Reading: Implement change management system Contents Introduction ................................................................................... 2 Logging the change request .......................................................... 2 The expected impact of the change .............................................. 5 Risk management ......................................................................... 5 Risk identification ....................................................................... 6 Risk quantification ...................................................................... 6 Risk response............................................................................. 7 Document the expected outcomes of the change ......................... 8 Inform users of changes ................................................................ 8 Assign the change to the appropriate person for actioning. .......... 9 Reading: Change management © NSW DET 2009 1 Introduction Website systems can be large and complex. With this size and complexity comes a growing risk of problems and faults that can affect user productivity. Users have high expectations of live systems such web servers. Although users generally accept that problems and faults can and do occur they expect minimum down-time in accessing website resources. Together these two issues create a strong need for effective change management systems to support the complex website systems and the demanding expectations of users. Internal users and IT support staff need to be able to quickly log change requests, receive a timely response that the request is being processed, be kept up-to-date with the status of the request and be informed of the outcome. Logging the change request Good change management involves three steps: request for change evaluation decision. All change management systems need some form of logging information or reporting a request for change. These requests for change must be in writing, no matter the source, otherwise control is lost and a change history cannot be accurately built up over time. Change must be controlled to make sure that the changes have a positive affect on all existing systems. Usually this is done via a change request form or via a helpdesk which can log requests. Helpdesk systems are typically only feasible for mid to large organisations or where the nature of the business creates a large volume of change requests. Below is an example of a change request form: Change request form Contact details Requested by: Joe Blogs Date: 19/08/08 Phone: (02) 9784-4501 Email: [email protected] Change request 2 Reading: Change management © NSW DET 2009 Change requested: Upgrade website to reflect new company logo Reason for change: Website visitors need to be exposed to the new logo and all uses of the old logo are scheduled to be phases out. Priority: Low Alternative solutions: None known of at this time Roll back plan: Backup website data. If the logo image update fails use backup to restore previous logo. Budget: $150 Estimated time: 3 hours Resources required: New web versions of logo to be created. Medium High Website areas affected Areas: Home page Navigation Other content pages Database Other systems: Web server hardware Web server software PHP Content management server None Approval/denial details Network manager Approved: YES NO Conditions for approval: CIO approval required YES Date: 20/05/09 Signature: Peter Smith Reason for denial: NA CIO Approved: YES NO Operation performed after 7pm and before 8am. NO Conditions for approval: Date: Signature: Reason for denial: Response/Action Action to be taken by: Joe Blogs Reading: Change management © NSW DET 2009 3 Planned date and time of action: Date: 21/05/09 Time: 7pm Completed: YES Outcomes: Logo image swapped to new version and rendered correctly in all approved browsers. Follow up required: Test with older version of browsers. Other comments: NA NO There may be several versions of change requests to suit different users and businesses. As you can see from the example change request form both you may to assign several people to sign–off on a request. The exact procedure for the change request and its approval will depend upon the size, structure, policies and procedures that are in place in an organisation, the type of change required and the number of users that are impacted. A balance must be found between efficiency and risk. If too many people are involved in the approval process it can take an inefficiently long time to make small modifications. However, if too few people are made aware of the proposed change then potential problems may be overlooked. Complex and expensive modifications may require a more detailed analysis than a simple change request form. If there is some doubt or if the change is extensive, further research and testing should be conducted. A final change should be made only after a recommendation for approval or an alternative has been signed off by the appropriate person, being the business owner or manager as they have responsibility to pay for the work or solution. When designing a change management system there are some important things to consider: 4 All changes must be requested in writing and submitted via systems such as email or an online form. This is vital if your business uses an external IT provider to maintain your web presence. Is the change justified? Staff actioning change requests need to be able to identify that the requested change is necessary and make sure that any resulting modifications are beneficial to the website usability. Change requests and resulting actions must be well documented. All changes must be tested before implementation and measured after implementation. A follow-up system needs to be in place to confirm that the action has been taken and has solved the initial problem Reading: Change management © NSW DET 2009 The change management system must be easy to manage and oversee. Scheduling and prioritisation systems need to be in place to allow modifications to be performed effectively and in a timely fashion. The change management system should be able to support the allocation of resources to action the change. Checks should be in place to ensure that changes do not pull the organisation away from its core business or that changes in peripheral systems are not implemented at the expense of core business systems. Escalation processes must be in place to allow complex change requests to be actioned as quickly as possible. Risk analysis of system changes should be conducted. For example should there be checks to ensure that a change in one system does not have an adverse affect on another system. The expected impact of the change Some of the website changes resulting from change requests may be minor and only fix a small problem or the modification might focus on web server systems with little obvious change to website users. Other changes may have a strong and direct impact on users and require a change in visitor behaviour new ways