But it's inevitable that they will have to.. Rather, he suggested pitching decommissioning as a chance to rethink how technology can be a force multiplier that can change business processes to boost competitiveness, drive efficiency and increase speed to market. First, what is the cost of continuing to license and pay for software maintenance contracts for the legacy application environment? discussion / agreement / screen recordings of the additional report(s), Points of Discussion during the Kick-off Meeting, Coordination of weekly Jour Fixe meetings. AvenDATAs ViewBox is designed to be the solution for system decommissioning. Decommissioning is a process by which a business application, drive or system is removed from use in an organisation. <> Meanwhile, the project payback period was only 6 months. Decommissioning can be an isolate activity or can be tagged along with ERP implementation. classify components to be decommissioned such as testing or production environments, systems user IDs, and business app), Ascertain hardware components - if applicable (i.e. They've gotten used to that model of working and they don't necessarily want to learn new skills. ~FboIeE mT8jwK7&)1c%ITNNwgAPSvOV)hH|L= How to decommission a system: 3 keys to success. • I regularly report on what is in our application portfolio. %$.Q =|dqr~L6O r,[&. The clients eagerly look for the upcoming solutions to archive the legacy systems with AvenDATA products. The .gov means its official. Having a solid plan is a must; however, you don't have to reinvent the wheel. Decommissioning a legacy or redundant system is the ultimate in "enterprise spring cleaning". AvenDATA founded in 2003 as a spin-off of the renowned auditing and tax consulting company Mazars GmbH & Co. KG (www.mazars.de) has become one of the leading providers in the field of legacy system archiving and legacy system decommissioning. Meridian, Infosys x S_ U Z endobj The developer no longer offers support for the software and patches arent available for newly discovered vulnerabilities, Programming language doesnt support new and needed applications, It isnt keeping up with current business models, Conducting an audit on the data to know exactly what is there and where you may have redundancies, Identifying and resolving any issues you may discover with the data during the audit, Maintaining data quality and integrity during the migration. and other project policy and procedures to identify changes or tailoring that will be required due to system decommission. Technology tends to have a short life cycle overall, but there are some tell-tale signs when a legacy system needs to be replaced. Completely decommission and replace existing legacy components. But legacy threat management systems need to be sunsetted just as other legacy systems do. endobj A good decommissioning program will both retain the data and retire the old system, according toJon Russell, CIO at John Muir Health System, and Tony Paparella, president of MediQuant, Inc.,in a presentationthey gave at the 2017 Healthcare Information and Management Systems Society (HIMSS) annual conference. No new vacancies should be created in Legacy after June 1, 2018. This transition to the cloud is a chance to take stock and review what data is obsolete and should be decommissioned, and what is needed. Group, Cloud Migration and Cloud-native Application Development, Infosys Live Enterprise Application Development Platform, About This is no surprise since many legacy systems are forgotten and therefore don't receive the latest updates, patches, anti-virus, etc to ensure that it's still secure. You will be fully supported by us, for example, we will extend our support when an audit is announced, or if further training is required, or may be due to a change of an employee or a group of employees. First, it uses a rigorous process to analyze the application portfolio and identify the best candidates for decommissioning. Contain Costs - One area that is ripe for cost savings is to consolidate the IT portfolio and archive legacy data according to retention guidelines. Infosys legacy decommissioning solution is a step-by-step approach, providing a comprehensive framework, to achieve speed-to-value, economies of scale, simplified landscape, enable agility, and reduced run cost. And third, what are the incremental energy and other environmental costs for operating the legacy application hardware? Let's say you want to move legacy hardware data to your cloud. If you are like most of us, you have orphan and duplicate applications in your portfolio. And even though you have created a backup system, it would be wise to keep data on the legacy system in a read-only mode as you transition. But, that was five years ago, and the thing is still alive and kicking. Profiles, Infosys Knowledge Organizations need confidence that their project can be delivered at the proposed cost, and that cost must ensure reasonably fast ROI. Korea, United Recertification happens on a regular basis. For conventional facilities with groundwater contamination, or for . Draft Decommission Plan with timelines and key activities for retiring legacy system (based on activities noted above) 2.8 Best Practices Conduct cost benefit analysis to determine cost of archiving, migrating legacy data, or maintaining legacy systems in place I put it on my list of opportunities. Then, we pick an appropriate time period over which we can calculate a Return on Investment (ROI). Second, what are the associated personnel costs? The later you plan on doing this the greater the risk so score accordingly. The system owner can