(1) This procedure is developed in support of the University's Risk Management Policy to provide detailed procedural steps and guidance to implement effective and demonstrable risk management practices across Charles Sturt University (the University). Through this procedure, the University aims to achieve consistent application of risk management principles and maintenance of risk registers across the institution. (2) For the purpose of this procedure, the University has outlined a number of definitions in the Risk Management Policy. (3) Refer to the Risk Management Policy. (4) Enterprise levels refer to the hierarchical management structure of the University at which risks are managed. Enterprise levels also include specific-purpose endeavours, such as projects and events. For the purpose of risk management, enterprise levels are classified according to tiers. (5) Risk owners are accountable for ensuring that risks within the management structure for which they are responsible are managed in accordance with acceptable appetite levels, as per University’s Risk Appetite Statement. This entails carrying out or overseeing the identification, analysis, evaluation of risks, as well as the design, implementation, and monitoring of any risk treatments. (6) The risk owners for each enterprise level are listed below: (7) A risk register is an output of the risk management processes that documents the University’s current exposure to risks. It includes such information as: enterprise level, risk description, risk factors or causes, controls, inherent and controlled risk ratings, risk appetite, and risk treatments. (8) The Risk and Compliance Unit is responsible for maintaining the University's risk register through periodic risk assessments facilitated with the support of the Audit and Risk Committee and the Executive Leadership Team (ELT). (9) Each risk owner is responsible for establishing, updating and reviewing their respective risks on a periodic basis to be included in the University risk reporting process outlined in the Risk Appetite Statement. It is the intention that risk management is embedded as part of a business-as-usual management activity, instead of a separate process. (10) When entering new risks into the risk register, the following process applies: (11) Once risks are incorporated into the risk register, any updates should be approved by the corresponding portfolio leader or the Vice-Chancellor. (12) The risk assessment process adopted by the University is based on the Standard. (13) Prior to undertaking the risk assessment process, it is important to define the context against which risks will be assessed. This will help to: (14) It is important to understand the internal and external environments that the University operates in that may influence or impact the function or process being assessed. The following should be considered: (15) The risk identification process is a critical step to ensure that risks captured reflect a list of risk events that may impact the achievement of University objectives. An incomplete list of risks may result in material risks not being analysed to the required detail and, in turn, exposing the University to an inappropriate degree of risk. Risks identified are documented in the risk register. (16) Identified risks should be described in a comprehensive fashion, with reference to the following: (17) It is preferred that risk identification be conducted through a team-based approach with all members of the group having a good understanding of the tasks, objectives of the area being assessed and how the risks impact the University's objectives. Other techniques such as desktop (i.e., offsite) risk assessments or management reviews can also be used. (18) It is important to identify the risk owner who will be responsible for managing the risk. This is critical to ensure that the risk is regularly monitored and appropriately addressed through mitigation strategies further down the risk management process. (19) Questions to ask when identifying potential risks might include, but are not limited to the following: (20) This stage is undertaken to better understand the risks identified in the previous step. This involves measuring the likelihood of the risk event occurring and extent of the consequences if the risk were to occur. (21) Measuring the likelihood and consequence of a risk event is not strictly a statistical or quantitative measure. It requires management's judgement which can be informed by previous experiences of such risk event, experience of other Universities or organisations in similar scenarios, available University performance data or audit/independent review observations. (22) The following steps should be followed in assigning risk rating to each risk event and should be rated from a whole-of-institution perspective: (23) When completing the risk register the inherent and controlled risk ratings are calculated based on the University's Risk Management Guidelines. (24) Once the controlled risk ratings are determined, each risk is evaluated to determine whether it is acceptable or unacceptable based on the University's Risk Appetite Statement or acceptable risk levels determined by risk owners. The University’s acceptable risk appetite levels can change over time, depending on its strategy and the environment it operates in. (25) Evaluation of each identified risk may result in the following scenarios: (26) Although many risks may be rated within the acceptable risk appetite level from a University perspective, these may be unacceptable to the risk owner and should be flagged as such. The risk register can in this way identify risks that warrant priority attention both at a University level and/or an operational level. (27) The acceptance of risks lying outside the Risk Appetite Statement is subject to University Council approval. This may be the case, when, for example: (28) If further risk treatment actions are required for a specific risk, risk owners are accountable for implementing appropriate measures to reduce the risk to an acceptable level. (29) Risk treatment actions to reduce the risk level include: (30) The following principles should be considered when identifying risk treatment actions: (31) Once a risk treatment action is identified, it should outline the: (32) Examples of possible mitigation strategies include: (33) In most cases, treatments to reduce exposure to risk will entail modifications to the University's internal control environment, such as by implementing new or enhancing existing controls. (34) Risk owners are accountable overall for ensuring risks, internal controls and any risk treatments documented in the risk register within their area of responsibility are regularly monitored and reviewed. (35) Monitoring and review processes are used to ensure that: (36) To assist in risk monitoring, it is recommended that governance and management bodies include risk management as a standing agenda item and as part of their annual work plans for periodic review. (37) The Risk and Compliance Unit will review risks to ensure that the following risk management functions are undertaken in accordance with the University's Risk Management Policy: (38) The internal audit function is responsible for independently assessing the adequacy and effectiveness of internal controls of the University on a risk-based approach. The results of Internal Audit's work will inform how well the controls identified in risk registers are operating and may affect the controlled risk ratings for associated risks. (39) Internal Audit will periodically review the completeness and effectiveness of the University's Risk Management Framework and refer the findings to the University Council (via the Audit and Risk Committee). (40) The Risk Management Policy is published in the University’s policy library and referenced on the Risk and Compliance website/portal. All associated guides, templates and information on the University's risk management framework is available from the Risk and Compliance website/portal. (41) Refer to the Charles Sturt University’s Risk Appetite Statement which outlines the University's risk reporting structure. (42) Nil.Risk Management Procedure
Section 1 - Purpose
Section 2 - Glossary
Section 3 - Policy
Section 4 - Procedures
Enterprise levels and risk owners
Enterprise level
Management structure
Risk owner
Tier 1
Whole of organisation
Vice-Chancellor
Tier 2
Portfolio
Executive Leadership Team portfolio leaders
Tier 3
Business unit (e.g., faculty, division, centre, office)
Executive directors, executive deans, pro vice-chancellors
Tier 4
Unit (e.g., school, office, unit, institute or centre)
Directors, deans, heads of school, managers
Tier 5
Specific-purpose endeavours (e.g., projects, events)
Project managers, event managers
Risk register
Risk register maintenance
Updating the risk register
Risk management process
Establishing the context
Risk identification
Risk analysis
Risk evaluation
Risk treatment selection
Risk treatment implementation
Risk monitoring
Risk owners
Risk and Compliance Unit
Internal audit function
Related documentation
Risk Reporting Structure
Section 5 - Guidelines
View Current
This is not a current document. To view the current version, click the link in the document's navigation bar.
Note: Potential consequences should be described according to the Risk Management Guidelines, rather than a process, a failure or lack of controls.