Browse Definitions :
Definition

IT chargeback system

Contributor(s): Contributor: Scott Feuless

IT chargeback is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used. This system contrasts with traditional IT accounting models in which a centralized department bears all of the IT costs in an organization and those costs are treated simply as corporate overhead. 

IT chargeback systems are sometimes called "responsibility accounting" because this sort of accounting demonstrates which departments or individuals are responsible for significant expenses. Such systems are intended to shift responsibility to users and encourage them to treat IT services as they would any other utility, which in turn encourages moderate use. 

Reporting systems that leverage IT chargeback can help administrators to clearly see what factors are driving costs and to budget accordingly. Such a system provides end users with more transparency into which business decisions are creating expenses and helps management identify how to achieve greater profitability. The cost of legacy systems, redundancies or expensive proprietary technologies also become clear, providing IT staff with an effective rationale for upgrades that are intended to improve utilization or reduce energy use and administration time. 

Since chargeback depends on a variety of IT metrics to provide equitable distribution of costs, a balance must always be struck between the precision of the system and the difficulty of collecting the necessary data. Complex IT chargeback systems can depend upon detailed line item accounting for each IT-related expense, including which business unit incurred it and whether it was for software, hardware or services. Since single line item expenditures can sometimes be substantial and can be shared by multiple business units (a mainframe purchase, for example), usage data from the IT department is also needed to help split out these costs in an equitable manner. 

Simple IT chargeback systems are little more than straight allocations of IT costs based on readily available information, such as user counts, application counts, or even subjective estimation. At a lesser degree of complexity, an organization trades some of the effectiveness of IT chargeback for a smaller burden, in terms of time and money required to perform the chargeback. 

This shift turns internal IT systems into service providers that may be managed independently of the organization at large. An IT chargeback system provides useful metrics that can be compared against the costs of outsourcing such services to a third party. IT administrators and CIOs, for instance, could compare the effectiveness of internal departments at provisioning networks, providing storage capacity, making network data transfers or maintaining Web application uptime. There are other uses for the system as well. A CIO could take the results of a past quarter's IT chargeback to a CEO and use those numbers to assess whether the revenue created by taking advantage of business opportunities justifies the expense.

Despite such advantages, however, some CIOs find the internal politics associated with implementing and maintaining IT chargeback systems to be daunting, especially when combined with administrative costs and substantial accounting challenges. Nevertheless, IT chargeback systems have attracted considerable interest as energy costs and usage have soared in recent years. Increased adoption of private cloud infrastructures, software-as-a-service (SaaS) and on-demand service-oriented architectures (SOA) at many enterprises could make measuring usage and allocating costs easier than ever before as IT services are treated as a utility.

This was last updated in February 2011

Continue Reading About IT chargeback system

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • privilege creep

    Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. In IT, a privilege is...

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

Close