IT Risk Assessment Policy

Updated Annually

Purpose

This document explains the Company’s Risk Assessment policies and procedures. This policy empowers the Information Security Officer (ISO) or Data Protection Office (DPO) to perform periodic information security risk assessments (RAs) for the purpose of determining areas of vulnerability, and to initiate appropriate remediation.

Scope

RAs may be conducted on any Entity within the Company or any outside Entity that has signed a Third Party Agreement with the Company.

RAs may be conducted on any information system to include: applications, servers, and networks, and any process or procedure by which these systems are administered and/or maintained.

Authority and Enforcement

The Company’s Information Security Officer (ISO) is responsible for the development and oversight of these policies and standards.

The ISO works in conjunction with management, the Information Technology (IT) department, and others for the development, monitoring, and enforcement of these policies and standards.

Policy

The execution, development, and implementation of remediation programs are the joint responsibility of the IT department and the department responsible for the systems area being assessed.

Employees are expected to cooperate fully with any RA being conducted on systems for which they are held accountable.

Employees are further expected to work with the IT Risk Assessment Team in the development of a remediation plan.

Enforcement

Staff members found in policy violation may be subject to disciplinary action, up to and including termination.