SlideShare a Scribd company logo
1 of 22
Significant risksHEADLINE RISKDESCRIPTION OF
RISKINHERENT RISK FACTORIDENTIFY EXISTING
CONTROLS
&
EFFECTIVENESS OF MITIGATIONIS RISK DECREASING,
INCREASING OR STATIC?RESIDUAL RISK FACTORRISK
OWNER1aSecurity software is not properly installed or
updatedSecurity team fails to ensure that the most up-to-date
security software is installed with the new hardware10
Likelihood (2)
Impact (5)Existing Controls - Training of regulations for
compliance with security protocols. Effectiveness of Mitigation
- Monthly security reviews suggesting improved security
amongst the whole network. Decreasing4
L (2)
I (2)Organization2aSoftware support was not initially setupWith
the installation of new hardware, software support was not setup
and fully registered12
Likelihood 3
Impact 4Existing Controls - Notifications are sent out before
hardware upgrades. Effectiveness of mitigation - Overall
reduction of hardware not registered.Decreasing6
L (6)
I (2)End users 3aFunds drained before all hardware has been
upgradedCost report was below target point resulting in delays
of upgrade to some of the older computers resulting in more
increased time reports for project12
L(2)
I(6)Existing Controls - Cost calculations are projected well
before any upgrades. Effectiveness of Mitigation - Decrease in
the risk on going over project spending on future
upgrades.Decreasing6
L (3)
I (2)End users
&"Arial,Bold"&14CHRE Risk Register 2011-12
&12Last updated 28/04/11
&9NOTE: each risk is scored according to the risk matrix. &10
&"Arial,Bold"&9KEY: LA Linda Allan, CB Christine
Braithwaite, HC Harry Cayton, RS Ros Hayles, SMT Senior
Management Team Page &P of &N
Page &P of &N
Essay2/Example/Example writing.docx
The attached file shows an excerpt from a Risk Analysis Plan
for a team project. The project was to offer Pinellas County an
online support system for home-schooled families. This program
is different from the traditional K-12 online programs because it
doesn’t follow the conventional grading methods—it would be
only for home schooled children so that the parents could access
materials, videos and teaching information that would
supplement their individualized home schooling curriculum.
We started with a risk breakdown structure to identify the risks
by categorizing them into different activities that were relevant
to the project. We then performed a qualitative risk analysis and
assigned a numeric value to the probability of the risk on a
scale of 1-5. We charted these risks and color coded them in a
Risk Severity Matrix. This analysis allowed us to rank the risks
and identify the top ten risks that scored in the Medium and
High probability categories (yellow and red sections) as the
focus for the Risk Response Plan.
We then created a Risk Response Plan for each of the top ten
risks and categorized the responses by “avoid, mitigate, accept,
contingency or transfer” as well as included a specific response
plan for each risk. The Response Plan also included a trigger to
know when the risk was coming, and an owner to execute the
response.
Essay2/Example/Excel example.pdf
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 11 of 15
Appendix A: RBS Risk Breakdown Structure
Source: (Larson & Gray, 2014, p. 208)
Created by Team1
Classroom at
Home Project
Planning
Website
location
Subjects
offered
Availability of
teachers
Production
Technical
difficulties for
users
Users’ under-
standing of
program
Computer
and browser
compatibility
Teacher
technical
difficulties
Student
questions
Login and
password
retrieval
Design
User interface
for youth
User interface
for non-native
speakers
Development
Programming
delays
Security risks
on servers
Testing
Ability to
reveal all
problems
Marketing
Program not
known by
parents
Program
under-utilized
Students not
disciplined to
use
Parents not
being
responsible to
guide
Parents not
realizing
program is
free
Confusion
with enrolled
vs home
schooled
Non-
Floridians
interest
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 12 of 15
APPENDIX B: Risk Severity Matrix
Low
Probability
Medium
Probability
High
Probability
5
Computer and
browser
compatibility
4
Ability to reveal all problems
Security risks on
servers
Technical
difficulties for
users
Teacher technical
difficulties
Users’ under-
standing of
program
3
Parents not
realizing program
is free
Student questions Availability of teachers
Login and
password
retrieval
Program under-
utilized
2
Subjects offered Website location Program not known by
parents
Programming
delays
Non-Floridians
interest
1
User interface for
youth
User interface for
non-native
speakers
Confusion with
enrolled vs home
schooled
1 2 3 4 5
Low Impact Medium
Impact
High Impact
Source: (Larson & Gray, 2014, p. 212), Created by Team1
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 13 of 15
APPENDIX C: Risk Response Matrix
Source: (Project Management Docs, 2015), Created by Team1
Risk Risk Category
Prob-
ability Impact
Risk
Score
Risk
Ranking Risk Response Trigger Risk Owner
Users' understanding
of program Production 4 5 20 1
Conduct a student training
program that must be
completed prior to class
starting
>20% of students
complain about
program Herb Walker
Technical difficulties
for users Production 4 4 16 2
Recruit a smail group of
IT support staff, available
via phone
>15% students suffer
technical problems Jason Black
Teacher technical
difficulties Production 4 4 16 3
Recruit a smail group of
IT support staff, available
via phone
>10% teachers suffer
technical problems Jason Black
