The Importance of Due Diligence and Organisational Clarity in Divestitures

Jeff Owen


Subscribe Contact us

Authors


Part 2 in a 6-part Series on Transition Service Agreements and Divestitures

The Detail Is in Your Diligence


The most important thing to take into consideration when planning or preparing for a divestiture, carve-out, or acquisition is due diligence. In other words, you will maximise the capabilities and efficiency of a TSA by starting with a thorough and detailed understanding of your company, strategy, and what you want out of the end result. This works both ways: sellers and buyers both must share an awareness of their business in order to calculate the real cost of the deal and realise potential value synergies.


This knowledge should extend to the TSA itself. For example, it may not be necessary to have specific SLA levels included in the TSA because in certain outsourcing scenarios it might be more practical for the seller to monitor and report service level metrics for the buyer. Conversely, using vague statements like ‘commercially reasonable’ or ‘best commercial effort’ should be avoided as these are ambiguous and will often lead to a clash of expectations, which will lead to delays, etc.


Some parts of the TSA will necessarily require looser expression because those details cannot be worked out just yet and therefore will evolve with the transition. Because different elements of your TSA might be tight or loose, we recommend that you use experienced consultants and work closely with a legal team to draft an agreement that is fit-for-purpose.


In complex separations you may decide to use specific TSA Service Schedules to cover areas such as IT and HR. In cross-border M&A, different TSA schedules would be required for different geographic locations. Overall, it is crucial to have a clear image of your TSA before you jump into it.

Chasing Waterfalls

A British Exploring Society expedition in Iceland

Once you have this image in mind, the next step is to consider your timeline. At Cambridge MC, we recommend you adopt a Waterfall and Agile approach to your TSA, prioritising frequent opportunities for review. Rather than trying to tackle the entire migration at once, plan for tranches for systems migration. This lowers the risk and allows both parties to regroup and evaluate success before moving on—making changes between phases to deal with any unforeseen issues. 


Transferring employees


Proper due diligence and planning allows for onboarding and payroll to be set up by HR. Payroll management is complicated for transferred staff and often information gets lost in the process. You should give yourself an appropriate window to deal with these issues and learn from your mistakes.

Know Your End-state

If you don’t have a clear view of the end state, decisions will be much harder.

- Jeff Owen, Managing Partner for M&A

Blueprints for Success

All of these aspects can be condensed into a really detailed blueprint, a high-level document which provides a scoping of programme deliverables against the TSA.


Primarily, the purpose of a blueprint is to provide a comprehensive overview of projects and benefits for the Programme Director, so that she/he can create work steams to move those requirements toward a solution. The blueprint will also provide further clarity of TSA outcomes to ensure that there is an understanding by all parties involved. 


Blueprints should be as agnostic as possible so that they do not tie the hands of downstream delivery teams, with the caveat being that solutions must remain in the boundary of the blueprint and therefore aligned to the TSA. 


Programmes without blueprints are at risk of improvising as they go and thus are likely to encounter unexpected obstacles without the funding or personnel to pick up the pieces.


Each situation is unique and therefore a bespoke blueprint must be created for each client programme.


In general, the blueprint is based on Managing Successful Programmes (MSP) framework with commentary on the POTI (Process, Organisation, Tools and Information) for the ‘as-is’ and ‘to-be’ states.

The benefit of a blueprint is that all parties are aware of how the programme will be delivered, by who, and what the outcomes should be.

- Jeff Owen, Managing Partner for M&A

What to Include in a Blueprint

The benefits in a merger, acquisition, or a divestment are not as deeply defined in the blueprint as they would be in other programme types and thus the benefits will differ depending on whether it is buyer- or seller-sponsored.


For example, a potential benefit of a seller-sponsored blueprint could be as simple as divesting the company, its technology, information, and organisation to the buying company; a buyer-sponsored blueprint, on the other hand, will want more focus on the amount of integration or balance going into the parent/standalone company and where rationalisation of systems can be achieved for greater efficiencies. 


It is highly beneficial to incorporate a RACI Matrix (Responsible, Accountable, Consulted, Informed) in the blueprint alongside the documented activities to ensure that the PMO is fully aware of who is doing what. All too often, programmes have black holes where nobody picks up pieces of work, and thus including a RACI Matrix will avoid the finger-pointing between buyer and seller. 


It is also essential to define each of the POTI areas so that the PMO is aware of the requirements and solution roadmap for delivery. It is critical that the Blueprint defines all interdependencies across projects so that the PMO can interface them to create the overall programme plan to closure.


