<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Governance Archive - amendos gmbh</title>
	<atom:link href="https://www.amendos.de/en/category/governance/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.amendos.de/en/category/governance/</link>
	<description></description>
	<lastBuildDate>Wed, 03 Dec 2025 14:23:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.amendos.de/wp-content/uploads/2021/02/cropped-Symbol_Amendos_HQ_weisses_A-1-e1612369711166-32x32.png</url>
	<title>Governance Archive - amendos gmbh</title>
	<link>https://www.amendos.de/en/category/governance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>GDPR-Reform 2025: A Step Back or a Much-Needed Adjustment?</title>
		<link>https://www.amendos.de/en/compliance/gdpr-reform-2025-a-step-back-or-a-much-needed-adjustment/</link>
		
		<dc:creator><![CDATA[Michael Pfitzmann]]></dc:creator>
		<pubDate>Thu, 05 Jun 2025 11:41:37 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/gdpr-reform-2025-a-step-back-or-a-much-needed-adjustment/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/compliance/gdpr-reform-2025-a-step-back-or-a-much-needed-adjustment/">GDPR-Reform 2025: A Step Back or a Much-Needed Adjustment?</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>Since its entry into force in May 2018, the General Data Protection Regulation (GDPR) has been considered the central framework for handling personal data within the European Union. Its aim is to strengthen citizens&rsquo; rights in the digital space and to obligate companies to practice transparent and responsible data protection. Despite its pioneering status, the GDPR is frequently criticized&mdash;especially by small and medium-sized enterprises (SMEs)&mdash;as overly bureaucratic and difficult to implement. Now, a comprehensive reform is planned for 2025. With its proposals, the European Commission seeks to reduce existing hurdles and adapt the regulation to current technological developments such as artificial intelligence (AI) and big data&mdash;without compromising fundamental data protection rights. But can this balancing act succeed?</strong></p>
<div></div>
<h3>Why GDPR Reform Is Now on the Agenda</h3>
<p>The proposed GDPR reform was officially introduced in spring 2024. Since then, additional proposals have emerged, all pursuing a central goal: making the regulation more practical and efficient. Two key objectives are in focus:</p>
<ul>
<li>Relief for SMEs by reducing excessive obligations</li>
<li>Adapting the GDPR to technological innovation</li>
</ul>
<p>While business associations such as Bitkom and the BDI welcome the reform, data protection advocates and civil society organizations like noyb warn of serious risks to EU citizens&rsquo; fundamental rights.</p>
<div></div>
<h3>Reducing Bureaucracy for SMEs: Relief or Risky Exception?</h3>
<p>A core element of the reform is the planned relief for small and medium-sized enterprises. Companies with fewer than 750 employees would be exempt from certain documentation requirements&mdash;such as processing records or data protection impact assessments&mdash;provided no high risk is involved.</p>
<p>The EU Commission justifies this step by citing the need to align the GDPR with business realities. The current &ldquo;one-size-fits-all&rdquo; approach places a disproportionate burden on SMEs with limited resources.</p>
<p>Surveys show that many companies are not fundamentally opposed to data protection&mdash;they simply struggle with the practical implementation of its requirements. A shift toward differentiated regulation could offer much-needed relief.</p>
<p>However, critics argue that this differentiation sets a precedent: data protection rights could be weighted differently depending on company size. This would contradict the European fundamental right to informational self-determination.</p>
<div></div>
<h3>Jurisdictional Flexibility: Streamlining or Strategic Loophole?</h3>
<p>Another significant aspect of the GDPR reform concerns the jurisdiction of data protection authorities. Currently, the principle is that in cases of cross-border processing, the authority at the company&rsquo;s main establishment takes the lead.</p>
<p>In the future, this model is to be made more flexible to accelerate procedures and reduce legal uncertainty.</p>
<p>Yet practice already reveals weaknesses in the system: companies like Meta and Google benefit from the Irish Data Protection Authority being responsible for them&mdash;an authority repeatedly criticized for slow response times and weak enforcement.</p>
<p>Too much flexibility could allow corporations to strategically choose &ldquo;data-friendly&rdquo; authorities&mdash;clearly a setback for EU-wide harmonization of data protection oversight.</p>
<div></div>
<h3>Technological Change: How AI and Big Data Challenge the GDPR</h3>
<p>A major driver of the reform is technological progress. The GDPR was created at a time when automated decision-making, algorithmic profiling, and AI systems were still fringe topics. Today, they are central to digital business models.</p>
<p>Therefore, the Commission proposes:</p>
<ul>
<li>Clearer definitions of terms like &ldquo;personal data&rdquo; and &ldquo;automated decision&rdquo;</li>
<li>Reassessment of pseudonymized or aggregated data</li>
<li>Technology-neutral solutions that uphold data protection standards</li>
</ul>
<p>Industry representatives welcome this move, hoping for legal clarity to support data-driven innovation. Companies want to better understand what compliant AI applications should look like.</p>
<p>But data protection advocates urge caution: in practice, pseudonymized data is often re-identifiable&mdash;especially when analyzed using AI across large datasets. A premature opening could foster misuse and undermine fundamental rights.</p>
<div></div>
<div>
<p><img fetchpriority="high" decoding="async" class="wp-image-17684 aligncenter" src="http://www.amendos.de/wp-content/uploads/2025/06/GDPR-Reform-2025-300x275.png" alt="" width="384" height="352" srcset="https://www.amendos.de/wp-content/uploads/2025/06/GDPR-Reform-2025-300x275.png 300w, https://www.amendos.de/wp-content/uploads/2025/06/GDPR-Reform-2025-1024x938.png 1024w, https://www.amendos.de/wp-content/uploads/2025/06/GDPR-Reform-2025-768x704.png 768w, https://www.amendos.de/wp-content/uploads/2025/06/GDPR-Reform-2025-1536x1408.png 1536w, https://www.amendos.de/wp-content/uploads/2025/06/GDPR-Reform-2025.png 1700w" sizes="(max-width: 384px) 100vw, 384px"></p>
</div>
<h3>Civil Society Criticism: Lack of Transparency and Inclusion</h3>
<p>It&rsquo;s not just the content but also the legislative process itself that faces sharp criticism. Civil society organizations complain that economic interests dominated the drafting of the reform.</p>
<p>NGOs, data protection experts, academics, and civil rights groups were barely involved. This one-sidedness threatens the legitimacy of the entire legislative process and could erode trust in EU institutions.</p>
<p>Civil society therefore calls for a transparent debate, balanced representation of interests, and an independent impact assessment that also considers long-term risks to democracy and the rule of law.</p>
<div></div>
<h3>Conclusion: GDPR Reform as a Balancing Act Between Innovation and Rights Protection</h3>
<p>The planned GDPR reform of 2025 is undoubtedly necessary&mdash;not least to align regulation with the realities of modern data processing. Targeted relief could benefit especially small and medium-sized enterprises. Greater clarity is also needed in dealing with emerging technologies like AI and data analytics.</p>
<p>But modernization must not come at the expense of data protection and digital self-determination. The challenge lies in finding a fair, practical, and legally sound solution. One thing is clear: if data protection is weakened, Europe risks not only losing trust but also its leading role in global data law.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/compliance/gdpr-reform-2025-a-step-back-or-a-much-needed-adjustment/">GDPR-Reform 2025: A Step Back or a Much-Needed Adjustment?</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NIS2 – Impacts on the Supply Chain</title>
		<link>https://www.amendos.de/en/compliance/nis2-impacts-on-the-supply-chain/</link>
		
		<dc:creator><![CDATA[Michael Pfitzmann]]></dc:creator>
		<pubDate>Wed, 04 Dec 2024 12:47:51 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/nis2-impacts-on-the-supply-chain/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/compliance/nis2-impacts-on-the-supply-chain/">NIS2 – Impacts on the Supply Chain</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>Germany&rsquo;s&nbsp;<a href="https://en.wikipedia.org/wiki/Cyber-security_regulation#NIS_2_Directive"><strong>NIS2 Implementation and Cybersecurity Strengthening Act (NIS2UmsuCG)</strong></a>&nbsp;is expected to come into force in&nbsp;<strong>spring 2025</strong>. This new regulation will have&nbsp;<strong>significant implications</strong>&nbsp;for service provider contracts and cybersecurity. Companies should not wait passively but actively prepare to comply with the legal requirements. This article outlines how NIS2 will affect future service provider contracts for regulated entities and what actions must be taken.</p>
<h3><strong>Urgency of NIS2 Implementation</strong></h3>
<p>In practice, the delay in Germany&rsquo;s NIS2 law does not exempt regulated companies from preparing. Although penalties cannot be imposed before the law takes effect,&nbsp;<strong>cyber insurers may refuse coverage</strong>&nbsp;for incidents occurring after&nbsp;<strong>October 17, 2024</strong>, if NIS2 requirements are ignored.This deadline marked the end of the EU&rsquo;s transposition period. For companies operating across borders, legal uncertainty arises: who is liable if an incident occurs in an EU country that has implemented NIS2, but the responsible company is based in unregulated Germany?</p>
<h3><strong>Who Needs to Prepare?</strong></h3>
<p>A simple rule applies:&nbsp;<strong>any company regulated under NIS2 must begin preparations immediately</strong>. In Germany, this affects up to&nbsp;<strong>29,500 companies.</strong>However, due to NIS2&rsquo;s <strong>supply chain security requirements</strong>, it&rsquo;s unclear how many&nbsp;<strong>service providers and suppliers</strong>&nbsp;will also be impacted.</p>
<h3><strong>Supply Chain Security</strong></h3>
<p>NIS2 requires regulated companies to&nbsp;<strong>contractually ensure</strong> that all external partners comply with cybersecurity standards&mdash;whenever outsourcing, third-party services, or hardware/software products affect business-critical processes. In such cases, contractors must commit to meeting the same requirements as the regulated company itself.</p>
<p>&nbsp;</p>
