Attention! Incoming Project Catastrophe... - 3 IT Project Risks to Watch Out For

03 March 2021 | Robert Bojek | it project risks

The research results published by CHAOS REPORT 2015 are clear - it may be inferred that merely 36% of IT projects are successful, in turn according to Project Management Institue this figure rises to 69%.But there’s always room for improvement. To make that happen, learn about three risks in IT projects.

It’s easy to overlook the elements listed below at the planning stage. These elements are partly bound with the allocation of responsibilities - the developer may decide that prevention is not in his wheelhouse, the PM won’t be aware of technical limitations, and the tester could misunderstand the performance requirements. Awareness of the existence of IT project risks and cooperation with an experienced team will be your ally in successfully opposing and, consequently, improving your chance of success.

Threat no. 1

Shots in the dark, or the lack of definition-of-done

One of the first issues to be dealt with to ensure efficient project execution is settling on a clear definition-of-done with your supplier. These arrangements should take into account whether the project is to be delivered in whole or in individual parts, or with a list of performance requirements which must be fulfilled to consider it finished.

These are only some examples; as a matter of fact, the definition of a completed project should be the result of common arrangements between the customer and the supplier. The more precise the understandings, the less misunderstandings.

That way you avoid a lot of stress and unnecessary costs. Something to keep in mind as well - when you partner up with an IT solutions team make sure that the definition-of-done is clearly established.

Threat no. 2

Payment provider integration – will there be no payment option?

Connecting two systems is always a risky task associated with something more than just technical problems. It also carries challenges of formal and legal nature.

To enable the use of payments in the project, you as a customer must establish cooperation with a company that allows making online transactions. Among others, this is associated with the need to be verified as a reliable partner, which is not always easy. Issues could appear when the company:

  • operates in an industry considered risky (e.g., bookmakers),
  • has a short history of activities and/or low turnover,
  • does not have a website or appears to be unreliable for other reasons.

This factor could get your application rejected, which becomes a major obstacle if the selected payment system has already been implemented by a company deploying new technologies in your business.

Keep in mind that all formalities associated with launching e-payments in the project are on your end and tying up any loose ends is often time-consuming.

Therefore, before taking the first step in development work, you need to make sure that the application will not be rejected and that integration will be possible.

Threat no. 3

What if you’re not their cup of tea? - review of the app in Google Play or AppStore

In the case of mobile apps, it’s worth keeping in mind that even if you send them for acceptance long before the final project deadline, it does not mean that they will be launched on time. This problem concerns the AppStore in particular - the acceptance process is not instantaneous. On top of that, it could turn out that the app has missed some requirement, which may result in rejection.

There are different reasons, sometimes associated with complex and discretionary questions, such as:

  • collecting data during user registration that the App Store or Google Play deems unnecessary for the proper operation of the app,
  • no access to the content contained in the application for inactive users,
  • incorrect (according to the evaluator) application interface.

For the above reasons, it’s best to always assume a safe time buffer, even if other applications have been accepted in just days in the past. Of course, there are rules and practices that increase the odds of your applications being approved quickly. These practices are applied by specialized IT teams, making it easier for their clients to release the product on time.

Every project is associated with a number of threats that are often difficult to predict and to prevent. To minimize those risks, you should establish cooperation with a team that has knowledge and experience sufficient to help you analyze the real and potential risks in the IT project going over and above technical, legal or organizational issues. Preventing these risks is crucial for completing the project on time, resulting in a refined and top quality product that brings real profits.

Lemlock ebook. Expert Guidebook: Three vievs on cybersecurity
We would be happy to talk about your project!
Consent to  data processing for contact purposes
I confirm that I have read the  information clause of Sagiton Sp. z o.o.

I hereby give consent to the processing of my personal data by the Personal Data Controller (hereinafter: "PDC") – Sagiton Sp. z o.o. ul. Fabryczna 19, 53-609 Wrocław, within the scope of: full name, e-mail address or telephone number, for the purpose of sale of products and services of Sagiton Sp. z o.o. and for the purpose of sending me feedback and making contact with me by Sagiton Sp. z o.o.

At the same time, I acknowledge that: at any time I can request the removal of my personal data from the PDC Sagiton Sp. z o.o. database, by sending an e-mail to, or a letter to Sagiton Sp. z o.o., ul. Fabryczna 19, 53-609 Wrocław, with a statement containing the relevant request, which shall result in the deletion of my personal data from the PDC Sagiton Sp. z o.o. database; I have the right to access my data; providing my data is voluntary, however refusal to provide it is tantamount to not receiving information regarding sale of products and services of Sagiton Sp. z o.o., as well as not receiving feedback and making contact with me by Sagiton Sp. z o.o.

In accordance with Art. 13 section 1 of the General Data Protection Regulation of 27 April 2016, (GDPR), we would like to inform you that the controller of your personal data is Sagiton Sp. z o.o. with its registered office at ul. Fabryczna 19, 53-609 Wrocław, e-mail:

Your personal data shall be processed within the scope of: full name, e-mail address and/or telephone number in order to answer your question/request for contact and send feedback – pursuant to Art. 6 section 1 (a) of the GDPR, i.e. consent to the processing of personal data.

The data controller would like to inform you that your personal data shall not be disclosed to third parties.

Your data shall not be transferred outside of the European Economic Area or to international organizations.

Your personal data shall be processed until you withdraw your consent to the processing of data, as well as if the purpose for processing this data shall no longer be applicable.

You have the right to access your personal data, rectify it, delete it, restrict its processing, the right to transfer it, as well as the right to object.

In the case of giving your consent, you have the right to withdraw it at any time. Exercising the right to withdraw the consent does not affect the processing carried out before the consent was withdrawn.

You have the right to lodge a complaint with the supervisory body, i.e. the President of the Office for Personal Data Protection, ul. Stawki 2, 00-193 Warsaw.

Providing your personal data is a prerequisite for making contact with you by Sagiton Sp. z o.o. with its registered office at ul. Fabryczna 19, 53-609 Wrocław. In the case of not providing your personal data, Sagiton Sp. z o.o., shall not be able to contact you.

The Data Controller, Sagiton Sp. z o.o., would like to inform you that they shall not use your personal data for automated decision-making, which is based solely on automated processing, including profiling, and has legal effects for you or affects you significantly in a similar way.