You do not have permission to edit this page, for the following reason:
You can view and copy the source of this page:
Return to ICI Risk Management.
The Icertis Contract Intelligence (ICI) platform introduces the Risk Management Application to make it easier for professionals to carry out their tasks related to risk management such as assessment, due diligence, remediation, monitoring and reassessment. Risk management is the process of identifying the potential risk, assessing the magnitude of risk based on the business objectives, devising strategies to mitigate them and tracking the performance until they are completely mitigated.
The platform’s modern, scalable and integration-friendly cloud architecture can model even the most complex risk management scenarios. The App provides secure access such that only authorized users can access the App entities and data, using the ICI’s access control functionalities such as role action mapping. The user-friendly interface makes it possible for anyone in the enterprise having access to be able to use the platform with ease.
Icertis uses a standard framework for risk management of discovery, assessment, remediation, monitoring and optimization to manage enterprise risk.
The Risk Management process includes:
ICI Risk Management supports the following risk management business scenarios:
The user must have:
ICI offers the ability to determine the application type (Contracting, Sourcing, Obligation Management and Risk Management application) when creating a contract type. This is possible with the inclusion of two new choice type attributes, Business Application Type and Business Application Category at the contract type level. This feature helps effortlessly drive business applications on ICI platform.
These attributes are enabled through technical configuration and applicable for agreements and associated document contract types. The access privileges for business applications (such as Risk Management) are managed through security groups.
The ICI Risk Management application provides some seeded entities, attributes, workflows, rules and notifications that are necessary for the flow of the risk management. Some of the entities are:
Refer the Risk Management Configuration guide for details.
The ICI Risk Management application provides some seeded masterdata that are necessary for the flow of the risk management. Users can create masterdata instances with desired values.
To create masterdata instance:
1. Click Configuration > Masterdata > Create Masterdata on the Home page. The Create Masterdata page opens.
2. Select the Masterdata Contract Type. For example, Risk Area Master.
3. Click Next. The Attributes page opens.
4. Enter or select the details in the fields. For example, enter Risk Area Name as Anti-Bribery Corruption.
5. Click Save. The masterdata instance is created.
Similarly, setup masterdata for Risk Taxonomy, Risk Remediation action, Likelihood Rating and Risk Score Matrix Masters.
The ICI Risk Management application enables users to manage risks by creating risk assessment. Risk Assessment deals with the process of identifying and evaluating the magnitude of potential risk areas. For example, buyers can use the ICI Risk Management application that allows configuring a questionnaire to perform supplier risk assessment. The risk areas can be identified based on the responses received for the questionnaire as the outcome of the risk assessment process.
Risk assessment workflow performed by risk assessment owners typically involves the following:
Here is the Risk Assessment workflow at a glance:
1.Click the Risk Management tile on the Home page. The drop-down opens with options:
2. Click Create Risk Assessment. The Attributes page for Create Risk Assessment opens. The Attributes page includes questions to capture the responses based on which the risk areas can be generated. These questions are non-seeded attributes and users can configure them to the Risk Assessment contract type as per their business needs.
Attributes page has seeded sections as:
3. Enter the details in fields in the Identification section:
4. Enter the details in fields in the Risk Assessment Timeline section.
5. Enter the details in fields in all the sections on the Attributes page.
6. Click Next. The Verify page opens.
7. Verify the details and click Create. The risk assessment is created in Draft state.
Once created, users can Edit, Delete, Cancel or Submit the Risk Assessment.
1. Click the Risk Management > Risk Assessment on the Home page.
2. Click the View Record icon next to the Risk Assessment record you want to open. For example, Risk_Assessment_May2020. The Risk Assessment Details page opens.
1. Click Edit on the Risk Assessment Details page. The Edit Agreement page opens.
3. Verify the details and click Update. The risk assessment is updated and remains in Draft state.
1.Click Cancel on the Risk Assessment Details page.
The confirmation window opens.