<div id="attachment_17665" style="width: 738px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-17665" class=" wp-image-17665" src="http://www.amendos.de/wp-content/uploads/2024/12/NIS2-300x184.png" alt="" width="728" height="446" srcset="https://www.amendos.de/wp-content/uploads/2024/12/NIS2-300x184.png 300w, https://www.amendos.de/wp-content/uploads/2024/12/NIS2-1024x629.png 1024w, https://www.amendos.de/wp-content/uploads/2024/12/NIS2-768x472.png 768w, https://www.amendos.de/wp-content/uploads/2024/12/NIS2-1536x943.png 1536w, https://www.amendos.de/wp-content/uploads/2024/12/NIS2.png 1920w" sizes="(max-width: 728px) 100vw, 728px"><p id="caption-attachment-17665" class="wp-caption-text">Figure 1: NIS2 impact on service providers and suppliers</p></div>
<p>This is not entirely new for many providers. Companies pursuing&nbsp;<strong>ISO 27001</strong>&nbsp;or&nbsp;<strong>BSI IT-Grundschutz</strong>&nbsp;certifications already face supplier audits and contractual requirements for resilience, integrity, and confidentiality. Data center operators, for example, are used to regular checks by clients with sensitive data needs.</p>
<h3><strong>Impacts on Service Providers</strong></h3>
<p>What&rsquo;s new with NIS2 is that&nbsp;<strong>compliance is enforced indirectly</strong>&mdash;through contractual obligations from regulated clients. Paradoxically,&nbsp;<strong>suppliers may face compliance demands before their clients do</strong>. While regulated companies benefit from transition periods (up to three years for critical infrastructure operators),&nbsp;<strong><a href="https://www.amendos.de/en/it-vendor-management/selecting-it-service-providers-the-5-most-common-mistakes/">service providers</a> do not</strong>. Many contracts are renewed every 2&ndash;4 years, and upcoming negotiations will require&nbsp;<strong>NIS2-compliant clauses</strong>.If a contract&rsquo;s term overlaps with the law&rsquo;s effective period, regulated companies must ensure their suppliers are compliant. Procurement teams will demand&nbsp;<strong>proof of cybersecurity measures</strong>&nbsp;during contract renewals. Risk management will only allow partnerships that meet legal standards.</p>
<h3><strong>Recommended Actions for Service Providers</strong></h3>
<p>Service providers should begin implementing the&nbsp;<strong>minimum security requirements</strong>&nbsp;listed in&nbsp;<strong>Article 21 of NIS2</strong>, such as security concepts and encryption. Most of these are not new, especially for platform operators, data centers, or software developers working with regulated clients.A useful benchmark is the&nbsp;<strong>questionnaires used by cyber insurers</strong>, which assess crisis management, network security, and user privileges. Clients will expect&nbsp;<strong>readiness for audits, penetration tests, and exercises</strong>. Additional cybersecurity clauses may be added to SLAs. Written declarations of compliance with IT-Grundschutz may become mandatory&mdash;already a requirement in public tenders.</p>
<h3><strong>Conclusion: NIS2 and the Supply Chain</strong></h3>
<p>Ignoring rising cybersecurity expectations is no longer an option&mdash;especially for service providers working with NIS2-regulated companies. Future contracts will only be awarded to those who can&nbsp;<strong>demonstrate an appropriate level of cybersecurity</strong>. NIS2 dramatically expands the scope of cybersecurity obligations. Thousands of companies must now meet their clients&rsquo; elevated expectations. Compliance may even become a&nbsp;<strong>competitive advantage</strong>, especially if high resilience and security are emphasized in marketing.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/compliance/nis2-impacts-on-the-supply-chain/">NIS2 – Impacts on the Supply Chain</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IT Service Contracts – 10 Key Aspects from a Provider Management Perspective</title>
		<link>https://www.amendos.de/en/purchasing/it-service-contracts-10-key-aspects-from-a-provider-management-perspective/</link>
		
		<dc:creator><![CDATA[Jörg Bujotzek]]></dc:creator>
		<pubDate>Wed, 04 Sep 2024 10:15:00 +0000</pubDate>
				<category><![CDATA[Purchasing]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[IT Vendor Management]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/it-service-contracts-10-key-aspects-from-a-provider-management-perspective/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/purchasing/it-service-contracts-10-key-aspects-from-a-provider-management-perspective/">IT Service Contracts – 10 Key Aspects from a Provider Management Perspective</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>In today&rsquo;s business world, IT service contracts are the critical foundation for collaboration between outsourcing companies and their service providers. A well-crafted contract can make the difference between smooth cooperation and constant conflict. Based on our experience from various outsourcing projects, we want to highlight 10 important aspects that should be regulated in an IT service contract to ensure effective provider management.</p>
<h4><strong>Scope</strong></h4>
<p>We do not aim for completeness: many other aspects should also be appropriately regulated in IT service contracts depending on the outsourcing situation. These include liability, warranties, payment terms, confidentiality, contract duration, termination conditions, knowledge and compliance management. So let&rsquo;s focus on the aspects that, in our view, are particularly decisive for the success or failure of cooperation with service providers. Summarized for you:&nbsp;<strong>IT Service Contracts &ndash; 10 Key Aspects</strong></p>
<div id="attachment_17654" style="width: 725px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-17654" class=" wp-image-17654" src="http://www.amendos.de/wp-content/uploads/2024/09/10-Aspekts-300x139.png" alt="" width="715" height="331" srcset="https://www.amendos.de/wp-content/uploads/2024/09/10-Aspekts-300x139.png 300w, https://www.amendos.de/wp-content/uploads/2024/09/10-Aspekts-1024x475.png 1024w, https://www.amendos.de/wp-content/uploads/2024/09/10-Aspekts-768x356.png 768w, https://www.amendos.de/wp-content/uploads/2024/09/10-Aspekts-1536x713.png 1536w, https://www.amendos.de/wp-content/uploads/2024/09/10-Aspekts.png 1920w" sizes="(max-width: 715px) 100vw, 715px"><p id="caption-attachment-17654" class="wp-caption-text">Figure 1: 10 Aspekts</p></div>
<h3><strong>Ten Aspects</strong></h3>
<h4><strong>1. Clear Service Specification</strong></h4>
<p>The services to be provided must be defined as clearly and precisely as possible in the service contract. This includes the type and scope of services as well as the expected service quality. The latter is usually specified in the contract through service levels. The procedure for measuring compliance with service levels should also be regulated in the contract.</p>
<p>When specifying the expected external services, it is important to clearly define the client&rsquo;s cooperation obligations. If other service providers are working for the outsourcing company, clear performance boundaries between all parties must be specified. The goal is to minimize gray areas between provider and client as well as between providers.</p>
<p>Additionally, the framework conditions under which the service provider is to deliver the services must be defined. These can include service times and location requirements.</p>
<p>Clear service specifications and measurable service levels help manage expectations on both sides and provide a basis for evaluating service quality.</p>
<p>&nbsp;</p>
<h4><strong>2. Pricing and Billing Modalities</strong></h4>
<p>A transparent and fair pricing mechanism is essential to avoid misunderstandings and disputes. The contract should clearly specify which services are provided at what price and how billing is handled. Variable costs, such as for additional services or overtime, should also be clearly regulated.</p>
<p>&nbsp;</p>
<h4><strong>3. Change Management</strong></h4>
<p>Changes to IT services are inevitable, whether due to technological advancements or changing business requirements on the client side. Effective change management in the contract ensures that changes are carried out in a structured and controlled manner. This includes defining processes for requesting, evaluating, commissioning, and implementing changes, as well as communication between the parties.</p>
<p>&nbsp;</p>
<h4><strong>4. Risk Management</strong></h4>
<p>A good IT service contract should also include provisions for handling risks and emergencies. This involves identifying potential risks, developing action plans, and regularly reviewing and updating these plans. The goal is to proactively minimize the impact of disruptions and ensure continuity of business processes.</p>
<p>&nbsp;</p>
<h4><strong>5. Reporting, Roles, and Communication</strong></h4>
<p>Regular reporting and open communication are crucial for successful provider management. The contract should specify what information (especially within SLA reporting) a provider must deliver and at what intervals, and how communication between the parties is organized. Appropriate roles and committees, along with their tasks and interactions, should be defined in the contract for regular exchanges and decision-making.</p>
<p>This enables continuous monitoring of service quality, early identification of problems, and appropriate service development.</p>
<p>&nbsp;</p>
<h4><strong>6. Cooperation</strong></h4>
<p>The contract should also obligate the service provider to cooperative behavior. This applies not only to collaboration with the client but also with the client&rsquo;s other service providers. Shared goals should be defined in the contract as a basis. Common values and rules can then be agreed upon to guide cooperative behavior.</p>
<p>&nbsp;</p>
<h4><strong>7. Escalation Procedures</strong></h4>
<p>A clearly defined escalation procedure is important for resolving conflicts quickly and effectively. The contract should specify the steps to be taken when problems cannot be resolved at one level and who is then responsible for resolution. This helps avoid misunderstandings and ensures timely problem resolution.</p>
<p>&nbsp;</p>
<h4><strong>8. Performance Reviews and Audits</strong></h4>
<p>Periodic performance reviews and audits help ensure compliance with contractually agreed standards. The contract should specify how often these reviews take place and what criteria are applied. This allows deviations to be identified early and countermeasures to be taken.</p>
<p>&nbsp;</p>
<h4><strong>9. Continuous Improvement and Innovation</strong></h4>
<p>A good IT service contract should also include provisions to promote innovation and continuous improvement. This may include the provider&rsquo;s obligation to regularly evaluate new technologies and best practices and to propose optimization measures for IT services. The contract should also define how improvement ideas are planned and implemented, especially when multiple service providers must collaborate to realize improvements.</p>
