Best-Practices-Playbook - BPM - v1.8 - 05 - 11 - 2021
Best-Practices-Playbook - BPM - v1.8 - 05 - 11 - 2021
BEST PRACTICES
PLAYBOOK - PART I
November 2021
Foreword
The BPM industry in India is diverse in nature – comprising of organizations of different sizes catering to a
variety of verticals serving Indian and global markets. It is spread across larger metro cities as well as some
smaller towns. As an industry, we have more than two decades worth of experience and expertise and have
moved up the value chain – from cost arbitrage to being transformation partners for clients, taking care of their
critical front office, mid office, and back office business operations as well as offering insights to drive business.
As we develop new capabilities, adapt to continuous technology changes, and make ‘digital’ an integral
part of all our offerings, it is important that all organizations big or small should have the right tools, insights,
processes, and practices to achieve the highest level of quality and attain scale. This in fact is critical to ensure
that the industry grows at a faster pace and organizations across segments and sizes are able to drive this
growth.
The BPM Best Practices Playbook has been compiled together with a vision to share learnings from across
the industry in four areas (identified through interactions with many small and mid-sized players) that have
significant potential to drive impact on the business operations of the BPM organizations. Our hope is that,
the ‘actionable’ recommendations will help the BPM players enhance efficiency and effectiveness of these
functions as well as build strong, sustainable client relationships.
The first chapter about Hiring, Onboarding, and Upskilling focuses on making these functions more
streamlined, effective, and future oriented. The next chapter on IT Infrastructure Standardization provides
useful suggestions to create a seamless, secure, flexible, and scalable IT set-up that is cost effective, fulfils
compliance obligations, and fits client demands. The third chapter is about Robotic Process Automation
(RPA) and offers detailed insights to develop and execute successful automation projects. The last chapter on
Contract Management includes valuable guidelines on drawing up comprehensive and meticulous contracts
that not only work for the present but also have room to govern the growing collaboration between the service
provider and the client. Each BPM organization has its unique suite of strengths and opportunities. Our hope
is to strengthen them further by encouraging adoption of some of these best practices, most suited for each
organization’s specific context.
We hope to identify many more areas of impact and bring out the best practices for the industry in future and
ensure that the learnings are available to all for implementation as relevant.
Sukanya Roy
Head – BPM and GCC Initiatives, NASSCOM
2
Contents
1
Chapter 1
Hiring, On-boarding, and Upskilling – A Planned Approach 4
Authored by EXL and Concentrix
2
Chapter 2
IT Infrastructure Standardization – Need Of The Hour 18
Authored by Genpact
3
Chapter 3
Robotic Process Automation – An Exciting Opportunity 30
Authored by HGS
4
Chapter 4
Contract Management – An Effective Tool For Successful Client Engagement 48
Authored by eClerx and Mahindra Integrated Business Solutions (MIBS)
5 Acknowledgments 59
3
Chapter 1
Hiring, On-boarding, and Upskilling –
A Planned Approach
Authored by EXL and Concentrix
4
Chapter 1
5
Chapter 1
Job Description
1 Creation
A detailed and unambiguous job description helps both the candidates and the recruiters to evaluate if they
are a good match for the position. A succinct introduction of the organization and the function will help set the
right context. Remember to call out all the USPs of your organization as well as the salient points about the
function to make a compelling pitch.
Recruitment Calibration
2 and Strategy
6
Chapter 1
3 Sourcing Strategy
Seeding
The sourcing channels can be selected based on the skills required
Strategy
and timelines – leverage several channels in parallel as necessary.
This strategy primarily
a. Job boards (for sourcing and job posting) works well when you are
b. Walk-ins pitching for a new business
c. In-house tele-callers or have less time to get the
d. Seeding strategy team ready for new work.
This strategy works well when you require people with For example, if you are
experience as a point of diffrentiation or quick transition pitching for a new stream
e. Referrals & internal job posting (IJP) of work on New Business
Having a robust and visible referral and internal job-posting
Submission in Insurance,
program with constant communication and reward structure
can be a viable and low-cost channel for sourcing. then seeding people with
f. Social media channels
experience in this specific
Use social media promotions to widen the reach in the market area will not only accelerate
place. These channels are also effective if you want to target the transition process but
specific demographics and skills.
will also become a point of
g. Specialized recruitment partners/Search firms
differentiation in the new
Specialized search agencies/partners can be used to aid your
own recruitment efforts. They are helpful in terms of creating pitch.
a pipeline of viable candidates based on their own screening,
especially when you have to recruit in large numbers.
h. Campus hiring
Strong campus relationships with universities through
strategic tie-ups and programs can be useful as they have a
ready pool of candidates, entering the job market every year.
