SlideShare a Scribd company logo
1 of 32
COMMON DASHBOARDS
ISO 9001:2008
What is ISO 9001:2008
• ISO 9001:2008 is a quality management system
standard, first published in 1987 by ISO
(International Organization for Standardization).
This standard is designed to help organizations
ensure that they meet all requirements of
customers and stakeholders.
• ISO 9001 is considered as a key factor for doing
business in global markets and for improving
competitiveness.
ISO 9001:2008
• It is the most popular standard worldwide and up to the end of
December 2013, at least 1, 129, 446 certificates had been issued
in 187 countries and economies, three more than in the
previous year. The 2013 total represents an increase of 3 % (+32
459) over 2012.
The table below summarizes the statistics of the ISO 9001
certifications around the world.
AN OVERVIEW OF ISO 9001:2008
• ISO 9001 specifies requirements for a quality
management system where an organization
needs to demonstrate its ability to consistently
provide products that meet customer and
applicable statutory and regulatory
requirements; in addition to enhancing
customer satisfaction through the effective
application of the system, including processes
for continual improvement of the system and
assurance of conformity to customer and
applicable statutory and regulatory
requirements.
QUALITY STANDARDIZATION EVOLVES WITH ISO
9001 BY ADDING:
• Greater emphasis on setting the objectives, monitoring
performance and metrics;
• Clearer expectations on management; and
• More careful planning for and preparing the resources
needed for ensuring quality
SIX SIGMA
WHAT IS SIX SIGMA?
• Six Sigma ranks among the foremost methodologies
for making business processes more effective and
efficient. In addition to establishing a culture dedicated
to continuous process improvement, Six Sigma offers
tools and techniques that reduce variance, eliminate
defects and help identify the root causes of errors,
allowing organizations to create better products and
services for consumers.
METHODOLOGIES OF SIX SIGMA
There are two major methodologies used within Six Sigma,
both of which are composed of five sections, according to
the 2005 book “JURAN Institute Six Sigma Breakthrough
and Beyond” by Joseph A. De Feo and William Barnard.
• DMAIC
• DMADV
METHODOLOGIES OF SIX SIGMA
DMADV: The DMADV method is typically used to create new
processes and new products or services. The letters
stand for:
D- Define the project goals
M- Measure critical components of the process and the
product capabilities
A- Analyze the data and develop various designs for the
process, eventually picking the best one
D- Design and test details of the process
V- Verify the design by running simulations and a pilot
program, and then handing over the process to the client
METHODOLOGIES OF SIX SIGMA
DMAIC: The DMAIC method is used primarily for improving
existing business processes. The letters stand for:
D-Define the problem and the project goals
M-Measure in detail the various aspects of the current
process
A- Analyze data to, among other things, find the root defects
in a process
i- Improve the process
C- Control how the process is done in the future
SIX SIGMA CERTIFICATION
• Yellow Belt certification is an efficient way to learn the
basics of Six Sigma. It is ideal for those who lead limited
improvement projects. Those who are supporting
improvement projects in a limited role in a Six Sigma
team.
• Green Belt certification is ideal for those who are part of a
Six Sigma Management Team. Those who are assisting
with data collection and analysis for improvement
projects. Green Belt training will allow you to implement
Six Sigma proficiently.
• Black Belt certification is for team leaders who manage
big improvement. It also helps in problem-solving
projects. At the Black Belt level, you will have a thorough
understanding of all aspects of Six Sigma.
BENEFITS OF SIX SIGMA TO THE ORGANIZATION
• Customer Satisfaction
• Improved bottom line
• Employee satisfaction
WHAT IS ITIL
• The IT Infrastructure Library (ITIL) is a library of volumes
describing a framework of best practices for delivering IT
services. ITIL has gone through several revisions in its
history and currently comprises five books, each
covering various processes and stages of the IT service
lifecycle.
• Developed by the British government's Central Computer
and Telecommunications Agency (CCTA) during the
1980s, the ITIL first consisted of more than 30 books,
developed and released over time, that codified best
practices in information technology accumulated from
many sources (including vendors' best practices) around
the world.
WHAT IS IN THE ITIL
• The original 30 books of the ITIL were first condensed in
2000 (when ITIL V2 was launched) to seven books, each
wrapped around a facet of IT management. Later, the ITIL
Refresh Project in 2007 consolidated the ITIL to five
volumes consisting of 26 process and functions – this is
referred to as the ITIL 2007 edition. In 2011, another
update — dubbed ITIL 2011 — was published under the
Cabinet Office. The five volumes remained, and ITIL 2007
and ITIL 2011 remained similar.
WHAT IS IN THE ITIL
• ITIL 4, which was released in 2019, maintains the same focus on
automating processes, improving service management and
integrating the IT department into the business. However, it also
updates the framework to accommodate and answer to modern
technology, tools and software. Since ITIL’s last update, the IT
department has grown to become integral to every business and
the new framework accommodates this by being more agile,
flexible and collaborative.
• The newest version of ITIL focuses on company culture and
integrating IT into the overall business structure. It encourages
collaboration between IT and other departments, especially as
other business units increasingly rely on technology to get work
done. ITIL 4 also emphasizes customer feedback, since it’s easier
than ever for businesses to understand their public perception,
customer satisfaction and dissatisfaction.
BENEFITS OF ITIL
• ITIL will help businesses navigate the new technological
era, commonly known as the Fourth Industrial
Revolution.
• TIL will provide a practical and flexible basis to support
organizations on their journey into the new world of
digital transformation .
• ITIL will be much more relevant to software developers,
service management practitioners and businesses
through promoting a holistic view of delivering products
and services.
• ITIL is the next iteration that incorporates all of the best
things from ITIL as it is known today and expands IT and
service operations to a new level. Moving from traditional
process-led delivery, ITIL 4 supports faster quality and
value driven delivery for people and organizations.
PRINCE 2
What is Prince 2
• PRINCE2 is an acronym for Projects IN Controlled
Environments. It’s a process-based method for managing
a project. As noted, it’s been mostly used by the
government in the United Kingdom, but it’s also prevalent
in the private sector in the United Kingdom and other
places around the world.
• The key features of PRINCE2 focus on business
justification, defining the structure of an organization for
the project management team and using a product-based
approach. There’s an emphasis on dividing the project
into manageable and controllable stages, with flexibility.
PRINCE2 provides great control over project resources
and excels at managing business and project risk more
effectively.
HISTORY OF PRINCE2
First established in 1989 by the Central Computer and
Telecommunications Agency (CCTA), PRINCE2 was
originally based on PROMPT, another acronym that
stands for Project Resource Organization Management
Planning Technique, which was created in 1975 and used
by the United Kingdom for its information system
projects. PRINCE2 was finally published in 1996, and
surprisingly, it is in the public domain.
PRINCE 2 ROLES
• The project manager is the one who is responsible for the
organization and in control of the project and its
processes.
• There is also a customer, user or supplier involved in the
project. This is the person or organization that is paying
for the project.
• Finally, there’s a project board, which is made up of the
customer and executives, such as a person who
represents the user side and another representing the
suppliers or specialists involved in the project.
PRINCE 2 PROCESS
BENEFITS OF PRINCE 2
COSO
What is COSO?
• In 1992, the Committee of Sponsoring Organizations of
the Treadway Commission (COSO) developed a model for
evaluating internal controls..
• The COSO model defines internal control as “a process
effected by an entity’s board of directors, management
and other personnel designed to provide reasonable
assurance of the achievement of objectives in the
following categories:
-Operational Effectiveness and Efficiency
-Financial Reporting Reliability
-Applicable Laws and Regulations Compliance
FIVE COMPONENTS WORK
In an effective internal control system, the following five
components work to support the achievement of an
entity’s mission, strategies and related business
objectives:
• Control Environment
 Exercise integrity and ethical values.
 Make a commitment to competence.
 Use the board of directors and audit committee.
 Facilitate management’s philosophy and operating style.
 Create organizational structure.
 Issue assignment of authority and responsibility.
 Utilize human resources policies and procedures.
FIVE COMPONENTS WORK
Risk Assessment
 Create companywide objectives.
 Incorporate process-level objectives.
 Perform risk identification and analysis.
 Manage change.
Control Activities
 Follow policies and procedures.
 Improve security (application and network).
 Conduct application change management.
 Plan business continuity/backups.
 Perform outsourcing.
FIVE COMPONENT WORK
Information and Communication
 Measure quality of information.
 Measure effectiveness of communication.
Monitoring
 Perform ongoing monitoring.
 Conduct separate evaluations.
 Report deficiencies.
COSO expects the updated framework to deliver a number of benefits,
including the following:
Improved governance
Expanded use beyond financial reporting
Improved quality of risk assessment
Strengthened anti-fraud efforts
Ability to adapt controls to changing business needs
Greater applicability for various business models
Thank you for
listening!