Computer and
Browswer
Compatability Production 5 3 15 4
Design different types of
virtual software that is
compatible with the same
accessebile browser
(Mozilla Firefox)
Increase in
technological
advances Herb Walker
Program under-
utilized Marketing 3 5 15 5
Conduct a student training
program that must be
completed prior to starting
class
A decrease of study
toold being
used/decrease in
passing grades Herb Walker
Login and passord
retrevial Production 3 4 12 6
Recruit a smail group of
IT support staff, available
via phone(troubleshoot)
Increase in students
being locked out of
school programs Jason Black
Security Risks on
Servers Development 4 3 12 7
Transfer security
surveillance to an outside
company to ensure safety
of students and teachers The start of the school Mary White
Non-Floridian's
interest Marketing 2 5 10 8
Explain to Non-Floridians
interested in the program
that you must live in
Florida for the 1 year prior
to starting
Non-Floridians
inquiring about the
virtual school program Tom Sunday
Availability of teachers Planning 3 3 9 9
Recruit more teachers
with a versatile
background of teaching
many subjects
Parents complaints of
school curricullum Mary White
Ability to Reveal All
Problems Testing 4 2 8 10
Conduct more practice
pilots during school off
seasons
The start of the school
year Ron Smith
Risk Identification Risk ResponseQualitative Rating
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 14 of 15
APPENDIX D: Risk Responsibility Matrix
Risk Responsibility Matrix
Risk Event Response Contingency Plan Trigger
Who is
Responsible
Users'
Understanding of
program
Mitigate
Conduct a student training program that
must be completed prior to class starting
>20% of students complain
about program
Herb Walker
Technical Difficulties
for users
Mitigate
Recruit a small group of IT support staff,
available via phone
>15% students suffer technical
problems
Jason Black
Teacher Technical
Difficulties
Mitigate
Recruit a small group of IT support staff,
available via phone
>10% teachers suffer technical
problems
Jason Black
Computer and
Browser
Compatibility
Mitigate
Design different types of the virtual
software that is compatible with the
same accessible browser (Mozilla Firefox)
Increase in technological
advances
Herb Walker
Program under-
utilized
Mitigate
Conduct a student training program that
must be completed prior to class starting
A decrease of study tools being
used/decrease in passing
grades
Herb Walker
Login and password
retrieval
Mitigate
Recruit a small group of IT support staff,
available via phone (troubleshoot
problems)
Increase in Students being
locked out of school programs
Jason Black
Security Risks on
Servers
Transfer
Transfer security surveillance to an
outside company to ensure safety of
students and teachers
The start of school year Mary White
Non-Floridian's
interest
Accept
Explain to Non-Floridian's interested in
program that you must live in Florida for
the 1 year prior to starting
Non-Floridians inquiring about
Virtual School Program
Tom Sunday
Availability of
teachers
Mitigate
Recruit more teachers with a versatile
background of teaching many subjects
Parent complaints of school
curriculum
Mary White
Ability to reveal all
problems
Mitigate
Conduct more practice pilots during
school off seasons
The start of school year Ron Smith
Source: (Project Management Docs, 2015), Created by Team1
Team1 - Classroom at Home Risk Analysis
TEAM1-Risk Analysis-FINAL.docx Page 15 of 15
REFERENCES
HHS. (2015, April 1). Health and Human Services. Retrieved
from HHS:
http://www.hhs.gov/ocio/eplc/EPLC%20Archive%20Documents/
05%20-
%20Risk%20Management%20Plan/eplc_risk_management_temp
late.doc
Larson, E. W., & Gray, C. F. (2014). Project Management: the
managerial process, Sixth edition.
New York: McGraw-Hill Education.
Project Management Docs. (2015, April 3). Project Planning
Templates. Retrieved from Project
Management Docs:
http://www.projectmanagementdocs.com/project-planning-
templates/risk-register.html
5432154321High ImpactMedium ImpactLow ImpactReferences
Essay2/Instructions.docx
Essay 2:
Instructions:
Review the following download: Detailed Risk Matrix sample in
Excel
format. (http://www.professionalstandards.org.uk/docs/voluntar
y-registers/risk-matrix-template.xlsx?sfvrsn=4 ). This type of
Risk matrix is fast becoming a standard tool in projects, plus
general activities for federal and local government. Our
textbook had some content on this, however, this was too
limited, see the suggested link for more detail.
Share your version of a risk matrix and provide a specific
example of a significant process or project. Enter a file and a
quality explanation using no less than 180 words. [Your
example should involve a large amount of money or an event
that will have an influence over a long period for a number of
people.]
I will provide an example by someone else in this folder. Please
use template to complete.
Essay2/risk-matrix-template (1).xlsx
Significant risksHEADLINE RISKDESCRIPTION OF
RISKINHERENT RISK FACTORIDENTIFY EXISTING
CONTROLS
&
EFFECTIVENESS OF MITIGATIONIS RISK DECREASING,
INCREASING OR STATIC?RESIDUAL RISK FACTORRISK
OWNER1aExample: Personal Behaviour - Registrants violate
boundariesRegistrants fail to establish appropriate boundaries
with services users, i.e. do not explain professional relationship
to service users and violate boundaries, i.e. emotional, sexual,
etc. Registrants abuse their position of power.
Disclaimer: The purpose of this generic example is to give
applicants an idea of how to complete this matrix. It would not
