Malicious Damage to IT Assets

Below are the details of the operational risks covered within this selected sub-risk category:

info1

Malicious damage to software or information within key IT Systems by employees

Risk Description: -

Malicious damage to software or information within key IT Systems by employees may result in business disruption, incorrect/delayed reporting, incorrect/delayed processing and unplanned costs. Examples of damage may include: -



Malicious damage to software or information within key IT Systems by external parties

Risk Description: -

Malicious damage to software or information within key IT Systems by external parties may result in business disruption, incorrect/delayed reporting, incorrect/delayed processing and unplanned costs. Examples of damage may include: -



Malicious damage to IT hardware by employees

Risk Description: -

Malicious damage to IT hardware by employees may result in business disruption, incorrect/delayed processing, incorrect/delayed reporting and unplanned costs. Examples of damage may include: -



Malicious damage to IT hardware by external parties

Risk Description: -

Malicious damage to IT hardware by external parties may result in business disruption, incorrect/delayed processing, incorrect/delayed reporting and unplanned costs. Examples of damage may include: -