You can select the institutions based on your requirement
– if you need to hire candidates with a specific subject
background such as technical skills and accounting, this
channel can be fruitful.
7
Chapter 1
Assessment
4 Process
Follow the four-step assessment methodology for screening candidates to hire the right talent. Customize the
assessments to suit specific needs.
Assessment Description
1st Level Conducted by in-house recruiters to check organization and role fitment.
2nd Level Performed using language assessment tools especially for testing voice skill.
1. Assessed for analytical skills, computer proficiency, typing skills, and data
handling ability – benchmarked against agreed upon skill sets.
2. Domain assessment conducted to evaluate the interpretation skills of the
3rd Level candidate across common operations parameters. For example, insurance
terminologies, basic rating calculation, subject driven interpretation requests
(for instance the difference between ‘increase premium by’ and ‘increase pre-
mium to’).
8
Steps for Conducting an Effective Interview
a. Introduce the interviewer
c. Share an overview of the organization and of the specific The interview should aim at
department for which the hiring is being done gaining information about
d. Describe the role and outline the role expectations
the personality and behavior
clearly including the reporting structure associated with patterns of the candidate
the role and not only on testing the
e. Discuss the culture of the organization knowledge levels.
g. Keep the conversation engaging and make an effort to understand candidate’s personality and
behavior patterns based on the information shared in response to your questions – specific
examples from their experiences, challenges faced, lessons learnt, etc.
h. Ask if the candidate has any questions at this time on the role, organization, timelines, etc.
i. Close on a positive note with significant emphasis given to the organization and the brand,
irrespective of the potential outcome of the interview
Offer Roll
5 Out
9
Chapter 1
Background
6 Verification
10
Chapter 1
On-boarding,
7 Induction
On-boarding is an ongoing activity, not a one-time initiative.
The Buddy From the moment a candidate accepts an offer, a gradual flow of
System information should start to keep him/her engaged.
11
Chapter 1
12
Chapter 1
Category Requirement
Include an agreed percentage mix of fresher and experienced resources. An agreed percentage mix of
candidates with BPO and non-BPO experience can be hired, if the requirement is to hire domain specific
talent only.
13
Chapter 1
Skill Assessment
The Master Services Agreement should cover the contact channels and geographies to be supported.
Skill assessment can be customized as per the complexity of the work and the contact channels. Different
type of skill assessments are necessary for voice and back office roles. Described below are the minimum
requirements for these jobs.
14
Chapter 1
Job Roles
Technical Writing/
Business Analyst Instructional Designing
This profile is typically related to the knowledge As this is a specialized segment, certification in
process outsourcing (KPO) segment and the work instructional designing or technical writing, is
involves business or financial analysis of companies. required. Many companies are outsourcing content
This is a domain-specific profile and demands writing to India, and apart from technical writers,
relevant academic qualifications like a degree flash designers are in demand for these types of
in mathematics and statistics. Average to good roles.
communication skills are also required, as you will
need to interact with clients on a regular basis.
a. Hardware support
A candidate can be a graduate in any
discipline with a diploma in computers. Most
organizations offering hardware support will
Language train you on their hardware; however, you do
Specialists need a basic understanding of computers.
15
National Skills Registry (NSR)
An organization must avail of the "trusted sourcing" initiative by NASSCOM which offers an access to a national
database of registered and verified workforce for its member companies through "National Skills Registry
(NSR)". The database seeks to develop and hold a lifetime permanent profile for each person working in the
industry. Such profiles will be uniquely identified based on bio-metric and will hold credible data about each
industry employee including results of background check conducted by a professional third party on the
information of such a person. NSR is a web-based system hosting a fact sheet of information about existing
and prospective employees of Indian IT & ITeS / BPM industry. This database can be used by the IT & ITeS /
BPM industry and its clients as a credible source of information about the registered professionals.
NSR system has been designed in co-operation with the industry by collecting inputs from industry
representatives. Here are some key features of NSR.
The company can access further details at the National Skills Registry Website (www.nationalskillsregistry.com)
and join the National Skill Registry initiative.