necessarily be described as it is done here. The existing controls
and mitigation actions are some of the possible controls and
actions we would expect to see in place but not all of them are
listed here. For example, for this specific risk safeguarding
issues would have to be considered and actions put in place.
The inherent and residual risk factor are not a real assessment -
they were included here to demonstrate how to calculate the
factor. 12
Likelihood 4
Impact 3Existing Controls: Adherence to Ethical Framework
and Code of Practice. Mandatory CPD and supervision audited
by Professional Standards Authority at annual renewal of
registration. Training provided by organisation. Leaflets and
other information material available to registrants. Professional
Conduct Procedure in place. Case facts and sanctions published
on website to promote learning amongst registrants.
Effectiveness of Mitigation: annual review of conduct cases
suggests reduction of complaints against registrants in relation
to boundary violations. Decreasing6
L (2)
I (3)X (organisation holding register)1b1c1d1e2aExample:
Technical Competence - Lack of effectivenessRegistrants do not
have the skills to practice so service provided does not have
expected effect/outcome. Registrants cannot identify underlying
issues and do not refer service user to appropriate qualified
professional.
Disclaimer: The purpose of this generic example is to give
applicants an idea of how to complete this matrix. It would not
necessarily be described as it is done here. 20
L (4)
I (5)Existing control: Education and training equips registrant
with skills to practice. Mandatory CPD requirements assist
registrants to keep their skills up to date. Mandatory
supervision identifies potential skill gaps and recommends
appropriate training. Registrants sign up to Code of
Practice/Ethical Framework that require them to practise within
their competence and refer service users to other professionals
if required. Organisation provides guidance on underlying
health/social issues, for example, offers a protocol/checklist to
registrants with common issues and symptoms.
Effectiveness of mitigation: reduced number of complaints
alleging lack of therapeutical effectiveness; feedback from
supervisors; organisation monitors use of protocol/checklist by
registrants and ascertains that 90% of registrants use the
protocol; research demonstrates issue/risk is managed
appropriately; organisation offers CPD on effectiveness and
underlying issues undertaken by 70% of registrants.Decreasing4
L (2)
I (2)X (organisation holding register);
registrant;
supervisor2b2c2d3aExample: Business Practice - Misleading
advertising by registrantsA; B; C;16
L(4)
I(4)X; Y; Z Static8
L (4)
I (2)3b3c3d
&"Arial,Bold"&14CHRE Risk Register 2011-12
&12Last updated 28/04/11
&9NOTE: each risk is scored according to the risk matrix. &10
&"Arial,Bold"&9KEY: LA Linda Allan, CB Christine
Braithwaite, HC Harry Cayton, RS Ros Hayles, SMT Senior
Management Team Page &P of &N
Page &P of &N
Essay 1:
What is the preferred method of calculating a contingency
reserve?
250 words of detail of the above topic.
Contingency reserve is the amount of time/or cost added to the
project to deal with known unknowns like identified risk. This
is a project management class.
Example topic from another student (not related, just example
so please dont use any of this):
rom the risk management plan, a contingency plan is put into
place if the threat or opportunity occurs (Mulcahy, p. 205).
Although they may not be implemented, contingency plans are
plan actions created for an event that may occur but is not a fact
or inevitable. The purpose is to develop a response action to a
risk identified earlier in the risk management plan.
As a contingency plan is an “insurance policy should a major
risk occur” (De Sousa, 2009). It is considered “Plan A” in
response to the identified risk. For instance, your organization
has created a new healthcare drug and is awaiting FDA approval
but it is taking longer than anticipated. You know that holding
back beginning stages of production will increase costs so you
begin preparing the labels and shipment procedures to help
reduce the delay.
With risks there should always be a “Plan B” which is where the
fallback plan comes into play. These types of plans are
“implemented when the contingency plan fails or is not fully
effective” (Usmani, 2012). For instance, following the previous
example of the contingency plan, if preparing the labels and
shipment procedures does not truly reduce the delay, the
fallback plan would then be executed. In this situation the
fallback plan would be to use preordered and prepared supplies
from a pre-identified supplier to arrange the second shipment
for deployment earlier than originally scheduled to make up for
the delay from the first shipment.
“Contingency and fallback plans are the backbones of your risk
management plan which help you manage the identified risk”
(Usmani, 2012). By having both in place it creates a guideline
of what needs to happen if a threat or opportunity arises rather
than not being adequately prepared; which can lead to bigger
issues.
References:
De Sousa, S. (2009). What is Contingency Planning? My PM
Expert, the fast track to project success. Retrieved
from: http://www.my-
project-management-expert.com/what-is-contingency-
planning.html
Mulcahy, R. (2010). Risk Management: Tricks of the trade for
project managers (2nd ed.). United States of America: RMC
Publications,
Inc.
Essay 2:

More Related Content

Similar to Significant risksHEADLINE RISKDESCRIPTION OF RISKINHERENT RISK FAC.docx

For this lab assignment, you are identifying IT domains for identi.docx
For this lab assignment, you are identifying IT domains for identi.docxFor this lab assignment, you are identifying IT domains for identi.docx
For this lab assignment, you are identifying IT domains for identi.docx
hanneloremccaffery
 
Navigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsNavigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common Pitfalls
AnanthReddy38
 
Instructional plan – Phase II
Instructional plan – Phase IIInstructional plan – Phase II
Instructional plan – Phase II
dmj5707
 
Models of evaluation in educational technology
Models of evaluation in educational technologyModels of evaluation in educational technology
Models of evaluation in educational technology
السيف البتار
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
annettsparrow
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
toltonkendal
 
e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009
andyramsden
 
ITM310_001FiliasW16
ITM310_001FiliasW16ITM310_001FiliasW16
ITM310_001FiliasW16
Peter Filias
 

Similar to Significant risksHEADLINE RISKDESCRIPTION OF RISKINHERENT RISK FAC.docx (20)

Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
 
Lean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program EssentialsLean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program Essentials
 
For this lab assignment, you are identifying IT domains for identi.docx
For this lab assignment, you are identifying IT domains for identi.docxFor this lab assignment, you are identifying IT domains for identi.docx
For this lab assignment, you are identifying IT domains for identi.docx
 
Navigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common PitfallsNavigating the Software Testing Maze: Avoiding Common Pitfalls
Navigating the Software Testing Maze: Avoiding Common Pitfalls
 
A strategy to increase students’ motivation and decrease dropout rates
A strategy to increase students’ motivation and decrease dropout ratesA strategy to increase students’ motivation and decrease dropout rates
A strategy to increase students’ motivation and decrease dropout rates
 
Strategizing to build a perfect test environment
Strategizing to build a perfect test environmentStrategizing to build a perfect test environment
Strategizing to build a perfect test environment
 
Instructional plan – Phase II
Instructional plan – Phase IIInstructional plan – Phase II
Instructional plan – Phase II
 
Western's Text Messaging and Emergency Notification Overview
Western's Text Messaging and Emergency Notification OverviewWestern's Text Messaging and Emergency Notification Overview
Western's Text Messaging and Emergency Notification Overview
 
Models of evaluation in educational technology
Models of evaluation in educational technologyModels of evaluation in educational technology
Models of evaluation in educational technology
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 
IRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among Parents
 
Risk and Testing
Risk and TestingRisk and Testing
Risk and Testing
 
e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009
 
About the flashpoint college fire safety program (short demo)
About the flashpoint college fire safety program (short demo)About the flashpoint college fire safety program (short demo)
About the flashpoint college fire safety program (short demo)
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
Risk-based Testing: Not for the Fainthearted
Risk-based Testing: Not for the FaintheartedRisk-based Testing: Not for the Fainthearted
Risk-based Testing: Not for the Fainthearted
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Risk Management Presentation.pptx
Risk Management Presentation.pptxRisk Management Presentation.pptx
Risk Management Presentation.pptx
 
ITM310_001FiliasW16
ITM310_001FiliasW16ITM310_001FiliasW16
ITM310_001FiliasW16
 

More from budabrooks46239

English IV Research PaperMrs. MantineoObjective  To adher.docx
English IV Research PaperMrs. MantineoObjective  To adher.docxEnglish IV Research PaperMrs. MantineoObjective  To adher.docx
English IV Research PaperMrs. MantineoObjective  To adher.docx
budabrooks46239
 
English II – Touchstone 3.2 Draft an Argumentative Research Essay.docx
English II – Touchstone 3.2 Draft an Argumentative Research Essay.docxEnglish II – Touchstone 3.2 Draft an Argumentative Research Essay.docx
English II – Touchstone 3.2 Draft an Argumentative Research Essay.docx
budabrooks46239
 
English 3060Spring 2021Group Summary ofReinhardP.docx
English 3060Spring 2021Group Summary ofReinhardP.docxEnglish 3060Spring 2021Group Summary ofReinhardP.docx
English 3060Spring 2021Group Summary ofReinhardP.docx
budabrooks46239
 
English 102 Essay 2 First Draft Assignment Feminism and Hubris.docx
English 102 Essay 2 First Draft Assignment Feminism and Hubris.docxEnglish 102 Essay 2 First Draft Assignment Feminism and Hubris.docx
English 102 Essay 2 First Draft Assignment Feminism and Hubris.docx
budabrooks46239
 
English 102 Essay 2 Assignment Feminism and Hubris”Write a.docx
English 102 Essay 2 Assignment Feminism and Hubris”Write a.docxEnglish 102 Essay 2 Assignment Feminism and Hubris”Write a.docx
English 102 Essay 2 Assignment Feminism and Hubris”Write a.docx
budabrooks46239
 
ENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docx
ENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docxENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docx
ENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docx
budabrooks46239
 
English 101 - Reminders and Help for Rhetorical Analysis Paragraph.docx
English 101 - Reminders and Help for Rhetorical Analysis Paragraph.docxEnglish 101 - Reminders and Help for Rhetorical Analysis Paragraph.docx
English 101 - Reminders and Help for Rhetorical Analysis Paragraph.docx
budabrooks46239
 
ENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docx
ENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docxENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docx
ENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docx
budabrooks46239
 
ENGL 102Use the following template as a cover page for each writ.docx
ENGL 102Use the following template as a cover page for each writ.docxENGL 102Use the following template as a cover page for each writ.docx
ENGL 102Use the following template as a cover page for each writ.docx
budabrooks46239
 
ENGL2310 Essay 2 Assignment Due by Saturday, June 13, a.docx
ENGL2310 Essay 2 Assignment          Due by Saturday, June 13, a.docxENGL2310 Essay 2 Assignment          Due by Saturday, June 13, a.docx
ENGL2310 Essay 2 Assignment Due by Saturday, June 13, a.docx
budabrooks46239
 
ENGL 151 Research EssayAssignment DetailsValue 25 (additio.docx
ENGL 151 Research EssayAssignment DetailsValue 25 (additio.docxENGL 151 Research EssayAssignment DetailsValue 25 (additio.docx
ENGL 151 Research EssayAssignment DetailsValue 25 (additio.docx
budabrooks46239
 
ENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docx
ENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docxENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docx
ENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docx
budabrooks46239
 
ENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docx
ENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docxENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docx
ENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docx
budabrooks46239
 
Engaging Youth Experiencing Homelessness Core Practi.docx
Engaging Youth Experiencing Homelessness Core Practi.docxEngaging Youth Experiencing Homelessness Core Practi.docx
Engaging Youth Experiencing Homelessness Core Practi.docx
budabrooks46239
 
Engaging Families to Support Indigenous Students’ Numeracy Devel.docx
Engaging Families to Support Indigenous Students’ Numeracy Devel.docxEngaging Families to Support Indigenous Students’ Numeracy Devel.docx
Engaging Families to Support Indigenous Students’ Numeracy Devel.docx
budabrooks46239
 
ENG 130 Literature and Comp ENG 130 Research Essay E.docx
ENG 130 Literature and Comp ENG 130 Research Essay E.docxENG 130 Literature and Comp ENG 130 Research Essay E.docx
ENG 130 Literature and Comp ENG 130 Research Essay E.docx
budabrooks46239
 

More from budabrooks46239 (20)

Enterprise Key Management Plan An eight- to 10-page  double.docx
Enterprise Key Management Plan An eight- to 10-page  double.docxEnterprise Key Management Plan An eight- to 10-page  double.docx
Enterprise Key Management Plan An eight- to 10-page  double.docx
 
English IV Research PaperMrs. MantineoObjective  To adher.docx
English IV Research PaperMrs. MantineoObjective  To adher.docxEnglish IV Research PaperMrs. MantineoObjective  To adher.docx
English IV Research PaperMrs. MantineoObjective  To adher.docx
 
Enter in conversation with other writers by writing a thesis-dri.docx
Enter in conversation with other writers by writing a thesis-dri.docxEnter in conversation with other writers by writing a thesis-dri.docx
Enter in conversation with other writers by writing a thesis-dri.docx
 
English II – Touchstone 3.2 Draft an Argumentative Research Essay.docx
English II – Touchstone 3.2 Draft an Argumentative Research Essay.docxEnglish II – Touchstone 3.2 Draft an Argumentative Research Essay.docx
English II – Touchstone 3.2 Draft an Argumentative Research Essay.docx
 
English 3060Spring 2021Group Summary ofReinhardP.docx
English 3060Spring 2021Group Summary ofReinhardP.docxEnglish 3060Spring 2021Group Summary ofReinhardP.docx
English 3060Spring 2021Group Summary ofReinhardP.docx
 
English 102 Essay 2 First Draft Assignment Feminism and Hubris.docx
English 102 Essay 2 First Draft Assignment Feminism and Hubris.docxEnglish 102 Essay 2 First Draft Assignment Feminism and Hubris.docx
English 102 Essay 2 First Draft Assignment Feminism and Hubris.docx
 
English 102 Essay 2 Assignment Feminism and Hubris”Write a.docx
English 102 Essay 2 Assignment Feminism and Hubris”Write a.docxEnglish 102 Essay 2 Assignment Feminism and Hubris”Write a.docx
English 102 Essay 2 Assignment Feminism and Hubris”Write a.docx
 
ENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docx
ENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docxENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docx
ENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docx
 
English 101 - Reminders and Help for Rhetorical Analysis Paragraph.docx
English 101 - Reminders and Help for Rhetorical Analysis Paragraph.docxEnglish 101 - Reminders and Help for Rhetorical Analysis Paragraph.docx
English 101 - Reminders and Help for Rhetorical Analysis Paragraph.docx
 
ENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docx
ENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docxENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docx
ENGL 301BSections 12 & 15Prof. GuzikSpring 2020Assignment .docx
 
ENGL 102Use the following template as a cover page for each writ.docx
ENGL 102Use the following template as a cover page for each writ.docxENGL 102Use the following template as a cover page for each writ.docx
ENGL 102Use the following template as a cover page for each writ.docx
 
ENGL2310 Essay 2 Assignment Due by Saturday, June 13, a.docx
ENGL2310 Essay 2 Assignment          Due by Saturday, June 13, a.docxENGL2310 Essay 2 Assignment          Due by Saturday, June 13, a.docx
ENGL2310 Essay 2 Assignment Due by Saturday, June 13, a.docx
 
ENGL 151 Research EssayAssignment DetailsValue 25 (additio.docx
ENGL 151 Research EssayAssignment DetailsValue 25 (additio.docxENGL 151 Research EssayAssignment DetailsValue 25 (additio.docx
ENGL 151 Research EssayAssignment DetailsValue 25 (additio.docx
 
ENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docx
ENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docxENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docx
ENGL 140 Signature Essay Peer Review WorksheetAssignmentDirectio.docx
 
ENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docx
ENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docxENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docx
ENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docx
 
Engaging Youth Experiencing Homelessness Core Practi.docx
Engaging Youth Experiencing Homelessness Core Practi.docxEngaging Youth Experiencing Homelessness Core Practi.docx
Engaging Youth Experiencing Homelessness Core Practi.docx
 
Engaging Families to Support Indigenous Students’ Numeracy Devel.docx
Engaging Families to Support Indigenous Students’ Numeracy Devel.docxEngaging Families to Support Indigenous Students’ Numeracy Devel.docx
Engaging Families to Support Indigenous Students’ Numeracy Devel.docx
 
Endocrine Attendance QuestionsWhat is hypopituitarism and how .docx
Endocrine Attendance QuestionsWhat is hypopituitarism and how .docxEndocrine Attendance QuestionsWhat is hypopituitarism and how .docx
Endocrine Attendance QuestionsWhat is hypopituitarism and how .docx
 
ENG 130 Literature and Comp ENG 130 Research Essay E.docx
ENG 130 Literature and Comp ENG 130 Research Essay E.docxENG 130 Literature and Comp ENG 130 Research Essay E.docx
ENG 130 Literature and Comp ENG 130 Research Essay E.docx
 
ENG 201 01 Summer I Presentation Assignment· Due , June 7, .docx
ENG 201 01 Summer I Presentation Assignment· Due , June 7, .docxENG 201 01 Summer I Presentation Assignment· Due , June 7, .docx
ENG 201 01 Summer I Presentation Assignment· Due , June 7, .docx
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

Significant risksHEADLINE RISKDESCRIPTION OF RISKINHERENT RISK FAC.docx

  • 1. Significant risksHEADLINE RISKDESCRIPTION OF RISKINHERENT RISK FACTORIDENTIFY EXISTING CONTROLS & EFFECTIVENESS OF MITIGATIONIS RISK DECREASING, INCREASING OR STATIC?RESIDUAL RISK FACTORRISK OWNER1aSecurity software is not properly installed or updatedSecurity team fails to ensure that the most up-to-date security software is installed with the new hardware10 Likelihood (2) Impact (5)Existing Controls - Training of regulations for compliance with security protocols. Effectiveness of Mitigation - Monthly security reviews suggesting improved security amongst the whole network. Decreasing4 L (2) I (2)Organization2aSoftware support was not initially setupWith the installation of new hardware, software support was not setup and fully registered12 Likelihood 3 Impact 4Existing Controls - Notifications are sent out before hardware upgrades. Effectiveness of mitigation - Overall reduction of hardware not registered.Decreasing6 L (6) I (2)End users 3aFunds drained before all hardware has been upgradedCost report was below target point resulting in delays of upgrade to some of the older computers resulting in more increased time reports for project12 L(2) I(6)Existing Controls - Cost calculations are projected well before any upgrades. Effectiveness of Mitigation - Decrease in the risk on going over project spending on future upgrades.Decreasing6 L (3) I (2)End users
  • 2. &"Arial,Bold"&14CHRE Risk Register 2011-12 &12Last updated 28/04/11 &9NOTE: each risk is scored according to the risk matrix. &10 &"Arial,Bold"&9KEY: LA Linda Allan, CB Christine Braithwaite, HC Harry Cayton, RS Ros Hayles, SMT Senior Management Team Page &P of &N Page &P of &N Essay2/Example/Example writing.docx The attached file shows an excerpt from a Risk Analysis Plan for a team project. The project was to offer Pinellas County an online support system for home-schooled families. This program is different from the traditional K-12 online programs because it doesn’t follow the conventional grading methods—it would be only for home schooled children so that the parents could access materials, videos and teaching information that would supplement their individualized home schooling curriculum. We started with a risk breakdown structure to identify the risks by categorizing them into different activities that were relevant to the project. We then performed a qualitative risk analysis and assigned a numeric value to the probability of the risk on a scale of 1-5. We charted these risks and color coded them in a Risk Severity Matrix. This analysis allowed us to rank the risks and identify the top ten risks that scored in the Medium and High probability categories (yellow and red sections) as the focus for the Risk Response Plan. We then created a Risk Response Plan for each of the top ten risks and categorized the responses by “avoid, mitigate, accept, contingency or transfer” as well as included a specific response plan for each risk. The Response Plan also included a trigger to know when the risk was coming, and an owner to execute the response.
  • 3. Essay2/Example/Excel example.pdf Team1 - Classroom at Home Risk Analysis TEAM1-Risk Analysis-FINAL.docx Page 11 of 15 Appendix A: RBS Risk Breakdown Structure Source: (Larson & Gray, 2014, p. 208) Created by Team1 Classroom at Home Project
  • 4. Planning Website location Subjects offered Availability of teachers Production Technical difficulties for users Users’ under- standing of program Computer and browser compatibility Teacher technical difficulties Student questions Login and password
  • 5. retrieval Design User interface for youth User interface for non-native speakers Development Programming delays Security risks on servers Testing Ability to reveal all problems Marketing Program not known by parents Program under-utilized Students not
  • 6. disciplined to use Parents not being responsible to guide Parents not realizing program is free Confusion with enrolled vs home schooled Non- Floridians interest Team1 - Classroom at Home Risk Analysis TEAM1-Risk Analysis-FINAL.docx Page 12 of 15 APPENDIX B: Risk Severity Matrix Low
  • 7. Probability Medium Probability High Probability 5 Computer and browser compatibility 4 Ability to reveal all problems Security risks on servers Technical difficulties for users Teacher technical difficulties Users’ under- standing of program
  • 8. 3 Parents not realizing program is free Student questions Availability of teachers Login and password retrieval Program under- utilized 2 Subjects offered Website location Program not known by parents Programming delays Non-Floridians interest 1 User interface for youth User interface for non-native speakers
