{"id":346793,"date":"2024-10-20T00:22:53","date_gmt":"2024-10-20T00:22:53","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-181282014\/"},"modified":"2024-10-25T23:50:42","modified_gmt":"2024-10-25T23:50:42","slug":"bsi-pd-iso-tr-181282014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-181282014\/","title":{"rendered":"BSI PD ISO\/TR 18128:2014"},"content":{"rendered":"
This Technical Report intends to assist organizations in assessing risks to records processes and systems so they can ensure records continue to meet identified business needs as long as required.<\/p>\n
The report<\/p>\n
establishes a method of analysis for identifying risks related to records processes and systems,<\/p>\n<\/li>\n
provides a method of analysing the potential effects of adverse events on records processes and systems,<\/p>\n<\/li>\n
provides guidelines for conducting an assessment of risks related to records processes and systems, and<\/p>\n<\/li>\n
provides guidelines for documenting identified and assessed risks in preparation for mitigation.<\/p>\n<\/li>\n<\/ol>\n
This Technical Report does not address the general risks to an organization\u2019s operations which can be mitigated by creating records.<\/p>\n
This Technical Report can be used by all organizations regardless of size, nature of their activities, or complexity of their functions and structure. These factors, and the regulatory regime in which the organization operates which prescribes the creation and control of its records, are taken into account when identifying and assessing risk related to records and records systems.<\/p>\n
Defining an organization or identifying its boundaries should take into account the complex structures and partnerships and contractual arrangements for outsourcing services and supply chains which are a common feature of contemporary government and corporate entities. Identifying the boundaries of the organization is the initial step in defining the scope of the project of risk assessment related to records.<\/p>\n
This Technical Report does not address directly the mitigation of risks as methods for these will vary from organization to organization.<\/p>\n
The Technical Report can be used by records professionals or people who have responsibility for records in their organizations and by auditors or managers who have responsibility for risk management programs in their organizations.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Figure fig_1 <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Section sec_1 Section sec_2 1\tScope 2\tNormative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Section sec_3 Section sec_3.1 Section sec_3.1.1 Section sec_3.2 Section sec_3.2.1 Section sec_3.2.2 Section sec_4 Section sec_4.1 3\tTerms and definitions 3.1\tTerms specific to risk 3.2\tTerms specific to records 4\tRisk assessment criteria for the organization 4.1\tAssessment of risk <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Section sec_4.2 Section sec_4.3 Section sec_5 Section sec_5.1 4.2\tRisk criteria 4.3\tAssignment of priority 5\tRisk identification 5.1\tGeneral <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Figure fig_2 <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Section sec_5.2 Section sec_5.2.1 Section sec_5.2.2 Section sec_5.2.3 5.2\tContext: External factors <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Section sec_5.2.4 Section sec_5.3 Section sec_5.3.1 5.3\tContext: Internal factors <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Section sec_5.3.2 Section sec_5.3.3 <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Section sec_5.3.4 Section sec_5.4 Section sec_5.4.1 5.4\tRecords systems <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Section sec_5.4.2 Section sec_5.4.3 <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Section sec_5.4.4 Section sec_5.4.5 <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Section sec_5.5 Section sec_5.5.1 Section sec_5.5.2 Section sec_5.5.3 Section sec_5.5.4 5.5\tRecords processes <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Section sec_5.5.4.1 Section sec_5.5.5 Section sec_6 Section sec_6.1 6\tAnalysing identified risks 6.1\tGeneral <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Section sec_6.2 Table tab_1 Section sec_6.2.1 6.2\tLikelihood analysis and probability estimation <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Section sec_6.2.2 Section sec_6.2.3 Section sec_6.2.4 <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Section sec_7 Section sec_7.1 7\tEvaluating risks 7.1\tGeneral <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Section sec_7.2 Table tab_2 Section sec_7.3 7.2\tEvaluating impact of adverse events 7.3\tEvaluating the risk <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Table tab_3 Section sec_8 8\tCommunicating the identified risks <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex sec_A Annex\u00a0A \n(informative)<\/p>\n Example of a documented risk entry in a risk register <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex sec_B Annex sec_B.1 Annex sec_B.1.1 Annex sec_B.1.2 Annex sec_B.1.3 Annex sec_B.1.4 Annex\u00a0B \n(informative)<\/p>\n Example: checklists for identifying areas of uncertainty <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex sec_B.2 Annex sec_B.2.1 Annex sec_B.2.2 <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex sec_B.2.3 Annex sec_B.2.4 Annex sec_B.3 Annex sec_B.3.1 <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex sec_B.3.2 Annex sec_B.3.3 <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex sec_B.3.4 Annex sec_B.3.5 Annex sec_B.4 Annex sec_B.4.1 <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex sec_B.4.2 Annex sec_B.4.3 Annex sec_B.4.4 Annex sec_B.4.5 <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex sec_B.4.6 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex sec_C Annex\u00a0C \n(informative)<\/p>\n Guide to using controls from ISO\/IEC\u00a027001, Annex A <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information and documentation. Risk assessment for records processes and systems<\/b><\/p>\n |