Solved

Purchasing kit outside normal procurement rules

Posted on 2013-01-16
1
203 Views
Last Modified: 2013-01-29
I am trying to put together a comprehensive list of risks/issues that arise from the following scenario - to identify as many issues/risks as possible to help quash this sort of practice. Corporate policy dictates IT equipment has to be purchased via our 3rd part outsourced IT contractor. A sub department of our company has taken it on themselves to purchase a number of iPad devices without doing this through the proper channels. What kind of issues or risks does this create? What does could purchasing equipment through your IT bring? How does the purchasing of IT kit work in your environment?
0
Comment
Question by:pma111
1 Comment
 
LVL 57

Accepted Solution

by:
giltjr earned 500 total points
ID: 38782409
Who you actually purchase it from typically does not matter, unless you get some sort of discount.  The issues?  That depends.  When purchased outside the normal channels:

Who will support it?
Will it work with your current environment?
Are their security risks?
Were maintenance contracts purchased?

If your IT contractor will not support anything that they don't purchase, then as long as the "users" are aware that they are on their own for anything they buy and if it does not work on your network or does not meet your security standards then let it happen.  However I do realize that some users don't care about that and even if they don't follow the rules they want you to make it work.

It's tough, but that is the way it has been for as long as I have been in the business, 30 years.


We have a purchasing group where there is one employee that specializes in purchasing IT equipment.  However, we have some departments that don't see some equipment as "IT" related equipment and thus just get it on their own and the IT group don't find out about it until it is asked to connect to the network.  Example:  LAN attached copiers, LAN attached faxes.  I'm not talking about the desktop multifunction devices.  I'm talking about the copiers that stand on the floor.  That is a "copier" that just happens to connect to the LAN, not a piece of "IT" equipment.

Now, some of this you may have to learn to semi-support no matter what.  In this day of bring your own devices or having a requirement to allow guests to connect to your wireless network, not a whole lot you can do about it.  Our wireless LAN supports having multiple SSID's.  We have created 3 SSID's for 3 different security zones.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Let’s list some of the technologies that enable smooth teleworking. 
Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now