  • 9. Confusion with enrolled vs home schooled 1 2 3 4 5 Low Impact Medium Impact High Impact Source: (Larson & Gray, 2014, p. 212), Created by Team1 Team1 - Classroom at Home Risk Analysis TEAM1-Risk Analysis-FINAL.docx Page 13 of 15 APPENDIX C: Risk Response Matrix Source: (Project Management Docs, 2015), Created by Team1 Risk Risk Category Prob- ability Impact Risk Score Risk
  • 10. Ranking Risk Response Trigger Risk Owner Users' understanding of program Production 4 5 20 1 Conduct a student training program that must be completed prior to class starting >20% of students complain about program Herb Walker Technical difficulties for users Production 4 4 16 2 Recruit a smail group of IT support staff, available via phone >15% students suffer technical problems Jason Black Teacher technical difficulties Production 4 4 16 3 Recruit a smail group of IT support staff, available via phone >10% teachers suffer technical problems Jason Black Computer and Browswer
  • 11. Compatability Production 5 3 15 4 Design different types of virtual software that is compatible with the same accessebile browser (Mozilla Firefox) Increase in technological advances Herb Walker Program under- utilized Marketing 3 5 15 5 Conduct a student training program that must be completed prior to starting class A decrease of study toold being used/decrease in passing grades Herb Walker Login and passord retrevial Production 3 4 12 6 Recruit a smail group of IT support staff, available via phone(troubleshoot) Increase in students being locked out of school programs Jason Black
  • 12. Security Risks on Servers Development 4 3 12 7 Transfer security surveillance to an outside company to ensure safety of students and teachers The start of the school Mary White Non-Floridian's interest Marketing 2 5 10 8 Explain to Non-Floridians interested in the program that you must live in Florida for the 1 year prior to starting Non-Floridians inquiring about the virtual school program Tom Sunday Availability of teachers Planning 3 3 9 9 Recruit more teachers with a versatile background of teaching many subjects Parents complaints of school curricullum Mary White Ability to Reveal All Problems Testing 4 2 8 10 Conduct more practice pilots during school off
  • 13. seasons The start of the school year Ron Smith Risk Identification Risk ResponseQualitative Rating Team1 - Classroom at Home Risk Analysis TEAM1-Risk Analysis-FINAL.docx Page 14 of 15 APPENDIX D: Risk Responsibility Matrix Risk Responsibility Matrix Risk Event Response Contingency Plan Trigger Who is Responsible Users' Understanding of program Mitigate Conduct a student training program that must be completed prior to class starting >20% of students complain about program Herb Walker
  • 14. Technical Difficulties for users Mitigate Recruit a small group of IT support staff, available via phone >15% students suffer technical problems Jason Black Teacher Technical Difficulties Mitigate Recruit a small group of IT support staff, available via phone >10% teachers suffer technical problems Jason Black Computer and Browser Compatibility Mitigate Design different types of the virtual software that is compatible with the same accessible browser (Mozilla Firefox) Increase in technological
  • 15. advances Herb Walker Program under- utilized Mitigate Conduct a student training program that must be completed prior to class starting A decrease of study tools being used/decrease in passing grades Herb Walker Login and password retrieval Mitigate Recruit a small group of IT support staff, available via phone (troubleshoot problems) Increase in Students being locked out of school programs Jason Black Security Risks on Servers Transfer Transfer security surveillance to an
  • 16. outside company to ensure safety of students and teachers The start of school year Mary White Non-Floridian's interest Accept Explain to Non-Floridian's interested in program that you must live in Florida for the 1 year prior to starting Non-Floridians inquiring about Virtual School Program Tom Sunday Availability of teachers Mitigate Recruit more teachers with a versatile background of teaching many subjects Parent complaints of school curriculum Mary White Ability to reveal all problems Mitigate
  • 17. Conduct more practice pilots during school off seasons The start of school year Ron Smith Source: (Project Management Docs, 2015), Created by Team1 Team1 - Classroom at Home Risk Analysis TEAM1-Risk Analysis-FINAL.docx Page 15 of 15 REFERENCES HHS. (2015, April 1). Health and Human Services. Retrieved from HHS: http://www.hhs.gov/ocio/eplc/EPLC%20Archive%20Documents/ 05%20- %20Risk%20Management%20Plan/eplc_risk_management_temp late.doc Larson, E. W., & Gray, C. F. (2014). Project Management: the managerial process, Sixth edition. New York: McGraw-Hill Education. Project Management Docs. (2015, April 3). Project Planning Templates. Retrieved from Project Management Docs: http://www.projectmanagementdocs.com/project-planning- templates/risk-register.html 5432154321High ImpactMedium ImpactLow ImpactReferences
  • 18. Essay2/Instructions.docx Essay 2: Instructions: Review the following download: Detailed Risk Matrix sample in Excel format. (http://www.professionalstandards.org.uk/docs/voluntar y-registers/risk-matrix-template.xlsx?sfvrsn=4 ). This type of Risk matrix is fast becoming a standard tool in projects, plus general activities for federal and local government. Our textbook had some content on this, however, this was too limited, see the suggested link for more detail. Share your version of a risk matrix and provide a specific example of a significant process or project. Enter a file and a quality explanation using no less than 180 words. [Your example should involve a large amount of money or an event that will have an influence over a long period for a number of people.] I will provide an example by someone else in this folder. Please use template to complete. Essay2/risk-matrix-template (1).xlsx Significant risksHEADLINE RISKDESCRIPTION OF RISKINHERENT RISK FACTORIDENTIFY EXISTING CONTROLS & EFFECTIVENESS OF MITIGATIONIS RISK DECREASING, INCREASING OR STATIC?RESIDUAL RISK FACTORRISK OWNER1aExample: Personal Behaviour - Registrants violate boundariesRegistrants fail to establish appropriate boundaries with services users, i.e. do not explain professional relationship to service users and violate boundaries, i.e. emotional, sexual,
