The approval workflow example details a typical sales quote with discount approval, starting from employee submitting a sales quote with a discount for manager approval.
The purchase approval process approval workflow example details a typical purchase requisition approval, starting from employee submitting a purchase requisition for manager or director approval.
The management approval process details a typical expense approval, starting from employee request to manager and finance department approval.
The compliance approval process workflow diagram details a typical holiday approval, starting from employee request to manager and HR approval.
After the user confirms that the issue of the ticket has been resolved, the ticket is closed.
During this process, the description of the error, the situation and the solution are revised to reflect the final status. This way, the solutions create a knowledge database that can be used for future tickets.
The analysis of the target market provides relevant information about the potential and risks that the company expects when it becomes active there.
A treatment of risks is carried out. It is examined which measures limit the risk and which controls / checks are necessary for this. The aim of this measure is to bring risks that cannot be resolved to a level acceptable to the company (risk acceptance).
This process leads to corresponding change requests.
Changes to IT security are always implemented in the form of projects or change transactions. The IT management monitors these processes from the perspective of a client.
The implementation of changes to the general IT services is normally done through change transactions or internal projects. The division management monitors these processes as a client in order to intervene accordingly in the event of disruptions.
The IT management monitors the issues on the IT infrastructure, which are handled as internal projects and provided with a project manager, and intervene in the procedure if necessary.
Previously spent IT assets are recaptured. This happens in case of defect, replacement or employee resignation. The process is triggered by the transfer of equipment or devices to the IT department, which is initiated by another party, e.g:
- When an employee leaves Human Resources
- In case of replacement by the user's supervisor
- In case of defect by the user himself
From a target market, suitable requirements were qualified which have enough potential that a closer examination of a product idea is worthwhile here. This is a check whether the demand can be met by the company.
The processes and procedures as well as the performance of information technology are monitored to ensure that they are in line with the company's objectives and strategy.
A support ticket is qualified by the IT staff so that a complete picture of the error exists.
A target market or sub-market that is considered suitable in relation to the vision of the company or group of companies has been identified accordingly in the IT system. This must now be further qualified.
An IT asset is procured
A qualified ticket is recorded and processed by an employee. This involves resolving the error and determining whether fundamental changes to the IT landscape help to avoid the error or increase the service quality of the ITC.
Measures to reduce (risk reduction, risk mitigation) and limit a risk are defined and initiated. This is known as risk mitigation.
Among other measures, the controls are defined and checked that are appropriate for the risk or its limitation.
A risk analysis (risk assessment) based on risk identification is carried out to evaluate the identified objectives and objects of the business with regard to threat potential (threat), vulnerability of the business, probability of occurrence and impact. The risk analysis leads to a risk evaluation.