ࡱ>  Abjbj $g1gg1g9d d    8B -]]]-------$/=2\<-];"]]]<-mQ- ]^- ]- rB*TB+P=c$ j*-g-0-*2%2B+2B+]] ]]]]]<-<-]]]-]]]]2]]]]]]]]]d X : For detailed information about contractual liability and risk assessment, always refer to the  HYPERLINK "https://www.finance.wa.gov.au/cms/uploadedFiles/Government_Procurement/Guidelines_and_templates/gs_risk_workbook.doc" Risk Workbook. The following table is the risk assessment conducted at the whole of government level for CUA ICTS2021. The risk assessment was conducted with the top 10 Customers of the CUA ICTS2021. The risks identified in this table are considered the typical risks that may arise from the provision of ICT services under the CUA with the maximum probable loss compounded to provide coverage to all agencies at the whole of government level. There may be some risks that are not applicable to your project or service procured under this CUA. Conversely, there may be project specific risks that are not listed in the table and should be included. Instructions: Consider the applicability of the Risks 1 to Risk 15 and the controls available in your agency. Assess the consequence, likelihood and risk impact of each risk (see excerpt from Risk Workbook at the end of document) using your agencys risk reference tables. Estimate the maximum probable loss that could arise as a result of each risk and update the Max Probable Loss column. Ensure the information is captured in the same format as Appendix A- Risk Register of the Risk Workbook. Add any additional risks at the bottom of the table and repeat Steps 2 to 4. Send your Request document or Quote Form together with the completed Appendix A Risk Register to your RiskCover Funds Services Contact. Project Name: ____________________ Estimated Contract Value (inc. extension options and GST): ____________________ Name of Respondent/s: __________________ Please note that the table below is provided as a sample to assist with understanding the potential ICT risk exposures and is developed by Finance for the CUA ICTS2021 from a whole of government perspective. Risk #Risk What can go wrong? Insurance/ LiabilityConsequence/ ResultControls Mechanisms in place to prevent the event occurring or limit its impactConsequence Category and Level (A)Likelihood (B)Risk Impact (A x B)Max Probable Loss A $ estimate of any costs /damages that could be incurred.1Service standards do not meet contractual requirements (leading to significant breach).Professional Indemnity, (Clause J) - Party to Party LiabilityFailure to achieve the anticipated project benefits Service level agreement not metCustomers to clearly articulate controls and measures in the order form to develop clear unambiguous scope. Customers have a responsibility to manage the performance of the Contractor. Service level agreement and financial penalties imposed if contractors fail to meet service levels. Progress meetings as part of contract management. Financial (2) about $500k Reputation (2) Project (2) Tech (2) Legal (2) Possible (2) (at an individual agency level)Moderate (4)$1.5 million2Incomplete data capture from the old system, unauthorised changes to data during migration or data migration failure. Professional Indemnity, (Clause J) - Party to Party Liability, (Clause L) Loss of DataContractor causes a loss of data/ data corruption for the Customer (e.g. during migration) Most Public Authorities have data backup. Agencies have an implementation plan prior to any data migration. Contractors will only work on test environments and have strict checks before implementation in production environments. The Buyers Guide will include information to explain risks around data losses and Financial (3) Technical (3) Reputation (3) Legal (4) Project (3) Possible (2)For Financial, Technical, Reputation and Project: Moderate (6) Legal: High (8)$5 million3Breach of confidentiality/ security of working files compromised during migrationProfessional Indemnity, (Clause I) - Party to Party Liability Breach of Privacy Act and confidentiality of data and information is compromised. General conditions of contract and applicable legislation and regulation. Contractors have to sign acceptable use agreement. Contractors may not have access to agencys computer network. Agencies requests for Police clearances and integrity check if Contractor is required to work with confidential information. Agencies specify on the Quote Form the information that is confidential. Agencies require Contractors to sign confidentiality agreements.Reputation (2) Legal (2)Possible (2)Moderate (4)None4Damage to agencys property or ICT equipment causing system error or system downtimeLiability GeneralEquipment needs to be replaced Project delayedThe General conditions of contract protect the customer against Faulty or Unsatisfactory services. Under this clause the Contractor must re-supply the service at no cost, does not have to pay for the Faulty Service and the customer may seek