Discuss about the case study IT Consultants for Western Widgents.
The western widgets is a wholesale business that supplies widgets to clients in a local area and other regions. The company has gained the reputation in years for being fast and reliable in providing their services to clients. The company achieves this through a turnaround from the submission and delivery of orders; this is because they have built a large clientele base over the years throughout the southwest and Toowoomba region. Widget consultants is located in the local industry estate and occupies the large single storey shed of the warehouse and a co-located building where the main office is situated. The following service level agreement discusses issues, which will be covered by the organisation to meet the client’s needs in all areas (Deng, et al., 2003)(eContent, 2006). The agreement discusses, objective, period of the agreement, procedure, and other important areas of the service level agreement such as the information technology, contingency plan that looks at some of the threats and ways to minimise down time for business critical function, the customer service staff responsibilities and the responsibilities of the employee in this agreement.
Statement of Intent
The aim of this agreement is to provide the company with a strong base that will pave way for close co-operation between the clients for disaster management action plan to be provided by Western Widget IT consultants. The agreement is important in ensuring that the services are provided in an efficient and timely manner to the clients. The objectives of this agreement is detailed in section 1.2. This agreement is dependent on each participant fulfilling and knowing their responsibilities and having an environment to maintain and meet the main issues in the service areas (A.Harzing & A.Pinnington, 2011)(Akpoyomare, et al., 2012)(Briggs, et al., 2016)(Cameron, 2004).
This service level agreement will begin on the specified date in the Memorandum of Understanding with reference to the acceptance of the terms by each party and shall continue so unless otherwise agreed by the parties.
The review procedure of this agreement will be done annually and at a date, which is mutual agreed by the client and office administration of Western Widgets. In kind of review will cover services that are provided, procedures and all service levels. Any type of change to the agreement will have to be approved by the office of Western Widgets administration and the Client.
The Western Widget consultants and the clients nominate the following representatives to be responsible for the monitoring and the maintenance of this service level agreement.
Western Widget Administration |
Representative |
Client |
Representative |
Reference Documents
As part of the agreement, the following documents will be vital, as a basis for the procedures and policies by Western Widgets in executing is services. The documentation will also define the levels of support that are required and activities being prioritized with regard to the needs of the client. First of all the supports services by the administration of western widgets will be provided with the current standard operating procedures for IT consultants, the company also has a code of federal regulations that will be followed, property management regulations, orders of execution, personnel management rules and regulations, letters and other bargaining agreements(Jones, 2014)(Bozarth & Handfield, 2012)(Early, 2006).
In order for this service level agreement to succeed, then it will call upon the ability for the company to measure performance accurately to gather reliable and credible information, which the IT consultant will provide, to the customer and support areas, which are provided by the services. These factors will need to be measurable, meaningful and constantly monitored. The services will also be compared with the target levels agreed by the client and the IT consultant. Should there be any form of discrepancy between the agreed target and the service levels by the two parties; then a solution should come between the two parties and come up with a resolution on the same. Monitoring of the service levels will also be done by the Western Widgets administration and the client representative (Cohen, et al., 2007)(Armstrong, 2012). The consultant will also be responsible in providing progress reports for the services that will have been provided and they will be called upon to share with the representatives of the client’s organisation.
Service Desk
The IT consultant’s service desk will be responsible for providing IT support services to the clients and employees of the organisation. Some of these services will include client information security, networking services, real-time online customer care, handling customer complaints, responding to client’s emails and management of the organisational activities.
Scope
The IT consultant will be responsible in provision of all services but not limited to clients’ needs especially in handling client complaints, administering and answering client emails, providing online real-time complaints response and managing client’s calls. Such other activities will include as indicated in 3.0
The aim of customer service will be to attend to any need, complaints and other calls from the organisations clients. This will also include providing the customer will the right information, provide alternative solution to a crisis and be able to make appropriate referrals when needed at any point.
General responsibilities:
The hours of operation for Western widgets will be as follows:
Office Hours: 8:00 AM- 5:00 PM for seven days a week.
Overtime Hours: 5:00PM to 8:00AM from Monday to Friday.
The response time to incidents reported by clients will be within 20-30 minutes of the call.
INCIDENT |
RESPONSE TIME |
Low internet communication |
20-30 minutes |
Payroll system low |
20-30 minutes |
Crashed Customer feedback system |
1 hour |
Priority level Response time will be within 10 minutes.
PRIORITY |
RESPONSE TIME |
Poor customer feedback system |
10 |
Faulty Phone extension lines |
10 |
Poor network server |
10 |
Response time for service will be done within 2 hours of the call. This will involve gathering of information from the person requesting, finding appropriate person and details and reverting to the client.
Custom Requests (CR)
Custom request shall be done within 12 hours of the call.
Escalation Process
Escalation process will take within 2 to 3 working days. This will provide time to investigate the issue, find the right response, repackage, and revert.
Planned Outages
Planned outages for this agreement will only be visited during the following window period between 9:00AM 9:00 PM on Sundays. It will however be changed depending on the needs of the client and upon prior notice.
Data Security and System Integrity
There will be strict handling and administration of client’s data all time. In times of access to the client’s data, the client shall be duly informed to authorise any use of data. The client shall also deserve administrative rights of his data and will provide authorisation for its use.
Plan Updating
The Disaster Recovery Plan updating will properly be controlled to the needs of the client. All the changes made will be fully tested and appropriate amendments made before signing of the SLA. All the Disaster Recovery Plan procedures will be done under the control of the IT Consultant.
With regard to the Disaster Recovery Plan, all information will be documented and stored in secure locations as directed by the company. The senior management will be issued with the Storage device and a hard copy of this agreement. Each team member will also be issued with a CD and hard copy of the plan. There will be a master copy; this will be stored in specific resources that are established for this course.
With regard to this agreement, all the business processes between the IT consultant and the client will be listed. The strategy will involve the maintenance of a duplicate site that will enable an instant switching between the headquarters and the backup area. Some of the most vital areas will include:
KEY BUSINESS PROCESS |
BACKUP STRATEGY |
IT Operations |
Fully mirrored recovery site |
Tech Support – Hardware |
Fully mirrored recovery site |
Tech Support – Software |
Fully mirrored recovery site |
Facilities Management |
Fully mirrored recovery site |
|
Fully mirrored recovery site |
Purchasing |
Fully mirrored recovery site |
Disaster Recovery |
Fully mirrored recovery site |
Finance |
Fully mirrored recovery site |
Contracts Admin |
Fully mirrored recovery site |
Warehouse & Inventory |
Fully mirrored recovery site |
Product Sales |
Fully mirrored recovery site |
Maintenance Sales |
Fully mirrored recovery site |
Human Resources |
Off-site data storage facility |
Testing Fully Mirrored Recovery site – |
Fully mirrored recovery site |
Workshop Fully Mirrored Recovery site – |
Fully mirrored recovery site |
Call Center |
Fully mirrored recovery site |
Web Site |
Fully mirrored recovery site |
With regard to the business processes, there are disruptive threats that will occur anytime that will affect the service. Some of the potential threats for the IT consultant are listed in the below table. Each risk has been examined clearly with regard to the level of business disruption that could arise from each disaster.
Potential disasters have been assessed as follows:
Potential Disaster |
Probability Rating |
Impact Rating |
Brief Description Of Potential Consequences & Remedial Actions |
Fire |
3 |
4 |
Excess power load that could cause cables to heat up. Fire and smoke detectors on all floors. |
Act of sabotage |
5 |
||
Electrical power failure |
3 |
4 |
Redundant UPS array together with auto standby generator that is tested weekly & remotely monitored 24/7. UPSs also remotely monitored. |
Loss of communications network services |
4 |
4 |
Poor LAN or ISP that will lead to loss of communication. Purchase a new service provider. Have backup. |
Probability: 1=Very High, 5=Very Low Impact: 1=Total destruction, 5=Minor annoyance
There will be key issues identified by the IT consultant that will trigger the activation of Disaster Recovery Plan. With regard to the work under the Service Level Agreement, some of the main key trigger issues are:
When this happens all the departments will assemble at the working group-meeting hall or at the recreation hall as an alternative.
The IT consultant will contact and assemble the Disaster Recovery Team. The responsibility of this team will include but not limited to the following:
The IT consultant will ensure that there is a hard copy of the names and contact numbers of each employee working in various departments. The management department will work with the IT consultant in storage of customer and client information, both in a backup hard disk and in hard copy. They will also be issued with the Disaster Recovery plan and business continuity plan, which they will be allowed to keep in their homes in the event that the building could be inaccessible due to natural disasters like fire.
There will also be close contact will all employees with regard to disaster and immediate action for the company. Employees who will not reach fellow staff from their list will be provided with staff emergency contacts. If the manager of a particular department assigned to contact another client is inaccessible, the backup staff member will do this job.
Whenever staff desires to get latest information and response from the organization, they will be provided with a toll free number, which will be listed in the disaster recovery card. In the card, there will be details on the nature of disaster, where to assemble and constant updates regard time and day to resume work.