<p>&nbsp;</p>
<h4><strong>10. Exit Strategy</strong></h4>
<p>A well-thought-out exit strategy is essential to ensure a smooth transition to a new provider or the reintegration of services into the company upon contract termination. The contract should include clear provisions for the handover process, data migration, and support from the previous provider.</p>
<p>&nbsp;</p>
<h3><strong>Conclusion: IT Service Contracts &ndash; 10 Key Aspects</strong></h3>
<p>A well-crafted IT service contract is the foundation for successful collaboration between client companies and IT service providers. The ten aspects mentioned &ndash; clear service specification, pricing and billing modalities, change management, risk management, reporting and communication, cooperation, escalation procedures, audits, continuous improvement, and exit strategy &ndash; are crucial for effective provider management and minimizing conflicts.</p>
<p>As a provider manager, you should ensure that these points are clearly and precisely regulated in your contracts to enable smooth and successful collaboration. If you work with multiple service providers, it makes sense to agree on uniform contract provisions with all parties. This simplifies collaboration and provider management.</p>
<p>A good contract alone does not guarantee good service and smooth cooperation. But it provides the necessary foundation. Consistent expectation management and active relationship management are essential for long-term success in IT outsourcing.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/purchasing/it-service-contracts-10-key-aspects-from-a-provider-management-perspective/">IT Service Contracts – 10 Key Aspects from a Provider Management Perspective</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NIS2: Who is affected, and what needs to be done?</title>
		<link>https://www.amendos.de/en/compliance/nis2-who-is-affected-and-what-needs-to-be-done/</link>
		
		<dc:creator><![CDATA[Michael Pfitzmann]]></dc:creator>
		<pubDate>Tue, 04 Jun 2024 09:55:28 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/nis2-who-is-affected-and-what-needs-to-be-done/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/compliance/nis2-who-is-affected-and-what-needs-to-be-done/">NIS2: Who is affected, and what needs to be done?</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>After our <a href="https://www.amendos.de/en/compliance/nis2-how-did-the-new-eu-directive-come-about-and-what-changes-will-it-bring/">first blog article</a> (April 2024) on the new <a href="https://en.wikipedia.org/wiki/Cyber-security_regulation#NIS_2_Directive">EU NIS2 Guidline</a> dealt with the basics, differences to NIS1, and the legislative situation, we will this time focus on the following topics: What criteria are used to categorize companies that operate critical infrastructure? What sanctions are potentially possible? What measures, especially in the area of risk management, must be implemented by the companies affected? In the following article, we provide an overview of these topics.</strong></p>
<h2><strong>NIS2 categorization of affected companies</strong></h2>
<p>With the NIS2 Directive coming into force, companies in 18 industrial sectors&mdash;instead of the previous 9&mdash;will have to implement specified minimum information security standards from 2024 onwards. The following two main criteria apply to determine whether a company is affected:</p>
<ol>
<li>Criterion: Company size</li>
</ol>
<p>Companies with at least 50 employees and an annual turnover of more than &euro;10 million fall within the scope of the NIS 2 Guidline if criterion 2 is also met.</p>
<p>2. Criterion: The company sector</p>
<p>Whether an organization falls under NIS 2 also depends on whether it belongs to one of the 18 defined company sectors. The company sector is the second decisive criterion, in addition to the size of the company. If both criteria are met, an organization falls under the NIS 2 Guidline.</p>
<h2>Special cases in categorization</h2>
<p>There are special cases in the digital infrastructure sector. Some operators are to be regulated regardless of their size. For companies that offer domain name services or trust services with qualified signature management, for example, which are considered extremely critical under NIS2, the size of the company is irrelevant. Even small or micro-enterprises that offer such services are considered particularly important entities&mdash;with all the obligations that this entails. Figure 1 provides an overview of this.</p>
<p>&nbsp;</p>
<div id="attachment_17636" style="width: 1329px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-17636" class=" wp-image-17636" src="http://www.amendos.de/wp-content/uploads/2024/06/Abbildung1-300x83.png" alt="" width="1319" height="365" srcset="https://www.amendos.de/wp-content/uploads/2024/06/Abbildung1-300x83.png 300w, https://www.amendos.de/wp-content/uploads/2024/06/Abbildung1-1024x284.png 1024w, https://www.amendos.de/wp-content/uploads/2024/06/Abbildung1-768x213.png 768w, https://www.amendos.de/wp-content/uploads/2024/06/Abbildung1.png 1224w" sizes="auto, (max-width: 1319px) 100vw, 1319px"><p id="caption-attachment-17636" class="wp-caption-text">Figure 1: Special cases for digital infrastructure companies</p></div>
<p>&nbsp;</p>
<h2>NIS2 Sanctions</h2>
<p>NIS2 divides sectors into eleven &ldquo;essential&rdquo; sectors with high criticality and seven &ldquo;important&rdquo; sectors. The distinction between &lsquo;essential&rsquo; and &ldquo;important&rdquo; also determines the scope of government oversight and the sanctions that can be imposed for non-compliance with and violations of NIS2 requirements.</p>
<p>For &ldquo;essential entities,&rdquo; sanctions can amount to up to ten million euros or two percent of global annual turnover, whichever is higher. For &ldquo;important entities,&rdquo; fines can amount to up to seven million euros or 1.4 percent of global annual turnover, also based on the higher amount.</p>
<p>A distinction is made between negligent and intentional fault, without differentiating between &ldquo;essential&rdquo; and &ldquo;important&rdquo; sectors. Even negligence can then lead, for example, to personal liability on the part of the managing director.</p>
<h2>Companies exempt from NIS2</h2>
<p>A company that should actually be affected may also be completely exempt from NIS2. The NIS2 Guidline does not apply to entities in the fields of defense or national security, public security, and law enforcement. The judiciary and parliaments are also excluded from the scope of application.</p>
<p>To avoid multiple regulation, the NIS2 Guidline provides an exemption for entities that must meet corresponding IT security requirements under other EU directives. For example, financial institutions subject to DORA only need to provide evidence of their information security and report incidents under DORA. They therefore already meet the relevant requirements.</p>
<h2>Measures to be ensured</h2>
<p>What measures must the affected companies now implement? The NIS2 Guidline requires them to implement a series of compliance measures. The following ten detailed requirements for risk management are taken directly from Article 21 of NIS2. They are crucial for full compliance with the Directive:</p>
<ul>
<li>established concepts for risk analysis and security for information systems,</li>
<li>concepts for dealing with security incidents,</li>
<li>concepts for maintaining operations, such as backup management and disaster recovery, as well as the corresponding crisis management,</li>
<li>evidence of supply chain security, including security-related aspects of the relationships between individual institutions and their immediate suppliers or service providers,</li>
<li>Security measures for the acquisition, development, and maintenance of network and information systems, including vulnerability management and disclosure,</li>
<li>Concepts and procedures for assessing the effectiveness of risk management measures in the area of cybersecurity,</li>
<li>Basic procedures in the area of cyber hygiene and training of employees in the area of cybersecurity,</li>
<li>Concepts and procedures for the use of cryptography and, where appropriate, encryption,</li>
<li>Staff security, concepts for access control and facility management (e.g., data centers),</li>
<li>use of multi-factor authentication or continuous authentication solutions, secure voice, video, and text communications, and, where appropriate, secure emergency communications systems within your own facility.</li>
</ul>
<p>&nbsp;</p>
<h2>Checklist for implementing necessary measures</h2>
<p>But how can these requirements be implemented consistently? We recommend creating a checklist. In our opinion, the following recommendations should be included in this checklist:</p>
<ol>
<li>Risk assessment and management:<br>
The first step should be to conduct a comprehensive assessment of current security risks. This involves identifying vulnerabilities in the IT infrastructure and then developing plans to address them.</li>
<li>Implementation of security measures:<br>
It must be ensured that security measures comply with the requirements of NIS2. These include advanced technologies for defending against cyber threats, regular updates and patches, and effective access controls.</li>
<li>Employee training:<br>
An essential part of compliance is raising awareness and training all employees. It must be ensured that they understand the importance of IT security and know how to respond to security incidents.</li>
<li>Incident reporting system and SIEM:<br>
Effective systems for detecting and reporting security incidents must be implemented. This should enable incidents to be detected, recorded, and reported quickly and efficiently.</li>
<li>Documentation and compliance review:<br>
Security processes and compliance measures must be carefully documented. Regular internal audits can help to review and ensure compliance with the NIS2 Guidline.</li>
<li>Cooperation and information exchange:<br>
Opportunities for cooperation with other companies affected by NIS2 and with authorities should be exploited in order to exchange best practices and continuously improve one&rsquo;s own security strategy.</li>
</ol>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>The NIS2 Guidline represents a significant step forward for European IT security. Its scope has been expanded to include additional sectors. The focus is on stricter security requirements as well as transparency and cooperation.</p>
<p>Companies now need to check in good time whether they are affected by NIS2. If this is the case, they must review their security strategies and adapt them to the new requirements. This includes a comprehensive risk assessment, the implementation of stronger security measures, employee training, the establishment of effective incident reporting systems, and clear documentation of all measures taken.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/compliance/nis2-who-is-affected-and-what-needs-to-be-done/">NIS2: Who is affected, and what needs to be done?</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NIS2: how did the new EU directive come about and what changes will it bring?</title>
