Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Document Control: Version history, approval status, and document management information
2. Executive Summary: Overview of key findings and critical risks identified
3. Introduction: Purpose, scope, and objectives of the risk assessment
4. Assessment Methodology: Description of the risk assessment approach, scoring criteria, and evaluation methods used
5. System/Process Description: Detailed description of the system, process, or activity being assessed
6. Risk Identification: Comprehensive list of identified risks and their sources
7. Risk Analysis: Detailed analysis of each identified risk, including likelihood and impact assessment
8. Risk Evaluation: Evaluation of risk levels against acceptance criteria
9. Current Control Measures: Description of existing control measures and their effectiveness
10. Risk Treatment Plan: Proposed measures for risk mitigation and implementation timeline
11. Monitoring and Review: Process for ongoing monitoring and periodic review of risks
12. Roles and Responsibilities: Definition of key stakeholders and their responsibilities in risk management
1. Cost-Benefit Analysis: Financial assessment of proposed risk mitigation measures, used when significant investments are required
2. Environmental Impact Assessment: Analysis of environmental risks and impacts, required when environmental factors are significant
3. Emergency Response Procedures: Detailed emergency protocols, included when dealing with high-risk operations
4. Training Requirements: Specific training needs identified during risk assessment, included when new procedures or equipment are introduced
5. Compliance Matrix: Mapping of assessment against specific regulatory requirements, used for highly regulated industries
6. Stakeholder Consultation: Documentation of consultation process with affected parties, included when multiple parties are impacted
1. Risk Assessment Matrix: Detailed risk scoring matrix and evaluation criteria
2. Risk Register: Complete listing of all identified risks and their characteristics
3. Control Measure Checklist: Detailed checklist of all control measures and their implementation status
4. Action Plan Timeline: Detailed timeline for implementing risk treatment measures
5. Technical Data Sheets: Technical specifications and safety data relevant to the assessment
6. Assessment Tools and Templates: Copies of tools and templates used in the risk assessment process
7. Relevant Certificates and Permits: Copies of relevant safety certificates and operational permits
8. Incident History Log: Historical record of relevant incidents and their outcomes
Find the document you need
Fire Safety Risk Assessment
A comprehensive fire safety evaluation document that assesses risks and compliance requirements under Swiss federal and cantonal regulations.
Legionella Risk Assessment For Landlords
A Swiss-compliant technical assessment document for evaluating and managing Legionella risks in building water systems, required for landlords and property owners.
Hazard Identification Form
A Swiss-compliant workplace hazard identification and assessment document that aligns with UVG and VUV requirements for systematic safety management.
Risk Management Assessment
A Swiss law-compliant Risk Management Assessment document analyzing organizational risks, controls, and mitigation strategies.
Workplace Risk Assessment
A Swiss-compliant workplace risk assessment document detailing hazard identification, risk evaluation, and control measures as required by federal safety regulations.
Third Party Risk Assessment
A Swiss law-compliant assessment document analyzing and documenting potential risks associated with third party business relationships, including regulatory, operational, and compliance considerations.
Travel Risk Assessment
A Swiss law-compliant document assessing and addressing business travel risks, including security, health, and safety considerations.
Pregnancy Risk Assessment
Swiss-compliant workplace risk assessment document for protecting pregnant employees, identifying hazards and establishing necessary protective measures in accordance with federal labor laws.
Legal Risk Assessment
A Swiss law-compliant legal risk assessment document that identifies and analyzes potential legal risks while providing mitigation strategies.
Functional Risk Assessment
A Swiss-compliant systematic assessment document that identifies, analyzes, and evaluates functional risks within organizational operations, providing mitigation strategies in accordance with Swiss federal regulations.
Standard Risk Assessment Form
A Swiss-compliant risk assessment form for identifying and evaluating workplace hazards under Swiss federal safety regulations.
Chemical Hazard Assessment Form
A Swiss-compliant assessment form for evaluating and documenting chemical hazards, control measures, and safety procedures under Swiss chemical safety regulations.
Biological Risk Assessment Form
Swiss-compliant biological risk assessment document for evaluating and managing biological hazards in laboratory settings under federal biosafety regulations.
Health Hazard Evaluation Form
A Swiss-compliant workplace health hazard assessment form for identifying, evaluating, and documenting occupational health risks and control measures.
Cyber Security Assessment Form
A Swiss law-compliant form for evaluating and documenting an organization's cybersecurity controls and data protection measures.
Activity Based Risk Assessment Form
A Swiss-compliant workplace safety assessment form for identifying and controlling activity-specific risks under FAIA/UVG regulations.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