More Related Content

What's hot

COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introductionaqel aqel
 
I Forum GSTI - David Bathiely
I Forum GSTI - David BathielyI Forum GSTI - David Bathiely
I Forum GSTI - David BathielyMarcos Andre
 
ITIL vs TOGAF First Round
ITIL vs TOGAF First RoundITIL vs TOGAF First Round
ITIL vs TOGAF First RoundBITIL.COM
 
Secure Software Development – COBIT5 Perspective
Secure Software  Development –  COBIT5  PerspectiveSecure Software  Development –  COBIT5  Perspective
Secure Software Development – COBIT5 PerspectiveSPIN Chennai
 
ADD: New itil implementation approach
ADD: New itil implementation approachADD: New itil implementation approach
ADD: New itil implementation approachMohamed Zohair
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Trainingvyomlabs
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGoutama Bachtiar
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training courseIman Baradari
 
Cobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposalCobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposalEmilio Gratton
 
Cobit5 introduction
Cobit5 introductionCobit5 introduction
Cobit5 introductionMarkus Yaldu
 
Tackling ITIL Implementation Challenges
Tackling ITIL Implementation ChallengesTackling ITIL Implementation Challenges
Tackling ITIL Implementation ChallengesMohamed Zohair
 
IT frameworks
IT frameworksIT frameworks
IT frameworkscyouss
 
Introduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service managementIntroduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service managementChristian F. Nissen
 
Implement cobit in your organization
Implement cobit in your organizationImplement cobit in your organization
Implement cobit in your organizationCheikh Hamallah DJIBA
 

What's hot (19)

Darmin ritonga 11353205418
Darmin ritonga 11353205418Darmin ritonga 11353205418
Darmin ritonga 11353205418
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introduction
 
I Forum GSTI - David Bathiely
I Forum GSTI - David BathielyI Forum GSTI - David Bathiely
I Forum GSTI - David Bathiely
 
ITIL vs TOGAF First Round
ITIL vs TOGAF First RoundITIL vs TOGAF First Round
ITIL vs TOGAF First Round
 
Secure Software Development – COBIT5 Perspective
Secure Software  Development –  COBIT5  PerspectiveSecure Software  Development –  COBIT5  Perspective
Secure Software Development – COBIT5 Perspective
 
ADD: New itil implementation approach
ADD: New itil implementation approachADD: New itil implementation approach
ADD: New itil implementation approach
 
Cobit 5 - An Overview
Cobit 5 - An OverviewCobit 5 - An Overview
Cobit 5 - An Overview
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Training
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
Cobit Training course
Cobit Training courseCobit Training course
Cobit Training course
 
Cobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposalCobit5 owerwiev and implementation proposal
Cobit5 owerwiev and implementation proposal
 
Itil,cobit and ıso27001
Itil,cobit and ıso27001Itil,cobit and ıso27001
Itil,cobit and ıso27001
 
Co5bit
Co5bitCo5bit
Co5bit
 
Cobit5 introduction
Cobit5 introductionCobit5 introduction
Cobit5 introduction
 
Tackling ITIL Implementation Challenges
Tackling ITIL Implementation ChallengesTackling ITIL Implementation Challenges
Tackling ITIL Implementation Challenges
 
Cobit 5 introduction plgr
Cobit 5 introduction plgrCobit 5 introduction plgr
Cobit 5 introduction plgr
 
IT frameworks
IT frameworksIT frameworks
IT frameworks
 
Introduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service managementIntroduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service management
 
Implement cobit in your organization
Implement cobit in your organizationImplement cobit in your organization
Implement cobit in your organization
 

Similar to Common d ashboards

ITIL Career Path
ITIL Career PathITIL Career Path
ITIL Career PathSimplilearn
 
01 integrated management system telkom 2016 opening
01 integrated management system   telkom 2016 opening01 integrated management system   telkom 2016 opening
01 integrated management system telkom 2016 openingwisnu wardhana, i nyoman
 
Allstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -FinalAllstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -FinalCathy Kirch
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
 
ITIL Course Wide version
ITIL Course Wide versionITIL Course Wide version
ITIL Course Wide versionPhillip Smith
 
Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...
Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...
Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...LucyAntheny
 
ITSM Frameworks - Coming of Age
ITSM Frameworks - Coming of AgeITSM Frameworks - Coming of Age
ITSM Frameworks - Coming of AgeAgileNetwork
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)Sam Mandebvu
 
Itil the basics
Itil the basicsItil the basics
Itil the basicsdarshan185
 
Digital Transformation Strategy, Blueprint and Toolkit
Digital Transformation Strategy, Blueprint and ToolkitDigital Transformation Strategy, Blueprint and Toolkit
Digital Transformation Strategy, Blueprint and ToolkitAurelien Domont, MBA
 
IT Management Toolkit - ITIL Is Not Enough
IT Management Toolkit - ITIL Is Not EnoughIT Management Toolkit - ITIL Is Not Enough
IT Management Toolkit - ITIL Is Not EnoughAhmed Al-Hadidi
 
ISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfMarkMandeoya
 
Post Merger Integration Toolkit - Frameworks, Best Practices and Templates
Post Merger Integration Toolkit - Frameworks, Best Practices and TemplatesPost Merger Integration Toolkit - Frameworks, Best Practices and Templates
Post Merger Integration Toolkit - Frameworks, Best Practices and TemplatesAurelien Domont, MBA
 
Syzygal cobit5-brc
Syzygal cobit5-brcSyzygal cobit5-brc
Syzygal cobit5-brcSyzygal
 

Similar to Common d ashboards (20)

ITIL Career Path
ITIL Career PathITIL Career Path
ITIL Career Path
 
01 integrated management system telkom 2016 opening
01 integrated management system   telkom 2016 opening01 integrated management system   telkom 2016 opening
01 integrated management system telkom 2016 opening
 
Allstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -FinalAllstate- Cathy Kirch- Release -Final
Allstate- Cathy Kirch- Release -Final
 
Process
ProcessProcess
Process
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise IT
 
ITIL Course Wide version
ITIL Course Wide versionITIL Course Wide version
ITIL Course Wide version
 
Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...
Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...
Top 10 ITIL Service Management Templates with Samples and Examples (Free PDF ...
 
ITSM Frameworks - Coming of Age
ITSM Frameworks - Coming of AgeITSM Frameworks - Coming of Age
ITSM Frameworks - Coming of Age
 
CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)CoBIT 5 (A brief Description)
CoBIT 5 (A brief Description)
 
Itil the basics
Itil the basicsItil the basics
Itil the basics
 
Digital Transformation Strategy, Blueprint and Toolkit
Digital Transformation Strategy, Blueprint and ToolkitDigital Transformation Strategy, Blueprint and Toolkit
Digital Transformation Strategy, Blueprint and Toolkit
 
IT Management Toolkit - ITIL Is Not Enough
IT Management Toolkit - ITIL Is Not EnoughIT Management Toolkit - ITIL Is Not Enough
IT Management Toolkit - ITIL Is Not Enough
 
ISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdf
 
Post Merger Integration Toolkit - Frameworks, Best Practices and Templates
Post Merger Integration Toolkit - Frameworks, Best Practices and TemplatesPost Merger Integration Toolkit - Frameworks, Best Practices and Templates
Post Merger Integration Toolkit - Frameworks, Best Practices and Templates
 
CobiT And ITIL Breakfast Seminar
CobiT And ITIL Breakfast SeminarCobiT And ITIL Breakfast Seminar
CobiT And ITIL Breakfast Seminar
 
Donna Febriani
Donna FebrianiDonna Febriani
Donna Febriani
 
Lailatul izzati
Lailatul izzatiLailatul izzati
Lailatul izzati
 
Itil 2
Itil 2Itil 2
Itil 2
 
Syzygal cobit5-brc
Syzygal cobit5-brcSyzygal cobit5-brc
Syzygal cobit5-brc
 
Cobit 4.1 indri
Cobit 4.1 indriCobit 4.1 indri
Cobit 4.1 indri
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Common d ashboards