16
Chapter 1
1) Customized Courses
Organizations can develop customized learning c. Conflict management (For Team Leaders and
courses basis the ongoing technology changes and above)
business requirements via their Learning Department. d. Coaching skills (For Team Leaders and above)
Some of them can cover:
e. Acing an Internal Job Posting (IJP) (For all levels)
a. Leadership skills (For Team Leaders and above) f. Knowing your organization (For Frontliners)
b. Time management and stress management
(For all levels)
17
Chapter 2
IT Infrastructure Standardization –
Need Of The Hour
Authored by Genpact
18
Chapter 2
Information Technology Infrastructure primarily refers Investing in IT infrastructure as per your need and
to an arrangement of computing and communication scaling it up as required, instead of incurring heavy
facilities and services needed to enable efficient expenditure upfront, is critical. In this context, let
data collection and data analysis and utilizing these us understand what IT standardization may signify
insights for seamless day-to-day operations. or look like. Your business needs and prevailing
infrastructure define your IT standardization, and this
Small and medium-sized businesses including
may take many forms. Surely, not every organization
BPM organizations typically face various challenges
can fit the same framework, though there are some
due to insufficient and inadequate IT infrastructure.
best practices regardless of industry, budgetary
Unlike large corporations, small businesses have
concerns, and company size that any organization can
limited funds and IT expertise, which pose problems
follow:
in building a robust IT set-up. At the same time, an
up-to-date technology ecosystem is a key growth • Similar hardware - not a mixed configuration of
driver for these smaller organizations that increases PC and Mac
efficiency, boosts productivity, and cuts operating • Matching operating systems - instead of
costs. Therefore, there is a need of an IT ecosystem different generations of the same system
that is manageable, affordable, and fit-for-purpose.
• Comparable equipment - servers, printers,
Here are some key factors that small/medium- scanners, copiers
sized BPM organizations should contemplate before • Similar applications - email, collaboration tools,
building their IT infrastructure: business management software, file sharing
services, password managers
• Nature of their business activities
• Standardized policies such as two-factor
• Core and auxiliary services
authentication
• Method of operations
Implementing and maintaining IT Infrastructure is
• Their geographic presence (remotely located/ not easy. Given below are a few recommendations to
presence in tier 1, tier 2 cities) build a strong yet cost effective IT infrastructure.
19
Chapter 2
c) Ensure Appropriate
Network Speed
An increased network speed helps in boosting
productivity of the resources and ensures consistency.
Choose a fast internet option to ensure lesser
downtime and to reduce maintenance costs.
20
Chapter 2
Standardizing
2 IT Infrastructure is Beneficial
Although the extent of standardization possible will depend on unique company circumstances – industry
type, company size, and the available budget, standardization offers significant benefits that cannot be
overlooked.
21
Chapter 2
Information systems infrastructure is the cornerstone of operations and a basic building block that other
business systems and processes rely upon for various purposes. Here are the challenges faced in absence of
a consistent IT set-up.
b) Inadequate Data
Provisioning
The processing and utilization of the humungous
amount of data available today can be a formidable
competitive advantage. To that end, choose the
most effective and efficient system arrangement for
simplified, expedited data processing. Inadequate
provisioning may lead to not having enough data
available to be able to glean meaningful insights.
22
Chapter 2
Successful
5 Automation Hinges
on Effective IT
Infrastructure and
Standardization
23
Chapter 2
b. Clients’ demands for diverse specifications can be addressed by virtualizing some of the
computing resources, allocating the usage to them as per their needs, and charging them for
their share. This way, the additional cost for customized IT set-up may discourage them and
persuade them to utilize the already established standard infrastructure. Given the additional
costs of a customized set-up, clients may appreciate the effectiveness of having a shared cost
model and the flexibility of ‘pay as you use’ model for cloud managed services.
c. That being said, build the IT infrastructure based on industry best practices, including for
security and compliance. Modern business operations rely on complex IT frameworks spanning
across hybrid IT infrastructure, from the cloud to the edge. The IT infrastructure performance
makes or breaks the end-customer experience and ultimately the business performance. The
key objective is to minimize the downtime and ensure the continuity of the operations.
d. A robust standardized infrastructure works for at least 80% of the clients. It has rationalized
pricing that is offered to the clients and this will always tend to remain within the budgetary
limits as pricing is always based on volumes and the shared consumption/services model.
e. The remaining 20% of the clients may still need customization in terms of more controls,
different configurations, etc. which then would need to be priced at premium.