The disaster recovery Plan team will prepare an initial financial and personal assessment of each employee. It will then compare this with the impact of financial affairs of the client’s business. Some of the areas to look at will include:
The main objectives of the Contingency Plan will be to ensure that there is uninterrupted existence of the company’s business functions to the client as per the service level agreement. This will evolve around the protection of two most vital areas of the clients business, and this is Data and Personnel. All areas of the business contingency plan will address protection and safety of Data and Personnel information. This will be done in the following order:
The IT consultant together with the client will determine which team member will be responsible for each function during the contingency plan phase. There will be addition duties and responsibilities that will address specific actions and functions during each phase.
The response phase thus will server the following functions:
The main activities during the resumption phase will be:
During the implementation of the contingency plan, the following assumptions are made;
First, it is there will be evident running telecommunication connectivity and fibre optic cabling which Internet Service Provider and the Telecom Department will provide.
Also all the necessary Memorandums of Agreement and Understanding will have been executed.
Some of the major Issues that can be encountered by the IT consultant during the implementation of the contingency plan will be as follows:
Core business functions |
Characteristics of interruption |
Short term (Up to [TIMEFRAME]) |
Long term (More than [TIMEFRAME]) |
Payroll |
Inavailability of building and payroll system |
Organize with the bank to ensure payments are wired as previousely done in the past month. |
IT consultant to organise for a backup payroll system be installed promptly. |
|
No Email Access In the Building and Fault with the exchange Server |
IT consultant to advice ISP . Accounts to be set up to access email over webmail of the disaster is not recovered promptly. |
Buy a new server or borrow server and rebuild. Collect back ups from off store storage. |
Network- Including Print and remote access |
No access to shared drives, prints and financial information |
IT consultant to contact IT supplier to support remotely. |
Implementation or repair of terminal server to wait until access to the building is restored. If the problem persists decision to be made on purchasing a new one. |
Phone and landlines |
Access to phone system down including mobile phones |
Contact Telcom firm to fix the problem. Advice the provider to separate main lines from extension systems |
Arrange for telcom firm to remove diversion |
Accounting Systems |
No access to building and other special financial systems |
IT consultant to contact IT supplier and repaire SQL server. |
If unrepairable purchase new server. |
By signing below, all parties agree to the terms and conditions described in this Agreement.
The Terms and Conditions will apply for (check the required box only):
Services – As per Appendix A Service Catalogue
Hours of Coverage – As per this SLA
Name: Damien John Stritch
Position: IT Technician/Consultant
Signature:
Date: 12/08/2016
Name:
Position:
Signature:
Date:
References
A.Harzing & A.Pinnington, 2011. International Human Resource Management. London : Sage Pub.
Adrian, H., 2007. Corporate truth: the limits to transparency. Sterling: VA: Earthscan..
Akpoyomare, O., Adeosun, L. & Ganiyu, R., 2012. Differentiation and Positioning Strategy: A Toss of the Same Coin.. International Journal of Management and Sustainability, 1(2), pp. 53–65.
Armstrong, M., 2012. Armstrong’s handbook of management and leadership: developing effective people skills for better leadership and management. s.l.:Kogan Page.
Bozarth, C. & Handfield, R., 2012. Introduction to operations and supply chain management. 3rd ed. Upper Saddle River, New Jersey: Pearson Prentice Hall..
Briggs, D. M., Swailes, S. & Baker, S., 2016. The measurement of worker relations: the development of a three-component scale.. Leadership & Organization Development Journal, 37(1), pp. 2-12.
Cameron, K., 2004. Strategies for successful organisational downsizing. Human Resource Management, 33(2), pp. 189-211.
Cohen, L., Manion, L. & Morrison, K., 2007. Research Methods in Education (6th Ed.). Abingdon: Routledge.
Deng, J., Menguc, B. & Benson, J., 2003. The impact of human resource management on export performance of Chinese manufacturing enterprises.. Thunderbird International Business Review, p. 409–429.
Early, J., 2006. Service level agreements. Nursing management , 3(3), p. 25.
eContent, 2006. Governance: corporate social responsibilty and employee accountability. Innovation: Management, Policy, & Practice, 8(1), pp. 8-12.
H.Zhao & Seibert, S., 2006. The big five personality dimensions and entrepreneurial personality dimensions and entrepreneurial. Journal of Applied Psychology, pp. 91(2), 259-271..
Jacobs, R. F. & Chase, R. B., 2014. Operations and supply chain management. 14th ed. New York: McGraw-Hill/Irwin.
Jones, R., 2014. Largest IT consulting Companies. Arkansas Business, 52(31), p. 90.
Kramar, Syed, R. a. & J, 2012. Human Resource Management In A Global Context. London: Palgrave Macmillan (658.3KRA).
Wischnowski, M., Pfluke, J. & Twining, D., 2003. Writing an Interagency Agreement. Young Exceptional Children, 6(4), pp. 11-17.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download