




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、Risk Management PlanHealth and Human Services Agency, Office of Systems IntegrationRevision HistoryREVISION HISTORYREVISION/WORKSITE #DATE OF RELEASEOWNERSUMMARY OF CHANGESSID Docs #3164v406/23/2004SID - PMOInitial ReleaseOSIAdmin 328308/29/2008OSI - PMOMajor revisions made. Incorporated tailoring g
2、uide information into this templateRemove template revision history and insert Project Risk Management Plan revision history.ApprovalsNAME ROLEDATEInsert Project Approvals here.Template Instructions: This template is color coded to differentiate between boilerplate language, instructions, sample lan
3、guage, and hyperlinks. In consideration of those reviewing a black and white hard copy of this document we have also differentiated these sections of the document using various fonts and styles. Details are described below. Please remove the template instructions when the document is finalized.Stand
4、ard boilerplate language has been developed for this management plan. This language is identified in black Arial font and will not be modified without the prior approval of the OSI Project Management Office (PMO). If the project has identified a business need to modify the standard boilerplate langu
5、age, the request must be communicated to the PMO for review. Instructions for using this template are provided in blue Times New Roman font and describe general information for completing this management plan. All blue text should be removed from the final version of this plan.Sample language is ide
6、ntified in red italic Arial font. This language provides suggestions for completing specific sections. All red text should be replaced with project-specific information and the font color replaced with black text.Hyperlinks are annotated in purple underlined Arial text and can be accessed by followi
7、ng the on-screen instructions. To return to the original document after accessing a hyperlink, click on the back arrow in your browsers toolbar. The “File Download” dialog box will open. Click on “Open” to return to this document. Table of Contents1.INTRODUCTION .1PURPOSE.1SCOPE.1REFERENCES.1Best Pr
8、actices Website.1External References .1Project Risk Database (PRD) .1ACRONYMS.1DOCUMENT MAINTENANCE.22.PARTICIPANTS ROLES AND RESPONSIBILITIES.2OFFICE OF SYSTEMS INTEGRATION (OSI).2Project Director.2Project Manager (PM).2Risk Manager.3Risk Analyst.3Project Stakeholders and Vendors .33. PROJECT RISK
9、MANAGEMENT .3RISK MANAGEMENT PROCESS.34.RISK MANAGEMENT TOOL PROJECT RISK DATABASE (PRD).19RISK RADAR .19RISK CATEGORIZATION.19Risk Area .19Current Status.19Control .20RISK RATINGS.205.PROJECT CLOSEOUT.20RISK REVIEW.20LESSONS LEARNED.21ARCHIVE AND STORAGE.21APPENDIX A : LIST OF SEI RISK TAXONOMY QUE
10、STIONNAIRE TOPICS.A-1APPENDIX B : PROJECT RISK DATABASE DATA ELEMENTS .B-1APPENDIX C : RISK CANDIDATE IDENTIFICATION FORM .C-1APPENDIX D : SOFTWARE INTEGRITY LEVEL SCHEME.D-1APPENDIX E : MITIGATION STRATEGY & CONTINGENCY PLANNING MEASURES.E-1APPENDIX F : SOFTWARE ENGINEERING INSTITUTE RISK TAXONOMY
11、CATEGORIES.F-1APPENDIX G : KEY TERMS.G-1FIGURE 1: PROJECT RISK MANAGEMENT PARADIGM.3FIGURE 2: RISK MANAGEMENT RESPONSIBILITIES AT A GLANCE.5TABLE 1: CRITERIA FOR RISK IDENTIFICATION.7TABLE 2: RISK IDENTIFICATION COMPONENTS.8TABLE 3: CRITERIA FOR RISK IMPACT.10TABLE 4: CRITERIA FOR RISK PROBABILITY.1
12、1TABLE 5: CRITERIA FOR RISK TIMEFRAME.12TABLE 6: GUIDE FOR DETERMINATION OF RISK EXPOSURE.13TABLE 7: GUIDE FOR DETERMINATION OF RISK SEVERITY.13TABLE 8: GUIDE FOR DETERMINATION OF RISK ESCALATION.181. INTRODUCTION1.1 PurposeThe purpose of this Risk Management Plan (RMP) is to describe the methodolog
13、y for identifying, tracking, mitigating, and ultimately retiring Project risks. This document defines the risk management roles and responsibilities of the Team1.2 ScopeThe scope of this document pertains to the Project and its internal and external risks. The risk management methodology identified
14、in this document will be primarily used by and is to be used during the entire Project. The Vendors risk management methodology will be provided as a contractual deliverable and will develop a separate Risk Management Plan. The Vendor will be responsible for managing their project risk and reporting
15、 to Project Managers.1.3 References1.3.1 Best Practices WebsiteFor guidance on the Office of Systems Integration (OSI) risk management methodology refer to the OSI Best Practices website (BPWeb) ().1.3.2 External ReferencesPMBOK Guide, 3rd Edition, Section 11 - Project Risk Management Office of the
