ROM: Governance and Pipeline (part 2) Flashcards
What is the objective of the foundation Governance?
In Governance and Pipeline
Ensuring the whole RPA ecosystem has the right governance and controls in place is critical for ensuring a safe, scalable and reliable digital workforce.
Create a controlled, secured and well governed digital workforce.
Organizations can be sure that they are providing the best and most secure service by implementing the ROM alongside the key controls.
Name the Key Governance Topics
- Governance
- Security
- Change Management (minimize the impact of changes to business processes and software applications)
What does the Governance Board?
Sets the stategy for RPA and empowers the wider team to deliver against that strategy.
The board will be include the Head of RPA and representatives from IT and the business, who will prioritize the demand for the processes being selected for automation and will ensure the associated business benefit is recorded.
Name and define Governance key points
- Demand generation and management: ultimate gate keeper for all demand generated for RPA (identifying and qualifying opportunities and incorporating change management)
- Benefit realization: ensure the benefit of RPA is realized within the organization and promote and evangelize the benefits of RPA within the organization and communicate successful implementation stories
- Program steering: define success criteria, governance and policies and provide an escalation point for critical issues and risks
- Continuous improvement: identify opportunities to drive greater value from RPA and provide sponsorship for CI initiatives
Who is responsible for all governance?
Head of RPA
* Data policies (that cover logging, archiving, backups, work queues and solution data)
* Deliverable Standards & Design Authority (to ensure high quality delivery)
* Onboarding Digital Workers (who, as humans, need a secure environment in which to work and access to relevant apps to perform tasks
Define Security and its purpose
Security refers to processes and policies that an organization has in place, to ensure that the BP estate is protected from malicious activity.
Defining a security policy is key to ensure that risks are addressed and should incorporate 4 core models.
Name the 4 core models for Security
- BP Access Model
- Windows Access Model
- Target System Access Model
- Environment Access Model
Why a Change Management Process is important?
Having a established Change Management Process in place will help organizations reduce the impact of any changes to business processes or IT systems, and to minimize any associated risks.
Any changes to business processes must be accurately replicated in the automated process to ensure the automated solution can make correct decisions.
Any changes to the IT system must be assessed and tested, so that the automated solution can interact with the target application in a robust manner.
Change Management Process: name proactive changes
- Prioritization
- Scheduling
Articulated by business and IT to BP team. Changes that flow through the demand management pipeline. Include articulated upgrades to apps and requests for changes to existing automations.
Change Management Process: name reactive changes
- Impact Assessment
- Governance Board
Fall outside IT and business change management process. Example: temporary spike in demand for a service not typically used to high volumes that may otherwise require the recruitment of a large team of temporary staff to manage it.