Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Assessment Information: Basic details including date, assessor name, department, and scope of assessment
2. System Information: Details of the IT system being assessed, including system name, purpose, owner, and technical specifications
3. Data Classification: Classification of data types processed by the system, especially concerning personal data under PDP Law
4. Threat Identification: Identification and listing of potential threats to the system
5. Vulnerability Assessment: Analysis of system vulnerabilities and weaknesses
6. Risk Analysis: Detailed analysis of identified risks including likelihood and impact ratings
7. Current Controls: Documentation of existing security controls and measures
8. Risk Rating: Overall risk ratings based on impact and likelihood assessments
9. Recommendations: Proposed risk mitigation measures and security improvements
10. Compliance Status: Assessment of compliance with relevant Indonesian regulations
1. Cloud Services Assessment: Additional assessment criteria for cloud-based services, used when the system involves cloud computing
2. Third-Party Integration Risk: Assessment of risks related to third-party system integrations, used when external systems are connected
3. Business Continuity Impact: Analysis of system impact on business continuity, used for critical systems
4. Privacy Impact Assessment: Detailed privacy risk assessment, used when processing sensitive personal data
5. Mobile Application Security: Specific security assessment for mobile applications, used when mobile apps are part of the system
6. IoT Device Security: Security assessment for IoT devices, used when IoT devices are part of the infrastructure
1. Risk Assessment Matrix: Detailed matrix showing risk levels based on impact and likelihood combinations
2. Technical Infrastructure Diagram: Network and system architecture diagrams showing system components
3. Control Checklist: Detailed checklist of security controls and their implementation status
4. Incident Response Procedures: Procedures for responding to identified security incidents
5. Regulatory Compliance Checklist: Checklist of compliance requirements under Indonesian regulations
6. Risk Treatment Plan: Detailed plan for addressing identified risks including timeline and responsibilities
Find the document you need
Health And Safety Assessment
A comprehensive workplace safety evaluation document that assesses compliance with Indonesian health and safety regulations while providing practical recommendations for improvement.
Fire Safety Risk Assessment
A legally-required assessment document evaluating fire safety risks and compliance measures within properties in Indonesia, aligned with national building and safety regulations.
Pre Job Hazard Assessment
An Indonesian regulatory-compliant document for systematic hazard identification and risk control before commencing work activities.
Risk Assessment And Management Plan
A comprehensive risk management framework document compliant with Indonesian regulations, providing structured approaches for risk identification, assessment, and mitigation strategies.
Legionella Risk Assessment For Landlords
A legally-compliant assessment document for managing Legionella risks in property water systems under Indonesian regulations.
Food Risk Assessment
A regulatory-compliant food safety risk assessment document under Indonesian law that identifies, analyzes, and provides control measures for food safety hazards in food business operations.
Food Fraud Vulnerability Assessment
A systematic assessment document for identifying and managing food fraud risks in compliance with Indonesian food safety regulations and standards.
Warehouse Risk Assessment
A comprehensive warehouse risk assessment document compliant with Indonesian safety and operational regulations, evaluating facility hazards and providing risk mitigation recommendations.
Travel Risk Assessment
An Indonesian law-compliant document assessing travel-related risks, mitigation strategies, and emergency procedures for specific locations or activities.
IT Risk Assessment Form
An Indonesian-compliant IT Risk Assessment Form for evaluating and documenting technology-related risks and compliance requirements under local data protection and electronic transaction laws.
Security Risk Assessment Form
An Indonesian-compliant security risk assessment document for evaluating and documenting organizational security risks, threats, and mitigation measures.
Information Security Risk Assessment Form
An Indonesian-compliant form for systematic assessment of information security risks, aligned with local data protection and cybersecurity regulations.
Vendor Risk Assessment Form
An Indonesian-compliant vendor risk assessment tool for evaluating supplier risks across multiple dimensions, aligned with local regulations including UU PDP 2022.
Risk Management Form
An Indonesian-compliant Risk Management Form for systematic risk identification, assessment, and control, aligned with OJK regulations.
Plant Risk Assessment Form
An Indonesian regulatory-compliant form for assessing and managing risks associated with industrial plant and equipment operations.
Job Safety Assessment Form
An Indonesian-compliant workplace safety assessment document for identifying hazards, evaluating risks, and implementing control measures in accordance with local safety regulations.
Health Risk Assessment Form
An Indonesian-compliant health risk assessment form for evaluating individual health status and workplace-related health risks, aligned with national healthcare and safety regulations.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