16、Chief Information Officer Information Technology Project Oversight Framework- Section 5: Risk Management and Escalation ProceduresIEEE Standard 1012-1998: IEEE Standard for Software Verification and Validation, 1.3.3 Project Risk Database (PRD)Refer to the Risk Radar Database located at . If the pro
17、ject is not using Risk Radar, indicate the name and location of the Project Risk Database the Project is employing. Update the document as appropriate to reflect the name of the PRD.1.4 AcronymsList only acronyms that are applicable to this document.BPWebOSI Best Practices Website CHHSACalifornia He
18、ath and Human Services AgencyIEEEInstitute of Electrical and Electronics EngineersIPOCIndependent Project Oversight ContractorMTSIIManagement Tracking System IIOCIOOffice of the Chief Information OfficerOSIOffice of Systems IntegrationPMIProject Management InstitutePMOProject Management OfficePRDPro
19、ject Risk DatabaseRMPRisk Management PlanSEISoftware Engineering Institute1.5 Document MaintenanceThis document will be reviewed annually and updated as needed, as the project proceeds through each phase of the system development life cycle. If the document is written in an older format, the documen
20、t should be revised into the latest OSI template format at the next annual review. This document contains a revision history log. When changes occur, the documents revision history log will reflect an updated version number as well as the date, the owner making the change, and change description wil
21、l be recorded in the revision history log of the document. 2. PARTICIPANTS ROLES AND RESPONSIBILITIES This section describes the roles and responsibilities of the staff with regard to the Risk Management Plan. Note that these are roles, not positions or titles. One person may fulfill more than one r
22、ole. Avoid listing specific names as this will lead to frequent maintenance updates to the plan. There are various staff resources and stakeholders involved in managing project risks. In some cases, one individual may perform multiple roles in the process. 2.1 Office of Systems Integration (OSI)2.1.
23、1 Project DirectorThe Project Director is involved in monitoring risk action effectiveness and participating in risk escalation. The Project Director also has the responsibility to communicate to certain project stakeholders, on an as needed basis.2.1.2Project Manager (PM)The role of the Project Man
24、ager is to write and approve the Project Risk Management Plan, define the Risk Management process, participate in the Risk Management process, and take ownership of risk mitigation planning and execution.2.1.3 Risk ManagerThe Risk Manager is responsible for leading the risk management effort, sponso
25、ring risk identification activities, facilitating communication throughout the execution of the risk management process, and ensuring the PRD is maintained and the statuses assigned to risks and risk activities are current. The Risk Manager is responsible for providing the Project Manager with recom
26、mendations and statuses on risk actions. 2.1.4 Risk AnalystThe Risk Analysts role is to evaluate risks, maintain the Risk Management database, and facilitate communication throughout the execution of the process.2.1.5 Project Stakeholders and VendorsThe role of Project stakeholders and vendors is to
27、 participate in the Risk Management process by providing candidate risk input, and supporting risk mitigation planning and execution activities.3. PROJECT RISK MANAGEMENT3.1Risk Management ProcessThe Project Risk Management Paradigm, depicted in Figure 1, summarizes the Risk Management process for t
28、he Project. This paradigm portrays the high-level process steps of the Risk Management process, which are:Step 1 IdentifyStep 2 AnalyzeStep 3 PlanStep 4 ImplementStep 5 Track and ControlContinuous Process CommunicateFigure 1: Project Risk Management ParadigmCommunication is an essential part of the
29、Risk Management and occurs at every step of the process among the stakeholders and contractors.A key component of the Risk Management Process is the Risk Management Database (RMD). team will use this database as a repository for Project risk information. The proposed Risk Management Database field d
30、escriptions in Table XXX identify and describe the proposed data elements to be incorporated into the RMD. Risk Manager is responsible for maintaining the RMD. Figure 2 depicts the Risk Management Process flow. IdentifyAnalyzePlanImplementTrack/ControlCommunicateIdentifySearch and locate risks BEFOR
31、E theymaterializeAnalyzeProcess risk data into decision-makinginformationPlanTranslate risk information into decisions andactions (mitigations)CommunicateInformation and feedback throughout all riskmanagement functions and project organizationsImplementExecute decisions andmitigation action plansTra
