Process for managing change within an enterprise
First Claim
1. A method for managing change to protect the integrity of an enterprise'"'"'s computer operating environment comprising the steps of:
- (a) submitting a change request document by a change requester to a change manager for validation, wherein the change requester and the change manager are separate entities;
(b) broadcasting notice of a proposed change described ill a valid change request document to at least one potentially interested operating unit within the enterprise, wherein the potentially interested operating unit is an organization comprising a plurality of individuals, and wherein said change consists of modifications to hardware, software, or both in an electronic computing system of the enterprise;
(c) reviewing said proposed change by a review team comprising said change manager and a representative of each potentially interested operating unit receiving notification of said proposed change and choosing to participate in said review team, said review team recommending a course of action regarding said proposed change, wherein the representative of the potentially interested operating unit is one of the individuals; and
(d) notifying said change requester of said review team'"'"'s recommended course of action regarding said proposed change;
wherein the implementation of said change is unsuccessful and the method further comprises the steps of;
(e) leaving in place any partial successful steps taken in the implementation of said change;
(f) rescheduling any remaining steps to be taken implementation of said change;
(g) notifying all potentially interested operating units of the status of said change; and
(h) updating said change request document with the status of said change.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a Change Management Procedure that enables businesses and other enterprises to effectively manage, record, and communicate changes by employing a centralized control agency to review, approve, document, and communicate changes taking place within an enterprise. While the Change Management Procedure is applicable to any type of change, in the preferred embodiment the procedure manages changes in electronic computer systems including but not limited to architecture changes, outages (e.g., hardware, software or facility), replacement of hardware, upgrading of software, and rebooting of devices. By requiring that all changes be formally requested and approved, the Change Management Procedure prevents unauthorized changes. The Change Management Procedure also creates an audit trail that keeps a record of all changes for future reference. Another advantage of the Change Management Procedure is the communication of changes to operating units within the enterprise that are potentially interested in the change. At any step within the Change Management Procedure, entities that might be affected by a change may be notified of the change. Thus, potentially interested operating units can be aware of changes before they occur and can be informed of all changes that have occurred.
-
Citations
25 Claims
-
1. A method for managing change to protect the integrity of an enterprise'"'"'s computer operating environment comprising the steps of:
-
(a) submitting a change request document by a change requester to a change manager for validation, wherein the change requester and the change manager are separate entities; (b) broadcasting notice of a proposed change described ill a valid change request document to at least one potentially interested operating unit within the enterprise, wherein the potentially interested operating unit is an organization comprising a plurality of individuals, and wherein said change consists of modifications to hardware, software, or both in an electronic computing system of the enterprise; (c) reviewing said proposed change by a review team comprising said change manager and a representative of each potentially interested operating unit receiving notification of said proposed change and choosing to participate in said review team, said review team recommending a course of action regarding said proposed change, wherein the representative of the potentially interested operating unit is one of the individuals; and (d) notifying said change requester of said review team'"'"'s recommended course of action regarding said proposed change; wherein the implementation of said change is unsuccessful and the method further comprises the steps of; (e) leaving in place any partial successful steps taken in the implementation of said change; (f) rescheduling any remaining steps to be taken implementation of said change; (g) notifying all potentially interested operating units of the status of said change; and (h) updating said change request document with the status of said change. - View Dependent Claims (2, 3, 4, 5)
-
- 6. The method of clam 5 further comprising the step of said change requester or a designee of the change requester or change manager implementing said change.
-
15. A method for managing change to protect the integrity of an enterprise'"'"'s computer operating environment comprising the steps of:
-
(a) submitting a change request document by a change requester to a change manager for validation, wherein the change requester and the change manager are separate entities; (b) broadcasting notice of a proposed change described in a valid change request document to at least one potentially interested operating unit within the enterprise, wherein the potentially interested operating unit is an organization comprising a plurality of individuals, and wherein said change consists of modifications to hardware, software, or both in an electronic computing system of the enterprise; (c) reviewing said proposed change by a review team comprising said change manager and a representative of each potentially interested operating unit receiving notification of said proposed change and choosing to participate in said review team, said review team recommending a course of action regarding said proposed change, wherein the representative of the potentially interested operating unit is one of the individuals; and (d) notifying said change requester of said review team'"'"'s recommended course of action regarding said proposed change; wherein the implementation of said change is unsuccessful and the method further comprises the steps of; (e) reversing all steps taken in the attempted implementation of said change; (f) notifying all potentially interested operating units of the unsuccessful implementation of said change; and (g) updating said change request document with the status of said change.
-
-
16. A method for managing change to protect the integrity of an enterprise'"'"'s computer operating environment, when said change is necessitated by an emergency situation, comprising the steps of:
-
(a) evaluating the severity of said emergency situation by a change requester; (b) notifying a change manager by said change requester that said emergency situation exists, wherein the change requester and the change manager are separate (c) determining by said change manager that said emergency situation requires immediate remediation; (d) granting immediate approval to change requester by said change manager to implement said change wherein said change consists of modifications to hardware, software, or both in an electronic computing system of the enterprise; (e) implementing said change by said change requester or a designee thereof; and (f) creating and completing, by said change requester after implementation of said change, an emergency change request document to describe and record said change; wherein the implementation of said change is unsuccessful and the method further comprises the steps of; (g) leaving in place any partial, successful steps taken in the implementation of said change; (h) rescheduling any remaining steps to be taken in the implementation of said change; (i) notifying all potentially interested operating units of the status of said change; and (j) updating said change request document with the status of said change.
-
-
17. A method for managing change to protect the integrity of an enterprise'"'"'s computer operating environment, when said change is necessitated by an emergency situation, comprising the steps of:
-
(a) evaluating the severity of said emergency situation by a change requester; (b) notifying a change manager by said change requester that said emergency situation exists, wherein the change requester and the change manager are separate entities; (c) determining by said change manager that remediation of said emergency situation can be deferred; (d) notify said change requester by said change manager that an emergency change request document must be submitted prior to approval; (e) submitting an emergency change request document by said change requester to said change manager; (f) approving of a change described in said emergency change request document by said change manager or a designee thereof wherein said change consists of modifications to hardware, software, or both in an electronic computing system of the enterprise; (g) scheduling of said change by said change manager with collaboration from at least one potentially interested operating unit; (h) notifying each potentially interested operating unit of the schedule for and details of implementation of said change; and (i) implementing said change by said change requester or a designee thereof; wherein the implementation of said change is unsuccessful and the method further comprises the steps of; (j) reversing all steps taken in the attempted implementation of said change; (k) notifying all potentially interested operating units of the unsuccessful implementation of said change; and (l) updating said change request document with the status of said change. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification