Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
IT Risk Assessment Form
"I need an IT Risk Assessment Form for our new cloud-based CRM system that will be implemented in March 2025, with particular focus on data protection requirements under Singapore law and third-party vendor assessment for our healthcare organization."
1. System/Application Information: Basic details about the IT system being assessed, including system name, owner, purpose, and technical specifications
2. Risk Assessment Methodology: Detailed explanation of the risk assessment approach, scoring criteria, and evaluation framework used
3. Threat Identification: Comprehensive inventory of potential threats to the system, including internal and external threats
4. Vulnerability Assessment: Analysis of system weaknesses, security gaps, and potential points of failure
5. Impact Analysis: Evaluation of potential business, operational, and financial impacts of identified risks
6. Risk Rating Matrix: Framework for scoring and prioritizing risks based on likelihood and impact
7. Control Measures: Documentation of existing security controls and recommendations for additional measures
1. Cloud Service Provider Assessment: Specific risk assessment for cloud services, including data residency, service availability, and provider compliance
2. Third-Party Vendor Assessment: Evaluation of risks associated with external vendors, including access controls and data handling practices
3. Data Protection Impact Assessment: Detailed assessment of personal data handling practices and compliance with PDPA requirements
4. Cross-Border Data Transfer Assessment: Analysis of risks related to international data transfers and compliance with relevant regulations
1. Risk Assessment Checklist: Comprehensive checklist of assessment criteria and compliance requirements
2. System Architecture Diagram: Technical documentation showing system components, data flows, and security controls
3. Control Implementation Plan: Detailed timeline and responsibilities for implementing recommended security controls
4. Previous Assessment History: Record of past assessments, findings, and remediation actions taken
5. Regulatory Compliance Matrix: Mapping of assessment findings to relevant Singapore regulatory requirements
Authors
Information Asset
Threat
Vulnerability
Impact
Likelihood
Risk Level
Control Measure
Risk Treatment
Residual Risk
Critical Information Infrastructure
Personal Data
Data Protection Officer
Security Incident
Risk Owner
System Owner
Risk Appetite
Risk Tolerance
Risk Matrix
Control Effectiveness
Business Impact Analysis
Recovery Time Objective
Recovery Point Objective
Third-Party Vendor
Cloud Service Provider
Data Processor
Data Controller
Access Control
Authentication
Authorization
Incident Response
Business Continuity Plan
Disaster Recovery Plan
Compliance Requirements
Audit Trail
Security Breach
Risk Register
Risk Mitigation
Technical Controls
Administrative Controls
Scope of Assessment
Risk Assessment Methodology
Data Classification
Threat Identification
Vulnerability Assessment
Impact Analysis
Control Measures
Risk Rating
Compliance Requirements
Roles and Responsibilities
Review Period
Access Control
Data Protection
Security Controls
Incident Response
Business Continuity
Third-Party Risk
Cloud Security
Network Security
Physical Security
System Monitoring
Backup and Recovery
Change Management
Training Requirements
Documentation Requirements
Audit Requirements
Reporting Requirements
Review and Updates
Sign-off Requirements
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.