  • 19. etc. Registrants abuse their position of power. Disclaimer: The purpose of this generic example is to give applicants an idea of how to complete this matrix. It would not necessarily be described as it is done here. The existing controls and mitigation actions are some of the possible controls and actions we would expect to see in place but not all of them are listed here. For example, for this specific risk safeguarding issues would have to be considered and actions put in place. The inherent and residual risk factor are not a real assessment - they were included here to demonstrate how to calculate the factor. 12 Likelihood 4 Impact 3Existing Controls: Adherence to Ethical Framework and Code of Practice. Mandatory CPD and supervision audited by Professional Standards Authority at annual renewal of registration. Training provided by organisation. Leaflets and other information material available to registrants. Professional Conduct Procedure in place. Case facts and sanctions published on website to promote learning amongst registrants. Effectiveness of Mitigation: annual review of conduct cases suggests reduction of complaints against registrants in relation to boundary violations. Decreasing6 L (2) I (3)X (organisation holding register)1b1c1d1e2aExample: Technical Competence - Lack of effectivenessRegistrants do not have the skills to practice so service provided does not have expected effect/outcome. Registrants cannot identify underlying issues and do not refer service user to appropriate qualified professional. Disclaimer: The purpose of this generic example is to give applicants an idea of how to complete this matrix. It would not necessarily be described as it is done here. 20 L (4)
  • 20. I (5)Existing control: Education and training equips registrant with skills to practice. Mandatory CPD requirements assist registrants to keep their skills up to date. Mandatory supervision identifies potential skill gaps and recommends appropriate training. Registrants sign up to Code of Practice/Ethical Framework that require them to practise within their competence and refer service users to other professionals if required. Organisation provides guidance on underlying health/social issues, for example, offers a protocol/checklist to registrants with common issues and symptoms. Effectiveness of mitigation: reduced number of complaints alleging lack of therapeutical effectiveness; feedback from supervisors; organisation monitors use of protocol/checklist by registrants and ascertains that 90% of registrants use the protocol; research demonstrates issue/risk is managed appropriately; organisation offers CPD on effectiveness and underlying issues undertaken by 70% of registrants.Decreasing4 L (2) I (2)X (organisation holding register); registrant; supervisor2b2c2d3aExample: Business Practice - Misleading advertising by registrantsA; B; C;16 L(4) I(4)X; Y; Z Static8 L (4) I (2)3b3c3d &"Arial,Bold"&14CHRE Risk Register 2011-12 &12Last updated 28/04/11 &9NOTE: each risk is scored according to the risk matrix. &10 &"Arial,Bold"&9KEY: LA Linda Allan, CB Christine Braithwaite, HC Harry Cayton, RS Ros Hayles, SMT Senior Management Team Page &P of &N Page &P of &N
  • 21. Essay 1: What is the preferred method of calculating a contingency reserve? 250 words of detail of the above topic. Contingency reserve is the amount of time/or cost added to the project to deal with known unknowns like identified risk. This is a project management class. Example topic from another student (not related, just example so please dont use any of this): rom the risk management plan, a contingency plan is put into place if the threat or opportunity occurs (Mulcahy, p. 205). Although they may not be implemented, contingency plans are plan actions created for an event that may occur but is not a fact or inevitable. The purpose is to develop a response action to a risk identified earlier in the risk management plan. As a contingency plan is an “insurance policy should a major risk occur” (De Sousa, 2009). It is considered “Plan A” in response to the identified risk. For instance, your organization has created a new healthcare drug and is awaiting FDA approval but it is taking longer than anticipated. You know that holding back beginning stages of production will increase costs so you begin preparing the labels and shipment procedures to help reduce the delay. With risks there should always be a “Plan B” which is where the fallback plan comes into play. These types of plans are “implemented when the contingency plan fails or is not fully effective” (Usmani, 2012). For instance, following the previous example of the contingency plan, if preparing the labels and shipment procedures does not truly reduce the delay, the fallback plan would then be executed. In this situation the fallback plan would be to use preordered and prepared supplies from a pre-identified supplier to arrange the second shipment for deployment earlier than originally scheduled to make up for
  • 22. the delay from the first shipment. “Contingency and fallback plans are the backbones of your risk management plan which help you manage the identified risk” (Usmani, 2012). By having both in place it creates a guideline of what needs to happen if a threat or opportunity arises rather than not being adequately prepared; which can lead to bigger issues. References: De Sousa, S. (2009). What is Contingency Planning? My PM Expert, the fast track to project success. Retrieved from: http://www.my- project-management-expert.com/what-is-contingency- planning.html Mulcahy, R. (2010). Risk Management: Tricks of the trade for project managers (2nd ed.). United States of America: RMC Publications, Inc. Essay 2: