Below are the details of the operational risks covered within this selected sub-risk category:
Theft of intangible assets in digital form
Theft or robbery of intangible assets in digital form E.g.:-
Unauthorised updates to information within firm's IT Systems for fraudulent purposes
External parties may exploit weaknesses in firm's IT Systems to execute updates to information within the IT Systems, where such updates enables involved external parties to commit fraud. Examples of updates may include: -