Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Criticality Assessment Matrix
1. Introduction: Overview of the purpose and scope of the criticality assessment matrix
2. Assessment Framework: Description of the methodology, scoring system, and evaluation criteria used in the matrix
3. Impact Categories: Definition of impact categories (e.g., financial, operational, reputational, regulatory) and their measurement scales
4. Probability Assessment: Criteria for assessing likelihood or frequency of potential disruptions
5. Criticality Levels: Definition of criticality levels and their thresholds
6. Assessment Process: Step-by-step procedure for conducting the criticality assessment
7. Roles and Responsibilities: Definition of key stakeholders and their responsibilities in the assessment process
8. Review and Update Procedures: Requirements and timeline for periodic review and updates of the assessment
1. Industry-Specific Considerations: Additional criteria or considerations specific to the organization's industry sector
2. Compliance Requirements: Specific regulatory or compliance requirements affecting the criticality assessment
3. Business Impact Analysis Integration: How the criticality assessment integrates with broader business impact analysis
4. Risk Treatment Guidelines: Guidelines for addressing and mitigating risks identified through the assessment
5. Recovery Time Objectives: Definition of recovery time objectives for critical functions
6. Stakeholder Communication Plan: Procedures for communicating assessment results to stakeholders
1. Criticality Assessment Matrix Template: The actual matrix template with scoring criteria and evaluation framework
2. Impact Category Scoring Guidelines: Detailed guidelines for scoring each impact category
3. Assessment Worksheets: Ƶ for conducting and documenting individual assessments
4. Sample Calculations: Examples of how to calculate and determine criticality levels
5. Review Log: Template for documenting assessment reviews and updates
6. Stakeholder Sign-off Sheet: Template for obtaining necessary approvals and sign-offs
Authors
Find the exact document you need
Area Risk Assessment
A structured evaluation of workplace hazards and safety measures compliant with Danish regulations and EU safety directives.
Vendor Risk Assessment Questionnaire
Danish law-compliant vendor risk assessment questionnaire for evaluating supplier risk profiles and regulatory compliance.
Vulnerability Assessment Matrix
A Danish-compliant security assessment document that systematically evaluates and documents IT infrastructure vulnerabilities and their recommended mitigation strategies.
Asset Criticality Assessment
A Danish law-compliant document that assesses and documents the criticality level of organizational assets, incorporating local and EU regulatory requirements.
Workplace Assessment
A mandatory Danish workplace safety and health evaluation document that assesses and addresses all significant work environment risks and conditions.
Asset Management Risk Assessment
A Danish-law compliant risk assessment document for asset management activities, addressing key risks and regulatory requirements under Danish and EU financial regulations.
Audit Risk Assessment
A Danish-compliant audit planning document that assesses engagement risks and determines audit approach in accordance with Danish audit regulations and ISA standards.
Workplace Risk Assessment
Danish-compliant workplace risk assessment document for systematic evaluation of workplace hazards and safety measures under Danish Working Environment Act.
Activity Based Risk Assessment Form
A Danish-compliant workplace safety document for systematic risk assessment and control of specific work activities, meeting local regulatory requirements.
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.