32、ck/ControlMonitor risk indicators andmitigation actionsCorrect for deviations fromplanned risk actionsIdentifyAnalyzePlanImplementTrack/ControlCommunicateIdentifySearch and locate risks BEFORE theymaterializeAnalyzeProcess risk data into decision-makinginformationPlanTranslate risk information into
33、decisions andactions (mitigations)CommunicateInformation and feedback throughout all riskmanagement functions and project organizationsImplementExecute decisions andmitigation action plansTrack/ControlMonitor risk indicators andmitigation actionsCorrect for deviations fromplanned risk actionsIdentif
34、yAnalyzePlanImplementTrack/ControlCommunicateIdentifySearch and locate risks BEFORE theymaterializeAnalyzeProcess risk data into decision-makinginformationPlanTranslate risk information into decisions andactions (mitigations)CommunicateInformation and feedback throughout all riskmanagement functions
35、 and project organizationsImplementExecute decisions andmitigation action plansTrack/ControlMonitor risk indicators andmitigation actionsCorrect for deviations fromplanned risk actionsIdentifyAnalyzePlanImplementTrack/ControlCommunicateIdentifySearch and locate risks BEFORE theymaterializeAnalyzePro
36、cess risk data into decision-makinginformationPlanTranslate risk information into decisions andactions (mitigations)CommunicateInformation and feedback throughout all riskmanagement functions and project organizationsImplementExecute decisions andmitigation action plansTrack/ControlMonitor risk indi
37、cators andmitigation actionsCorrect for deviations fromplanned risk actionsIdentifyAnalyzePlanImplementTrack/ControlCommunicateIdentifySearch and locate risks BEFORE theymaterializeAnalyzeProcess risk data into decision-makinginformationPlanTranslate risk information into decisions andactions (mitig
38、ations)CommunicateInformation and feedback throughout all riskmanagement functions and project organizationsImplementExecute decisions andmitigation action plansTrack/ControlMonitor risk indicators andmitigation actionsCorrect for deviations fromplanned risk actionsIdentifyAnalyzePlanImplementTrack/
39、ControlCommunicateIdentifySearch and locate risks BEFORE theymaterializeAnalyzeProcess risk data into decision-makinginformationPlanTranslate risk information into decisions andactions (mitigations)CommunicateInformation and feedback throughout all riskmanagement functions and project organizationsI
40、mplementExecute decisions andmitigation action plansTrack/ControlMonitor risk indicators andmitigation actionsCorrect for deviations fromplanned risk actionsIdentifyAnalyzePlanImplementTrack/ControlCommunicateIdentifySearch and locate risks BEFORE theymaterializeAnalyzeProcess risk data into decisio
41、n-makinginformationPlanTranslate risk information into decisions andactions (mitigations)CommunicateInformation and feedback throughout all riskmanagement functions and project organizationsImplementExecute decisions andmitigation action plansTrack/ControlMonitor risk indicators andmitigation action
42、sCorrect for deviations fromplanned risk actionsIdentifyAnalyzePlanImplementTrack/ControlCommunicateIdentifySearch and locate risks BEFORE theymaterializeAnalyzeProcess risk data into decision-makinginformationPlanTranslate risk information into decisions andactions (mitigations)CommunicateInformati
43、on and feedback throughout all riskmanagement functions and project organizationsImplementExecute decisions andmitigation action plansTrack/ControlMonitor risk indicators andmitigation actionsCorrect for deviations fromplanned risk actionsFigure 2: Risk Management Process Risk IDOriginatorOriginatio
44、n DateRisk TitleRisk StatementRisk ContextStatus=IdentifiedRisk Manager/Risk AnalystProject Director &/or DesigneeProject Risk Database (PRD) 1-1 Identify Candidate Risks1-3 Review Candidate Risks1-4 Record Identified Risks in Project Risk Database (PRD)2-1 Determine Risk Classification2-2 Determine
45、 Risk Impact2-3 Determine Risk Probability2-4 Determine Risk Timeframe2-5 Determine Risk Exposure2-6 Determine Risk Severity2-7 Develop Recommended Mitgations/ Contingencies Risk ClassRisk Impact, Probability, Timeframe, PriorityRecommended MitigationsRecommended MeasurementsStatus=ConfirmedStatus C
46、hange DateIdentifyAnalyzePlanImplementTrack/Control3-1 Assign Risk Owner3-4 Review Mitigations & Measurements3-5 Approve Mitigation & MeasurementsWeekly Status ReportRisk Status5-1 Oversee Action Plan Execution5-4 Report Risk Status5-7 Risk Retirement5-2 Track Action Plan & Provide Feedback5-3 Re-As
47、sess Risks5-4 Report Risk Status5-5 Maintain PRD5-6 Escalation of Project Risk5-7 Risk RetirementRisk OwnerMitigationsMeasurementsAction PlansStatus=Assigned, Approved, PlannedStatus Change DateMitigation ProgressStatus=MitigatedStatus Change DateMitigation ProgressStatus=Mitigated, RetiredStatus Ch
