Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Parties: Identification of the assessing party (security assessor) and the client organization, including their legal details and authorized representatives
2. Background: Context of the security assessment requirement, including any regulatory compliance needs and general purpose of the assessment
3. Definitions: Detailed definitions of technical and legal terms used throughout the agreement
4. Scope of Assessment: Detailed description of the applications, systems, and components to be assessed, including boundaries and exclusions
5. Assessment Methodology: Description of the security testing approach, standards followed, and assessment techniques to be employed
6. Duration and Timeline: Timeframe for the assessment, including key milestones and delivery dates
7. Responsibilities and Access Rights: Specific duties of both parties, including access provisions, support requirements, and coordination procedures
8. Confidentiality and Data Protection: Provisions for handling sensitive information and compliance with Indonesian data protection laws
9. Deliverables: Detailed description of assessment reports, documentation, and other outputs to be provided
10. Security Incident Handling: Procedures for handling and reporting any security incidents discovered during the assessment
11. Fees and Payment Terms: Financial terms, payment schedule, and any conditional payments based on milestones
12. Limitation of Liability: Boundaries of legal responsibility and liability caps for both parties
13. Governing Law and Dispute Resolution: Specification of Indonesian law as governing law and dispute resolution procedures
1. Business Continuity Provisions: Required when assessment involves critical systems or could impact business operations
2. Third-Party Tools and Software: Include when specific security testing tools or software will be used during the assessment
3. Cloud Service Provider Considerations: Required when applications being assessed are hosted on cloud platforms
4. Regulatory Compliance Specific Requirements: Include when assessment must meet specific regulatory standards (e.g., OJK requirements for financial applications)
5. Post-Assessment Support: Optional section for defining any post-assessment consultation or support services
6. Re-testing Provisions: Include when agreement covers potential re-testing after remediation
7. International Data Transfer: Required when assessment involves cross-border data transfers
1. Schedule A - Technical Scope Details: Detailed technical specifications of systems to be assessed, including architecture diagrams and system components
2. Schedule B - Assessment Methodology Details: Comprehensive testing methodology, including specific security testing procedures and standards
3. Schedule C - Testing Tools and Technologies: List of approved security testing tools and technologies to be used
4. Schedule D - Reporting Templates: Templates and formats for various reports and documentation to be delivered
5. Schedule E - Service Level Agreement: Specific performance metrics and service levels for the assessment process
6. Appendix 1 - Compliance Requirements: Detailed regulatory and compliance requirements applicable to the assessment
7. Appendix 2 - Security Controls Checklist: Checklist of security controls to be assessed based on relevant standards
8. Appendix 3 - Communication Protocol: Detailed procedures for communication and escalation during the assessment
Financial Services
Banking
Insurance
Healthcare
E-commerce
Technology
Telecommunications
Government
Education
Manufacturing
Energy
Transportation
Retail
Professional Services
Information Security
Risk Management
Legal
Compliance
IT Operations
Software Development
Quality Assurance
Procurement
Internal Audit
Data Protection
Project Management
Information Technology
Vendor Management
Chief Information Security Officer (CISO)
IT Security Manager
Risk Management Director
Compliance Officer
Information Security Analyst
Security Assessment Specialist
Application Security Engineer
IT Director
Chief Technology Officer (CTO)
Data Protection Officer
Security Consultant
IT Audit Manager
Project Manager
Legal Counsel
Procurement Manager
Find the exact document you need
On Site Risk Assessment
Professional on-site risk assessment agreement compliant with Indonesian safety regulations and workplace safety laws.
Money Laundering Risk Assessment For Solicitors
An Indonesian law-compliant risk assessment framework for identifying and managing money laundering risks in legal practices.
Kitchen Equipment Risk Assessment
A risk assessment document for kitchen equipment operations, ensuring compliance with Indonesian safety regulations and establishing safety protocols for commercial kitchen environments.
E Authentication Risk Assessment
A technical assessment document evaluating electronic authentication risks and compliance requirements under Indonesian law.
Crm Risk Assessment Matrix
An Indonesian-compliant risk assessment framework for evaluating and managing customer-related risks in financial institutions.
Company Risk Assessment
A comprehensive risk assessment document compliant with Indonesian regulatory requirements, analyzing organizational risks and providing mitigation strategies.
Equipment Criticality Assessment Matrix
A structured framework for evaluating equipment criticality and risk assessment in accordance with Indonesian safety regulations and SMK3 requirements.
Risk Assessment Summary
A structured evaluation of organizational risks and mitigation strategies, compliant with Indonesian risk management regulations and safety standards.
Young Worker Risk Assessment
An Indonesian law-compliant risk assessment document for evaluating and protecting young workers (ages 15-17) in the workplace.