The different POTI areas are as follows:


  • Process: The processing of transforming input data into the required defined output data and format


  • Organisation: The people inputting, operating, or receiving output from the process


  • Tools: The infrastructure providing the processing and storage to which the organisation interfaces


  • Information: The input data to be transformed into the required output by the process


Key Takeaway

If there is anything to take away from this article it’s to do the lion’s share of the planning before initiating the TSA in order to avoid un-funded obstacles down the line. This means constructing a detailed blueprint which takes into account both the buyer's and seller’s needs, business plans, and what they seek to gain from the merger, acquisition, or divestiture.


In other words, though it may take more time and effort to cover all these details at the beginning, it will avoid so much work and costly delays throughout the process.

Get in Touch

If you would like to find out more about how we can help with any stage of due diligence, drafting your TSA and/or blueprints, as well as our Project Management and PMO as-a-Service, get in touch below.


Contact - Africa

Subscribe to our Newsletter

Blog Subscribe

SHARE CONTENT

Neon 'Open' sign in business window
by Tom Burton 9 October 2025
SMEs make up 99% of UK businesses, three fifths of employment, over 50% of all business revenue, are in everyone's supply chain, and are exposed to largely the same threats as large enterprises. How should they get started with cyber security? Small and Medium sized Enterprises (SME) are not immune to the threat of cyber attacks. At the very least, if your business has money then it will be attractive to criminals. And even if you don’t have anything of value, you may still get caught up in a ransomware campaign with all of your data and systems made inaccessible. Unfortunately many SMEs do not have an IT team let alone a cyber security team. It may not be obvious where to start, but inaction can have significant impact on your business by both increasing risk and reducing the confidence to address new opportunities. In this article we outline 5 key questions that can help SMEs to understand what they need to do. Even if you outsource your IT to a supplier these questions are still relevant. Some can’t be delegated, and others are topics for discussion so that you can ensure your service provider is doing the right things, as well as understanding where their responsibilities stop and yours start. Q1: What's Important & Worth Defending Not everything needs protecting equally. In your personal life you will have some possessions that are dear to you and others that you are more laissez-faire about. The same applies to your digital assets, and the start point for any security plan needs to be an audit of the things you own and their importance to your business. Those ‘things’, or assets, may be particular types of data or information. For instance, you may have sensitive intellectual property or trade secrets; you may hold information about your customers that is governed by privacy regulations; or your financial data may be of particular concern. Some of this information needs to be protected from theft, while it may be more important to prevent other types of data from being modified or deleted. It is helpful to build a list of these assets, and their characteristics like the table below:
Illustration of EV sensor fields
by Duncan Clubb 25 September 2025
Explore the rise of edge AI: smaller data centres, faster networks, and sustainable power solutions. See why the future of digital infrastructure is distributed and intelligent | READ FULL ARTICLE
A close-up of the Downing St sign
by Craig Cheney 19 September 2025
Craig Cheney | The conversation around artificial intelligence (AI) in Government has shifted in recent years. The publication of the UK Government’s AI Playbook represents more than just updated guidance — it signals a huge shift in the government's approach to AI.
Volcano lava lake
by Scott Armstrong 18 September 2025
Discover why short-term thinking on sustainability risks business growth. Explore how long-term climate strategy drives resilience, valuation, and trust | READ FULL ARTICLE
Close up of electricity pylon
by Duncan Clubb 17 September 2025
The UK’s AI ambitions face gridlock. Discover how power shortages, costly electricity, and rack density challenges threaten data centre growth – and what’s being done | READ FULL ARTICLE
Abstract neon hexagons
by Tom Burton 17 September 2025
Delaying cybersecurity puts startups at risk. Discover how early safeguards boost investor confidence, customer trust, and long-term business resilience | READ FULL ARTICLE
Neon wave
by Anthony Aarons 16 September 2025
An in-depth look at AI risk and governance: OECD frameworks, EU AI Act, and UK/US strategies reveal how nations balance innovation with safety and accountability | READ NOW
Aerial shot of wind turbines
by Pete Nisbet 15 September 2025
Discover how businesses can drive value through sustainability by focusing on compliance, cost savings, and credibility—building trust, cutting emissions, and attracting investors | READ ARTICLE NOW
Abstract kaleidoscope of AI generated shapes
by Tom Burton 10 September 2025
This article explores the ‘Third Way’ to AI adoption – a balanced approach that enables innovation, defines success clearly, and scales AI responsibly for lasting impact | READ FULL ARTICLE
More posts