24
Chapter 2
25
Chapter 2
5) Certification of the
Network
For small set-ups, take advantage of cloud based
security on centrally managed model with ‘open
internet’ rather than building a private network. In
simple words, small-scale units should keep the
network simple and deploy applications on cloud so
that they can be used from anywhere and at any time.
In absence of cloud, heavy networking system would
have to be built with extra cost along with forming an
in-house team to maintain it.
26
Chapter 2
Quick Tips
1) Devices a. Adopt a CYOD policy for simplified
Adopting a ‘choose your own device’ (CYOD) policy
IT support, MDM to provide remote
can be a good compromise. This policy allows access to all the company devices.
employees to choose from a variety of devices that
b. Provide a wireless network for ease of
have been approved by your IT department. As a
result, the number of devices available is limited, and
access and flexibility.
IT support is simplified. A CYOD policy combined with
c. Leverage SaaS platforms for
‘mobile device management’ (MDM) is an excellent
improved productivity, mobility,
solution for small businesses.
sharing, and collaboration
It provides them with the necessary flexibility and capabilities.
employee mobility. An MDM provides remote access
to all company devices, allowing you to apply security d. Choose a conferencing software
updates, upgrade operating systems and programs such as Zoom or Google Meet based
and most significantly, remotely delete all data on a on the group size and the level
device if necessary. Your cybersecurity policy must
of interactivity anticipated in the
undoubtedly include an MDM.
meetings.
27
Chapter 2
2) Network 4) Conferencing
Connectivity Applications
A wireless network is recommended for most small There are several applications available for video
to medium-sized businesses. This is because they are conferencing, meetings, webinars, and interviews
cost-effective, faster and easier to scale, easy to set such as Zoom, Google Meet, and MS Teams. Though
up and access, and provide employees with flexibility. they seem similar in many aspects, depending upon
Typically, 90% of the network and Wi-Fi issues result specific requirements – size of the group participating
because of the problems in the network equipment. in a meeting or the nature of the conversation (highly
For businesses that have 10 or more Wi-Fi devices interactive vs. minimal collaboration) – a suitable
in the office, business-grade equipment should application can be chosen.
be considered. Easy control, improved security,
increased scalability, and consistent performance
are just a few of the advantages that business-grade Company mentions/examples are illustrative and not endorsements.
network equipment providers offer. Further, as ISPs
may sometimes go down, it is advised to go for a low-
tier plan from a secondary ISP provider as a backup.
3) Productivity
Applications
SaaS platforms must be considered for the set of
productivity applications required for business use
since they help create documents, presentations,
and spreadsheets all on the cloud. They also offer
the ability to share and collaborate. In addition, they
provide cloud storage, synchronization, and video
conferencing services. These SaaS platforms are
constantly available, can be accessed from any
device or location, and can be integrated with your
other apps. Employee mobility and productivity are
improved by the ease of sharing and collaboration
capabilities.
28
Chapter 2
Conclusion
In today’s fast paced, global operations, it is essential to build a standardized,
seamless IT infrastructure. This requires correctly estimating your requirements,
investing in the right hardware and the software, having judicious mix of on-
premise/cloud models, ensuring compliance with local and global laws,
and leveraging the latest technologies. Such an efficient IT set-up not only
improves productivity but also enhances reliance, trust, and viability. A robust IT
infrastructure is essential for a business to gain a sound standing in a competitive
environment. As technologies evolve rapidly, whether to develop in-house
expertise around the new technologies or to hire services from outside depends
on the size of the business and resources available internally. Evaluate the pros
and the cons of both and make a conscious decision. With the IT standardization
in place, you already have the right foundation to scale further.
29
Chapter 3
Robotic Process Automation –
An Exciting Opportunity
Authored by HGS
30
Chapter 3
CXOs are often tasked with driving cost optimization by enhancing business efficiency. This objective can be
achieved through digitization, by automating processes, and reducing manual effort. As per Gartner, robotic
process automation (RPA) is a type of automation – a productivity tool that allows a user to configure one or
more scripts (which some service providers refer to as ‘bots’) to activate specific keystrokes in an automated
fashion. In simple words, the RPA bots are digital employees equipped to perform several tasks such as parse
emails, log into programs, connect to APIs, and extract unstructured data. These RPA bots can adapt to any
interface or workflow, there is no need to change business systems, applications, or existing processes in order
to automate.
Forrester predicts the RPA industry to grow to $2.9 billion in 2021 while Gartner says 90% of large organizations
globally will have adopted RPA in some form by 2022. Considering the above-mentioned benefits, growing
demand for the RPA services, and the need to build digital resiliency to overcome future challenges like
the Covid-19 pandemic, medium and small-sized BPM organizations have a big opportunity to leverage
automation, specifically RPA, to enhance their current services and offer new ones. There are several
challenges in deploying RPA optimally such as lack of understanding on the client side, resistance from
business and the employees, selecting the most appropriate process for automation and the lack of properly
structured RPA implementation teams. That being said, RPA can be deployed successfully with an in-
depth knowledge of what to automate, how to automate, and how much to automate while keeping value
maximization in mind.
RPA Benefits
31
Chapter 3
In this chapter, you will learn about a systematic approach to deliver RPA solutions to your clients. The eight
points discussed below are the key pillars of any successful RPA deployment.
Process of Discovery
1 and Opportunity
Identification
a) Process Discovery
Workshop
This is usually the very first step in the process automation
journey. Most of the time, only a few stakeholders within a client
organization have some understanding of what automation can
deliver. The objective of this discovery is to make the stakeholders Process Discovery
aware of the ‘art of the possible’ – essentially, help them realize Workshop is a
what can be achieved through automation – and then identify the
right processes for it. While there could be scope for automation
great way to bring
in several areas, it is important to follow a systematic method to all stakeholders on
arrive at processes that are most suitable for automation.
the same page and
Conduct workshops with key business, functional, and automation understand their
stakeholders to socialize the concept and run an idea generation
activity to collate a list of opportunities. As part of this exercise, expectations from the
it is also important to understand the objectives from every automation projects.
stakeholder, their business priorities, pain points, etc. This
information will further help during the prioritization stage.
32
Chapter 3
b) Process Mining
The other useful method could be to deploy process-mining tools
on the systems of subject matter experts (SMEs) of a client. These
tools could capture the activities done by every individual across
Process mining can different functions or teams. An analyst can further study these
reveal important data points to provide insights on the automation opportunities,
complexity of the processes, ROI, etc.
data points that can
This activity can follow once the high-level workshops are
help in prioritization conducted and the areas that have potential for automation are
of processes for broadly identified. Process mining can typically be used where
there is scale, as it would come at an additional cost and may
automation.
add to the overall cost of automation. Some of these process
mining tools are offered by RPA platform providers while other
independent tools are available too. There are several advantages
of using these tools including lesser dependency on the SME
time and availability, more reliable data points for the baseline and
impact study, process documentation for the current process, and
prior understanding of exception scenarios.
factors that need to On the prioritization side, evaluate the effort and time required to
be considered for automate, dollar value impact, quality and compliance mandates,
customer satisfaction, etc. Additional areas to consider would be
selecting processes the environment, technology, etc., as some complex environment
for automation or legacy system could over complicate the automation solution.
Where the implementation of the project could be long and
including complexity complex, the plan should include phase-wise roll out and
of the process and the compute the potential ROI accordingly.
business needs. Ensure that the process is mature enough for automation, if not;
optimize the process beforehand to get optimum results. Mature
processes are structured, have clearly laid out workflows, and
involve minimal manual system intervention. Having documented
process flows and standard operating procedures (SOPs) is a plus;
however, if not available, these can be created during the design
phase. Sometimes the business teams may pose a challenge
on re-engineering aspects. In such a situation, emphasize
the importance of re-engineering in the context of the larger
automation goals and the envisaged benefits.
33
Chapter 3
d) Score Card
The best way to select projects for automation
is through a score card. The scorecard should
be created with parameters such as the ease of
implementation, business priority, and ROI with an
appropriate weightage for each parameter. Decide
the score card weightage based on business
priorities, and then the right processes could be
filtered for the automation pipeline.
Starting Right!
Be sure to create awareness
about what automation can
help achieve, evaluate diverse
processes thoroughly, and
prioritize based on the business
goals as well as the suitability of a
given process/workflow.
34
Chapter 3
a) Cost Impact
A robust business case goes a long way in setting up the automation
journey for success, in any organization. It is important to have a
good ROI for every process automated; otherwise, lack of clear
financial gains or other relevant benefits could become a hurdle
for the acceptance of the entire automation roadmap. In addition
to establishing a sound ROI, it is important to clearly ascertain the
investments needed for the automation initiatives.
