Below are the details of the operational risks covered within this selected sub-risk category:
Malicious damage to software or information within key IT Systems by employees
Malicious damage to software or information within key IT Systems by employees may result in business disruption, incorrect/delayed reporting, incorrect/delayed processing and unplanned costs. Examples of damage may include: -
Malicious damage to software or information within key IT Systems by external parties
Malicious damage to software or information within key IT Systems by external parties may result in business disruption, incorrect/delayed reporting, incorrect/delayed processing and unplanned costs. Examples of damage may include: -
Malicious damage to IT hardware by employees
Malicious damage to IT hardware by employees may result in business disruption, incorrect/delayed processing, incorrect/delayed reporting and unplanned costs. Examples of damage may include: -
Malicious damage to IT hardware by external parties
Malicious damage to IT hardware by external parties may result in business disruption, incorrect/delayed processing, incorrect/delayed reporting and unplanned costs. Examples of damage may include: -