2.3.4: Planning for Outsourcing – Student Workbook
- Page ID
- 48555
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\dsum}{\displaystyle\sum\limits} \)
\( \newcommand{\dint}{\displaystyle\int\limits} \)
\( \newcommand{\dlim}{\displaystyle\lim\limits} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\(\newcommand{\longvect}{\overrightarrow}\)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Plan of Attack: Making the Case for Smart Outsourcing
Setting the Stage
In a recent conversation with the Chief Operating Officer (COO) of a midsize tech company, I learned about a project that had veered off course—not because the product lacked value, but because the strategy behind its outsourcing decision was incomplete. The leadership team had decided to outsource the development of a core product, largely because they needed to demonstrate progress to investors. The logic seemed simple: external development meant lower cost and faster results.
To execute this plan, the company hired four U.S.-based software architects and engaged a development team in India. But there was a critical flaw: no one was assigned to manage the offshore team. The architects wanted to focus on design—not coordination. Communication broke down. Deliverables lagged. The project burned resources without building momentum. The company had “outsourced” development, but not responsibility, not planning, and not leadership.
This is a cautionary tale—one that’s all too common in organizations that see outsourcing as a budget solution rather than a strategic capability.
Why This Exercise Matters
Before you can make recommendations on how to outsource a project, you must be able to answer five essential questions:
- Why outsource at all?
- What should be outsourced—and what should remain in-house?
- How do we select the right supplier?
- How should we structure the engagement (contract, communication, oversight)?
- How do we manage the risks of offshoring—especially when it comes to quality, IP, and coordination?
In this milestone, your job is to guide leadership toward better outsourcing decisions—grounded in data, analysis, and professional project management practices.
Objectives for This Task
As a team, you will:
- Explain the strategic justification for outsourcing portions of the Reckon project
- Apply the outsourcing lifecycle to structure a sound outsourcing plan
- Draft a Statement of Work (SOW) to define the outsourced scope and expectations
- Design a supplier selection process, including criteria and due diligence
- Identify the risks associated with offshoring and present mitigation strategies
Your final product will be a clear, persuasive Outsourcing Recommendation for the executive team.
Step-by-Step Guide
Use the following structure to develop your deliverable:
Step 1: Justify the Decision to Outsource
Your first responsibility is to articulate why outsourcing makes sense for the Reckon project—based on internal constraints, external opportunities, and the project’s strategic importance.
Use a SWOT analysis to frame your argument:
- What strengths or opportunities make outsourcing feasible or advantageous?
- What weaknesses or threats make internal development problematic?
- How does outsourcing align with C-Bay’s broader goals?
Tip: Use one of the provided SWOT templates to organize your analysis. Anchor your reasoning in real constraints (e.g., staffing capacity, timelines, technology stack limitations).
Step 2: Identify What Should Be Outsourced (and What Shouldn’t)
Review the full project plan for Reckon. Break down the work into logical components or phases.
Then:
- Determine which components are strong candidates for outsourcing (e.g., front-end development, testing, legacy migration)
- Identify which elements must be kept in-house (e.g., system architecture, data governance, product strategy)
- Justify each decision based on complexity, risk, integration sensitivity, and internal capacity
Also describe what resources and roles are required internally to manage the outsourced components effectively.
Tip: Look for embedded assumptions in the original project plan. Challenge or validate them using your independent analysis.
Step 3: Recommend a Contract Type
Evaluate the different types of outsourcing contracts available:
- Fixed-price contracts
- Time-and-materials (T&M) contracts
- Cost-plus contracts
- Performance-based contracts
For each, explain:
- Pros and cons in the context of the Reckon project
- Level of flexibility vs. control
- Risk exposure for both parties
Then recommend the best-fit contract type and explain your rationale.
Tip: Consider the maturity of the vendor, clarity of scope, and C-Bay’s risk tolerance when choosing a contract model.
Step 4: Design a Supplier Selection Process
Develop a plan to identify, evaluate, and select the most qualified vendor.
Your plan should include:
- A clear supplier selection criteria list (technical expertise, delivery history, pricing, etc.)
- A step-by-step evaluation process (e.g., RFP → Proposal Review → Interview → Reference Check)
- Guidance on vendor due diligence (financial stability, past performance, ethical sourcing, data security readiness)
Tip: Reference the article on supplier due diligence to guide your approach.
Step 5: Identify and Manage Risks
Outsourcing and offshoring introduce a unique set of risks. Your recommendation should name at least 3–5 specific risks that could impact delivery, quality, or compliance.
For each risk:
- Describe the nature of the risk (e.g., IP leakage, delivery delays, communication failures)
- Assess the likelihood and impact
- Propose mitigation or management strategies
Tip: Review the ACM Job Migration Task Force report (Chapter 6) to understand the structural risks involved in global outsourcing.
What You Will Submit
Your team will prepare a formal Outsourcing Recommendation Document, which includes:
- SWOT Analysis Summary
- Make-or-Buy Rationale
- Outsourced Scope with Justification
- Contract Type Recommendation
- Supplier Selection Criteria and Evaluation Plan
- Risk Register and Mitigation Plan
- Supporting appendices (e.g., worksheets, visual frameworks, key assumptions)
You’ll also prepare a short presentation of your findings and recommendations for peer and instructor feedback.
Outsourcing is not a shortcut. It’s a strategic move that must be justified, structured, and governed. In this milestone, you’ll learn how to take a vague directive (“let’s outsource it”) and turn it into a professional-grade plan grounded in project management principles and stakeholder value.
Approach it like a consultant. Think like a strategist. Write like a leader.
Milestone 1: Planning for Outsourcing – Student Workbook
Section 1: Getting Started
Purpose:
This workbook will help your team structure and develop a complete outsourcing recommendation for the Reckon project. It guides you through key decisions, analysis tools, and templates required to justify what to outsource, how to structure the engagement, and how to manage risk.
Instructions:
Complete each section as a team. Your responses will feed directly into your final deliverable and presentation. Each prompt is designed to mirror real-world project management decision-making.
Team Roles:
List your team members and assign responsibilities for each major section.
- Team Lead:
- SWOT Analyst:
- Contract Research Lead:
- Risk Manager:
- Supplier Evaluator:

