms" to indicate priority. One department uses a scheme that has 5 levels of priority—where priority means level of resource applied to the issue. More urgent needs get more resources sooner in an escalating manner. It begins when an initial call is evaluated, and assuming a credible report of fire; the response is 5 fire engines, 2 ladder trucks, one rescue squad and one fire chief. q q q q A 1-alarm fire is one confirmed by the initial responders; and one more engine, one more ladder truck, one battalion fire chief and one ambulance are committed to the effort. A 2-alarm fire brings 4 more engines, 2 more ladder trucks, 1 more fire chief and EMS equipment. A 3-alarm fire gets 4 more engines and 2 more ladder trucks. 4-alarms signal a huge fire and the department sends all available equipment and personnel. Stay with me here! Fire fighting is a pretty well established business, and the schemes used have been proven. They know how and when to respond, and what resources they need to apply. Key points to notice here include: q The response level (e.g., priority or "alarms") is described in terms of how the support organization responds and not the scope or criticality of the situation q There are 5 types of response (initial, to 4 alarms), each indicating increased managerial and technical commitment q For each type of response there is a pre-defined resource allocation and process q Technical evaluation of the situation determines the response type q Few situations immediately receive a "4-alarm" response q Escalation provides more technical and managerial focus and resources How You Can Do It Fire fighting is actually a pretty good model for how IT might respond to incidents. It all begins by defining what resources you have available and how you want to deploy them. This requires a framework for evaluation and escalation. I am going to leave the topic of escalation for later, and focus on priority establishment. http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (2 of 5)12/31/2006 10:38:34 AM
  • 4. How To Prioritize Incidents It is very important to separate a priority from the establishment of that priority. A priority code, for example Critical, defines how the organization will respond. It is separate from the reasons an event or incident is handled Critically. This is a crucial distinction to understand. Many otherwise well intentioned priority coding system run amuck due to confusing this fact. Practically, this means that establishing a priority coding system requires two major parts: 1. definitions of organizational response (e.g., Critical, High, Medium, Low, etc.) 2. a method for determining which response to apply to any given incident ITIL presents an example (and it is just an example) of a 2-part priority coding system with five priority levels or tiers: 1-Critical, 2-High 3-Medium, 4-Low and 5-Planning. It then offers a simple matrix with impact on the top, and urgency on the side to select the priority. Thus, establishing priority is a matter of mostly two things: impact and urgency. Impact is what will happen if the job does not get done and urgency is a measure of how quickly a job has to get done. A third element, resource allocation, can also be used and relates to scope, in other words, how many "fires" you want to be able to fight at once. Of course, as is most often the case with ITIL, necessarily left completely up to the practitioner is the definition of impact and what constitutes urgency. This makes the next big question "how do impact and urgency get determined?" Start by defining what a Critical priority (code 1) means in terms of how the IT organization will respond to it. Here is one set of definitions taken in part from an actual organizations stated policies: CRITICAL priority means an immediate and sustained effort using all available resources until resolved. On-call procedures activated, vendor support invoked. Note how the priority describes how the IT organization will respond. It is not a description of some customer outage, affected users, or litany of services. Instead, it establishes the basis for servicing the customer. Any reasonable customer would now understand that given such definition of Critical (priority 1) issues, many socalled "urgent" or "critical" requests are not truly urgent or critical after all. How can the IT department apply "all available resources" (internal and external) to every issue? They can't and should not have to either. The number of priority definitions, and how long it has to respond, should be worked and agreed with the business and take into account any service catalogs and service level agreements. Next describe the rest of your levels: HIGH priority means technicians respond immediately, assess the situation, may interrupt other staff working low or medium priority jobs for assistance. MEDIUM priority means responding using standard procedures and operating within normal supervisory management structures. LOW priority means responding using standard operating procedures and as time allows. After defining the responses, we now have to develop a workable matrix (in conjunction with the business) to choose which response will be used for any given incident. One example considers several impact aspects in addition to urgency, and assigns a numeric point value to a variety of applications, customers, situations, and so on. Figure 1 shows three aspects: Scope (number of affected users), Goodwill (visibility), and Operations (functional interference). Note that the number of impact aspects should be worked and agreed with the http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (3 of 5)12/31/2006 10:38:34 AM
