Risk-based Assessment Clause Samples

Risk-based Assessment. The PI team will meet to evaluate, and assess the last performance year’s focused reviews and determine if there are any outstanding risk that were identified from the focused reviews or other program or project observations. Using a risk-based approach the PI team will identify all the preconstruction and construction focused risk reviews for the next performance year.
Risk-based Assessment. During the FHWA Division’s (MoDIV) annual risk assessment process, TEs and Program Specialists will identify potential risk areas that could be addressed with PoDI activities on projects where those higher risk items are likely to occur. This includes evaluating results from last year’s risk activities, such as findings from program reviews, CAP reviews, focused reviews, and other project approval actions (per the Stewardship and Oversight Agreement) to determine if any risks should be carried over to the next year. Using a risk-based approach, the FHWA Division will identify all the program, preconstruction and construction PoDI focused reviews or other activities for the next federal fiscal year.
Risk-based Assessment. During the Division’s annual risk assessment process, TEs and Program Specialists will identify potential risk areas that could be addressed with PoDI activities on projects where those higher risk items are likely to occur. This includes evaluating results from last year’s risk activities, such as findings from program reviews, CAP reviews, focused reviews, and other project approval actions (per the Stewardship and Oversight Agreement) to determine if any risks should be carried over to the next year. Using a risk-based approach the Division will identify all the program, preconstruction and construction PoDI focused reviews or other activities for the next fiscal year.
Risk-based Assessment. Most jurisdictions impose a requirement that the custodian assign money laundering risk rating to each customer. This exercise identifies customers that may poses a higher risk and the custodian conducts enhanced due diligence and imposes more extensive monitoring and more frequent risk assessment on these accounts. Furthermore, many of the anti-money laundering laws applicable to the global custodians, including those in the United States, allow for custodian to take a risk-based approach to combatting money laundering. By allowing for a risk-based approach, custodians are able to allocate resources efficiently and direct their efforts to those customers and areas that pose the higher risk. This risk-based approach is articulated in the 2007 report titled “Guidelines on the Risk-Based Approach to Combatting Money Laundering and Terrorist Financingissued by the Financial Action Task Force (FATF). In this report, it has been noted that where the same standard is set for all customers and resources are evenly applied to all, there could be the unintended consequence of the customer identification or other program elements becoming simply a tick the box exercise. Most anti-money laundering regimes around the globe allow for some form of risk-based approach to conducting customer due diligence. Under a risk-based approach it is up to each firm to decide on the specific documents requested, as determined by the client’s AML risk. So while some of the listed documents may be obtained using a risk-based approach, the regulations do not prescribe a specific list of universally required documents and, therefore, custodians may not always hold the same documents for all clients. Most importantly, where a client’s risk is assessed as low, Simplified Due Diligence (“SDD”) applies. This less burdensome set of KYC requirements is appropriate because the majority of custodian’s FII clients are themselves regulated financial institutions or collective investment vehicles, publicly listed companies, regulated employer funds, or government pension funds. As these categories of institutions have qualified for this SDD, there is no requirement to obtain the detailed documentation listed above. However, custodians must obtain suitable evidence to document the categorization of these clients for SDD.
Risk-based Assessment. The Division will enter all Major Projects and all other pre-screened projects that have the potential to be a PoCI into the FHWA SharePoint-based Resource Deployment Tool. This tool will be used to conduct a risk-based assessment to identify areas of elevated risk for each project, identify the level of Division office capacity to manage the risk, and determine if the project is recommended by the Division Office for selection as a final PoCI. The Resource Deployment Tool considers the project risks in the areas of: 1) complexity, 2) Cost, 3) Schedule, 4) Urgency,
Risk-based Assessment. The Division Office will conduct a risk-based assessment of the pre-screened projects using the resource deployment tool that emphasizes the ten risk areas below. 1. Complexity 2. Cost 3. Schedule 4. Urgency 5. Environmental Considerations and outside Stakeholders 6. Funding 7. Project Administration 8. National/Regional Significance 9. Corporate Actions

Related to Risk-based Assessment

  • Risk Assessment An assessment of any risks inherent in the work requirements and actions to mitigate these risks.

  • Performance Assessment 6.1 The Performance Plan (Annexure A) to this Agreement sets out key performance indicators and competencies that needs to be evaluated in terms of – 6.1.1 The standards and procedures for evaluating the Employee’s performance; and 6.1.2 During the intervals for the evaluation of the Employee’s performance. 6.2 Despite the establishment of agreed intervals for evaluation, the Employer may in addition review the Employee’s performance at any stage while the contract of employment remains in force; 6.3 Personal growth and development needs identified during any performance review discussion must be documented in a Personal Development Plan as well as the actions agreed to and implementation must take place within set time frames; 6.4 The Employee’s performance will also be measured in terms of contributions to the goals and strategies set out in the Employer’s Integrated Development Plan (IDP) as described in 6.6 – 6.13 below; 6.5 The Employee will submit quarterly performance reports (SDBIP) and a comprehensive annual performance report at least one week prior to the performance assessment meetings to the Evaluation Panel Chairperson for distribution to the panel members for preparation purposes; 6.6 Assessment of the achievement of results as outlined in the performance plan: 6.6.1 Each KPI or group of KPIs shall be assessed according to the extent to which the specified standards or performance targets have been met (qualitative and quantitative) and with due regard to ad-hoc tasks that had to be performed under the KPI; 6.6.2 A rating on the five-point scale described in 6.9 below shall be provided for each KPI or group of KPIs which will then be multiplied by the weighting to calculate the final score; 6.6.3 The Employee will submit his self-evaluation to the Employer prior to the formal assessment; 6.6.4 In the instance where the employee could not perform due to reasons outside the control of the employer and employee, the KPI will not be considered during the evaluation. The employee should provide sufficient evidence in such instances; and 6.6.5 An overall score will be calculated based on the total of the individual scores calculated above.

  • Risk Assessments a. Risk Assessment - DST shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats Schedule 10.2 p.2 occurring and the impact of those threats upon DST organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”). b. Risk Mitigation - DST shall use commercially reasonable efforts to manage, control and remediate threats identified in the Risk Assessments that it believes are likely to result in material unauthorized access, copying, use, processing, disclosure, alteration, transfer, loss or destruction of Fund Data, consistent with the Objective, and commensurate with the sensitivity of the Fund Data and the complexity and scope of the activities of DST pursuant to the Agreement. c. Security Controls Testing - DST shall, on approximately an annual basis, engage an independent external party to conduct a review (including information security) of DST’s systems that are related to the provision of services. DST shall have a process to review and evaluate high risk findings resulting from this testing.

  • Impact Assessments 5.1 The Parties shall: (a) provide all reasonable assistance to the each other to prepare any data protection impact assessment as may be required (including provision of detailed information and assessments in relation to Processing operations, risks and measures); and (b) maintain full and complete records of all Processing carried out in respect of the Personal Data in connection with the contract, in accordance with the terms of Article 30 GDPR.

  • Periodic Risk Assessment Provider further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.