Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. 1. Vendor Information: Basic information about the vendor including legal name, registration details, contact information, and business structure
2. 2. Services Overview: Description of products/services provided, scope of engagement, and criticality to operations
3. 3. Financial Assessment: Evaluation of vendor's financial stability, including financial statements, credit ratings, and insurance coverage
4. 4. Data Protection and Privacy: Assessment of GDPR and BDSG compliance, data handling practices, and privacy controls
5. 5. Information Security: Evaluation of IT security measures, cybersecurity controls, and compliance with IT-Sicherheitsgesetz
6. 6. Business Continuity: Assessment of disaster recovery plans, business continuity procedures, and incident response capabilities
7. 7. Operational Controls: Review of operational processes, quality management systems, and performance metrics
8. 8. Compliance and Regulatory: Assessment of regulatory compliance, licenses, certifications, and audit history
9. 9. Supply Chain Management: Evaluation of supply chain risks, subcontractor management, and LkSG compliance
10. 10. Risk Rating and Decision: Overall risk assessment scoring and recommendation for vendor engagement
1. Industry-Specific Requirements: Additional requirements for specific industries (e.g., financial services, healthcare, critical infrastructure)
2. Environmental and Social Responsibility: Assessment of environmental practices and social responsibility standards
3. Physical Security: Evaluation of physical security measures for vendors with access to facilities or handling physical assets
4. Cloud Services Assessment: Specific evaluation criteria for cloud service providers
5. Research and Development: Assessment of R&D capabilities and intellectual property protection for technology vendors
1. Schedule A - Scoring Matrix: Detailed scoring criteria and risk rating methodology
2. Schedule B - Required Documents: List of mandatory documents and certifications to be provided by vendor
3. Schedule C - Security Controls Checklist: Detailed checklist of required security controls and measures
4. Schedule D - GDPR Compliance Checklist: Specific requirements for GDPR compliance assessment
5. Schedule E - Incident Response Template: Template for reporting and handling security incidents
6. Appendix 1 - Vendor Questionnaire: Detailed questionnaire for vendor self-assessment
7. Appendix 2 - Certification Requirements: List of required certifications and standards compliance
8. Appendix 3 - SLA Requirements: Standard service level agreement requirements and metrics
Find the document you need
Standard Risk Assessment Form
A legally required workplace safety assessment document under German law that identifies and evaluates occupational hazards and their control measures.
Chemical Hazard Assessment Form
A mandatory German regulatory document for assessing and documenting workplace chemical hazards, aligned with GefStoffV and EU requirements.
Vendor Risk Assessment Form
A German law-compliant vendor risk assessment document for evaluating supplier risk profiles across financial, operational, and security dimensions.
Deliberate Risk Assessment Worksheet
A German law-compliant workplace risk assessment document for systematic identification and control of occupational hazards.
Ppe Hazard Assessment Form
A German law-compliant workplace safety document for assessing hazards and specifying required personal protective equipment, aligned with ArbSchG and EU regulations.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
