Feeds

Corruption cops warn on old-school project management

NSW's Independent Commission Against Corruption issues procurement guidance

Secure remote control for conventional and virtual desktops

The New South Wales Independent Commission Against Corruption (ICAC) has cast its eye over the IT sector, and suspects that there's a gap between project management practise and the real world that opens the door to corruption.

The issue the ICAC is trying to address is the way that a shift from staff to contractors can open the door to cost-blowouts and even outright corruption.

Contractors are an inevitable part of the modern IT project, the corruption watchdog notes, driven by both the supply side and the customer side. Someone with saleable skills rarely wants to stagnate into system maintenance after a project is completed. On the other side, the customer organisation usually doesn't have all the skills on hand to implement a major project, and probably lacks the time to build those skills from within.

However, the ICAC states, reliance on contract specialists to deliver projects also renders obsolete traditional project controls that are taught to any professional manager: “budget, specifications, timeframe, cost and measurement of deliverables become elastic and are rendered less effective,” the commission writes. “As these controls weaken, the ICAC has seen opportunities for profiteering and corruption increase; contractors can over-service, over-price and under-deliver.”

The customer-side manager is also confronted with a dizzying array of small and micro-businesses offering specialist services, the ICAC notes: most of the country's 20,000 IT businesses have fewer than five staff, and only 500 firms have more than 20 staff. That's in addition to two thousand recruitment firms, many of which are contractor-owned.

Hence its information paper, Managing IT Contractors, Improving Outcomes, compiled after interviews with CEOs, COOs, IT managers and auditors from public and private sector organisations.

The high points of its advice are that customers should:

  • The project's business case should be linked to the controls that apply throughout the project;
  • Design and build should be kept separate – the ICAC suggests rejecting low bids that indicate an undisclosed interest (such as a low design price that the contractor hopes to recover at build time). Informal contact between contractors and internal staff should be limited during the bid, and the ICAC suggests engaging separate contractors to act as reviewers;
  • Gateway control – managing who is allowed into contracts sounds obvious, but clearly the ICAC has seen evidence of organisations engaging contractors without the proper due diligence, so it recommends background checks of contractors, as well as using recruitment firms in contest with each other.
  • Managing project managers – PMs should not be too close to contractors, the ICAC writes, and their “span of control” should be limited; and
  • Exit strategy – every project needs one, and it should include enforcing fixed limits on tenure, so that a contractor doesn't have an incentive to string-out a project to keep the money flowing.

Certainly, none of these controls would have hurt Queensland Health, whose failed payroll system rollout ended in tears, an independent inquiry, and a final bill likely to reach $AUD1.2 billion for a system that's going to be replaced anyhow. ®

The essential guide to IT transformation

More from The Register

next story
Hello, police, El Reg here. Are we a bunch of terrorists now?
Do Brits risk arrest for watching beheading video nasty? We asked the fuzz
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.