any associated risks, therefore limiting productivity losses as our people get acclimated to the client site. While we have all the previously mentioned internal controls to minimize costs, customer needs supersede IPM’s desire for cost control. If a project constrained by a not-to-exceed estimate requires more hours than anticipated to meet the goals of the engagement (and requirements and scope have not changed), we will invest whatever is required in lieu of impacting the quality of service that our client receives. The actual data (as opposed to budgeted data ) in terms of hours is then incorporated into future estimates to ensure that similar IPM uses industry-standard approaches to ensure reliability and user-friendliness of our hardware and software. Reliability is achieved through standardization, proactive monitoring for potential points of failure, and initial and ongoing training. IPM laptops are purchased with on-site warranty repair within 24 hours. If an employee’s computer must be replaced due to extensive damage, IT staff can reapply the standard laptop image to the new computer, and access is restored. Laptops are replaced every three years to guard against failure and obsolescence. IPM uses the following approaches to keep hardware and software current and reliable: • Technology and systems planning • Trend monitoring • Employee surveys and informal vendor feedback • System and software development upgrades and patches As part of the 2013 office renovation, the room containing the corporate firewall and servers was built using dramatically higher standards versus the previous server room. Since the server room was upgraded, there has not been any server downtime due to power interruptions because of an increased capacity battery backup system. New flooring and dedicated air conditioning have provided the ideal environment for equipment, which leads to longer hardware lifetime. 6.2b(2) Security and Cybersecurity To ensure the security of sensitive data and information, IPM performs various tests, including vulnerability, stress, and intrusion accessibility, through annual or biannual assessments by a third-party security company. IPM has also created an information security system incorporating the Baldrige cyber security excellence builder and ISO 27001 standards. miscalculations do not occur in the future. 6.2b Management of Information Systems 6.2b(1) Reliability Granting appropriate access to our data and information and maintaining confidentiality are achieved by using network logon security, encryption of web traffic (https), read/write permissions applied to all systems, firewall security, incoming email spam filtering, secured wireless access that segregates trusted and guest access, and secured Virtual Private Network (VPN) access for the file server. IPM utilizes a patch management system to install all vendor recommended patches and features updates.
Figure 6.1-4 The Greenhouse Lifecycle
Figure 6.2-1 Cost Control Procedure by preventing them altogether. This is accomplished by PMCs through better guidelines, work instructions, and templates that comprise the IPM Way as well as support from their directors, the CoEs, KPM, and Communication and Creative Services (CCS). With their dual role as the account managers, the directors’ priority is quality, and they regularly review PMCs’ work product. CCS helps prevent defects, service errors, and associated rework by editing PMC documents, and they also create aesthetically pleasing, high-quality deliverables. In addition to being quality-focused and providing support, KPM emphasizes lessons learned and conducts Project Launch Analyses (PLAs). PLAs are held for the express purpose of allowing our PMCs to hit the ground running at an engagement by examining the conditions that may exist and
Page | 29
Made with FlippingBook interactive PDF creator