48、ange DateFeedbackProcessSteps1-2 Provide Candidate Risk Inputs to RM1-3 Review Candidate Risks2-8 Review Risks3-4 Review Mitigations & Measurements3-7 Update PRD4-2 Update PRD1-2 Provide Candidate Risk Inputs to RM Stakeholders, Vendors & Project TeamRisk OwnersProject Sponsor3-2 Develop Mitigations
49、/Contin.3-3 Develop Measurements3-6 Develop Mitigation/Contig. Action Plans 2-8 Review Risks as needed 2-8 Review Risks at least monthly4-1 Execute Mitigation/Conting. Action Plans5-4 Review Risk as needed5-4 Report Risk Status at least monthly4-1 Execute Mitigation Action Plans1-2 Provide Candidate
50、 Risk Inputs to RM5-2 Track Action Plan & Provide FeedbackCommunicateStep 1 IdentifyThe objective of Step 1 Identify is to search and find risks before they become problems using risk identification. Risk identification involves a process where concerns about a project are transformed into identifie
51、d risks. Identified risks can be described and measured. A detailed discussion of the identification process is provided in the sub-paragraphs below. 1-1 Identify and Collect Candidate RisksThrough the use of risk identification methods and the application of industry standards (e.g., OCIO, IEEE, PM
52、I), the Risk Manager and Risk Analyst search for and identify potential issues and concerns which could impact the overall success of the project. Methods to identify risks may include: monitoring project activities, examining artifacts and documentation, observing, interviewing, polling, surveying,
53、 brainstorming, participating in discussions and meetings, conducting focus sessions, and applying the OCIO Oversight guidelines. These potential issues and concerns result in candidate risks.Risk identification methods will collect candidate risk inputs from the Project participants. Project partic
54、ipants include the Project team, stakeholders, vendors, and the Project team. 1-2 Identify and Provide Candidate Risk Input to the Risk Manager/Risk AnalystThe Project participants, including the project team, stakeholders, and vendors, are key sources for identifying issues and concerns and submitt
55、ing these as candidate risks to input to the Risk Management process. The Project participants voluntarily submit candidate risks to the Risk Manager/Risk Analyst as input to Step 1-3.The methods used by the Project participants to submit candidate risks to the Risk Manager include, but are not limi
56、ted to, the following: verbal, email, or written communication.Project participants may submit candidate risks to the Risk Manager using the Risk Candidate Identification Form provided in Appendix B, ensuring the key risk identification components identified in Table 2 are captured. While this form
57、will be the primary tool used for this process, any communication method is acceptable. If this form is not used for submission, the Risk Manager/Risk Analyst will enter the risk data directly into Risk Radar and provide a copy of the data entered to the originator for verification. 1-3 Review Candi
58、date RisksThis step involves collecting candidate risk input from Project participants and reviewing these candidate risks. Candidate risks that can be described and measured become “identified risks”. The Risk Manager/Risk Analyst will work with risk originators and the Project Director and/or desi
59、gnee to achieve consensus on deciding whether or not candidate risks become identified risks.Reviewing candidate risks includes defining the risk and capturing appropriate information about the candidate risk to support risk analysis in Step 2 Analyze. “Defining the risk” involves understanding the
60、definition of a risk (see Appendix G: Key Terms), and applying the Criteria for Risk Identification provided in Table 1 as a guide. Table 1: Criteria for Risk Identification1. Is it a risk? Is the concern a risk? A risk is a potential event that would have an impact on the success of the project if
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 魯棒子空間聚類算法及應(yīng)用研究
- 農(nóng)村蔬菜銷售合同范例
- 指向地理綜合思維培養(yǎng)的學(xué)科融合教學(xué)策略研究
- 幾類BCH碼的參數(shù)研究
- 公司移動電話采購合同范例
- 中石化訂購合同范例
- 會子合同范例
- 公積金合同范例有些
- 光伏發(fā)電租房合同范例
- 個人器材租賃合同范例
- GB/T 44592-2024紅樹林生態(tài)保護(hù)修復(fù)技術(shù)規(guī)程
- 傳感器技術(shù)-武漢大學(xué)
- 初中數(shù)學(xué)建模研究報告
- 人教A版(2019)高中數(shù)學(xué)選擇性必修第二冊 《數(shù)列的相關(guān)概念》教學(xué)設(shè)計
- 虛勞中醫(yī)護(hù)理方案
- 2024至2030年中國調(diào)味品市場前景預(yù)測及投資研究報告
- 江蘇省南通市通州區(qū)通州區(qū)育才中學(xué)2023-2024學(xué)年英語八下期末檢測試題含答案
- 【美妝產(chǎn)品的直播帶貨營銷策略探究:以花西子彩妝為例12000字(論文)】
- 靜配中心腸外營養(yǎng)液TPN藥物配置的操作方法課件
- 2024年浙江省寧波市外事服務(wù)中心招聘2人歷年(高頻重點(diǎn)復(fù)習(xí)提升訓(xùn)練)共500題附帶答案詳解
- 廢活性炭管理制度范文
評論
0/150
提交評論