Browse Definitions :
Definition

IT chargeback system

Contributor(s): Contributor: Scott Feuless

IT chargeback is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used. This system contrasts with traditional IT accounting models in which a centralized department bears all of the IT costs in an organization and those costs are treated simply as corporate overhead. 

IT chargeback systems are sometimes called "responsibility accounting" because this sort of accounting demonstrates which departments or individuals are responsible for significant expenses. Such systems are intended to shift responsibility to users and encourage them to treat IT services as they would any other utility, which in turn encourages moderate use. 

Reporting systems that leverage IT chargeback can help administrators to clearly see what factors are driving costs and to budget accordingly. Such a system provides end users with more transparency into which business decisions are creating expenses and helps management identify how to achieve greater profitability. The cost of legacy systems, redundancies or expensive proprietary technologies also become clear, providing IT staff with an effective rationale for upgrades that are intended to improve utilization or reduce energy use and administration time. 

Since chargeback depends on a variety of IT metrics to provide equitable distribution of costs, a balance must always be struck between the precision of the system and the difficulty of collecting the necessary data. Complex IT chargeback systems can depend upon detailed line item accounting for each IT-related expense, including which business unit incurred it and whether it was for software, hardware or services. Since single line item expenditures can sometimes be substantial and can be shared by multiple business units (a mainframe purchase, for example), usage data from the IT department is also needed to help split out these costs in an equitable manner. 

Simple IT chargeback systems are little more than straight allocations of IT costs based on readily available information, such as user counts, application counts, or even subjective estimation. At a lesser degree of complexity, an organization trades some of the effectiveness of IT chargeback for a smaller burden, in terms of time and money required to perform the chargeback. 

This shift turns internal IT systems into service providers that may be managed independently of the organization at large. An IT chargeback system provides useful metrics that can be compared against the costs of outsourcing such services to a third party. IT administrators and CIOs, for instance, could compare the effectiveness of internal departments at provisioning networks, providing storage capacity, making network data transfers or maintaining Web application uptime. There are other uses for the system as well. A CIO could take the results of a past quarter's IT chargeback to a CEO and use those numbers to assess whether the revenue created by taking advantage of business opportunities justifies the expense.

Despite such advantages, however, some CIOs find the internal politics associated with implementing and maintaining IT chargeback systems to be daunting, especially when combined with administrative costs and substantial accounting challenges. Nevertheless, IT chargeback systems have attracted considerable interest as energy costs and usage have soared in recent years. Increased adoption of private cloud infrastructures, software-as-a-service (SaaS) and on-demand service-oriented architectures (SOA) at many enterprises could make measuring usage and allocating costs easier than ever before as IT services are treated as a utility.

This was last updated in February 2011

Continue Reading About IT chargeback system

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close