Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Purchasing kit outside normal procurement rules

Posted on 2013-01-16
1
Medium Priority
?
233 Views
Last Modified: 2013-01-29
I am trying to put together a comprehensive list of risks/issues that arise from the following scenario - to identify as many issues/risks as possible to help quash this sort of practice. Corporate policy dictates IT equipment has to be purchased via our 3rd part outsourced IT contractor. A sub department of our company has taken it on themselves to purchase a number of iPad devices without doing this through the proper channels. What kind of issues or risks does this create? What does could purchasing equipment through your IT bring? How does the purchasing of IT kit work in your environment?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 57

Accepted Solution

by:
giltjr earned 2000 total points
ID: 38782409
Who you actually purchase it from typically does not matter, unless you get some sort of discount.  The issues?  That depends.  When purchased outside the normal channels:

Who will support it?
Will it work with your current environment?
Are their security risks?
Were maintenance contracts purchased?

If your IT contractor will not support anything that they don't purchase, then as long as the "users" are aware that they are on their own for anything they buy and if it does not work on your network or does not meet your security standards then let it happen.  However I do realize that some users don't care about that and even if they don't follow the rules they want you to make it work.

It's tough, but that is the way it has been for as long as I have been in the business, 30 years.


We have a purchasing group where there is one employee that specializes in purchasing IT equipment.  However, we have some departments that don't see some equipment as "IT" related equipment and thus just get it on their own and the IT group don't find out about it until it is asked to connect to the network.  Example:  LAN attached copiers, LAN attached faxes.  I'm not talking about the desktop multifunction devices.  I'm talking about the copiers that stand on the floor.  That is a "copier" that just happens to connect to the LAN, not a piece of "IT" equipment.

Now, some of this you may have to learn to semi-support no matter what.  In this day of bring your own devices or having a requirement to allow guests to connect to your wireless network, not a whole lot you can do about it.  Our wireless LAN supports having multiple SSID's.  We have created 3 SSID's for 3 different security zones.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question