Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Assessment Information: Basic information including date, assessor details, organization name, and scope of assessment
2. Asset Inventory: Comprehensive list of assets being assessed, including physical assets, information assets, and critical systems
3. Threat Identification: Documentation of potential threats to the identified assets, including both internal and external threats
4. Vulnerability Assessment: Analysis of weaknesses in the current security system that could be exploited
5. Risk Analysis: Evaluation of risks based on threat likelihood and potential impact, including risk scoring methodology
6. Current Controls Assessment: Review of existing security controls and their effectiveness
7. Risk Treatment Plan: Proposed measures to address identified risks, including priorities and timelines
8. Compliance Requirements: Assessment of compliance with Indonesian regulations and relevant standards
9. Sign-off and Approval: Signatures from relevant authorities and stakeholders acknowledging the assessment
1. Business Impact Analysis: Detailed analysis of potential business impacts of security breaches, recommended for large organizations or critical systems
2. Third-Party Risk Assessment: Evaluation of risks associated with vendors and third-party service providers, relevant when external parties have access to systems
3. Data Privacy Impact: Specific assessment of personal data risks, required when processing sensitive personal data under PDP Law
4. Cloud Security Assessment: Specific evaluation of cloud-based services and associated risks, needed when cloud services are used
5. Physical Security Assessment: Detailed assessment of physical security measures, recommended for organizations with critical physical infrastructure
6. Incident Response Readiness: Assessment of incident response capabilities, recommended for high-risk environments
1. Risk Assessment Matrix: Detailed matrix showing risk ratings and calculations
2. Asset Register: Detailed inventory of all assets included in the assessment scope
3. Control Framework Mapping: Mapping of controls to relevant Indonesian regulations and international standards
4. Vulnerability Scan Reports: Technical reports from vulnerability scanning tools
5. Risk Treatment Timeline: Detailed timeline for implementing recommended security measures
6. Previous Assessment Findings: Summary of previous assessment findings and status of remediation efforts
Find the document you need
Health And Safety Assessment
A comprehensive workplace safety evaluation document that assesses compliance with Indonesian health and safety regulations while providing practical recommendations for improvement.
Fire Safety Risk Assessment
A legally-required assessment document evaluating fire safety risks and compliance measures within properties in Indonesia, aligned with national building and safety regulations.
Pre Job Hazard Assessment
An Indonesian regulatory-compliant document for systematic hazard identification and risk control before commencing work activities.
Risk Assessment And Management Plan
A comprehensive risk management framework document compliant with Indonesian regulations, providing structured approaches for risk identification, assessment, and mitigation strategies.
Legionella Risk Assessment For Landlords
A legally-compliant assessment document for managing Legionella risks in property water systems under Indonesian regulations.
Food Risk Assessment
A regulatory-compliant food safety risk assessment document under Indonesian law that identifies, analyzes, and provides control measures for food safety hazards in food business operations.
Food Fraud Vulnerability Assessment
A systematic assessment document for identifying and managing food fraud risks in compliance with Indonesian food safety regulations and standards.
Warehouse Risk Assessment
A comprehensive warehouse risk assessment document compliant with Indonesian safety and operational regulations, evaluating facility hazards and providing risk mitigation recommendations.
Travel Risk Assessment
An Indonesian law-compliant document assessing travel-related risks, mitigation strategies, and emergency procedures for specific locations or activities.
IT Risk Assessment Form
An Indonesian-compliant IT Risk Assessment Form for evaluating and documenting technology-related risks and compliance requirements under local data protection and electronic transaction laws.
Security Risk Assessment Form
An Indonesian-compliant security risk assessment document for evaluating and documenting organizational security risks, threats, and mitigation measures.
Information Security Risk Assessment Form
An Indonesian-compliant form for systematic assessment of information security risks, aligned with local data protection and cybersecurity regulations.
Vendor Risk Assessment Form
An Indonesian-compliant vendor risk assessment tool for evaluating supplier risks across multiple dimensions, aligned with local regulations including UU PDP 2022.
Risk Management Form
An Indonesian-compliant Risk Management Form for systematic risk identification, assessment, and control, aligned with OJK regulations.
Plant Risk Assessment Form
An Indonesian regulatory-compliant form for assessing and managing risks associated with industrial plant and equipment operations.
Job Safety Assessment Form
An Indonesian-compliant workplace safety assessment document for identifying hazards, evaluating risks, and implementing control measures in accordance with local safety regulations.
Health Risk Assessment Form
An Indonesian-compliant health risk assessment form for evaluating individual health status and workplace-related health risks, aligned with national healthcare and safety regulations.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