35
Chapter 3
b) Error Reduction/
Compliance c) Turn Around Time/SLA
If some processes are considered as high risk or There are several time-bound or SLA driven
critical due to their nature, for example, financial processes where transactions need to be completed
transactions, sensitive data points, they may on time or within a specific duration. Some processes
be pertinent for automation. Errors in handling may also have seasonal fluctuation of volumes, for
these type of transactions could mean breach example, higher volumes during the holiday season.
of compliance, negative impact on the company Any delay in processing such transactions would
image, and might result in financial implications. For mean loss of revenue, brand reputation risk, and loss
example, processing an invoice incorrectly may lead of reward in some cases. These are relevant scenarios
to lesser or excess payment by the company. to be considered for automation. Absenteeism or work
overload leading to additional staffing requirement
can be addressed via automation as well. Having
bots work 24/7, beyond the regular time slots, would
help provide more capacity with the same digital
resources, drive efficiency while also meeting the
SLAs set.
36
Chapter 3
Governance for
3 Automation
37
Chapter 3
Not all automation opportunities are the same; hence choose an RPA solution most suited for the specific
problem at hand. The focus should be more on the design and the solution than the platform itself.
38
Chapter 3
c) Handling Unstructured
or Semi-structured Data
Sources
While RPA can handle rule-based structured
information seamlessly, it may not work as well
when unstructured or semi-structured inputs are
involved. Therefore, evaluate the complexity of the
documents and identify the right solution. Most of the
prominent RPA platforms today provide additional
tools to support handling of these data sources
and some work very well when it comes to digital
documents such as invoices, bank statements and
on boarding documents while others need additional
configuration. These solutions may not provide 100%
accuracy and may evolve over a period based on
model training etc. Be cognizant of the type of the
problem, complexity, and the business case for
the automation opportunity before selecting the
solutions.
d) POC/Pilot Approach
Take a proof of concept (POC) or pilot approach
when working with a new client to help show quick
progress and outcomes and to help build stakeholder
confidence to scale eventually. The POC would also
help in socializing the concept with different units
within the organization and help them understand the
impact of automation.
39
Chapter 3
Stages of RPA
Lifecycle
Technical
5
a. Discovery – Process identification,
Development Life creation of high-level
implementation plan
Cycle and Best b. Solution Design – Process deep
Practices dive, solution design, creation
of technical documents for
development
40
Chapter 3
c. Technical Design Document – TDD (helps Testing is done either by the development team or by
technical teams to understand the components a separate testing team as per the client requirement.
of the bot built) Upon successful testing, the code is pushed to the
production environment. However, if the tests fail,
The above-mentioned documents contain all the bugs are fixed in the development environment and
information that will be required by the developers to re-tested in UAT or staging before being moved to the
build a bot as well as ensure that the business users production environment. After successfully testing the
understand the process laid out for the bot activity. subsequent runs, the bot is moved to the deployment
Typically, these documents capture keystroke level phase.
details, thus giving a step-by-step detailed guide for
both the business users as well as the technical users Typically, these tests are run in the presence of
for all the current and future operational needs. business users who will review the bot output and
sign off for the next phase.
Take a sign off at each phase to ensure that the
solution is in line with the expectations of the client.
Company mentions/examples are illustrative and not endorsements.
c) Development Phase
In this phase, the developer creates automation
scripts using the chosen RPA tools from providers
such as UiPath, Automation Anywhere (AA), and Blue
Prism.
41
Chapter 3
e) Deployment &
Maintenance Phase f) Support & Maintenance
After deployment of a bot in production environment, In this ongoing phase of RPA life cycle, the bot is
track its accuracy and output for a set duration, based running in a BAU mode.
on the complexity of the automated tasks, as these
Any issues that surface during the production runs
are live cases. Gradually increase the number of
need to be handled by the maintenance team. It
cases for better outcome. In case of any gaps in the
is good to have a checklist of hygiene activities to
processing by the bot, the bot controller may note
proactively manage the bot. This could include folder
such instances and pass them on to the development
clean up, re-boots, code review, applying patches,
and the testing teams for review and closure. It
revisiting capacity, monitoring runs, bot performance
is imperative to have the business SMEs monitor
management, etc.
the runs alongside the controller during the initial
stage, solicit their feedback, and pass it back to the Depending on the scale of the bots deployed have
development team for any fixes. a dedicated control room team or cross-utilize
maintenance team to perform both activities. The job
A final sign off from the business as well as the bot
of the controller is to monitor bots regularly to check
controller is helpful to ensure all the activities have
for any unforeseen issues and liaise with maintenance
been completed satisfactorily and accurately. A
team to fix and minimize any production gaps.
checklist of all the issues through development,
testing, and production should be captured and Moreover, process changes or system upgrades
handed over to the maintenance team along with the could also affect the functioning of the bots and
TDD. typically, these activities should be planned in
advance in order to have minimal impact on the bots.
