Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Document Control Information: Version number, date, assessment owner, and approval status
2. Executive Summary: High-level overview of the assessment scope, key findings, and critical risks identified
3. Scope and Objectives: Definition of assessment boundaries, systems covered, and assessment goals
4. System/Process Description: Detailed description of IT systems, processes, and assets being assessed
5. Risk Assessment Methodology: Description of risk assessment approach, scoring criteria, and evaluation methods
6. Threat and Vulnerability Analysis: Identification and analysis of potential threats and vulnerabilities
7. Impact Assessment: Evaluation of potential business impact of identified risks
8. Current Controls Assessment: Review of existing security controls and their effectiveness
9. Risk Evaluation Matrix: Risk scoring and prioritization based on likelihood and impact
10. Recommendations: Proposed risk mitigation measures and controls
11. Action Plan: Timeline and responsibilities for implementing recommended controls
1. Compliance Assessment: Evaluation against specific regulatory requirements - include when assessment needs to demonstrate regulatory compliance
2. Business Continuity Impact: Analysis of risks affecting business continuity - include for critical systems
3. Third-Party Risk Assessment: Evaluation of risks related to third-party vendors - include when external providers are involved
4. Data Privacy Impact: Specific assessment of privacy risks - include when personal data is processed
5. Cost-Benefit Analysis: Financial analysis of proposed controls - include when budget justification is needed
6. Cloud Services Assessment: Specific evaluation of cloud-based services - include when cloud services are used
7. Historical Incident Analysis: Review of past security incidents - include for systems with previous issues
1. Appendix A: Risk Assessment Worksheets: Detailed risk assessment scoring sheets and calculations
2. Appendix B: System Architecture Diagrams: Technical diagrams and network architecture documents
3. Appendix C: Control Framework Mapping: Mapping of controls to relevant standards (ISO 27001, NIST, etc.)
4. Appendix D: Testing Results: Results of any security testing or vulnerability assessments conducted
5. Appendix E: Interview Records: Documentation of stakeholder interviews and information gathering
6. Appendix F: Asset Inventory: Detailed inventory of IT assets included in assessment scope
7. Appendix G: Compliance Checklist: Regulatory compliance verification checklist
8. Appendix H: Risk Treatment Plan: Detailed implementation plan for risk mitigation measures
Find the exact document you need
Coshh Assessment Form
A Belgian regulatory compliance document for assessing and controlling risks associated with hazardous substances in the workplace, aligned with national and EU safety regulations.
Risk Assessment For Schools
A Belgian-compliant risk assessment framework for educational institutions, addressing comprehensive safety and risk management requirements in school environments.
Stress Risk Assessment
A comprehensive workplace stress risk assessment framework compliant with Belgian legislation, designed to identify, evaluate, and manage work-related stress factors.
Pregnancy Risk Assessment
Belgian-compliant workplace risk assessment document for protecting pregnant workers, including hazard evaluation and required safety measures.
Functional Risk Assessment
A Belgian law-compliant document that systematically assesses and documents workplace hazards, risks, and control measures in accordance with national and EU safety regulations.
IT Risk Assessment Form
A Belgian-compliant form for systematically evaluating and documenting IT-related risks, ensuring alignment with national and EU regulations.
Pre Task Risk Assessment Form
A Belgian-compliant safety document for systematic risk assessment and hazard identification required before commencing potentially hazardous work tasks.
Composite Risk Assessment Worksheet
A Belgian law-compliant workplace risk assessment document for identifying, evaluating, and controlling occupational hazards.
Risk Management Form
Belgian-law compliant Risk Management Form for systematic risk identification, assessment, and mitigation tracking.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
