Risk Management Report: BSBOPS504 - Manage Business Risk
Risk Management Report: BSBOPS504 - Manage Business Risk
Workplace/Organisation
State/Territory
Privacy
Security
Requirements 1. Implement a Risk Management Framework based on the Risk Policy. ...
Identify at least two requirements.
2.
These details must relate to the identified Establish the Context
business risk area.
Processes 1. Identify existing and potential risks as well as existing controls. The potential risks can be categorized as services
performed, contract risk, acceptance or continuance risk and performance risk.
Explain how each process relates to the business
2. Analyze and evaluate the risks on a continuing basis. This involves a comparison of exposure levels against a
risk area. This will be used to define the scope of predetermined tolerance level, the degree of control, potential or actual losses and benefits and opportunities
risk management activities while establishing presented
Update after by the risk. consultation and negotiation
stakeholder
the context.
Procedures 1. Each procedure relates to the business risk areas because the risk identified in this situation is information
technology security. The procedure is to start a risk assessment. Every workplace environment has computers and.
Explain how each procedure relates to the
2. information technology hazards that could cause irreversible damage. But risk assessments can drastically
business risk area. This will be used to define the reduce the likelihood of work-related events. They raise awareness about hazards and the risks they pose and help
scope of risk management activities while employers identify ways to minimise risks.
establishing the context. 2. Accurate determination of scope is essential to ensure organisational outcomes are achieved. Knowing the
reasons you are conducting risk management helps you understand what you need to achieve in your process,
Requirements 1. and hence what your scope must encompass.
Explain how each requirement relates to the
2. 1..Implement a Risk Management Framework based on the Risk Policy- It is important to implement a risk
business risk area. This will be used to define the management framework based on the risk policy because the risk policy of the organization mentions how to
scope of risk management activities while implement risk management no matter what kind of risk it is.
establishing the context. 2. Establish the Context - It will establish the current conditions in which the organisation operates in an internal,
external and risk management context. Define criteria used to evaluate risk and establish a risk analysis
framework.
For each of the following contexts, identify at least one factor that influences workplace business activity and explain how the context is derived from your evaluation of
the organisational processes, procedures, and requirements.
Explanation When there is IT security risk, there is a major chance of data being stolen. When these private
information are made public that goes against the privacy act principle.
Explanation Interest rate risk is relevant for any organisation that has any interest-bearing asset, such as a loan or a
bond. Our company also has international loans but now due to the IT risk in the company, we are not
able to do day to day work which is causing great loss to the company.
Social Context Factor
Reputation
Explanation Because when there is a threat to information technology there is always a chance of customer personal
data theft. Because of private data breach the reputation of the company can be bad.
Explanation
Due to data loss in data from IT risk, many customers intellectual property can also be lost
Explanation When there is IT risk in the company there is a high chance of servers being crashed which can disrupt the
whole workflow of the company.
Explanation
Any breach of organizational policy can be a big risk to the company
1. Competitor Employees can reduce the likelihood and severity of potential project
Customer risks by identifying them early. If something does go wrong, there will
already be an action plan in place to handle it. This helps employees
Employee Employee prepare for the unexpected and maximize project outcomes.
Industry group
Supplier
2. Competitor They can give an outsider’s perspective on business and the risk being
Customer assessed.
Customer Employee
Industry group
Supplier
Evaluation
The clarity and simplicity of the arrangement makes it very clear for all
Explain how strengths outweigh the weaknesses employees and other stakeholders to understand.
or vice versa
Explanation
It is easy for all employees to under the risk that the company is facing
Explain how strengths outweigh the weaknesses
and the current approach to mitigate risks are good
or vice versa
Business Risk 1
Loss of customer due to cyber security breach
Business Risk 2
Increased competition
Business Risk 3
Change in government policy
Record all the sources of information used in preparing this report and the type of information sourced.
Annexure Documents
Annexure 1 Extracts of organisational processes, procedures, and requirements related to risk management.