		<link>https://www.amendos.de/en/compliance/nis2-how-did-the-new-eu-directive-come-about-and-what-changes-will-it-bring/</link>
		
		<dc:creator><![CDATA[Michael Pfitzmann]]></dc:creator>
		<pubDate>Tue, 23 Apr 2024 08:30:32 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/nis2-how-did-the-new-eu-directive-come-about-and-what-changes-will-it-bring/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/compliance/nis2-how-did-the-new-eu-directive-come-about-and-what-changes-will-it-bring/">NIS2: how did the new EU directive come about and what changes will it bring?</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>The new EU NIS2 Directive must be incorporated into German law by October 17, 2024. NIS2 stands for &ldquo;Network and Information Security &ndash; Version 2.&rdquo; The directive has been in force in the EU since January 2023. It aims to ensure that facilities classified as critical can supply the population in member states with essential goods and services. But how did the second version of NIS come about and how does it differ from NIS1? We will take a closer look at this and more in a series of blog articles. In the first article, we will discuss the origins and innovations of NIS2.</strong></p>
<p>&nbsp;</p>
<h2>History of NIS1 and KRITIS</h2>
<p>The European Union introduced its first cybersecurity directive in 2016. Today, this directive is known as NIS1. It was developed against the backdrop of an increasingly threatening situation and growing IT security requirements in Europe. The EU&rsquo;s aim was to protect sectors and services that are important to society in its member states from IT attacks.</p>
<p>NIS1 contains binding requirements for the protection of systems belonging to companies that operate &ldquo;critical infrastructures&rdquo; (KRITIS). These KRITIS companies play a crucial role in society as they provide services in important areas such as energy supply, health, and transportation.</p>
<h2></h2>
<h2>Emergence of NIS2</h2>
<p>Advancing digitalization is also leading to a steady increase in threats. A higher level of protection is required to adequately mitigate the current risks at KRITIS companies. The EU therefore decided to revise the NIS1 Directive. After lengthy deliberations and discussions, NIS2 was the result. Following approval by the EU Parliament and the European Council, NIS2 was adopted as an updated version on December 14, 2022. After it comes into force on January 16, 2023, EU member states will have 21 months to transpose the new regulations into national law. Accordingly, affected companies should already be familiarizing themselves with the requirements of the NIS2 Directive so that they can plan and implement the necessary measures in good time.</p>
<p>&nbsp;</p>
<div id="attachment_17630" style="width: 837px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-17630" class=" wp-image-17630" src="http://www.amendos.de/wp-content/uploads/2024/04/NIS2-2-300x83.png" alt="" width="827" height="229" srcset="https://www.amendos.de/wp-content/uploads/2024/04/NIS2-2-300x83.png 300w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2-2-1024x284.png 1024w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2-2-768x213.png 768w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2-2-1536x426.png 1536w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2-2.png 1920w" sizes="auto, (max-width: 827px) 100vw, 827px"><p id="caption-attachment-17630" class="wp-caption-text">Figure 1: Timeline of the Genesis of NIS2</p></div>
<p>&nbsp;</p>
<p>At the same time as NIS2, the so-called CER Directive &ndash; &ldquo;Critical Entities Resilience Directive&rdquo; &ndash; also came into force. CER regulates physical protection against sabotage and other attacks for KRITIS companies, for example in terms of access policies for data centers. The security of information and communication technology, on the other hand, is the subject of NIS2. CER is not discussed in detail in this and the following NIS2 articles.</p>
<p>&nbsp;</p>
<h2>Status of German legislation</h2>
<p>The drafts for the existing KRITIS umbrella law (KRITIS-DachG) on CER implementation and the somewhat cumbersome NIS 2 Implementation and Cybersecurity Strengthening Act (NIS2UmsuCG) are currently at different stages of the legislative process.</p>
<p>While the implementation of the KRITIS umbrella law has already been approved by the relevant ministries and the hearings with the federal states and associations for the second draft bill have been completed, there has been little progress on NIS2. An initial draft bill was already circulating unofficially in the summer of 2023. However, the Federal Ministry of the Interior and Homeland (BMI), which is in charge of the bill, has not yet published an official version. The schedule is now becoming increasingly tight. A concrete draft bill must first pass through the cabinet and then through parliament. Due to this complex procedure, it cannot be ruled out that the start date of NIS2 on October 18, 2024, will be missed.</p>
<p>&nbsp;</p>
<h2>Industries and sectors affected by NIS2</h2>
<p>The scope has been significantly expanded and now covers a total of eighteen industrial sectors, from water to space. The previous nine sectors of the KRITIS Regulation are included in the new areas. NIS2 continues to distinguish between high-criticality sectors and other critical sectors. The CER Directive applies to the 11 sectors with high criticality. The table in Figure 2 provides an overview of the sectors affected.</p>
<p>&nbsp;</p>
<div id="attachment_17632" style="width: 455px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-17632" class=" wp-image-17632" src="http://www.amendos.de/wp-content/uploads/2024/04/NIS2.1-284x300.png" alt="" width="445" height="470" srcset="https://www.amendos.de/wp-content/uploads/2024/04/NIS2.1-284x300.png 284w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2.1-969x1024.png 969w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2.1-768x812.png 768w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2.1-1454x1536.png 1454w, https://www.amendos.de/wp-content/uploads/2024/04/NIS2.1.png 1817w" sizes="auto, (max-width: 445px) 100vw, 445px"><p id="caption-attachment-17632" class="wp-caption-text">Figure 2: Sectors affected by NIS2</p></div>
<p>&nbsp;</p>
<p>Like NIS1, NIS2 imposes comprehensive requirements on risk management and cybersecurity.</p>
<h2></h2>
<h2>New classification as an affected company</h2>
<p>Another key element of the reform is a complete reclassification of the target group. In the previous understanding of critical infrastructures, the determination of their criticality was regulated in the KRITIS Regulation (KritisVO). In the future, this will be replaced by the Kritis-DachG (CER) and NIS2UmsuCG (NIS2).</p>
<p>The previous three-stage procedure defined sector affiliation, specific plant categories, and concrete thresholds. Exceeding these thresholds made an operator a KRITIS within the meaning of the regulation. The virtual benchmark for these thresholds was always a figure of 500,000 people who would be affected by a failure of the critical infrastructure.</p>
<p>After much back and forth, it was agreed in the negotiations on NIS2 (as well as CER) to redesign the classification of critical facilities and, in future, to classify them across Europe according to company size (50 employees and above), turnover figures (&euro;10 million/year), and sector affiliation. This classification will be regulated in the aforementioned NIS2UmsuCG in the future.</p>
<p>According to estimates by the Federal Statistical Office, these changes will mean that ten times more companies than before will be legally obliged to comply with the provisions of the NIS2 and CER directives. Existing KRITIS companies will automatically continue to fall under the new directive.</p>
<h2></h2>
<h2>New features in NIS2</h2>
<p>What are the most important differences and new features in NIS2 compared to NIS1? There are four important changes:</p>
<p>More than twice as many sectors (18 instead of 7) than before are classified as critical.<br>
Violations of NIS2 requirements will be punished according to a now uniform and significantly stricter catalog of fines, which is capped only by a percentage of global annual turnover &ndash; similar to the GDPR introduced in 2018. Previously, EU countries were able to determine the penalties themselves. In Germany, the maximum penalty was &euro;20 million.<br>
NIS2 introduces executive responsibility for the first time. In the future, executives will be personally liable if they violate their duties &ndash; including claims for damages that must be paid from their own assets.<br>
The new directive revises the existing reporting requirements to the Federal Network Agency and the BSI in the event of security incidents. In future, there will be a three-stage process instead of a single stage: a preliminary report must be made within 24 hours if a critical service fails &ndash; even if there is no precise knowledge of what exactly has happened. After 72 hours at the latest, the respective national supervisory authorities (in Germany, the Federal Network Agency) expect a qualified report on the incident and how it is being dealt with.</p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>The new classification system means that significantly more companies are now subject to KRITIS regulation. This results in many new tasks for these companies. Especially for smaller companies, the effort required for appropriate risk management can quickly become a major challenge. Companies already classified as KRITIS must review their existing concepts and adapt them if necessary. You can find out exactly what measures should be taken here, how the classification as a critical company works in detail, and further details in one of the next blog articles.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/compliance/nis2-how-did-the-new-eu-directive-come-about-and-what-changes-will-it-bring/">NIS2: how did the new EU directive come about and what changes will it bring?</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>EU Regulation DORA – Contents and implementation tips</title>
		<link>https://www.amendos.de/en/compliance/eu-regulation-dora-contents-and-implementation-tips/</link>
		
		<dc:creator><![CDATA[Jan Stammer]]></dc:creator>
		<pubDate>Tue, 05 Mar 2024 16:26:56 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Outsourcing]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/eu-regulation-dora-contents-and-implementation-tips/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/compliance/eu-regulation-dora-contents-and-implementation-tips/">EU Regulation DORA – Contents and implementation tips</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>The EU Regulation DORA (Digital Operational Resilience Act) establishes a unified framework for the European financial sector to manage cybersecurity and ICT risks. Its goal is to strengthen the EU financial market by harmonizing requirements and standards in cybersecurity and ICT risk management, ensuring resilience and adaptability&mdash;operational resilience&mdash;of financial institutions during and after disruptions. Implementation is required by 2025, but how can this be achieved with manageable effort? This blog post provides an overview of DORA and offers practical tips for implementation.</strong></p>
<h2>&nbsp;DORA Applies from Early 2025</h2>
<p>The Digital Operational Resilience Act affects nearly all regulated institutions and companies in the European financial sector, including banks, insurance, and reinsurance firms. Companies must act now: the regulation came into force in January 2023 and will apply from January 17, 2025, after a two-year transition period.</p>
<p>In January 2024, the European Supervisory Authorities (ESAs)* published the first final drafts of technical regulatory and implementation standards&mdash;a set of standards to ensure consistent regulation of operational processes.</p>
<p>&nbsp;</p>
<div id="attachment_17626" style="width: 997px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-17626" class=" wp-image-17626" src="http://www.amendos.de/wp-content/uploads/2024/03/DORA-300x103.png" alt="" width="987" height="339" srcset="https://www.amendos.de/wp-content/uploads/2024/03/DORA-300x103.png 300w, https://www.amendos.de/wp-content/uploads/2024/03/DORA-1024x353.png 1024w, https://www.amendos.de/wp-content/uploads/2024/03/DORA-768x264.png 768w, https://www.amendos.de/wp-content/uploads/2024/03/DORA-1536x529.png 1536w, https://www.amendos.de/wp-content/uploads/2024/03/DORA.png 1920w" sizes="auto, (max-width: 987px) 100vw, 987px"><p id="caption-attachment-17626" class="wp-caption-text">Figure 1 : EU Regulation DORA &ndash; Contents and implementation tips</p></div>
<p>*= The European Supervisory Authorities (ESAs) include:</p>
<p>EBA: European Banking Authority</p>
<p>ESMA: European Securities and Markets Authority</p>
<p>EIOPA: European Insurance and Occupational Pensions Authority</p>
<h2>&nbsp;What DORA Regulates</h2>
<p>The EU Regulation DORA aims to strengthen resilience against cyberattacks and digital security. It sets requirements for cybersecurity, business continuity, and crisis management to ensure processes remain available during cyberattacks or technical failures. It focuses on ICT risk management and aligns with national and international best practices.</p>
<p>DORA covers six key areas:</p>
<div>
<div>
<table>
<thead>
<tr>
<th>Area</th>
<th>Key Features</th>
</tr>
</thead>
<tbody>
<tr>
<td>ICT Risk Management:</td>
<td>
<ul>
<li>The control function is responsible for monitoring risks</li>
<li>Identify technical risks and respond appropriately</li>
<li>Mechanisms from prevention to coping</li>
</ul>
</td>
</tr>
<tr>
<td>Reporting on ICT incidents and significant cyber threats:</td>
<td>
<ul>
<li>Classification of incidents,</li>
<li>Structured process for notifications / reporting requirements</li>
</ul>
</td>
</tr>
<tr>
<td>Testing digital operational resilience and threat-led penetration testing (TLPT):</td>
<td>
<ul>
<li>Stress tests,</li>
<li>Robustness/vulnerability tests</li>
<li>Review of safety standards</li>
</ul>
</td>
</tr>
<tr>
<td>ICT third-party risk management:</td>
<td>Contract components, e.g., necessary components such as support from the service provider in the event of incidents</td>
</tr>
<tr>
<td>European supervisory framework for critical third-party ICT service providers:</td>
<td>Monitoring of critical IT service providers (critical, for example, in terms of the impact of operational disruptions on the entire financial market / number
<p>of customers or many systemically important</p>
<p>financial companies as customers)</p></td>
</tr>
<tr>
<td>&ldquo;Information sharing&rdquo; and cyber crisis and emergency drills:</td>
<td>Information exchange (at EU level) =&gt; Derive measures =&gt; Continuous improvement</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<div></div>
<p>&nbsp;</p>
</div>
<p>&nbsp;</p>
<h2>Incident Reporting Framework</h2>
<p>With regard to the implementation of DORA, uniformly regulated reporting processes for incidents in European financial companies are an important aspect. Parallels to the reporting obligation can also be found, for example, in the NIS2 Directive. Incidents are first reported to the competent national authority and assessed with the involvement of the European supervisory authorities. If relevant, they are then forwarded to other member states and other authorities. Figure 2 shows an incident in the DORA reporting process with BaFin as the central element in interaction with BSI and European supervisory authorities:</p>
<h3></h3>
<p>&nbsp;</p>
<h2>DORA regulatory and implementation standards</h2>
<p>The above-mentioned drafts of technical regulatory and implementation standards (RTS and ITS) published by the ESAs are intended to support and facilitate implementation: The <strong>regulatory technical standards</strong> (RTS) contain detailed, specific rules and technical requirements, e.g. with regard to ICT risk management and security measures for IT systems, while the <strong>implementing technical standards</strong> (ITS) contain specific rules or procedures, e.g. instructions for conducting security tests or reporting security incidents.<br>
The European Commission reviews these drafts to ensure that they are in line with European laws and policy objectives. They will become the binding standard for the implementation of DORA. As these standards specify the requirements of DORA in concrete terms, they also enable a better assessment of the implementation costs for companies.</p>
<div></div>
<p>&nbsp;</p>
<h2>Distinction from other regulatory requirements</h2>
<p>DORA overlaps thematically with other current regulations and directives, such as the <strong>NIS2</strong> <strong>Guidline</strong>, which aims to strengthen the overall level of cybersecurity in the EU, and TIBER (Threat Intelligence-based Ethical Red Teaming), which aims to promote resilience against cyberattacks through preventive testing. If a company also falls under the NIS2 Directive, the following applies: If the DORA requirement is more specific, it takes precedence.</p>
<p>For the banking sector, the European Banking Authority (EBA) published the <strong>EBA</strong> <strong>Guidelines on Outsourcing</strong> and <strong>Guidelines on ICT and Security Risk Management</strong> in 2019, defining risk management measures relating to information security and outsourcing requirements. However, these are recommendations or guidelines that only apply to the banking sector.</p>
<p>The DORA Regulation basically includes the content of these requirements and guidelines. DORA focuses on the consistent standardization of known regulations and requirements in the context of operational stability and business continuity. Unlike the EBA guidelines, it affects not only the EU banking sector, but the entire EU financial sector.</p>
<h3></h3>
<p>&nbsp;</p>
<h2>How does DORA integrate into German financial regulatory requirements?</h2>
<p>&nbsp;</p>
<div>
<p>There are a number of regulations issued by the German regulatory authority BaFin, such as BAIT (Banking Supervisory Requirements for IT). BaFin is also responsible for implementing DORA at the national level, including monitoring and control. It also has another important role: it is the central reporting office for ICT incidents and the link in cooperation with other national supervisory authorities and the EBA. In doing so, it works together with the European supervisory authorities to ensure consistent enforcement across the EU.</p>
<p>BaFin has also established requirements and practices in the German financial sector in the past that are now reflected in DORA:</p>
<ul>
<li>Harmonized requirements for ICT risk management<br>
e.g., minimum requirements for risk management (MaRisk), IT requirements in BAIT, ZAIT, VAIT, KAIT</li>
<li>Standardized reporting of outsourcing<br>
i.e., uniform standards and procedures for reporting outsourcing to BaFin</li>
<li>Monitoring of IT service providers with multiple clients</li>
<li>Standardized structures for reporting ICT-related incidents</li>
</ul>
<p>Key elements are reflected in DORA. Therefore, the BaFIn requirements that have already been implemented provide a good basis for the implementation for the DORA regulation in companies.</p>
<p>&nbsp;</p>
</div>
<p>&nbsp;</p>
<h2>Recommendations for action and tips for implementation</h2>
<p>&nbsp;</p>
<ol>
<li>Requirements/processes/methods that have already been implemented or established, e.g., from the EBA guidelines, provide a good basis for implementation for financial companies.</li>
<li>Requirements for documentation and reporting obligations should be reviewed and processes adapted.</li>
<li>Existing service provider contracts must be reviewed and, if necessary, adjusted, for example, with regard to the support to be provided by the service provider in the event of incidents. (Adjustments can be extremely time-consuming!)</li>
<li>Existing tools for risk management/documentation/reporting can be used to provide support, e.g., tools for automatic detection and alerting of anomalies, or tools for encryption and management of cryptographic keys, or for implementing lifecycles for firewall rules to strengthen network security.</li>
<li>New tools for documenting service provider contracts and information registers on service providers required for reporting obligations must be established.</li>
<li>Findings or measures from the implementation of the Supply Chain Act can also be helpful for the risk assessment of service providers (despite the primary focus on social and environmental standards).</li>
<li>Overall, specific requirements must be aligned with the (technical and organizational) standards already in place within the company, and processes must be adapted and adjusted accordingly.</li>
</ol>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>&nbsp;</p>
<div>The DORA Regulation is a positive step toward harmonized requirements and processes in the European financial sector. The increasing cyber threats of recent years have shown that improved measures are necessary for companies&mdash;not only in the financial sector. Appropriate measures and processes are crucial for operational security in order to respond to current and future threats and risks at the IT level. In order to ensure security and business continuity in the face of growing risks, concrete standard requirements such as those in DORA are helpful and necessary (for uniform resilience and security across the EU).</div>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/compliance/eu-regulation-dora-contents-and-implementation-tips/">EU Regulation DORA – Contents and implementation tips</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The EU Data Act – Implications for Cloud Service Providers</title>
