Risk Assessment Checklist Page 4

Download a blank fillable Risk Assessment Checklist in PDF format just by clicking the "DOWNLOAD PDF" button.

Open the file in any PDF-viewing software. Adobe Reader or any alternative for Windows or MacOS are required to access and complete fillable content.

Complete Risk Assessment Checklist with your personal data - all interactive fields are highlighted in places where you should type, access drop-down lists or select multiple-choice options.

Some fillable PDF-files have the option of saving the completed form that contains your own data for later use or sending it out straight away.

ADVERTISEMENT

Yes
No
In Progress
information security? Where appropriate, these responsibilities might continue for a defined
period after the end of the employment.
User training
1. Information security education and training
Do all employees of the organization and third party users (where relevant) receive
a.
appropriate Information Security training and regular updates in organizational policies and
procedures?
Responding to security/threat incidents
1. Reporting security/threat incidents
Does a formal reporting procedure exist, to report security/threat incidents through
a.
appropriate management channels as quickly as possible?
2. Reporting security weaknesses
Does a formal reporting procedure or guideline exist for users, to report security weakness
a.
in, or threats to, systems or services?
Physical and Environmental Security
Equipment Security
1. Equipment location protection
Are items requiring special protection isolated to reduce the general level of protection
a.
required?
Are controls adopted to minimize risk from potential threats such as theft, fire, explosives,
b.
smoke, water, dist, vibration, chemical effects, electrical supply interfaces, electromagnetic
radiation and flood?
2. Power Supplies

ADVERTISEMENT

00 votes

Related Articles

Related forms

Related Categories

Parent category: Business
Go
Page of 9