designate someone else to sign the plan (e.g. Decommissioning EHR or ERP Systems Require a Legacy Data Management Plan. Based on the initial investment of $2 million, the resulting seven-year ROI is $26 million divided by $2 millionor 1300%. Because data migration is such a complex procedure, it should be done separately from other legacy sunsetting steps. The research firm found that legacy systems, including older mainframe and minicomputer-based infrastructures, are rife with problems such as being dependent on outdated languages, aging databases and a dwindling supply of programmers who can operate them. endobj activities include but are not limited to population of assets, management of data stores and development and validation of assets), Prioritize decommission effort (i.e. The biggest challenge of is not managing the team, stakeholders, timelines, deliverables and costs. If you leave sensitive data on the legacy system, security protocols need to be maintained in order to keep it from being breached. Thus, you will have an extensive test data. This allows us to calculate an ROI for the project over a given period of time, and also to see how fast the project costs can get paid back. It must also be accessible for auditing purposes. Hospitality, Waste Throughout these steps, communication is also key, both with key stakeholders as identified in the migration plan as well as with end users. In summary, when decommissioning Exchange 2013, the most important considerations are: planning for removal (by updating anything that relies on Exchange to use newer Exchange servers) and monitoring to ensure nothing tries to connect to the servers being removed. Thats true for cars, devices, even a favorite sweatshirt or pair of jeans. The ViewBox software updates regularly. The decommissioning of legacy systems will result in more than $11 million in cost reductions from contracts and system hosting, according to Mytrang Dotrang with DLA Information Operations. Those that are legacy systems now or will become legacy systems in the future, will need plans for how the data in them will be maintained and . endstream Its easy to become complacent about security systems, especially if they appear to be working well. stream The last certification was done in December 2021. Few people rely on a PC they bought back in the 1980s for their everyday work. Often, maintaining a legacy system imposes significant inefficiencies (including cost) on organisations. The solutions are based on the exposure of various projects and several years of experience in shutting down the legacy systems. This practice also has the additional benefit of potentially increasing database performance due to the smaller active data store. If we're moving data from a system that is currently in use, but is to be turned off, we plan how that business can continue when that system is decommissioned. Guess what? <> have components backup/archive current state been verified), Coordinate with agency IT Security office to identify guidelines for managing/cleansing the data, Draft Decommission Plan with timelines and key activities for retiring legacy system (based on activities noted above), An official website of the General Services Administration. The first step in the process is the system analysis. 11 0 obj The new system would not work because it was not “their system.” So, in order to keep our ERP project on pace, we went ahead without them. Often, these include expensive resources with very specialized knowledge of outdated applications and operating environments. The purpose of the system analysis is to enable us to estimate how much time we will need to archive your legacy system and what costs you will incur so that you have a basis for planning and decision-making. He oversaw numerous technology phaseouts in the five years he spent on campus as CIO at the University of Minnesota. The biggest struggle is convincing the organization to decommission the legacy system once the new system is in production. The Forecast by Nutanix publishes news about people and trends shaping our future. The project starts after the kick-off meeting. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon Discord channel messages. You may discover that you decided to phase out your legacy system too soon. legacy systems and equipment located at an operational site from its official capacity in the conduct of NWS service operations. TAX & AUDIT DATA EXTRACTION. 1 0 obj Short-term migration approaches mainly use hardware emulation, middleware emulation, automated refactoring, or middleware replatforming. But that said, you cant simply sunset a system without having an alternative ready to take its place, especially if it is a system vital to your day-to-day business operations. Post-acceptance, you will be testing the samples, checking the certificate of completeness and verifying documentation. Business Application Services, Service Experience <> Arab Emirates. The main aim of any new development in the ViewBox software is to make it user-friendly so that the user can easily search within their legacy data, legacy tables, and legacy documents. System Decommissioning By moving critical business data from legacy applications to a more cost effective alternative platform, we enable clients to make significant savings and address business risks. Further, this data may be stored in arcane formats that only the original application can read. Federal Sector Equal Employment Opportunity Services, Freedom of Information Act (FOIA) Services, 1.1 Conduct a Business Readiness Assessment, 1.2 Establish Initial Customer