		<link>https://www.amendos.de/en/governance/the-eu-data-act-implications-for-cloud-service-providers/</link>
		
		<dc:creator><![CDATA[Michael Pfitzmann]]></dc:creator>
		<pubDate>Thu, 18 Jan 2024 12:32:05 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/the-eu-data-act-implications-for-cloud-service-providers/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/governance/the-eu-data-act-implications-for-cloud-service-providers/">The EU Data Act – Implications for Cloud Service Providers</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>On November 27, 2023, following the European Parliament, the European Council also adopted the EU Data Act. The aim of this act is to reduce legal, economic, and technical barriers to the data economy. Access to and transfer of automatically generated data arising from the use of a wide variety of networked products and related services (Internet of Things, IoT) is to be simplified. Such products include fitness trackers and products such as Apple CarPlay. Furthermore, this regulation is intended to make it much easier to switch cloud service providers. This blog article examines the key content of the EU Data Act, in particular its significance for the use of cloud services and the history of its development.</strong></p>
<p>&nbsp;</p>
<h2>History of its development</h2>
<p>The first draft of the EU Commission&rsquo;s Data Act dates from February 23, 2022. It is a comprehensive set of rules for fair access to and use of data. According to the EU Commission, a large proportion of machine-generated/industrial data &ndash; up to 80% &ndash; currently remains unused. The Data Act aims to unlock this treasure trove of data by removing the legal, economic, and technical barriers to its use, while at the same time improving the value creation associated with data.</p>
<p>After many readings and amendments, the European Parliament approved the regulation on November 9, 2023. Following its subsequent adoption by the European Council on November 27, 2023, the EU Data Act entered into force on January 11, 2024. There will now be a transition period of 20 months before the Data Act becomes applicable on September 11, 2025. It will then apply to all companies offering relevant products in the EU. Further obligations, such as compliance with the principle of &ldquo;access by design,&rdquo; i.e., access by state judicial and investigative authorities when necessary, will only become applicable after a further twelve months, i.e., probably in September 2026.</p>
<p>&nbsp;</p>
<p>The EU Data Act was developed from the initial draft phase on February 23, 2022, to its implementation on January 11, 2024. This period includes the transition period until full applicability on September 11, 2026.</p>
<p>&nbsp;</p>
<div id="attachment_17623" style="width: 837px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-17623" class=" wp-image-17623" src="http://www.amendos.de/wp-content/uploads/2024/01/EU-Data-Act-1-300x83.png" alt="" width="827" height="229" srcset="https://www.amendos.de/wp-content/uploads/2024/01/EU-Data-Act-1-300x83.png 300w, https://www.amendos.de/wp-content/uploads/2024/01/EU-Data-Act-1-1024x283.png 1024w, https://www.amendos.de/wp-content/uploads/2024/01/EU-Data-Act-1-768x212.png 768w, https://www.amendos.de/wp-content/uploads/2024/01/EU-Data-Act-1-1536x425.png 1536w, https://www.amendos.de/wp-content/uploads/2024/01/EU-Data-Act-1.png 1920w" sizes="auto, (max-width: 827px) 100vw, 827px"><p id="caption-attachment-17623" class="wp-caption-text">Figure 1: The EU Data Act &ndash; Implications for Cloud Service Providers</p></div>
<p>&nbsp;</p>
<h2>Overview &ndash; EU Data Act</h2>
<p>But what exactly does this Data Act entail in terms of new developments?</p>
<p>The EU Data Act is intended to regulate the handling of data from the areas of IoT, Industrial Internet of Things (IIoT), and connected cars. It also addresses the use of virtual assistants, which are likely to be AI-based in the future, and assumes that they will become increasingly important.<br>
It is intended to regulate the relationship between data owners and users. Users generate data that remains with data owners. The Data Act is intended to empower users to claim the data they have generated &ndash; and, if necessary, to trade it.<br>
Switching between cloud service providers is to be made much easier. According to the EU Data Act, it is no longer permissible to prevent users from switching.</p>
<p>&nbsp;</p>
<h2>Key content aspects</h2>
<p>Chapter 4 of the EU Data Act is dedicated specifically to switching between data processing services. This refers to what is known as &ldquo;cloud switching.&rdquo; According to this, a cloud service provider may not, for example, place technical, contractual, or organizational obstacles in the way of a customer who is about to switch. Specifically, this applies to, among other things, the termination of services, the conclusion of a new contract with a competitor, and the porting of data to a competitor or to one&rsquo;s own on-premise infrastructure with the aim of obtaining similar services from a competitor or splitting services &ndash; also known as &ldquo;unbundling.&rdquo;</p>
<p>Chapter 4, Article 25 of the Data Act contains provisions on contractual agreements for data processing services such as cloud services. In addition, there are information requirements regarding the methods and formats for changing service providers. This includes, among other things, information about any restrictions and technical limitations. Service providers are required to maintain an up-to-date online register that provides information on data structures and formats as well as relevant standards and specifications for interoperability.</p>
<p>In Chapter 8, Article 33, the Data Act establishes comprehensive rules on the interoperability of data, mechanisms and services for data transfer and use in shared European data spaces. Data spaces refer, for example, to cloud environments such as AWS, Azure, or Google Cloud. The EU Commission may issue implementing regulations and request standards-setting organizations (e.g., ISO, DIN) to establish uniform standards in this area in order to achieve this interoperability. Providers must then implement these standards accordingly.</p>
<p>&nbsp;</p>
<h2>Monitoring the implementation of requirements</h2>
<p>As is customary in comparable EU regulations, the EU sets out corresponding requirements for the implementation and enforcement of these rules in the Data Act. According to these requirements, the individual EU member states are to designate authorities responsible for enforcing the Data Act. For Germany, this is likely to be either the Ministry of the Interior or the BSI, which reports to it. However, this has not yet been decided. These authorities are to investigate complaints of violations of the EU Data Act, particularly in the area of trade secret protection, and generally monitor the application of the Data Act. In addition, they are to observe technological and economic developments in the area of data provision. Possible consequences would be an adjustment of regulations. An example of this would be a new product on the market that offers previously unknown possibilities for data collection and processing, for example in connection with AI. The member states will have to work out in the coming months what the EU-wide cooperation between the authorities should look like.</p>
<p>Similar to the GDPR, significant penalties are provided for violations of the EU Data Act. Fines can be up to &euro;20,000,000 or up to 4 percent of the company&rsquo;s global annual turnover. Such a penalty would be possible, for example, in the event of refusal to grant access to data.</p>
<p>&nbsp;</p>
<h2>Conclusion &ndash; EU Data Act</h2>
<p>The EU Data Act is the first set of regulations of its kind worldwide. The processing of industrial data is moving closer to the processing of personal data (GDPR) in regulatory terms. However, no concrete statement has been made on the subject of &ldquo;data ownership,&rdquo; which has been criticized by data protection organizations. Furthermore, the Data Act represents a significant encroachment on the freedom of the parties concerned to draft data use agreements. Once the regulation finally comes into force, it will become clear what consequences this will have. Affected service and product providers should start implementing the requirements of the Data Act now at the latest, as it is clear that the Data Act will entail numerous obligations for digital companies, some of which can only be met through long-term and extensive process adjustments.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/governance/the-eu-data-act-implications-for-cloud-service-providers/">The EU Data Act – Implications for Cloud Service Providers</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IT-Outsourcing – Measuring success correctly</title>
		<link>https://www.amendos.de/en/outsourcing/it-outsourcing-measuring-success-correctly/</link>
		
		<dc:creator><![CDATA[Jörg Bujotzek]]></dc:creator>
		<pubDate>Tue, 07 Dec 2021 12:19:00 +0000</pubDate>
				<category><![CDATA[Governance]]></category>
		<category><![CDATA[Outsourcing]]></category>
		<category><![CDATA[IT Vendor Management]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/it-outsourcing-erfolg-richtig-messen/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/outsourcing/it-outsourcing-measuring-success-correctly/">IT-Outsourcing – Measuring success correctly</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>When having done IT-Outsourcing &ndash; measuring success correctly is not easy. In most companies, the success of <a href="https://www.amendos.de/en/seminars/it-outsourcing-fundamentals-online/">IT outsourcing</a> is measured by the cost savings realized. It must be ensured that the scope and quality of the service also meet the customer&rsquo;s requirements. After outsourcing, internal IT checks this based on <a href="https://www.cio.com/article/274740/outsourcing-sla-definitions-and-solutions.html">SLA</a> reports from the service provider: it must ensure that the service provider&rsquo;s performance is &ldquo;correct&rdquo;. However, the effort and efficiency of internal provider management is often not taken into account when determining outsourcing success. In the following, we show how a holistic measurement of success can look like. It not only takes into account the performance of the external service provider. It also considers the performance of the vendor management in the evaluation.</strong></p>
