Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Purpose and Scope: Defines the objectives of the policy and its application scope across the organization
2. Definitions: Key terms and concepts used throughout the policy
3. Governance Framework: Outlines roles, responsibilities, and accountability structures for operational resilience
4. Risk Assessment and Management: Framework for identifying, assessing, and managing operational resilience risks
5. Critical Business Services: Identification and classification of critical business services and operations
6. Impact Tolerances: Definition and measurement of maximum tolerable disruption for critical services
7. Third-Party Risk Management: Requirements for managing operational resilience risks from external service providers
8. Business Continuity Management: Framework for ensuring continuity of critical operations during disruptions
9. Incident Management: Procedures for responding to and managing operational incidents
10. Testing and Assurance: Requirements for testing operational resilience capabilities and controls
11. Reporting and Communication: Framework for internal and external reporting of operational resilience matters
12. Review and Maintenance: Requirements for regular review and updates of the policy
1. Technology Resilience: Specific requirements for IT systems resilience - include if organization has significant technology dependencies
2. Data Management: Specific requirements for data resilience and recovery - include if organization handles sensitive or critical data
3. Change Management: Procedures for managing changes that could impact operational resilience - include for organizations with frequent operational changes
4. Financial Resilience: Requirements for maintaining financial resources to support operational resilience - include for financial institutions
5. Location Resilience: Requirements for physical location redundancy - include if organization has critical physical premises
6. Regulatory Compliance: Specific regulatory requirements for operational resilience - include if organization is subject to specific regulatory frameworks
1. Appendix A - Impact Assessment Matrix: Template and guidance for assessing operational impact levels
2. Appendix B - Critical Service Register: Template for documenting critical business services and their requirements
3. Appendix C - Incident Response Procedures: Detailed procedures for different types of operational incidents
4. Appendix D - Testing Schedule: Annual schedule and requirements for resilience testing
5. Appendix E - Key Performance Indicators: Metrics and thresholds for measuring operational resilience
6. Appendix F - Third-Party Assessment Template: Template for assessing third-party operational resilience
7. Appendix G - Communication Templates: Standard templates for incident and crisis communication
Find the exact document you need
Operational Resilience Policy
An Australian-compliant framework for establishing and maintaining organizational operational resilience, aligned with local regulatory requirements and industry best practices.
Contract Risk Management Policy
An Australian-compliant policy framework for managing contract-related risks across an organization, aligned with local legislation and governance requirements.
Risk Assessment And Management Policy
An Australian-compliant policy document establishing organizational risk assessment and management procedures, aligned with federal and state regulations.
Information Security Risk Assessment Policy
An Australian-compliant policy document establishing procedures and requirements for conducting information security risk assessments, aligned with local privacy laws and international standards.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)
.png)