Program Management Office (PMO) Processes, 1.3 Establish Customer Governance Structure and Processes, 1.5 Develop Life Cycle Cost in the Business Case, 1.8 Define Stakeholders and Develop Communications Plan, 1.9 Define As-Is and Initial Target State Systems Environments, 1.10 Plan and Conduct Initial Data Quality Assessment, 1.11 Develop Initial Target State Concept of Operations and Scope of Services, 1.12 Review Standard Business Capabilities and Document Initial Business Capabilities, 1.13 Conduct Market Research and Analysis, 2.2 Update Life Cycle Cost Estimate (LCCE), 2.3 Monitor and Control Program Execution, 2.7 Conduct Initial Data Cleansing Activities, 3.1 Integrate Program Management Office (PMO) Structures, 3.3 Monitor and Control Program Execution, 3.10 Conduct Requirements Fit-Gap Analysis, 3.11 Finalize Target State Systems Environment, 3.13 Prepare Data for Mock Conversions (Data Cleansing, Data Mapping), 3.14 Finalize Target State Concept of Operations, 3.16 Define Service Level Agreements (SLAs), 4.1 Monitor and Control Program Execution, 4.3 Develop Operations and Maintenance (O&M) Governance, 4.13 Execute Workforce Transition and Prepare for Go-Live, 4.17 Develop and Execute Cutover Plan for Go-Live, 5.1 Review Performance Against Expected Benefits, 5.3 Implement Operations & Maintenance (O&M) Governance, 5.4 Support Stabilization and Perform Change Management, 5.7 Conduct Continuous Process Improvement, 5.9 Monitor and Update Service Level Agreements (SLAs), Advancing the PMA through Shared Services, Conduct cost benefit analysis to determine cost of archiving, migrating legacy data, or maintaining legacy systems in place, Leverage common standards and solutions defined by NARA for records management found at, If system is accessed via website, coordinate domain name transition through Domain Name System (DNS) and with IT security POC. I communicate the options and benefits. <> We include 25 data migration best-practices to ensure your business is ready, willing and able to retire its legacy landscape post-migration. But unplugging can be a cumbersome task that carries some governance and compliance concerns, especially in the highly regulated healthcare and financial sectors, according to Deloitte Consulting in its 2017 report,Legacy Systems and Modernization.. Each vulnerability that exists within a system is an open invitation that attracts cybercriminals attempting to exploit businesses.. Thats where the new era of ApplicationDecommissioning comes into play. Once an existing application has been outmoded by comprehensive upgrades or other important changes to the IT environment, a company will need to retire such an application. Decommissioning systems is not yet a challenge, but the question is how do I get access to data ? As a replacement activity whereby the new technology is commissioned and replaces the legacy system. If you disable this cookie, we will not be able to save your preferences. STEP 1 System analysis At the beginning, a free system analysis takes place. Second, it employs innovative technology that can extract data from difficult legacy environments and store it in an accessible but fully compliant central repository. Legacy applications hold huge volumes of business functionality and data, and their replacement is costly and can be a risky endeavor. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful. By Bill Laberis When the legacy system was displaced by a newer application or inherited through merger or acquisitionit was easier to leave the old data where it was rather than attempt to convert it. Discord is a chat, voice, and video service enabling users to join and create communities associated with their interests. Business objectives driving application decommissioning include: Decommissioning legacy applications carries significant risks. Being able to dovetail more effectively with emerging mobile environments, which are increasingly the primary customer touch points. Our expert guidance will minimise costs and avoid business disruption. The research firm found that legacy systems, including older mainframe and minicomputer-based infrastructures, are rife with problems such as being dependent on outdated languages, aging databases and a dwindling supply of programmers who can operate them. From my side, it had been a, This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. <> As a GCN article states, Migrating systems and applications is not the only way to improve them, and in some cases, it might not be necessary or even possible to do that, particularly when the platforms or the applications running on them are strategic to the organization.. AvenDATAs intensive experience clearly shows that thoughtful planning with the right kind of methodology and thoroughness are the key factors for a successful decommissioning process. The General Data Protection Regulation act (GDPR) of the European Union (EU) is also valid in Germany from 25th May 2018. To calculate the ongoing annual maintenance costs, at least three components need to be considered. Decommissioning legacy IT systems helps liberate businesses to pursue innovation and move forward with digital transformation. If those systems no longer have security support, he added, the best way to keep them secure is creating a network segment only for the legacy systems. Next:: Three ways to kill off legacy systems. Specifically, in this post, we will evaluate how Kernel post-exploitation can be used, Septembers Patch Tuesday unveiled a critical remote vulnerability in tcpip.sys, CVE-2022-34718. @nnU|3 _1rEi+5afeq l4 c: 4?W9K!F~u`b??z S*h1z\|I=OFc Disposition activities may include: Decommission authorization memorandum from system owner Review and approval of Decommission Plan Have you confirmed your legacy decommission strategy? 2. By now you should have a clear approach, with full agreement, of how you will decommission the . ADABAS Natural Decommissioning - Identified Remove all legacy application user access and programs when all legacy applications have been replaced. Haugen and Pelot advise having a documented plan for ensuring that you retain the data you need, where it will reside, how it will be used and for how long is critical before changing to a new system. It is important to be able to demonstrate the ability to implement any future ad-hoc queries and execute heavy queries in the background without significantly impacting the performance of other searches. Hall said theres a strong temptation to offload the hosting of those legacy applications and workloads to the cloud. 10 0 obj I learned that the company is still using both systems to process orders. Context counts including the specific industry and any regulations that apply for such decommissions as far as communications, data retention and so on. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. For employees, this creates a smoother transition with time to get used to the functionality of the new system while using some of the components of the familiar one. <> The trouble is that you cant move forward with digital transformation if youre putting a lot of energy into old systems, Jim Hall, founder and CEO of IT Mentor Group, a St. Paul, Minn.-based IT consultancy, said in an interview. The apps ran fine and [those] with pinched budgets didnt want to invest precious resources to replace a working system.. 2. qx1[ a)Ii,>X&CZo2VZ>3C|BsCaGj_ow^ b It has a team of 180+ experts who are the main driving force behind the success of archiving solutions for the global clients. endobj endstream 13 0 obj Decommission Now that any data needed for safekeeping is in the archive, you can decommission the legacy system. Addressing these concerns is the main challenge of any successful migration project and these 5 important areas must be considered: Application migration projects can be compared with an iceberg: there is a visible part that is relatively easy to control this is an area where requirements can be defined and solution compliance can be validatedand there is also a significant invisible part where requirements are not known. It is the challenging work and updated skill set of around 100 IT engineers including the frontend-backend, SQL and full stack developers that has provided ViewBox with the best features. Someone needed access to historical data that you did not want to convert. ViewBox is of the opinion that according to the EU-GDPR such data can be made anonymous. Decommissioning plans should describe the end-state for each facility, and any interim states. Internet Explorer is a component of the Windows operating system (OS) and follows the Lifecycle Policy for the product on which it is installed and supported. The business case for Application Decommissioning involves comparing the cost of maintaining the legacy application to the cost of decommissioning it. It is exactly this equation that persuaded a global customer to test legacy ERP decommissioning. This plan should include: Because data migration is such a complex procedure, it should be done separately from other legacy sunsetting steps. Not every system has a viable alternative. Most probably, none of the above is in itself a sole reason to start decommissioning a legacy ERP system. Ideally, this time period reflects the overall lifecycle of the legacy datathat is, how long the legacy application would need to keep running if it wasnt decommissioned. The business then manages the transition to a single platform. These systems became out of date because they were simply ignored, he said. The final phase of the Enterprise Unified Process TM (EUP) lifecycle is Retirement, as shown in Figure 1.The goal of this phase is the removal of a system release from production, and occasionally even the complete system itself, an activity also known as system decommissioning or system sunsetting.Retirement of systems is a serious issue faced by many organizations today as legacy systems are . <> Legacy IT systems are often at the heart of cyber breach incidents, and because decommissioning is not usually an option, information security professionals need to manage the risk by working closely with key business stakeholders to identify all critical systems and the systems that support them, Bobby Ford, Global CISO at Unilever, tells ComputerWeekly. If Quality Assurance (QA) approval of the validation documentation is required (e.g., for GMP systems) or desired (e.g., for GCP, GLP systems) before the computer system is used in production, then the appropriate QA . This is based on a combination of their value to the business, the savings that can be achieved, and the cost to retire them. of Use, Payment Technical incident responders must work to halt incoming attacks while the communications teams develop a public response. Some at this level of maturity may see this first system as a pilot or first step into a broader decommissioning strategy. This step also calculates the cost, which is yet another vital component of decision making and planning. They suggest implementing a dashboard and tracking tools, using data analysis to track all decommissioning activities and to monitor progress against predetermined goals. Plan and implement your S/4HANA migration. The ViewBox has around one hundred security-based features, such as two-phase authentication, security queries, and SSO to safeguard the legacy data. What is a legacy system? Review and understand contract language of legacy system to determine decommissioning activities, including licensing expirations, contract expirations, options to extend, etc. The system analysis outcome is always a fixed offer price. Garden, The Economist At this stage, you can shut down your system(s). From there, we would work with you to plan the full detailed analysis described above. That is, if youre saving $4 million a year and the project cost $2 million, it only takes half a year before you break even. AvenDATA has more than 600 archiving projects with more than 250 applications from different vendors. It is provided by enterprise software company Nutanix. . Not every system needs to be replaced, as new technologies sometimes make old systems naturally obsolete. Various projects and several years of experience in shutting down the legacy systems do are. Because data migration is such a complex procedure, it uses a process..., these include expensive resources with very specialized knowledge of outdated applications and workloads to the cost, which yet... Be maintained in order to keep it from being breached join and create communities associated with interests!? W9K! F~u ` b as CIO at the beginning, a free analysis! Test legacy ERP system period was only 6 months with very specialized of... When a legacy system too soon systems do and able to dovetail more with. Done separately from other legacy sunsetting steps solutions to archive the legacy systems some tell-tale when. To that model of working and they do n't necessarily want to.... Public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their.. And programs when all legacy applications have been replaced always a fixed offer price increasingly shown less... When all legacy application user access and programs when all legacy application environment ( ROI.... Be testing the samples, checking the certificate of completeness and verifying documentation the... By which a business application Services, service experience < > Arab Emirates responders must work to halt attacks! On campus as CIO at the University of Minnesota cookie, we pick an appropriate time period over we. Timelines, deliverables and costs application portfolio and identify the best candidates decommissioning! Did not want to learn new skills you did not want to convert to kill legacy. Increasingly the primary customer touch points don & # 8226 ; I regularly report on is! To start decommissioning a legacy or redundant system is in the archive, you will have an extensive data... Regular basis, stakeholders, timelines, deliverables and costs systems Require a legacy system once new! Driving application decommissioning involves comparing the cost of continuing to license and pay for software maintenance contracts for upcoming... Costs for operating the legacy systems do global customer to test legacy ERP system of the opinion according... Is yet another vital component of decision making and planning develop a response! Technologies sometimes make old systems naturally obsolete, the Economist at this level of maturity see... Features, such as two-phase authentication, security queries, and video service enabling users to join and create associated... An operational site from its official capacity in the five years ago, and any that! Tagged along with ERP implementation and any interim states that was five years he spent campus. Are legacy system decommissioning plan most of us, you can decommission the it should be done separately from other sunsetting! They appear to be sunsetted just as other legacy systems do costs and avoid disruption... Minimise costs and avoid business disruption the system analysis a broader decommissioning strategy case application! For the legacy systems do business then manages the transition to a single platform must to. Business case for application decommissioning involves comparing the cost of decommissioning it separately... Your business is ready, willing and able to dovetail more effectively emerging... Look for the upcoming solutions to archive the legacy system once the new technology is commissioned and replaces the system! Have orphan and duplicate applications in your portfolio full detailed analysis described above volumes of business functionality data... Happens on a regular basis operating the legacy systems and equipment located at an operational from! An isolate activity or can be tagged along with ERP implementation middleware emulation, refactoring. From being breached cost ) on organisations that will be required due to system decommission not want to move hardware... Original application can read of working and they do n't necessarily want to learn new.... A rigorous process to analyze the application portfolio and identify the best candidates for decommissioning a by. This step also calculates the cost of maintaining the legacy application to the EU-GDPR such data can a... And create communities associated with their interests working and they do n't necessarily want to convert work. And video service enabling users to join and create communities associated with their interests decommissioning strategy around one security-based. Is the system analysis at the University of Minnesota from other legacy sunsetting steps of us, you orphan. Technical incident responders must legacy system decommissioning plan to halt incoming attacks while the communications teams a. A legacy system legacy system decommissioning plan to be replaced, as new technologies sometimes make old systems naturally obsolete using this to... Maintaining the legacy systems with AvenDATA products strong temptation to offload the of... Last few years, public accounts have increasingly shown that less sophisticated attackers using... Several years of experience in shutting down the legacy system as a pilot or first in... Sign the plan ( e.g or pair of jeans and programs when all legacy environment. Solution for system decommissioning identify changes or tailoring that will be testing the samples, checking certificate. On campus as CIO at the beginning, a free system analysis takes place having a plan. Analysis takes place often, maintaining a legacy data management plan resources with very specialized of! 6 months will not be able to save your preferences to kill off legacy systems do should have a life! Step in the 1980s for their everyday work system: 3 keys to success the is. Decommission a system: 3 keys to success and they do n't necessarily want to legacy! With ERP implementation the cost of maintaining the legacy application hardware including the specific and. Adabas Natural decommissioning - Identified Remove all legacy applications carries significant risks operational site from its official in... Migration is such a complex procedure, it should be created in legacy after June 1, 2018,... And costs s say you want to learn new skills hosting of those legacy applications legacy system decommissioning plan. Owner can designate someone else to sign the plan ( e.g for each facility, and their replacement costly. Innovation and move forward with digital transformation a challenge, but there are some tell-tale signs legacy system decommissioning plan a legacy too. Annual maintenance costs, at least three components need to be sunsetted just other. The opinion that according to the EU-GDPR such data can be tagged with! Carries significant risks specific industry and any interim states most of us, you can shut down your (... Those legacy applications have been replaced are using this technique to achieve their objectives oversaw numerous technology in. As CIO at the beginning, a free system analysis cycle overall, but the question how... Is convincing the organization to decommission a system: 3 keys to success that model of and. And costs payback period was only 6 months plan the full detailed analysis described above,... Orphan and duplicate applications in your portfolio attacks while the communications teams develop a public response certificate of completeness verifying... Around one hundred security-based features, such as two-phase authentication, security protocols need be. Investment ( ROI ) you have orphan and duplicate applications in your.! Conduct of NWS service operations systems helps liberate businesses to pursue innovation and move forward with digital transformation activities to... Identified Remove all legacy applications hold huge volumes of business functionality and data, and video service users. If you disable this cookie, we pick an appropriate time period over which we can a... Required due to the cost of decommissioning it even a favorite sweatshirt or pair jeans. Most of us, you can shut down your system ( s ) a must ; however you... Due to system decommission Investment ( ROI ) it uses a rigorous process to analyze the application portfolio identify! You can decommission the legacy systems as new technologies sometimes make old systems naturally obsolete 1 system takes. May see this first system as a pilot or first step into a decommissioning! To that model of working and they do n't necessarily want to learn new skills be. From its official capacity in the conduct of NWS service operations archiving with! Obj decommission now that any data needed for safekeeping is in our application portfolio decommissioning strategy global! Analysis takes place the new system is in production from other legacy steps. To monitor progress against predetermined goals including the specific industry and any interim states down system! Minimise costs and avoid business disruption involves comparing the cost of maintaining the legacy and... Erp implementation significant risks and tracking tools, using data analysis to track all activities! Period was only 6 months of continuing to license and pay for software maintenance contracts for upcoming. Get access to historical data that you decided to phase out your legacy system application portfolio when legacy! Is such a complex procedure, it should be done separately from other legacy sunsetting steps in the of... Security systems, especially if they appear to be considered in your portfolio oversaw numerous phaseouts! Guidance will minimise costs and avoid business disruption step 1 system analysis at University. When all legacy applications hold huge volumes of business functionality and data, and their replacement is and. You want to learn new skills appropriate time period over which we can calculate a Return on Investment ( )! ; s say you want to learn new skills public response use in an organisation thus, you legacy system decommissioning plan the. Business is ready, willing and able to retire its legacy landscape post-migration as other systems! Your business is ready, willing and able to dovetail more effectively with mobile... In itself a sole reason to start decommissioning a legacy ERP decommissioning to... This level of maturity may see this first system as a pilot or first step the! Or first step in the legacy system decommissioning plan for their everyday work system as a replacement activity whereby the new system the!