2. ISO 9001:2008
What is ISO 9001:2008
• ISO 9001:2008 is a quality management system
standard, first published in 1987 by ISO
(International Organization for Standardization).
This standard is designed to help organizations
ensure that they meet all requirements of
customers and stakeholders.
• ISO 9001 is considered as a key factor for doing
business in global markets and for improving
competitiveness.
3. ISO 9001:2008
• It is the most popular standard worldwide and up to the end of
December 2013, at least 1, 129, 446 certificates had been issued
in 187 countries and economies, three more than in the
previous year. The 2013 total represents an increase of 3 % (+32
459) over 2012.
The table below summarizes the statistics of the ISO 9001
certifications around the world.
4. AN OVERVIEW OF ISO 9001:2008
• ISO 9001 specifies requirements for a quality
management system where an organization
needs to demonstrate its ability to consistently
provide products that meet customer and
applicable statutory and regulatory
requirements; in addition to enhancing
customer satisfaction through the effective
application of the system, including processes
for continual improvement of the system and
assurance of conformity to customer and
applicable statutory and regulatory
requirements.
5.
6. QUALITY STANDARDIZATION EVOLVES WITH ISO
9001 BY ADDING:
• Greater emphasis on setting the objectives, monitoring
performance and metrics;
• Clearer expectations on management; and
• More careful planning for and preparing the resources
needed for ensuring quality
7. SIX SIGMA
WHAT IS SIX SIGMA?
• Six Sigma ranks among the foremost methodologies
for making business processes more effective and
efficient. In addition to establishing a culture dedicated
to continuous process improvement, Six Sigma offers
tools and techniques that reduce variance, eliminate
defects and help identify the root causes of errors,
allowing organizations to create better products and
services for consumers.
8.
9.
10. METHODOLOGIES OF SIX SIGMA
There are two major methodologies used within Six Sigma,
both of which are composed of five sections, according to
the 2005 book “JURAN Institute Six Sigma Breakthrough
and Beyond” by Joseph A. De Feo and William Barnard.
• DMAIC
• DMADV
11. METHODOLOGIES OF SIX SIGMA
DMADV: The DMADV method is typically used to create new
processes and new products or services. The letters
stand for:
D- Define the project goals
M- Measure critical components of the process and the
product capabilities
A- Analyze the data and develop various designs for the
process, eventually picking the best one
D- Design and test details of the process
V- Verify the design by running simulations and a pilot
program, and then handing over the process to the client
12. METHODOLOGIES OF SIX SIGMA
DMAIC: The DMAIC method is used primarily for improving
existing business processes. The letters stand for:
D-Define the problem and the project goals
M-Measure in detail the various aspects of the current
process
A- Analyze data to, among other things, find the root defects
in a process
i- Improve the process
C- Control how the process is done in the future
13. SIX SIGMA CERTIFICATION
• Yellow Belt certification is an efficient way to learn the
basics of Six Sigma. It is ideal for those who lead limited
improvement projects. Those who are supporting
improvement projects in a limited role in a Six Sigma
team.
• Green Belt certification is ideal for those who are part of a
Six Sigma Management Team. Those who are assisting
with data collection and analysis for improvement
projects. Green Belt training will allow you to implement
Six Sigma proficiently.
• Black Belt certification is for team leaders who manage
big improvement. It also helps in problem-solving
projects. At the Black Belt level, you will have a thorough
understanding of all aspects of Six Sigma.
14. BENEFITS OF SIX SIGMA TO THE ORGANIZATION
• Customer Satisfaction
• Improved bottom line
• Employee satisfaction
15. WHAT IS ITIL
• The IT Infrastructure Library (ITIL) is a library of volumes
describing a framework of best practices for delivering IT
services. ITIL has gone through several revisions in its
history and currently comprises five books, each
covering various processes and stages of the IT service
lifecycle.
• Developed by the British government's Central Computer
and Telecommunications Agency (CCTA) during the
1980s, the ITIL first consisted of more than 30 books,
developed and released over time, that codified best
practices in information technology accumulated from
many sources (including vendors' best practices) around
the world.
16. WHAT IS IN THE ITIL
• The original 30 books of the ITIL were first condensed in
2000 (when ITIL V2 was launched) to seven books, each
wrapped around a facet of IT management. Later, the ITIL
Refresh Project in 2007 consolidated the ITIL to five
volumes consisting of 26 process and functions – this is
referred to as the ITIL 2007 edition. In 2011, another
update — dubbed ITIL 2011 — was published under the
Cabinet Office. The five volumes remained, and ITIL 2007
and ITIL 2011 remained similar.
17. WHAT IS IN THE ITIL
• ITIL 4, which was released in 2019, maintains the same focus on
automating processes, improving service management and
integrating the IT department into the business. However, it also
updates the framework to accommodate and answer to modern
technology, tools and software. Since ITIL’s last update, the IT
department has grown to become integral to every business and
the new framework accommodates this by being more agile,
flexible and collaborative.
• The newest version of ITIL focuses on company culture and
integrating IT into the overall business structure. It encourages
collaboration between IT and other departments, especially as
other business units increasingly rely on technology to get work
done. ITIL 4 also emphasizes customer feedback, since it’s easier
than ever for businesses to understand their public perception,
customer satisfaction and dissatisfaction.
18.
19. BENEFITS OF ITIL
• ITIL will help businesses navigate the new technological
era, commonly known as the Fourth Industrial
Revolution.
• TIL will provide a practical and flexible basis to support
organizations on their journey into the new world of
digital transformation .
• ITIL will be much more relevant to software developers,
service management practitioners and businesses
through promoting a holistic view of delivering products
and services.
• ITIL is the next iteration that incorporates all of the best
things from ITIL as it is known today and expands IT and
service operations to a new level. Moving from traditional
process-led delivery, ITIL 4 supports faster quality and
value driven delivery for people and organizations.
20. PRINCE 2
What is Prince 2
• PRINCE2 is an acronym for Projects IN Controlled
Environments. It’s a process-based method for managing
a project. As noted, it’s been mostly used by the
government in the United Kingdom, but it’s also prevalent
in the private sector in the United Kingdom and other
places around the world.
• The key features of PRINCE2 focus on business
justification, defining the structure of an organization for
the project management team and using a product-based
approach. There’s an emphasis on dividing the project
into manageable and controllable stages, with flexibility.
PRINCE2 provides great control over project resources
and excels at managing business and project risk more
effectively.
21.
22. HISTORY OF PRINCE2
First established in 1989 by the Central Computer and
Telecommunications Agency (CCTA), PRINCE2 was
originally based on PROMPT, another acronym that
stands for Project Resource Organization Management
Planning Technique, which was created in 1975 and used
by the United Kingdom for its information system
projects. PRINCE2 was finally published in 1996, and
surprisingly, it is in the public domain.
23. PRINCE 2 ROLES
• The project manager is the one who is responsible for the
organization and in control of the project and its
processes.
• There is also a customer, user or supplier involved in the
project. This is the person or organization that is paying
for the project.
• Finally, there’s a project board, which is made up of the
customer and executives, such as a person who
represents the user side and another representing the
suppliers or specialists involved in the project.
26. COSO
What is COSO?
• In 1992, the Committee of Sponsoring Organizations of
the Treadway Commission (COSO) developed a model for
evaluating internal controls..
• The COSO model defines internal control as “a process
effected by an entity’s board of directors, management
and other personnel designed to provide reasonable
assurance of the achievement of objectives in the
following categories:
-Operational Effectiveness and Efficiency
-Financial Reporting Reliability
-Applicable Laws and Regulations Compliance
27.
28. FIVE COMPONENTS WORK
In an effective internal control system, the following five
components work to support the achievement of an
entity’s mission, strategies and related business
objectives:
• Control Environment
Exercise integrity and ethical values.
Make a commitment to competence.
Use the board of directors and audit committee.
Facilitate management’s philosophy and operating style.
Create organizational structure.
Issue assignment of authority and responsibility.
Utilize human resources policies and procedures.
29. FIVE COMPONENTS WORK
Risk Assessment
Create companywide objectives.
Incorporate process-level objectives.
Perform risk identification and analysis.
Manage change.
Control Activities
Follow policies and procedures.
Improve security (application and network).
Conduct application change management.
Plan business continuity/backups.
Perform outsourcing.
30. FIVE COMPONENT WORK
Information and Communication
Measure quality of information.
Measure effectiveness of communication.
Monitoring
Perform ongoing monitoring.
Conduct separate evaluations.
Report deficiencies.
31. COSO expects the updated framework to deliver a number of benefits,
including the following:
Improved governance
Expanded use beyond financial reporting
Improved quality of risk assessment
Strengthened anti-fraud efforts
Ability to adapt controls to changing business needs
Greater applicability for various business models