  • 2. ISO 9001:2008 What is ISO 9001:2008 • ISO 9001:2008 is a quality management system standard, first published in 1987 by ISO (International Organization for Standardization). This standard is designed to help organizations ensure that they meet all requirements of customers and stakeholders. • ISO 9001 is considered as a key factor for doing business in global markets and for improving competitiveness.
  • 3. ISO 9001:2008 • It is the most popular standard worldwide and up to the end of December 2013, at least 1, 129, 446 certificates had been issued in 187 countries and economies, three more than in the previous year. The 2013 total represents an increase of 3 % (+32 459) over 2012. The table below summarizes the statistics of the ISO 9001 certifications around the world.
  • 4. AN OVERVIEW OF ISO 9001:2008 • ISO 9001 specifies requirements for a quality management system where an organization needs to demonstrate its ability to consistently provide products that meet customer and applicable statutory and regulatory requirements; in addition to enhancing customer satisfaction through the effective application of the system, including processes for continual improvement of the system and assurance of conformity to customer and applicable statutory and regulatory requirements.
  • 5.
  • 6. QUALITY STANDARDIZATION EVOLVES WITH ISO 9001 BY ADDING: • Greater emphasis on setting the objectives, monitoring performance and metrics; • Clearer expectations on management; and • More careful planning for and preparing the resources needed for ensuring quality
  • 7. SIX SIGMA WHAT IS SIX SIGMA? • Six Sigma ranks among the foremost methodologies for making business processes more effective and efficient. In addition to establishing a culture dedicated to continuous process improvement, Six Sigma offers tools and techniques that reduce variance, eliminate defects and help identify the root causes of errors, allowing organizations to create better products and services for consumers.
  • 8.
  • 9.
  • 10. METHODOLOGIES OF SIX SIGMA There are two major methodologies used within Six Sigma, both of which are composed of five sections, according to the 2005 book “JURAN Institute Six Sigma Breakthrough and Beyond” by Joseph A. De Feo and William Barnard. • DMAIC • DMADV
  • 11. METHODOLOGIES OF SIX SIGMA DMADV: The DMADV method is typically used to create new processes and new products or services. The letters stand for: D- Define the project goals M- Measure critical components of the process and the product capabilities A- Analyze the data and develop various designs for the process, eventually picking the best one D- Design and test details of the process V- Verify the design by running simulations and a pilot program, and then handing over the process to the client
  • 12. METHODOLOGIES OF SIX SIGMA DMAIC: The DMAIC method is used primarily for improving existing business processes. The letters stand for: D-Define the problem and the project goals M-Measure in detail the various aspects of the current process A- Analyze data to, among other things, find the root defects in a process i- Improve the process C- Control how the process is done in the future
  • 13. SIX SIGMA CERTIFICATION • Yellow Belt certification is an efficient way to learn the basics of Six Sigma. It is ideal for those who lead limited improvement projects. Those who are supporting improvement projects in a limited role in a Six Sigma team. • Green Belt certification is ideal for those who are part of a Six Sigma Management Team. Those who are assisting with data collection and analysis for improvement projects. Green Belt training will allow you to implement Six Sigma proficiently. • Black Belt certification is for team leaders who manage big improvement. It also helps in problem-solving projects. At the Black Belt level, you will have a thorough understanding of all aspects of Six Sigma.
  • 14. BENEFITS OF SIX SIGMA TO THE ORGANIZATION • Customer Satisfaction • Improved bottom line • Employee satisfaction
  • 15. WHAT IS ITIL • The IT Infrastructure Library (ITIL) is a library of volumes describing a framework of best practices for delivering IT services. ITIL has gone through several revisions in its history and currently comprises five books, each covering various processes and stages of the IT service lifecycle. • Developed by the British government's Central Computer and Telecommunications Agency (CCTA) during the 1980s, the ITIL first consisted of more than 30 books, developed and released over time, that codified best practices in information technology accumulated from many sources (including vendors' best practices) around the world.
  • 16. WHAT IS IN THE ITIL • The original 30 books of the ITIL were first condensed in 2000 (when ITIL V2 was launched) to seven books, each wrapped around a facet of IT management. Later, the ITIL Refresh Project in 2007 consolidated the ITIL to five volumes consisting of 26 process and functions – this is referred to as the ITIL 2007 edition. In 2011, another update — dubbed ITIL 2011 — was published under the Cabinet Office. The five volumes remained, and ITIL 2007 and ITIL 2011 remained similar.