of using the site. You need to clearly understand what will be the impact on users, and what can be done to minimise the negative impact. Once the impact of a change has been assessed you can consider more carefully what the user may need to do differently and include activities in your change-process to minimise this impact. No matter what the expected impact to users all changes should be documented and carefully planned. The ability to do this should be part of the change management logging system. Risk management [Acknowledgment: The material in this section on risk management has been adapted from the UpFront! Toolbox (601) © Commonwealth Australia 2004.] Protecting live systems form problems arising from implementing requested changes should be part of a risk management policy. Reading: Change management © NSW DET 2009 5 Any change to a live website comes with a level of risk. The level of risk will depend on the complexity of the intended change and how wide the impact of the change is within the website. For example moving the website to a new web server will be a far more risky than updating some downloadable documents. A risk is something that may happen and if it does, it will have a negative impact on existing systems. A risk must also have a probability of occurring that is something above 0% and less than 100%. If there is no chance of it happening, then it is not a risk. If it has a 100% chance of occurring it is a certainty rather than a risk and must be factored into planning any modifications. The second thing to consider is what type of impact it will have. If it will have a neutral or positive impact, it is not a risk. There are three stages to risk management planning: 1. risk identification 2. risk quantification 3. risk response Risk identification In this stage, you need to identify and name the risks. The best way to do this is to communicate with users, managers and other affected staff. Use a combination of brainstorming risks specific to the planned change and reviewing standard risk lists. Generic risks are risks to all changes, for example the risk that staff may not be available to implement the change. Each organisation will develop standard responses to generic risks. Risks should be defined in two parts: the cause of the situation (such as hardware failure, excessive visitors, etc) the impact (such as exceeding the budget, system downtime, etc). Risk quantification Risks need to be quantified in two dimensions. You need to assess the probability of the risk occurring as well as the likely impact if the risk does occur. For simplicity, rate each on a 1 to 4 scale using a matrix similar to the one you see below — the larger the number, the larger the impact or probability. 6 Reading: Change management © NSW DET 2009 Risk quantification matrix Note that if probability is high and impact is low then this is a medium risk, whereas if the impact of a risk is high and probability is low it is high risk. A remote chance of a system-destroying risk warrants more attention than a high chance of a small problem. Risk response There are four things you can do about a risk: 1. Avoid the risk - do something to remove it, for example, contract specialist experts for complex changes. 2. Transfer the risk - make someone else responsible. Perhaps the website designer or hosting provider can be made responsible for a particularly risky change. 3. Mitigate the risk - take action to lessen the impact or chance of the risk occurring. Keeping hardware under warranty or having service level agreements in place with designers and hosting providers. 4. Accept the risk. The risk might be so small that the effort to do anything about it is not worthwhile. Much of the risk involved in changes can be mitigated through careful risk management planning. There are several fundamental tools you can utilise to reduce the impact of a failed system change: Backup- data must be protected throughout all stages of a system modification. Backups are an integral part of this process. Roll-back path-how will changes be undone if they are unsuccessful. Are their sensitive systems, such as website databases that are not easily restored to a previous version? Testing of a planned roll-back path is vital to ensuring that it will work as planned. Standby operations-particularly for mission critical websites it may be wise to have standby systems in place if a change fails. Reading: Change management © NSW DET 2009 7 This is can be done by running a duplicate website or hosting a website across several clustered servers. Optimise the current website -before implementing a website change is a good idea to optimise the current site. Things you can do include deleting unnecessary files, performing server maintenance, installing updates and patches etc. Document the expected outcomes of the change Documentation is vital. Changes can have a flow on affect where one change leads to many more. It is important to manage this process carefully to avoid adverse flow-on affects. You need to: record reasons for changes document the consequences of a change make sure the changes are agreed to before they are put into practice. When documenting the expected outcome of a change you should include: what business problem is being solved who will be affected by the modification what systems will be modified how will these modifications affect other systems how will website usage and performance change what resources will have been used to complete the change. Both the change request form and change log systems should allow the expected outcomes to be recorded and tracked to measure if the final outcome and the expected outcomes match. Inform users of changes Once you have identified the implications of the change you can consider if website users need to be informed and how best to inform them. The aim is ‘don’t keep users in the dark’. Communicate with users what the changes will be, why the changes are being made, how the changes will affect website usage, when the changes will occur and 8 Reading: Change management © NSW DET 2009 reassure them that the changes are being made to improve their website usage experience. You may even be able to get website visitors to assist in the change process by providing specific feedback about the change etc. Assign the change to the appropriate person for actioning. The role you play responding to recommended changes can depend largely on your role and the size of the organisation. If you are the sole website support person in a medium sized company you may have to receive the change request, prioritise it and respond to it through to completion. In larger organisations you may be working with IT support staff or inhouse web designers/programmers. For simple changes you can probably resolve the issue immediately and provide feedback directly to whoever logged the change. For more complex problems will have to escalate the change to better qualified staff. Reading: Change management © NSW DET 2009 9
© Copyright 2026 Paperzz