Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

When identifying the risks, why should you do the following?

Category: Business & Management Paper Type: Online Exam | Quiz | Test Reference: APA Words: 1400

   Identify the context for risk management

               It is important to understand for an organization that they must develop a context for risk management because, without a proper context, they would never be able to manage risks effectively. It is vital to look at internal as well as external environment, in which any risk can happen. They will have to realize which factors are driving their business, and how things are being managed on an operational level. Moreover, they will have to keep an eye on legal matters as well, which defines the overall operations of their business. This is how they will be able to develop a great context for their risk management strategy (Snedaker, 2013)

·         Identify risks using tools, ensuring all reasonable steps have been taken to identify all risks

               Risks can happen at any stage in an organization and these risks can be associated with employees or equipment. For instance, an organization can identify certain risks by taking evaluation measures into account. They can evaluate a job role being performed by an employee, if an employee is dealing with sensitive information, then there is a risk that information may get leaked, so all measures should be taken to avoid such risks. On the other hand, if there are various types of equipment being used by employees, and then all the safety measures should be ensured during the evaluation process so that employees remain safe when they use those types of equipment and machinery (Melton, 2008)

·         Document identified risks in accordance with relevant policies, procedures, legislation and standards?

               It is vital for an organization that they document all kinds of risks, which can be possible in the work processes so that they can evaluate that which risks are in line with the policy, and which ones are going against the policy. Moreover, there can be risks, which may go against certain laws, so it is viable to do documentation of all risks, and those risks should be avoided which are against the law or overall organizational policy.

2. When analyzing and evaluating the risks, why should you do the following:

·         Analyze and document risks in consultation with relevant stakeholders

               An organization cannot document its possible risks without taking its stakeholders into consideration. For instance, if an organization is trying to measure workplace hazards, which can be there due to using certain dangerous machinery, and they don’t talk to employees, who are actually working at the ground, then proper risks cannot be identified without their consultation. The relevant employees and stakeholders should always be consulted for proper risk identification and management (Brown, 2008)

·         Undertake risk categorization and determine level of risk

               It is vital to understand that all risks do not come with the same length and intensity in their outcomes, so it is crucial to categorize each risk as per its risk level. Some risks can be more dangerous and serious as compared to others, whose impact is minimal. So, it is recommended that different categories should be developed by making a categorization chart, in which each risk is given a certain level. For instance, a risk categorization chart can have categories such as low-level risk, mid-level risk, high-level risk, likely, most likely, or unlikely risk, etc. (The State of Queensland, 2016)

·         Document analysis processes and outcomes?

               The clear documentation is needed to analyze overall processes and their outcomes in relation to risk management. A proper document should be maintained on how things will be done, and how it will be evaluated from time to time. For instance, a daily, weekly and monthly review can be considered to see if things are going well within the guidelines, and if any risk has been identified, it is mitigated accordingly. When proper documentation is maintained, and any legal issues occur, the organization can have documentary evidence in their hands to show.

Part B – Written Assessment

1. Details of the risk situation

               A financial organization is managing financial data of its variety of clients, and they use software to store all the information and records. In this software, all kinds of information of the client is stored such as their credit card numbers, names, contact details as well as various other sensitive data. The risk is that if any virus attacks the software, then all the data can be lost, or if any outside hacker attacks the data, he/she can get access to all the sensitive information of clients.

2. Who you needed to communicate with during the work undertaken, including relevant stakeholders, colleagues and management

               It is important to discuss the risks with all the stakeholders. First of all, feedback is taken from employees like what they think about to manage these risks. The top management will also be consulted to get go-ahead for any policy matters to deal with the risks. The organization will also consult with IT and security experts as well as other relevant companies to get a view from them for managing such kind of risks.

3. The research and analysis made and how you presented your findings

               It was important for the organization to do some considerable research so that critical findings can be made for the above-mentioned risks. For instance, I consulted with all the experts who are related to cyber-security and safety. I consulted with the experts to know about legal guidelines and matters to keep things safe & secure. I also analyzed the last 12 months' data and facts of the organization to see if any data loss incident had occurred in the last, what was the extent of the incident, and how it was dealt with accordingly. I also called for a group meeting, where the discussion was made for such risks, and viable remarks were taken from all the participants. The minutes of the meeting were recorded so that these findings can be considered while making future decisions.

4. List the all identified risks in work areas by using Risk Register Form

RISK

Outcome

Existing Policy & Controls

Priority of Risk

Risk Level

Malfunction of Software

·         Data was lost for various client

·         Data had to be restored

Inadequate and incomplete

High Priority

Extremely High

 

5. Did you need to refer areas of risk to others, due to the risk being under another work area

               It is important to mention here that risk was not reported to anyone else other than our own department manager as well as the IT department, who are responsible for the management and security of the information management systems of the organization. The top management consent was already taken to take any considerable measures so risks were not shared with anyone else because there was no need to do so.

6. What legislative and organizational policies/procedures that you needed to consider for your risk management

               It is vital to mention here that any legislative issue was not associated with these risks, which have been mentioned earlier; rather it was more relevant to the organizational policy and procedures. We have made a policy that we will protect the information and data of our clients at any length, and if we make any mistakes, we will be liable to them. In a previous incident, all the lost data was restored, and clients had to face no problem. In this risk management policy, we wrote that if any data will be lost, and clients will incur any financial loss, we will pay back those financial losses, if any issue happens. But at first place, we hired new security experts to install and implement new security and safety measures, and clients were also given proper guidelines that how they can access or retrieve data so that no one else can see or attack data from outside.

References of Risk Management

Brown, T. (2008). PROJECT MANAGEMENT: STAKEHOLDER RISK MANAGEMENT. Retrieved Novembeer 27, 2019, from https://www.projectsmart.co.uk/project-management-stakeholder-risk-management.php

Melton, T. (2008). Managing Project Delivery: Maintaining Control and Achieving Success. Butterworth-Heinemann.

Snedaker, S. (2013). Business Continuity and Disaster Recovery Planning for IT Professionals (2nd Edition ed.). Newnes.

The State of Queensland. (2016). Analyse and evaluate the impact of risks. Retrieved November 27, 2019, from https://www.business.qld.gov.au/running-business/protecting-business/risk-management/preparing-plan/analyse

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Isabella K.

ONLINE

Isabella K.

21 Orders Completed

Top Essay Tutor

ONLINE

Top Essay Tutor

9702 Orders Completed

Engineering Solutions

ONLINE

Engineering Solutions

1680 Orders Completed