  • 17. WHAT IS IN THE ITIL • ITIL 4, which was released in 2019, maintains the same focus on automating processes, improving service management and integrating the IT department into the business. However, it also updates the framework to accommodate and answer to modern technology, tools and software. Since ITIL’s last update, the IT department has grown to become integral to every business and the new framework accommodates this by being more agile, flexible and collaborative. • The newest version of ITIL focuses on company culture and integrating IT into the overall business structure. It encourages collaboration between IT and other departments, especially as other business units increasingly rely on technology to get work done. ITIL 4 also emphasizes customer feedback, since it’s easier than ever for businesses to understand their public perception, customer satisfaction and dissatisfaction.
  • 18.
  • 19. BENEFITS OF ITIL • ITIL will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. • TIL will provide a practical and flexible basis to support organizations on their journey into the new world of digital transformation . • ITIL will be much more relevant to software developers, service management practitioners and businesses through promoting a holistic view of delivering products and services. • ITIL is the next iteration that incorporates all of the best things from ITIL as it is known today and expands IT and service operations to a new level. Moving from traditional process-led delivery, ITIL 4 supports faster quality and value driven delivery for people and organizations.
  • 20. PRINCE 2 What is Prince 2 • PRINCE2 is an acronym for Projects IN Controlled Environments. It’s a process-based method for managing a project. As noted, it’s been mostly used by the government in the United Kingdom, but it’s also prevalent in the private sector in the United Kingdom and other places around the world. • The key features of PRINCE2 focus on business justification, defining the structure of an organization for the project management team and using a product-based approach. There’s an emphasis on dividing the project into manageable and controllable stages, with flexibility. PRINCE2 provides great control over project resources and excels at managing business and project risk more effectively.
  • 21.
  • 22. HISTORY OF PRINCE2 First established in 1989 by the Central Computer and Telecommunications Agency (CCTA), PRINCE2 was originally based on PROMPT, another acronym that stands for Project Resource Organization Management Planning Technique, which was created in 1975 and used by the United Kingdom for its information system projects. PRINCE2 was finally published in 1996, and surprisingly, it is in the public domain.
  • 23. PRINCE 2 ROLES • The project manager is the one who is responsible for the organization and in control of the project and its processes. • There is also a customer, user or supplier involved in the project. This is the person or organization that is paying for the project. • Finally, there’s a project board, which is made up of the customer and executives, such as a person who represents the user side and another representing the suppliers or specialists involved in the project.
  • 26. COSO What is COSO? • In 1992, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) developed a model for evaluating internal controls.. • The COSO model defines internal control as “a process effected by an entity’s board of directors, management and other personnel designed to provide reasonable assurance of the achievement of objectives in the following categories: -Operational Effectiveness and Efficiency -Financial Reporting Reliability -Applicable Laws and Regulations Compliance
  • 27.
  • 28. FIVE COMPONENTS WORK In an effective internal control system, the following five components work to support the achievement of an entity’s mission, strategies and related business objectives: • Control Environment  Exercise integrity and ethical values.  Make a commitment to competence.  Use the board of directors and audit committee.  Facilitate management’s philosophy and operating style.  Create organizational structure.  Issue assignment of authority and responsibility.  Utilize human resources policies and procedures.
  • 29. FIVE COMPONENTS WORK Risk Assessment  Create companywide objectives.  Incorporate process-level objectives.  Perform risk identification and analysis.  Manage change. Control Activities  Follow policies and procedures.  Improve security (application and network).  Conduct application change management.  Plan business continuity/backups.  Perform outsourcing.
  • 30. FIVE COMPONENT WORK Information and Communication  Measure quality of information.  Measure effectiveness of communication. Monitoring  Perform ongoing monitoring.  Conduct separate evaluations.  Report deficiencies.
  • 31. COSO expects the updated framework to deliver a number of benefits, including the following: Improved governance Expanded use beyond financial reporting Improved quality of risk assessment Strengthened anti-fraud efforts Ability to adapt controls to changing business needs Greater applicability for various business models