CRISP™ Key Artifacts are designed to be minimally viable and maximally scalable, achieving a layer of optimization for noise-less collection/dissemination of cross-functional/cross-entity (CF/CE) data. The pivotal artifact is the NPX, or Nexus Point Exchange, where all Colleagues who are producing and consuming critical initiative data can access, update and reference that data with common identifiers.
The 5 base CRISP™ Key Artifacts are:
- NPX – the Nexus Point Exchange; single source of truth for CF/CE data
- Employee Matrix – single source of truth for transitioning employees
- Application Matrix – single source of truth for application-level ownership and activity
- Milestones – single source of truth for contractually mandated dates
- Colleague Roster – single source of truth for all people who are involved with executing the initiative
These artifacts cover 80-100% of the CF/CE data required for a successful transaction. Where transactions include transition services, the following artifacts are also provided:
- Request List – single source of truth for tracking ad hoc CF/CE action requests
- Knowledge Transfer Repository – recommended structure for tracking and recording knowledge transfer topics
- TSA Agreement Matrix – recommended structure for tracking and updating transition services including cost recapture
The Method also includes a common agenda planner/tracker, recommended for consistency across the initiative.
Listen to what one colleague explained about the NPX artifact when asked … §
The sample Key Artifacts are all Excel-based with companion Word usage protocol documents. They are designed to be used as-is, or modified to included branding or cultural/nomenclature customization. They also contain field/column-level database schema descriptions to assist implementation using the initiative technology ecosystem and do not require the adoption of any new applications or hardware.
Each Key Artifact contains the following metadata:
- Audience/Permission – what roles have access
- Purpose – what the artifact is used for
- Populating – how the artifact gets populated and by whom
- Updating – how often the artifact is updated; what gets updated and by whom
- Caveats – known usage issues and mitigation approaches; protocol and artifact adoption and modification considerations
- Scaling – horizontal and vertical
- Protocol – how the artifact is to be used, resource recommendation on ownership
The entire collection of CRISP™ Key Artifacts are included as part the complete CRISP™ Method. They are delivered as downloadable on-line content.
§ Colleague testimonials are in their own words (but not voices), edited for length, and rendered as avatars for confidentiality.