{"id":346793,"date":"2024-10-20T00:22:53","date_gmt":"2024-10-20T00:22:53","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-181282014\/"},"modified":"2024-10-25T23:50:42","modified_gmt":"2024-10-25T23:50:42","slug":"bsi-pd-iso-tr-181282014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-181282014\/","title":{"rendered":"BSI PD ISO\/TR 18128:2014"},"content":{"rendered":"

This Technical Report intends to assist organizations in assessing risks to records processes and systems so they can ensure records continue to meet identified business needs as long as required.<\/p>\n

The report<\/p>\n

    \n
  1. \n

    establishes a method of analysis for identifying risks related to records processes and systems,<\/p>\n<\/li>\n

  2. \n

    provides a method of analysing the potential effects of adverse events on records processes and systems,<\/p>\n<\/li>\n

  3. \n

    provides guidelines for conducting an assessment of risks related to records processes and systems, and<\/p>\n<\/li>\n

  4. \n

    provides guidelines for documenting identified and assessed risks in preparation for mitigation.<\/p>\n<\/li>\n<\/ol>\n

    This Technical Report does not address the general risks to an organization\u2019s operations which can be mitigated by creating records.<\/p>\n

    This Technical Report can be used by all organizations regardless of size, nature of their activities, or complexity of their functions and structure. These factors, and the regulatory regime in which the organization operates which prescribes the creation and control of its records, are taken into account when identifying and assessing risk related to records and records systems.<\/p>\n

    Defining an organization or identifying its boundaries should take into account the complex structures and partnerships and contractual arrangements for outsourcing services and supply chains which are a common feature of contemporary government and corporate entities. Identifying the boundaries of the organization is the initial step in defining the scope of the project of risk assessment related to records.<\/p>\n

    This Technical Report does not address directly the mitigation of risks as methods for these will vary from organization to organization.<\/p>\n

    The Technical Report can be used by records professionals or people who have responsibility for records in their organizations and by auditors or managers who have responsibility for risk management programs in their organizations.<\/p>\n

    PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
    PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
    6<\/td>\nForeword <\/td>\n<\/tr>\n
    7<\/td>\nIntroduction <\/td>\n<\/tr>\n
    8<\/td>\nFigure fig_1 <\/td>\n<\/tr>\n
    9<\/td>\nSection sec_1
    Section sec_2
    1\tScope
    2\tNormative references <\/td>\n<\/tr>\n
    10<\/td>\nSection sec_3
    Section sec_3.1
    Section sec_3.1.1
    Section sec_3.2
    Section sec_3.2.1
    Section sec_3.2.2
    Section sec_4
    Section sec_4.1
    3\tTerms and definitions
    3.1\tTerms specific to risk
    3.2\tTerms specific to records
    4\tRisk assessment criteria for the organization
    4.1\tAssessment of risk <\/td>\n<\/tr>\n
    11<\/td>\nSection sec_4.2
    Section sec_4.3
    Section sec_5
    Section sec_5.1
    4.2\tRisk criteria
    4.3\tAssignment of priority
    5\tRisk identification
    5.1\tGeneral <\/td>\n<\/tr>\n
    12<\/td>\nFigure fig_2 <\/td>\n<\/tr>\n
    13<\/td>\nSection sec_5.2
    Section sec_5.2.1
    Section sec_5.2.2
    Section sec_5.2.3
    5.2\tContext: External factors <\/td>\n<\/tr>\n
    14<\/td>\nSection sec_5.2.4
    Section sec_5.3
    Section sec_5.3.1
    5.3\tContext: Internal factors <\/td>\n<\/tr>\n
    15<\/td>\nSection sec_5.3.2
    Section sec_5.3.3 <\/td>\n<\/tr>\n
    16<\/td>\nSection sec_5.3.4
    Section sec_5.4
    Section sec_5.4.1
    5.4\tRecords systems <\/td>\n<\/tr>\n
    17<\/td>\nSection sec_5.4.2
    Section sec_5.4.3 <\/td>\n<\/tr>\n
    18<\/td>\nSection sec_5.4.4
    Section sec_5.4.5 <\/td>\n<\/tr>\n
    19<\/td>\nSection sec_5.5
    Section sec_5.5.1
    Section sec_5.5.2
    Section sec_5.5.3
    Section sec_5.5.4
    5.5\tRecords processes <\/td>\n<\/tr>\n
    20<\/td>\nSection sec_5.5.4.1
    Section sec_5.5.5
    Section sec_6
    Section sec_6.1
    6\tAnalysing identified risks
    6.1\tGeneral <\/td>\n<\/tr>\n
    21<\/td>\nSection sec_6.2
    Table tab_1
    Section sec_6.2.1
    6.2\tLikelihood analysis and probability estimation <\/td>\n<\/tr>\n
    22<\/td>\nSection sec_6.2.2
    Section sec_6.2.3
    Section sec_6.2.4 <\/td>\n<\/tr>\n
    23<\/td>\nSection sec_7
    Section sec_7.1
    7\tEvaluating risks
    7.1\tGeneral <\/td>\n<\/tr>\n
    24<\/td>\nSection sec_7.2
    Table tab_2
    Section sec_7.3
    7.2\tEvaluating impact of adverse events
    7.3\tEvaluating the risk <\/td>\n<\/tr>\n
    25<\/td>\nTable tab_3
    Section sec_8
    8\tCommunicating the identified risks <\/td>\n<\/tr>\n
    27<\/td>\nAnnex sec_A
    Annex\u00a0A
    \n(informative)<\/p>\n

    Example of a documented risk entry in a risk register <\/td>\n<\/tr>\n

    28<\/td>\nAnnex sec_B
    Annex sec_B.1
    Annex sec_B.1.1
    Annex sec_B.1.2
    Annex sec_B.1.3
    Annex sec_B.1.4
    Annex\u00a0B
    \n(informative)<\/p>\n

    Example: checklists for identifying areas of uncertainty <\/td>\n<\/tr>\n

    29<\/td>\nAnnex sec_B.2
    Annex sec_B.2.1
    Annex sec_B.2.2 <\/td>\n<\/tr>\n
    30<\/td>\nAnnex sec_B.2.3
    Annex sec_B.2.4
    Annex sec_B.3
    Annex sec_B.3.1 <\/td>\n<\/tr>\n
    31<\/td>\nAnnex sec_B.3.2
    Annex sec_B.3.3 <\/td>\n<\/tr>\n
    32<\/td>\nAnnex sec_B.3.4
    Annex sec_B.3.5
    Annex sec_B.4
    Annex sec_B.4.1 <\/td>\n<\/tr>\n
    33<\/td>\nAnnex sec_B.4.2
    Annex sec_B.4.3
    Annex sec_B.4.4
    Annex sec_B.4.5 <\/td>\n<\/tr>\n
    34<\/td>\nAnnex sec_B.4.6 <\/td>\n<\/tr>\n
    35<\/td>\nAnnex sec_C
    Annex\u00a0C
    \n(informative)<\/p>\n

    Guide to using controls from ISO\/IEC\u00a027001, Annex A <\/td>\n<\/tr>\n

    45<\/td>\nReference ref_1
    Reference ref_2
    Reference ref_3
    Reference ref_4
    Reference ref_5
    Reference ref_6
    Reference ref_7
    Reference ref_8
    Reference ref_9
    Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

    Information and documentation. Risk assessment for records processes and systems<\/b><\/p>\n\n\n\n\n
    Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
    BSI<\/b><\/a><\/td>\n2014<\/td>\n48<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":346801,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-346793","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/346793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/346801"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=346793"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=346793"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=346793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}