  • 5. How To Prioritize Incidents business. Don't have too many impact aspects or scoring an incident becomes troublesome. In figure 1, each IMPACT and URGENCY column can get earn from 0 to 3 points. For example, an Incident may have a Scope impact of 3, a Goodwill impact of 0, an Operations impact of 1, and an urgency of 2, and thus score a 6: Points 3 points each IMPACT Scope Affects > 50% of users IMPACT Goodwill Areas outside of the company will be affected negatively OR positively 2 points each Affects >10 but < 50 The company will be affected negatively users OR no more than 50% of all users OR positively 1 point each Affects < 10 users OR Business unit will be no more than 25% of affected negatively all users OR positively 0 points each Affects a single user Goodwill unchanged IMPACT Operations Interferes with core business functions OR loss or potential loss of mission critical data URGENCY Event underway and it cannot be stopped or changed AND immediate action could resolve the issue Interferes with nonEvent scheduled to core activities OR occur but enough functions that do not time remains to affect the entire respond without company impacting event Event can be Interferes with normal completion of postponed OR is far enough away in time work OR tasks are more difficult but not to allow response impossible to complete without loss of productivity Interferes with No scheduled recreational OR non- completion time is business related use required and normal work can continue until responding Figure 1. Priority Scoring Matrix We then go back to the priority codes (Critical, High, Medium, Low) and establish a value range for each. In this case a score of 12 means Critical; 9-11 means High; 5-8 means Medium; and 0-4 means Low. You will also need to establish the timeframes within which each priority code will occur. Such a matrix would look like figure 2. Following our example with a score of 6, this incident would be receive a priority of Medium: Score 12 Priority Code Critical 9-11 High 5-8 Medium 0-4 Low Response An immediate and sustained effort using all available resources until resolved. On-call procedures activated, vendor support invoked. Technicians respond immediately, assess the situation, may interrupt other staff working low or medium priority jobs for assistance. Respond using standard procedures and operating within normal supervisory management structures. Respond using standard operating procedures as time allows. Timeframes Immediate action/resolution as soon as possible. Action within 1 hour/resolution within 1 business day. Action within 2 hours/resolution within 2 business days. Action within 2 business days/ resolution within 10 business days. Figure 2. Priority Assignment Matrix To use the system, the agent will simply score the incident by adding up the conditions met in figure 1 to come to a total, and then choosing the appropriate priority code from figure 2! Summary Incident priority defines how the organization will respond. It takes into account multiple aspects of impact (e. g., scope, application, service, reputation, environment, business, etc.) and urgency (e.g., how much time IT http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (4 of 5)12/31/2006 10:38:34 AM
  • 6. How To Prioritize Incidents has to get the job done.) 1. Define your priority codes working with the business and as many unique Customers or representatives of departments or business units as possible. (They will soon realize that not everything can be Critical!) 2. Agree to definitions of what resources you will bring to bear (e.g., how you will respond) BEFORE you agree 3. 4. 5. 6. timeframes. Agree to timeframes BEFORE you attempt to determine the business impact/urgency matrix. Select, define and agree the impact columns, and an urgency column. Develop, agree, and share your incident priority system with the business. Train service desk staff, and then deploy. (Be sure to provide copies to customers and users so that they understand how decisions on priority will be made from now on.) A sound prioritization scheme like the one presented here can help you stabilize your day to day operations, make you less reactive and more even in your responses. It improves reporting, and since you developed it in conjunction with the business it lets you align more closely with customers and users, bridging the "IT Business chasm." You might even find that in time, you get less and less of the "we need it now" from customers. We in IT can all learn something from people who really fight fires! -Where to go from here: q Subscribe to our newsletter and get new skills delivered right to your Inbox, click here. q Download this article in PDF format for use at your own convenience, click here. q Browse back-issues of the DITY Newsletter, click here. Related articles: q q q How to Classify Incidents explains how to establish Incident classification systems. 9 Steps to Better Incident Classification explains Incident classification. Scripted Success for more on creating and using diagnostic scripts. Entire Contents © 2006 itSM Solutions LLC. All Rights Reserved. http://www.itsmsolutions.com/newsletters/DITYvol3iss1.htm (5 of 5)12/31/2006 10:38:34 AM