2. Click Yes. The Add Note window opens.
3. Add note text and select the Reason Code.
4. Click Add. The Risk Assessment status changes to Cancelled.
1. Click Delete on the Risk Assessment Details page. The risk assessment will be deleted.
screen 19
screen 20
Approvers can Approve or Reject the Risk Assessment from the risk assessment Details page.
To reject:
screen 21
To approve:
If there are no Approvers added to the Risk Assessment Team, the record will be approved directly and move to the Assessment Complete state.
screen 22
Note: The Assessment Complete state is the final state for Risk Assessment, and users cannot take further actions.
Changes made to the Risk Assessment record during various ICI risk management workflows are captured and can be viewed under History tab. For example, changes in Risk_Assessment_May2020 throughout its lifecycle are captured.
screen 23
Managing Risk Area includes:
The risk area can be generated automatically by seeded rules based on the risk assessment responses. Users can also add the risk area manually to the risk assessment.
To create a risk area for risk assessment:
screen 1
The Create Association Risk Area page has sections:
Reference Risk Assessment
This section contains the attributes:
screen 2
Risk Area Details
This section contains the attributes:
screen 3
Note: The values in the risk area details section can be auto-populated from Risk Area Master. The Risk Owner can be added to the risk area through configured rules.
Inherent Risk Rating
Inherent risk rating is the risk rating applicable to the risk when it was determined for the first time.
This section contains the attributes:
Note: The Inherent risk level and score is determined from the values in inherent likelihood rating and consequences rating and can be entered manually or by configuring rules.
screen 4
Risk Remediation Plan
This section includes the informaton related to the remediation stategies and actions that can be taken to mitigate the risk areas.
This section contains the attributes:
screen 5
Residual Risk Rating
This section includes the information related to the residual risk left after the remediation actions are taken.
This section contains the attributes:
screen 6
screen 7
screen 8
Risk Area records can be searched from:
To search risk area from association index page:
screen 9
To search risk area from Risk Assessments search result page:
screen 10
The Risk owner can be added to the risk area through configured rules. Risk owner then can take certain actions from the risk area Details page when the risk area is in Assessment state.
The actions can be:
Users can repeat the workflow Due Diligence – Remediate – Monitor until the risk is completely mitigated.
Users can also automate the workflows to initiate due diligence, remediate and monitor risk areas by configuring rules.
screen 11
Click Initiate Due Diligence. The Risk Area Details page opens again.
screen 12
The status of the risk area changes to Due Diligence.
screen 13
Click Remediate on the risk area Details page. The Risk Area Details page opens again.
screen 14
The status of the risk area changes to Remediation.
screen 15
Users can monitor the risk areas based on the remediation actions taken to check whether the risks are reduced.
To monitor a risk area:
Click Monitor on the risk area Details page. The Risk Area Details page opens.
screen 16
The status of the risk area changes to Monitoring.
screen 17
Users can repeat the actions taken on the risk areas until the risks are completely mitigated.
screen 18
screen 19
Risk owners can deactivate the invalid risk area. Once deactivated, no further actions are allowed on the risk area.
screen 20
screen 21
Changes made to the Risk Area record during various ICI risk management workflows are captured and can be viewed under History tab. The History tab for Risk Area has All, Draft, Approval and Post-Approval tabs. For example, changes in ICIRiskArea_372 throughout its lifecycle are captured.
screen 22
The Risk Area action workflows can also be managed automatically by configuring rules. Users can set the value in the script type attribute Target ICI to move the Risk Area workflow automatically from Assessment state to Due Diligence, Remediation or Monitoring state.
Users can create remediation tasks for managing risks using commitments, obligations or any third party system. ICI Risk management app currently supports managing Risk Assessments using ICI Commitment functionaity.
To create a task using commitment:
screen 1
screen 2
screen 3
To view and take action on the commitment tasks:
screen 4
The ICI Risk Management app sends the notifications when certain actions are taken on the Risk Area. These notifications are seeded.
The notifications are sent when events occurs:
The recipients can access the notifications from Notification Dashboard:
screen 5
You do not have permission to edit this page, for the following reason:
You are not allowed to execute the action you have requested.
You can view and copy the source of this page:
Return to ICI Risk Management.