Wiki source code of IT Due Diligence Checklist

Last modified by Drunk Monkey on 2020-08-12 21:06

Show last authors
1 Original article from here:
2 [[https:~~/~~/www.duedil.com/blogs/it-due-diligence-checklist>>https://www.duedil.com/blogs/it-due-diligence-checklist]]
3
4
5 **Conducting IT due diligence when taking over or merging with another company is key to a smooth transitional period. It may not be the most interesting or enjoyable task, but it’s important that the process isn’t rushed. Being as thorough as possible will not only save you time later on, but will also highlight any potential issues that will need to be fixed before the sale goes ahead.**
6
7 The main aim of carrying out this type of due diligence is that it helps you to build a clear picture of what the target company’s IT infrastructure is like and find out whether it’s similar to your own to determine what changes may need to be made when the merger/acquisition takes place.
8
9 As part of the IT due diligence process you will need to make a visit to the acquired company’s workplace to see their technology setup first-hand. However, to ensure that the visit is as productive as possible, it is best practice to send an outline of the onsite delivery process you hope to take.
10
11 **The key elements that need to be included in your due diligence are:**
12
13 1. Hardware
14 1. Software
15 1. Internet and telecom systems
16 1. Cyber & Network Security
17 1. Customer support systems
18 1. IT Support Staff
19 1. Company products & services
20
21 == 1. Hardware ==
22
23 The most important aspects to consider when it comes to hardware is what hardware do they do they actually have, who owns it, and how much is it worth.
24
25 You will need to make a record of the following hardware:
26
27 * Desktops, laptops and tablets
28 * Mobile and desk phones
29 * Servers
30 * Storage devices
31 * Mainframe computers
32
33 Once you have drawn up a comprehensive inventory, you must then find out details on the manufacturer and model number, how much they are currently worth and whether they are leased or owned by the company.
34
35 == 2. Software ==
36
37 Once you have collected all the relevant information on hardware, you should do the same for software. Finding out which anti-virus software, data management systems, SLAs and hosting systems the company uses is particularly important.
38
39 * Security systems
40 * Anti-virus systems
41 * Operating systems
42 * Email software
43 * CRM systems
44 * Payroll software
45 * Data management systems
46 * Software licensing agreements
47 * Databases
48 * Outsourced software development agreements
49 * All software for internal use
50 * Storage management (e.g. cloud systems)
51 * Operating systems (e.g. Windows, Chrome etc.)
52 * Open source software
53 * Information on software development processes
54
55 == 3. Internet and telecoms system ==
56
57 Examining the company’s existing network and telecoms set-up will help you to understand which methods of communication are favoured by their employees and how their computer systems are organised.
58
59 * Internet provider and contracts
60 * Information on hosting environment
61 * Log of planned (and unplanned) network downtime over a set period
62 * Storage backup systems (including information on cloud-based programmes)
63 * A diagram of the network set-up
64 * A description of the internal communication system
65
66 == 4. Cyber & Network Security ==
67
68 The security of the company needs to be thoroughly scrutinised; this is one area where you really cannot afford to cut corners.
69
70 It’s especially important to gauge the vulnerability of the company to a cyber attack in order to assess whether their cyber security needs to be bolstered.
71
72 * Intruder detection programmes
73 * Security of online payment systems
74 * Data encryption program
75 * Tests results for system vulnerability checks
76 * Information on previous security breaches (and what measures were put in place to prevent another)
77 * Cyber security insurance and certificates
78 * Staff training programmes on security
79 * Network Firewall settings and maintenance
80 * Remote access software
81 * Background checks for all employees
82 * Policy on acceptable use for hardware and software
83 * Policy on remote working
84 * Information on which non-employees are granted access to important company data
85 * Log of any hardware without anti-virus software
86 * Policy on company passwords
87 * Plan for disaster recovery and security breaches
88 * Information on database record storage
89 * Vendor updates
90
91 == 5. Customer Support Systems ==
92
93 The main objective of gathering information on the company’s customer support systems is to determine how IT is utilised to interact with their customer base. The key areas to assess when it comes to customers are:
94
95 * How do customers access technical support?
96 * What technical support is offered to customers?
97 * What are the most common technical questions that customers ask?
98 * How new customers are integrated into the IT system
99
100 == 6. IT Support Staff ==
101
102 A key element in the smooth running of your IT infrastructure is the number of staff employed to provide technical support. Finding out about the roles and responsibilities of IT personnel will help you to determine whether you’re doubling up on roles or need to employ additional IT support staff.
103
104 * Full list of all IT personnel and their individual roles and responsibilities
105 * Confidentiality and intellectual property agreements for staff
106 * List of employees who have had access to source codes in the last 3 years
107 * Staff training programmes
108 * Chart showing how the IT department is organised
109 * List of vacancies that need to be filled over the next year
110
111 == 7. Company products & services ==
112
113 You will also need to identify all products that have been created for both internal and external use, and find out who within the company has access to the products. This will help you to get a better understanding of who owns the software, and which staff are involved in its creation/development.