OHS Risk Assessment
An Indonesian regulatory-compliant workplace safety document that systematically assesses and addresses occupational hazards and risks under Government Regulation No. 50 of 2012 on SMK3.
Residential Fire Risk Assessment
A technical assessment document evaluating fire safety risks in residential properties under Indonesian building safety regulations.
Jsa Risk Assessment
A structured workplace safety assessment document that analyzes job-specific risks and control measures, complying with Indonesian safety regulations and SMK3 requirements.
Risk Assessment Control Form
An Indonesian regulatory-compliant document for systematic workplace hazard identification, risk assessment, and control measure implementation.
Confined Space Hazard Assessment
An Indonesian regulatory-compliant assessment document for identifying and controlling confined space hazards in accordance with national safety laws.
Museum Risk Assessment
A comprehensive museum risk assessment document compliant with Indonesian cultural heritage and safety regulations, evaluating collection and public safety risks with mitigation recommendations.
Fraud Risk Assessment For Banks
A regulatory-compliant fraud risk assessment document for Indonesian banking institutions, aligned with OJK and Bank Indonesia requirements.
Credit Union Risk Assessment
An Indonesian-compliant risk assessment framework for credit unions, incorporating OJK regulatory requirements and comprehensive risk evaluation guidelines.
Safety Assessment Form
An Indonesian-compliant workplace safety assessment document for systematic hazard identification and risk control, aligned with local safety regulations.
Liquidity Risk Assessment
A regulatory-compliant liquidity risk evaluation document for financial institutions operating in Indonesia, aligned with OJK and Bank Indonesia requirements.
Information Security Risk Assessment Report
A detailed assessment of information security risks and mitigation recommendations, aligned with Indonesian data protection and cybersecurity regulations.
Infection Control Risk Assessment Form For (Construction)
An Indonesian-compliant risk assessment form for managing infection control during healthcare facility construction projects.
Warehouse Fire Risk Assessment
A fire risk assessment document for warehouse facilities in Indonesia, ensuring compliance with national safety regulations while evaluating and mitigating fire hazards.
Abc Risk Assessment
An anti-bribery and corruption risk evaluation document aligned with Indonesian regulatory requirements, assessing organizational risks and providing mitigation recommendations.
Risk Assessment Executive Summary
An executive-level summary of organizational risks and mitigation strategies, compliant with Indonesian regulatory requirements and risk management frameworks.
Severity Risk Assessment Matrix
An Indonesian-compliant risk assessment matrix framework for evaluating and categorizing operational risks according to their severity and likelihood.
Risk Assessment SOP
Standard Operating Procedure for conducting workplace risk assessments in compliance with Indonesian safety regulations and government requirements.
Security Risk Assessment Report
A comprehensive security risk evaluation document compliant with Indonesian regulations, assessing organizational security threats, vulnerabilities, and providing mitigation recommendations.
Risk Assessment Report Of A Company
A comprehensive risk assessment document analyzing company-wide risks and mitigation strategies, compliant with Indonesian regulatory requirements.
Hot Works Risk Assessment
An Indonesian-compliant risk assessment document for managing safety in hot works operations, including welding, cutting, and related heat-generating activities.
Hazard Risk Assessment
A structured evaluation of operational hazards and risks, compliant with Indonesian safety regulations, providing risk analysis and mitigation recommendations.
Cyber Security Risk Assessment Matrix
A structured cybersecurity risk assessment framework compliant with Indonesian regulations for identifying and evaluating organizational cyber risks.
Building Risk Assessment
An Indonesian law-compliant assessment document evaluating building-related risks, safety compliance, and recommended mitigation measures under Law No. 28 of 2002 and related regulations.
Personal Training Risk Assessment
An Indonesian-compliant risk assessment document for personal training services, outlining safety protocols and risk mitigation strategies in accordance with local regulations.
Risk Assessment Document Software Development
A comprehensive software development risk assessment document compliant with Indonesian regulations, focusing on technical, operational, and security risk management.
Participant Risk Assessment
An Indonesian-compliant risk assessment document analyzing participant risk profiles across multiple dimensions, meeting local regulatory requirements.
Machine Guarding Risk Assessment
A technical assessment of machinery safety risks and guarding requirements compliant with Indonesian workplace safety regulations, providing recommendations for safety improvements.
Latex Risk Assessment
An Indonesian-compliant workplace safety document assessing latex-related risks and establishing control measures under Law No. 1 of 1970.
IT Security Assessment Report
A technical report detailing IT security assessment findings and recommendations, aligned with Indonesian cybersecurity regulations and standards.
Application Security Risk Assessment
An Indonesian law-compliant agreement for conducting Application Security Risk Assessment, establishing assessment parameters and compliance requirements.
Indoor Event Risk Assessment
An Indonesian-compliant risk assessment template for indoor events, incorporating national safety regulations and local building codes.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it


.png)