- Outsourcing Law - http://www.outsourcing-law.com -
Service Configuration
Intellectual property lawyers understand that transferring a business process to a third party could result in leakage of proprietary technology and competitive trade secrets, despite the contractual non-disclosure provisions. Similarly, many functions are not appropriate for outsourcing. Thus, risks can be avoided by not outsourcing sensitive processes.
Rather than eliminate risk, one can shape the parameters of the risk by service configuration techniques. Security can be enhanced by such infrastructure configurations as:
The practicalities of such service configurations can be quite beneficial. The outsourcing contract, though, needs to spell out the parties’ expectations about the structure of service configuration and its impact on productivity, price, costs, timing, responsiveness and quality of service.
Article printed from Outsourcing Law: http://www.outsourcing-law.com
URL to article: http://www.outsourcing-law.com/service-configuration/
Click here to print.
Copyright © 2012 Outsourcing Law. All rights reserved.