114
115 * Software that the company has sold
116 * Software that has the company is still responsible for
117 * Products that are currently being developed by the organisation
118 * Industry certification
119 * All software that the company has developed where the source code no longer exists
120 * A demonstration of all software
121
122
123 Original article from here:
124 [[https:~~/~~/crosslaketech.com/technical-due-diligence-checklist-why-acquiring-firms-need-it/>>https://crosslaketech.com/technical-due-diligence-checklist-why-acquiring-firms-need-it/]]
125
126 //Technical due diligence is a highly recommended component of the technology company investment cycle, whether you are a Private Equity firm, investment bank, or acquiring company. Find out why, as well as some of the mandatory areas to explore with this technical due diligence checklist.//
127 \\Would you buy a new home without having it inspected by a seasoned professional? Most people wouldn't. The cost of a home inspection is negligible compared to the cost of the home, and can provide significant peace of mind or even modification of the sales price to accommodate any defects or needed maintenance. Why not just do the inspection yourself? For starters, most people do not possess the expertise to inspect the fine details themselves. Additionally, every construction is different, so inspection is a bit of an art – you have to have a good eye and the wisdom to know what to look for. Previous experience building houses is helpful or even mandatory. Most people cannot be experts in all aspects of home construction, including structure, plumbing, electrical, general maintenance, and overall quality and aesthetics. With all these variables, hiring an outside third party to help evaluate and protect your investment intuitively makes sense.
128 \\The same concepts hold true when investing in a software company. In a list of [[20 due diligence activities>>url:https://www.forbes.com/sites/allbusiness/2014/12/19/20-key-due-diligence-activities-in-a-merger-and-acquisition-transaction/#65e21cab3c40]] necessary before a merger or acquisition, Forbes notes technical due diligence and intellectual property review as number two. Leaders of acquiring companies like Private Equity (PE) firms, or even other technology companies, are well versed in financial concepts, but may not be technology gurus. Using a third party to help evaluate the technical aspects of the target software company is akin to using a professional home inspector.
129 \\Most acquiring firms have a set of investment objectives in mind when acquiring a new technology company. Performing technical due diligence to evaluate the product, architecture, processes, and organization helps ensure that those objectives are met prior to closing the investment. Additionally, a detailed look at these aspects helps validate any assumptions the investment firm has made, such as the ability to scale the number of users 10x in 3 years.
130 \\Why not just do a basic technical due diligence yourself, particularly if you are a software company acquiring another software company? Firstly, competitive intelligence may be at stake and a third party with a signed non-disclosure agreement can help preserve that integrity. Secondly, using a third party with team members of varying expertise, an objective view, and the ability to compare hundreds of companies to the target adds further value to the diligence process.
131 \\A refined technical due diligence process is quick, efficient, and answers the investment questions in easy-to-understand terms with sufficient detail. Target companies are typically analyzed from three perspectives:
132
133
134 * Technical risks to the investment coupled with the cost to mitigate
135 * Opportunities for growth post-investment close to help meet objectives
136 * Strengths of the company that should be preserved and/or built-upon moving forward
137
138 Each of these perspectives is analyzed from the following categories. Included below are some sample questions to ask and answer:
139
140
141 * Product strategy and product portfolio
142 ** Does the product strategy fit with the investment company's growth objectives?
143 ** What are the product strengths, weaknesses, opportunities, and threats (SWOT) to help validate a reasonable direction is possible?
144 ** How does the company determine the product roadmap and what will add the most business value?
145 * Product function and quality
146 ** Are there obvious quality problems with the product, such as performance issues, that may be expensive to fix?
147 ** Does the product fulfill end user goals in a usable way or is an expensive UI revamp necessary?
148 * Architecture & Code
149 ** Is there anything in the architecture that is an impediment to meeting growth objectives?
150 ** Are there legacy components in the software that require replacement? How much will this replacement cost?
151 ** Are there third party or open source components that may be problematic from the legal or technical view?
152 ** Is the code written in a maintainable way such that others can be productive in the code base quickly?
153 * Processes, Practices and Tools
154 ** Are there opportunities for efficiency gains and/or cost reduction?
155 ** Will the existing practices scale appropriately with company growth?
156 ** Are there existing skills gaps that inhibit efficient delivery?
157 * People & Organization
158 ** Are the right people in the right roles to meet investment objectives (particularly leaders)?
159 ** Who are the people critical to the business and must be retained with the acquisition?
160 ** Are there significant gaps in the organization that must be filled to meet investment objectives?
161 ** Is the level of R&D spend appropriate for the company size? Are there opportunities for reduction?
162 * IT/Operations/DevOps
163 ** Are there opportunities for cost reduction, such as a move from locally managed resources to the cloud? What is the cost in doing so?
164 ** Is there a suitable business continuity plan in place, and if not, what risk is undertaken and what is required to implement one?
165 ** Are the expenditures reasonable given company size?
166 ** Are deployment practices efficient with minimal risk of human error?
167 * Product Support
168 ** What are the top support call generators that may be indicative of product problems?
169 ** How many escalations make their way to the development team?
170 * Professional Services
171 ** Are implementation times long potentially indicating lack of configurability/customization in the product?
172 ** Are there opportunities for product enhancement to scale to larger number of customers requiring less on the services side?
173
174