How to survive when your suppliers go bust

With the recession continuing to decrease the stability of outsourcing firms and other suppliers, enterprises should make sure they are prepared for any risks resulting from a collapse.

The neglect by CFOs towards the managing of contracts is all the more alarming considering this year's demise of Indian outsourcer Satyam and the panic caused amongst its top global clients as a result.

The $1 billion accounting fraud exposed at Satyam led to the likes of Coca-Cola, insurance firm State Farm and National Australia Bank taking their IT projects away from the outsourcer, presumably through well planned contingency plans.

The fact that the majority of Satyam customers stuck with the firm may well have been down to the swift way the Indian government dealt with the problem by replacing the board and helping it find a new owner.

But sceptics may be excused for thinking that many may have found it too complicated to jump ship in the first instance because they never had a proper plan B.

Advertisement
Advertisement - Article continues below

Neglect

David Skinner, a partner at legal firm Morrison and Foerster, and a specialist in technology contracts, confirmed there was neglect when it came to allocating resources to contract management.

"There is short termism among financial directors," Skinner said. "They are the first to demand cost-cutting and contract renegotiations, but often don't see that outsourcing and other contracts need long-term investment on the client side."

"You often have junior people on the client side working with B and C level people on the supplier side," he added. "If you have 30,000 a year people trying to manage 80,000 a year people there is going to be an inbalance. More senior people are required to manage strategic contracts."

Picking a fight

Skinner said there had been a recent increase in clients "picking a fight" with their suppliers over existing contracts with the aim of reducing their costs, with clients often citing previously highlighted problems.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019