<p>When measuring outsourcing success, most companies focus exclusively on the quality and costs of externally provided services. This means, focus is only on the performance and costs of service providers. Vendor management is often not included in this analysis: This has a significant influence on the performance of the services and also represents an additional cost component that must be taken into account when determining the total cost of ownership (TCO) of IT outsourcing.</p>
<p>In the following, we will first take a closer look at the dependencies between service provider performance and vendor management performance. We will then take a look at how to measure the success of IT outsourcing on the basis of key performance indicators (KPI), taking vendor management into account.</p>
<h2><strong>Dependence between provider and vendor management performance</strong></h2>
<p>Ideally, the service provider always provides its services at the service level agreed in the contract. Vendor management controls the provider with little effort. Additionally it ensures that the overall IT service for the company is always in line with customer requirements. Therefore it has to take appropriate measures to integrate all internal and external services (see figure 1).</p>
<div id="attachment_13373" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-13373" class="wp-image-13373 size-large" title="IT-Outsourcing &ndash; Measuring Success - Ideal scenario " src="https://www.amendos.de/wp-content/uploads/2021/12/Figure-1-1-1024x611.png" alt="IT-Outsourcing &ndash; Measuring Success - Ideal scenario " width="1024" height="611" srcset="https://www.amendos.de/wp-content/uploads/2021/12/Figure-1-1-1024x611.png 1024w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-1-1-300x179.png 300w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-1-1-768x458.png 768w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-1-1-1536x916.png 1536w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-1-1-2048x1221.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px"><p id="caption-attachment-13373" class="wp-caption-text">Figure 1: Ideal scenario &ndash; high performance of the service provider and vendor management (VM)</p></div>
<p>In practice, things often look different: There are always situations in which a provider falls short of the agreed service level.That means, the performance of this provider is too low. Now vendor management must take appropriate additional control measures to ensure that the provider better meets its contractual commitments.</p>
<p>The vendor management effort (and thus the vendor management cost) increase (see figure 2).</p>
<div id="attachment_13381" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-13381" class="wp-image-13381 size-large" title="IT-Outsourcing &ndash; Measuring Success - low performance of the service provider " src="https://www.amendos.de/wp-content/uploads/2021/12/Figure-2-2-1024x616.png" alt="IT-Outsourcing &ndash; Measuring Success - low performance of the service provider " width="1024" height="616" srcset="https://www.amendos.de/wp-content/uploads/2021/12/Figure-2-2-1024x616.png 1024w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-2-2-300x180.png 300w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-2-2-768x462.png 768w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-2-2-1536x923.png 1536w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-2-2-2048x1231.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px"><p id="caption-attachment-13381" class="wp-caption-text">Figure 2: low performance of the service provider &ndash; rising cost for vendor management</p></div>
<p>If things go badly with a provider for a longer period of time, the effort (and therefore the costs) in vendor management increase: Discussions increase, conflicts and escalations accumulate. This is particularly true if the vendor management is not set up efficiently. In this case its (low) performance is not sufficient to turn around the poor quality of the external service. In this situation, the performance of the provider may drop further (see figure 3).</p>
<p>&nbsp;</p>
<div id="attachment_13371" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-13371" class="wp-image-13371 size-large" title="IT-Outsourcing &ndash; Measuring Success - performance of the vendor management " src="https://www.amendos.de/wp-content/uploads/2021/12/Figure-3-1-1024x617.png" alt="IT-Outsourcing &ndash; Measuring Success - performance of the vendor management " width="1024" height="617" srcset="https://www.amendos.de/wp-content/uploads/2021/12/Figure-3-1-1024x617.png 1024w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-3-1-300x181.png 300w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-3-1-768x463.png 768w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-3-1-1536x926.png 1536w, https://www.amendos.de/wp-content/uploads/2021/12/Figure-3-1-2048x1234.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px"><p id="caption-attachment-13371" class="wp-caption-text">Figure 3: low performance of the vendor management deteriorates service provider performance</p></div>
<p>&nbsp;</p>
<p>Vendor management must therefore have sufficient performance of its own to bring the provider up to the agreed performance level. This can be done by using suitable control measures, especially in the event of service level deviations.</p>
<h2><strong>Measurement of outsourcing success</strong></h2>
<p>Let us now look at how the success of outsourcing can be measured. Usually KPIs are used for this purpose. The dependency between provider performance and vendor management performance/costs that has just been demonstrated makes it clear that outsourcing success cannot be depicted solely by measuring the performance of one party &ndash; i.e., only the service provider.</p>
<p>The &ldquo;correct&rdquo; set of KPIs must therefore reflect the performance of both parties. That is the basis to provide an accurate picture of the current situation. But which KPIs are the right ones to measure success? This depends on the outsourcing objectives, which are usually defined as part of the sourcing strategy: The KPIs and target values to be achieved are derived from these objectives. <strong>The set of KPIs should be manageable, but adequately reflect the objectives</strong>. Ideally, KPIs that reflect the performance of both parties are combined with those that only represent the performance of one party.</p>
<p>For example, if the following <strong>objectives</strong> are defined for a &ldquo;Workplace Service&rdquo; outsourcing measure:</p>
<ul>
<li>the reduction of cost of ownership (TCO) of the affected IT service</li>
<li>maintaining the performance of the IT service after outsourcing.</li>
</ul>
<p>Then these goals can be made measurable by the following KPIs, among others:<strong>&nbsp;</strong></p>
<h4><strong>(1) KPI TCO after outsourcing </strong></h4>
<div style="width; border: 1px solid #B13982; padding: 20px; margin-bottom: 20px;">TCO <sub>external Services</sub> =<br>
Costs of external services +<br>
Costs of internal provider management.</div>
<p>The cost share of internal provider management attributable to the external services under consideration must be used here. If the quantification of the target is a 10% reduction in the TCO of the services compared with the TCO before outsourcing, the</p>
<p><strong>target value</strong> (TCO <sub>external services</sub>) = <strong>TCO</strong> <sub>services before outsourcing</sub> * 0,9</p>
<h4><strong>(2) KPIs for performance after outsourcing</strong></h4>
<p>For example, one KPI of service quality after outsourcing that reflects the performance of both parties is the provisioning time for a new PC:</p>
<div style="width; border: 1px solid #B13982; padding: 20px; margin-bottom: 20px;">
<p>Provisioning time for new PC =<br>
Duration for internal service request acceptance incl. approval&nbsp; +<br>
Duration for external PC delivery and installation</p>
</div>
<p>This KPI implicitly measures the performance of vendor management: Vendor management has end-to-end responsibility and must ensure that the internal and external providers each deliver the required performance and also work together smoothly to always meet the required provisioning time.</p>
<p>The quantification for this KPI is already included in the target definition, as the performance is to remain the same after outsourcing:</p>
<p><strong>target value</strong> (PC deployment time <sub>external services</sub>) = <strong>PC deployment time</strong> <sub>services before outsourcing</sub></p>
<p>This KPI, which maps the performance of both parties, can now be supplemented by others that only map the performance of one party. For example, this could be the duration of the initial provision of a client application on a PC if the service request is handled solely by the service provider.</p>
<h2>Conclusion: IT-Outsourcing &ndash; Measuring Success Correctly</h2>
<p>The success of IT outsourcing should be measured by the degree to which the sourcing goals are achieved. Internal IT has a significant influence on this success through vendor management: If service providers are managed efficiently and processes involving internal and external parties run smoothly, then the planned benefits for the company&rsquo;s own IT customers can also be realized. That is why the performance of vendor management must be taken into account when determining the benefits of services. The degree to which sourcing goals are achieved can be measured using the &ldquo;correct&rdquo; set of KPIs. They adequately have to reflect the performance of the service provider and vendor management.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			
		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/outsourcing/it-outsourcing-measuring-success-correctly/">IT-Outsourcing – Measuring success correctly</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Business Relationship Management in IT Vendor Management</title>
		<link>https://www.amendos.de/en/it-vendor-management/business-relationship-management/</link>
		
		<dc:creator><![CDATA[Petra Bleshoy]]></dc:creator>
		<pubDate>Thu, 15 Jul 2021 16:15:31 +0000</pubDate>
				<category><![CDATA[Governance]]></category>
		<category><![CDATA[IT Vendor Management]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://www.amendos.de/uncategorized/business-relationship-management-in-providermanagement/</guid>

