{"id":386723,"date":"2024-10-20T03:36:44","date_gmt":"2024-10-20T03:36:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-ts-30105-62021\/"},"modified":"2024-10-26T06:35:52","modified_gmt":"2024-10-26T06:35:52","slug":"bsi-pd-iso-iec-ts-30105-62021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-ts-30105-62021\/","title":{"rendered":"BSI PD ISO\/IEC TS 30105-6:2021"},"content":{"rendered":"
This document provides guidance on risk management practices for the IT enabled services-business process outsourcing (ITES-BPO) service provider for the outsourced business processes. It provides guidance for planning, establishing, implementing, operating, monitoring, reviewing, maintaining and improving the risk management framework for the ITES-BPO services.<\/p>\n
This document:<\/p>\n
covers IT enabled business processes that are outsourced;<\/p>\n<\/li>\n
is applicable to the service provider;<\/p>\n<\/li>\n
is applicable to all lifecycle processes of ITES-BPO;<\/p>\n<\/li>\n
is not intended to cover IT services.<\/p>\n<\/li>\n<\/ul>\n
The guidelines in this document align to ISO 31000, elaborating the risk principles, risk management framework and risk management process from an ITES-BPO perspective.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Risk principles 4.1 Outcomes 4.1.1 General 4.1.2 Value creation and protection 4.2 Principles 4.2.1 Integrated risk management <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2.2 Structured and comprehensive 4.2.3 Customized 4.2.4 Inclusive 4.2.5 Dynamic 4.2.6 Best available information <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.2.7 Human and cultural factors 4.2.8 Continual improvement 5 Risk management framework 5.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 Risk management framework design 5.2.1 General 5.2.2 Context <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3 Risk culture 5.4 Risk management framework implementation 6 Risk management process 6.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2 Scope, context and criteria 6.2.1 General 6.2.2 Scope 6.2.3 External and internal context <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.4 Criteria 6.3 Risk assessment 6.3.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3.2 Risk identification 6.3.3 Risk analysis <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.3.4 Risk evaluation 6.4 Risk treatment 6.4.1 General 6.4.2 Risk mitigation 6.4.3 Risk avoidance <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.4.4 Risk transfer 6.4.5 Risk retention 7 Communication and reporting <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8 Monitoring and review 8.1 General 8.2 Monitoring and management review 8.2.1 Monitoring <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.2.2 Management review 8.3 Key risk indicators (KRIs) <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (informative) Case study <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex B (informative) Indicative governance structure for risk management <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes – Guidelines on risk management<\/b><\/p>\n |