42
Chapter 3
6
Resource Skillsets
This section describes responsibilities as well as best practices for key roles in the automation space
a) Solution Designers
i. Command strong understanding of the
industry, domain, and business processes
43
Chapter 3
44
Chapter 3
45
Chapter 3
46
Chapter 3
c) Platform Selection
There are multiple large and small RPA providers in the market. Some of them also have starter
packs and cheaper options to start the automation journey. It is important to get a sense of
the size of potential opportunities and then sign up for the right package with the automation
providers. There are also additional solutions being offered along with RPA tools which can be
picked up from the RPA providers or depending on the business need, some solutions can be
built in- house. It is important to try out different platforms for the specific use cases before
buying.
Conclusion
RPA can deliver tangible business impact by automating routine, repetitive, and
rule-based processes. For delivering successful RPA projects, it is important to
choose right processes for automation, accurately quantify the anticipated ROI
and benefits, follow a well-structured development process and ensure that an
appropriate business model is selected that is beneficial for both the client and
the service provider. Start with a pilot/proof-of-concept to showcase concrete
results and ensure that the key stakeholders in the client organization are well-
versed with the outcomes that are expected out of automation projects. These
are the key considerations to undertake a rewarding automation journey.
47
Chapter 4
Contract Management –
An Effective Tool For Successful
Client Engagement
Authored by eClerx and Mahindra Integrated Business Solutions (MIBS)
48
Chapter 4
Key Steps in
Contract Management
1. Pricing Model
2. Demonstrate Value
49
Chapter 4
1
Pricing Model
50
Chapter 4
x. Insurance cover
51
Chapter 4
52
Chapter 4
2
Demonstrate Value
53
Chapter 4
d) Co-creation
This is a critical element where the service provider
engages with a client to move up the process
benchmarks, provided the client is willing to invest/
sponsor in the change management, which could
be achieved by changes in process, quality/type
of people, and technology. This should be looked
at as a mutual win, such that there are medium-
term benefits for both parties. For example,
implementation of a voice bot may reduce X% of
headcount in the process, hence it delivers a cost
benefit for the client. At the same time, there would
be an investment in the voice bot by the service
provider with a payback period. The service provider
and the client can share the gains resulting from
the reduction in headcount by adjusting against the
investment in the voice bot.
54
Chapter 4
Contracts, Collections,
3 and Dispute
Resolutions
Contracts, Collections, and
Dispute Resolutions Related Key
Topics
a. Key documents
a) Key Documents b. Duties & charges
55
Chapter 4
i. Overall Clauses
Clearly articulate payment terms for seamless functioning – including the
turnaround time (TAT) for invoicing, method of invoicing, payment TAT, default
acceptance based on time lapse, payment of undisputed amounts, and payment
at time of disengagement under any scenario. Ensure no direct or indirect
administrative costs are added over and above agreed terms.
e) Duration of Contract
The period of contract and the notice period should be clearly specified in the
agreement. Let the contract termination notice be at least 15 days more than the
employee notice period as per the employment contract. Services that would be
provided during notice period should be clearly mentioned in the agreement. If the
services being provided to the client are critical in nature and the headcount reduces
during the notice period, this may invite penalties. Service provider can also decide
to give client flexibility of shorter notice for certain % of FTEs reduction, provided the
resources can be quickly redeployed to other processes or clients.
Explicitly mention the applicable laws, for example, whether Arbitration & Reconciliation
Act or MCIA rules will be considered, jurisdiction of legal disputes and arbitration,
choice of law, representation & warranties. Do not commit express or implied warranty
to provide services error free – instead providing service level credits might be more
prudent. A mutual clause is not always safe unless read in conjunction with other
clauses. London and Singapore are most favoured neutral jurisdictions for international
arbitration. Avoid choosing a country where you don’t have significant physical presence.