					<description><![CDATA[<p>Der Beitrag <a href="https://www.amendos.de/en/it-vendor-management/business-relationship-management/">Business Relationship Management in IT Vendor Management</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>In the following, we show how to set up business relationship management in IT vendor management based on the ISO 44001 approach in order to lead to better IT services for your own company. Cooperation with IT service providers offers companies many advantages in today&rsquo;s world: Cost savings, professional handling of service operations, rapid introduction of new technologies and services for their own core business. Nevertheless, companies pursuing a multi-sourcing strategy often find it difficult to create efficient collaboration between all parties involved. The reasons are essentially conflicting objectives of the parties. As a result, the quality of the externally provided services suffers and the goals set with outsourcing are increasingly missed over time. ISO 44001 (Collaborative Business Relationship Management System) can provide a remedy, enabling the active design of collaborative business relationships.</strong></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>With this article we would like to give a short overview of the standard and provide hints on how to get started with Business Relationship Management in provider management.</p>
<h2><strong>The structure of the ISO 44001 standard</strong></h2>
<p>ISO 44001 is divided into two elements. The basis of the standard is the High-Level Structure (HLS), consisting of 10 sections (see Figure 1). This was introduced to harmonize various ISO management system standards and give them a uniform structure. Thus, the information security standard ISO 27001 (2013) was the first &ldquo;heavyweight&rdquo; standard to use this HLS standard (for more details, see also <a href="https://www.iso.org/sites/directives/current/consolidated/index.xhtml#_idTextAnchor569">Annex SL</a>).</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-13427" title="Business Relationship Management in IT Vendor Management" src="https://www.amendos.de/wp-content/uploads/2021/07/Figure1.png" alt="Business Relationship Management in IT Vendor Management" width="628" height="500" srcset="https://www.amendos.de/wp-content/uploads/2021/07/Figure1.png 1760w, https://www.amendos.de/wp-content/uploads/2021/07/Figure1-300x239.png 300w, https://www.amendos.de/wp-content/uploads/2021/07/Figure1-1024x816.png 1024w, https://www.amendos.de/wp-content/uploads/2021/07/Figure1-768x612.png 768w, https://www.amendos.de/wp-content/uploads/2021/07/Figure1-1536x1224.png 1536w" sizes="auto, (max-width: 628px) 100vw, 628px"></p>
<p>&nbsp;</p>
<p>Based on this, an eight-stage life cycle (see Figure 2) was developed that addresses the requirements specific to ISO 44001 for the development, introduction and management of business relationships &ndash; in particular, shared governance, required personnel skills and the design of joint collaboration. This is applied in the eighth phase (operation) of the High Level Structure.</p>
<p>In the following, the main sections of the HLS, divided into the following three phases (see also Figure 1) &ndash; will be briefly presented: Prerequisites (Sections 1-7), Operation (Section 8 in interaction with the eight phases of the life cycle), and Performance Monitoring (Sections 9 and 10).</p>
<h2><strong>Phase 1: Create conditions in the company</strong></h2>
<p>The first seven sections of the HLS describe how to create the right conditions in a company.</p>
<p><strong>Section 4, Context of the Organization</strong>, is particularly important here. In this step, the needs and expectations of the various stakeholders are identified.&nbsp; In addition, issues such as legal requirements are analyzed. Furthermore, the area in which Collaborative Business Relationship Management is applied is defined.</p>
<p><strong>Section 5 Leadership</strong> describes the requirements &ndash; leadership, accountability and commitment with regard to the collaborative business relationship management system &ndash; for top management (C-level). Furthermore, the top level of management must ensure that the objectives of the management system are in line with the strategic direction of the company. Among other things, ISO 44001 requires the appointment of a Senior Executive Responsible (SER) and the introduction of governance structures. One core element here can be a code of conduct, along with others.</p>
<p><strong>Section 6 Planning</strong> focuses on setting up risk and opportunity management and aligning it with the business objectives: The who, what, how, when of a business objective must be identified.</p>
<p><strong>Section 7 Support</strong> deals with the selection and provision of all necessary resources. Here, it is particularly important to select competent personnel with the (soft) skills required for collaborative working. These can be honed in training courses if necessary. It is important that the people selected are aware of their important role in the introduction of the business relationship management system. However, support also means providing or maintaining all the necessary documentation.</p>
<p>&nbsp;</p>
<h2><strong>Phase 2: collaborative work based on the ISO 44001 life cycle model</strong></h2>
<p><strong>Section 8 Operation </strong>(Operation is the heart of ISO 44001). Here, the eight steps of the life cycle model are presented in detail. The following graphic provides a brief overview of the eight steps of the life cycle and their contents.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-13429 size-large" src="https://www.amendos.de/wp-content/uploads/2021/07/Figure2-1024x802.png" alt="" width="1024" height="802" srcset="https://www.amendos.de/wp-content/uploads/2021/07/Figure2-1024x802.png 1024w, https://www.amendos.de/wp-content/uploads/2021/07/Figure2-300x235.png 300w, https://www.amendos.de/wp-content/uploads/2021/07/Figure2-768x602.png 768w, https://www.amendos.de/wp-content/uploads/2021/07/Figure2-1536x1203.png 1536w, https://www.amendos.de/wp-content/uploads/2021/07/Figure2-2048x1605.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px"></p>
<p>&nbsp;</p>
<h2><strong>Phase 3: Performance monitoring</strong></h2>
<p><strong>Section 9 Performance Evaluation </strong>states, among other things, that evaluation methods and criteria must be defined for evaluating the collaborative business relationship. Regular evaluations must then be carried out on the basis of this evaluation system.</p>
<p>In the last step &ndash; <strong>Section 10 Improvement</strong> &ndash; the aim is to make continuous improvements to the relationship and relevant processes and activities in order to respond to changing requirements, needs or goals. In addition, it is important to identify and correct deviations from one&rsquo;s own concept that occur in practice.</p>
<p>&nbsp;</p>
<h2><strong>Introduction &ndash; Business Relationship Management in IT Vendor Management </strong></h2>
<p>In order to introduce a collaborative business relationship management system in IT vendor management, the company&rsquo;s own concept should first be tested and validated as part of a pilot with a service provider before it is introduced to other service providers.</p>
<h2><strong>The Choice of the Service Provider for the Pilot</strong></h2>
<p>First of all, it must be clarified for which service providers a minimum expected benefit can be achieved through the introduction of such a formalized management system. As a rule, these are the business relationships with strategic service providers. Their services are essential to the core business of their own company: if the relationship with the service provider deteriorates, the performance of the core business can quickly be impaired.</p>
<p>To identify strategic service providers, it makes sense to categorize all service providers. The following graphic shows examples of categories and criteria for category assignment. Once the strategic providers have been identified in this way, the most suitable one for the pilot must be selected from among them.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-13432 size-large" title="Business Relationship Management in IT Vendor Management" src="https://www.amendos.de/wp-content/uploads/2021/07/Figure3-1-1024x418.png" alt="Business Relationship Management in IT Vendor Management" width="1024" height="418" srcset="https://www.amendos.de/wp-content/uploads/2021/07/Figure3-1-1024x418.png 1024w, https://www.amendos.de/wp-content/uploads/2021/07/Figure3-1-300x122.png 300w, https://www.amendos.de/wp-content/uploads/2021/07/Figure3-1-768x313.png 768w, https://www.amendos.de/wp-content/uploads/2021/07/Figure3-1-1536x627.png 1536w, https://www.amendos.de/wp-content/uploads/2021/07/Figure3-1-2048x836.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px"></p>
<p>&nbsp;</p>
<h2><strong>The piloting</strong></h2>
<p>Once the strategic provider has been selected, the business relationship management system is introduced together with him as part of a pilot project. Experience gained in the pilot can thus be incorporated into the system concept. After the pilot is completed, the results of this first pilot will serve as a blueprint for adapting the results to other service providers.</p>
<p>The persons auditing the implementation of business relationship management in vendor management must be familiar with the content of the standard and obtain management&rsquo;s approval and support for the audit. Accordingly, the appropriate personnel and management for such an undertaking must also be selected in advance. In the next step, a gap and awareness analysis should be conducted in workshops. Other parameters must also be investigated or defined before a recommendation is made regarding the introduction:</p>
<ul>
<li>Impact and costs of pilot implementation</li>
<li>expected benefits</li>
<li>Scope of application</li>
<li>&hellip;</li>
</ul>
<p>Once management has approved the recommended rollout, nothing stands in the way of an initial rollout as part of the pilot. At the same time, however, an evaluation process must also be implemented. This is used in the pilot phase and later in regular operation to compare all activities and processes of the (pilot) project with the standard in order to identify gaps and deviations. From this, in turn, measures and action plans can be derived to better align the existing processes with the standard. After their implementation, a second evaluation of all processes follows.</p>
<h2><strong>Conclusion &ndash; Business Relationship Management in IT Vendor Management<br>
</strong></h2>
<p>ISO 44001 offers companies the opportunity to put their collaborative business relationships with their strategic service providers on a solid foundation. The standard takes a detailed look at various areas of collaboration, such as governance, personnel, skills and behavior. This creates a framework for actively shaping and developing relationships with strategic service providers and thus significantly increasing the benefits of the IT services that are most important for the company&rsquo;s own core business.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>Der Beitrag <a href="https://www.amendos.de/en/it-vendor-management/business-relationship-management/">Business Relationship Management in IT Vendor Management</a> erschien zuerst auf <a href="https://www.amendos.de/en/">amendos gmbh</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
