How to manage unauthorized changes

By ITIL® from Experience©

Unauthorized changes are mentioned profusely in ITIL®. For example, unauthorized changes are mentioned 7 times in the Change Management section and 15 times in the Configuration Management section of ITIL® Service Transition1 . On the other hand, unauthorized changes are mentioned 12 times in ITIL® v2, primarily in the Configuration Management Chapter2 .

Readers are advised to read sections 4.2 and 4.3 of ITIL® Service Transition for guidance. However, since ITIL® is a framework and not a prescriptive cookbook of recipes, readers may find the following articles useful as they discuss nuances of process design and implementation which are left uncovered by ITIL®.

Also, more than 50 answers to Change Management questions can be found here.

Published on: 2017-12-06

"Implementing Change Management is like driving from New Hampshire where you "Live Free or Die" to Missouri, "The Show Me State."

More Quotes


More on Change Management

From Around the Web:

ITIL Process > Change Management
Implementation > Process

 Plugin disabled
Plugin footnotearea cannot be executed.


Copyright 2017 - ITIL® from Experience© - D.Matte