56
Chapter 4
2. Omission of liability clause – is it beneficial for the service provider? Omission may
amount to ambiguity in the contract in the absence of any limitation of liability and
indemnity – being generally detrimental to the interest of the service provider in case
of dispute.
3. Here is the list of items that are usually considered as uncapped liability – death, injury,
breach of law, 3rd party IP, gross negligence, wilful misconduct, and employment
claims from vendor employees. Confidentiality breach may be uncapped provided
it excludes personal data from the definition of confidential information and a client
needs to make a claim on liability (and not on indemnity) basis.
5. Avoid duplication of the liability caps. The liability cap across all documents/damages
should be in aggregate and not compounded.
6. Liability for all indirect and consequential damages, including loss of profit, anticipated
revenue, and other similar issues should be excluded, i.e. no liability/damages to be
paid for these.
7. Liquidated damages.
8. Choose suitable insurance cover to protect against liabilities. The cover should be of
appropriate value and the voluntary deduction should be minimal.
9. As a rule of thumb, indemnity provided should not exceed the annual profits earned
from the client for Indian clients.
10. Cap the data and information security breach liability to a certain factor (1-2X) of
revenue for foreign clients.
11. Frame the force majeure clause appropriately to protect interests of the client and the
service provider considering the experience during the Covid pandemic. If the service
provider is capable of providing services as per the terms of agreement then the client
has to pay for services received/receivable fully with the only option to mutually agree
for a discount at the discretion of the service provider or terminate the contract under
appropriate notice period.
12. Include a clause to cover retrospective changes in statutory liabilities, which may result
in cost impact for the service provider.
13. The service providers should ensure zero non-compliance in areas of minimum
wages, non-payment, or delayed payment of statutory dues as the same are usually
committed to the client in the agreement.
14. Include a provision to permit ‘work from home’ in BCP situations so that separate
permissions are not needed in times of crises.
57
Chapter 4
Conclusion
Any successful client-service provider
relationship hinges on mutually
beneficial contractual terms and
conditions. These contracts cover
multitude of aspects — clauses that
span SLA, billing & payment terms,
arbitration and legal cover, etc. A
meticulously drafted contract makes
it easier for both parties to maintain
and improve quality standards, build
trust, ensure transparency and clarity of
expectations, and offers a clear roadmap
for remediation where necessary.
Efficient and effective contract
management creates a solid foundation
upon which a longstanding and winning
partnership between a client and a
service provider can be built.
58
Acknowledgments
NASSCOM takes this opportunity to thank the industry leaders for their valuable time and in-depth insights that
helped us create this playbook.
Contributors:
» Garima Srivastava
Assistant Vice President - Transformation Services,
» Rohitash Gupta
Chief Financial Officer, eClerx
Genpact
59
About
NASSCOM
NASSCOM is the industry association for the IT-BPM sector in India. A not-for-profit organization funded by
the industry, its objective is to build a growth led and sustainable technology and business services sector
in the country with over 3,000 members. NASSCOM Research is the in-house research and analytics
arm of NASSCOM generating insights and driving thought leadership for today’s business leaders and
entrepreneurs to strengthen India’s position as a hub for digital technologies and innovation.
Disclaimer
The information contained herein has been obtained from sources believed to be reliable. NASSCOM and its advisors & service
providers disclaims all warranties as to the accuracy, completeness or adequacy of such information. NASSCOM and its advisors &
service providers shall have no liability for errors, omissions or inadequacies in the information contained herein, or for interpretations
thereof. The material or information is not intended to be relied upon as the sole basis for any decision which may affect any business.
Before making any decision or taking any action that might affect anybody’s personal finances or business, they should consult a
qualified professional adviser.
Use or reference of companies/third parties in the report is merely for the purpose of exemplifying the trends in the industry and
that no bias is intended towards any company. This report does not purport to represent the views of the companies mentioned in
the report. Reference herein to any specific commercial product, process or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favouring by NASSCOM or any agency
thereof or its contractors or subcontractors.
The material in this publication is copyrighted. No part of this report can be reproduced either on paper or electronic media without
permission in writing from NASSCOM. Request for permission to reproduce any part of the report may be sent to NASSCOM.
60
National Association of Software and Services Company
NASSCOM Plot 7 to 10, Sector 126, Noida - 201303
Phone - +91-120-4990111
Usage of Information
Forwarding/copy/using in publications without approval from NASSCOM will be considered as infringement of intellectual property rights.
61