reimbursement for cost of substitute services and the expenses resulting from having to purchase substitute services. Specific service level agreement and penalties if contractors fail to meet service levels. Agency has disaster recovery planFinancial (2) Commercial (2) Technical (2)Possible (2)Moderate (4)$1.5 million5Occupational health and safety (OSH) event where CUA Contractors attending unfamiliar sites do not receive OSH information from Public Authority.Public LiabilityPersonal injury to Department employees or visitorsBuyers Guide and Customer education to emphasise need for public authorities to provide advice on OSH. Requirement for Contractors to hold Workers Compensation insurance cover as a condition of contract Contract Manager to monitor that CUA Contract complies with condition of contract i.e. holds Workers Compensation for the term of the CUA.Operational/ Compliance (2)Unlikely (1)Low (2)None6Motor Vehicle incidentMotor Vehicle InsuranceA service may require the specified personnel to travel to an Agencies location to deliver the service Ie IT support for Agriculture Company from Perth is required to travel to Bunbury and crash the car. Require Contractors to hold Motor Vehicle insurance cover as a condition of contract Contract Manager to monitor that CUA Contract complies with condition of contract i.e. holds Motor Vehicle for the term of the CUAOperational/ Compliance (2)Unlikely (1)Low (2)$30M is considered appropriate7System development model or tools recommended by Contractor not suitable for delivery of the system causing unforeseen system or interface failure during development (such as hardware, software, development tools, financials)Professional Indemnity (Clause I) - Party to Party Liability, (Clause J) Indirect LossesProject delayed or terminated Further budget required to rectify error to system Failure to achieve anticipated project benefits General conditions of contract protects the customer against Faulty or Unsatisfactory services where the Contractor must re-supply the service at no cost, does not have to pay for the Faulty Service and the customer may seek reimbursement for cost of substitute services and the expenses resulting from having to purchase substitute services. Most Public Authorities have data backup. Agencies have an implementation plan prior to any data migration. Contractors will only work on test environments and have strict checks before implementation in production environments. The Buyers Guide will include information to explain risks around data losses andFinancial (2) about $500k Reputation (2) Project (2) Tech (2) Legal (2) Unlikely (1)Low (2)$ 0.5 million8Underestimation of technology capacity requirements (workstation, server, LAN, WAN or others)Professional IndemnityProject delayed or terminated Further budget required to rectify error to system Failure to achieve anticipated project benefits General conditions of contract protects the customer against Faulty or Unsatisfactory services where the Contractor must re-supply the service at no cost, does not have to pay for the Faulty Service and the customer may seek reimbursement for cost of substitute services and the expenses resulting from having to purchase substitute services. Agencies have an implementation plan prior to any environment going live. Contractors will only work on test environments and have strict checks before implementation in production environments. Change management controlsFinancial (2) about $500k Reputation (2) Project (2) Tech (2) Legal (2) Unlikely (1)Low (2)$ 0.5 million9Unauthorised changes to scope by contractor Professional Indemnity (Clause I) - Party to Party Liability, (Clause J) Indirect LossesDamage to ICT environment and equipment needs to be replaced Budget required to rectify error Project delayed General conditions of contract protects the customer against Faulty or Unsatisfactory services where the Contractor must re-supply the service at no cost, does not have to pay for the Faulty Service and the customer may seek reimbursement for cost of substitute services and the expenses resulting from having to purchase substitute services. Agencies have an implementation plan prior to any environment going live. Contractors will only work on test environments and have strict checks before implementation in production environments. Robust governance framework for scope changes prior to any changes going live. Progress meetings as part of contract management.Financial (2) about 500k Reputation (2) Project (2) Tech (2) Legal (2) Unlikely (1)Low (2)$ 0.5 million10Untested changes are made to the production environment during implementation causing unforeseen problemsProfessional Indemnity (Clause I) - Party to Party Liability, (Clause J) Indirect LossesBudget required to rectify error Project delayed General conditions of contract protects the customer against Faulty or Unsatisfactory services where the Contractor must re-supply the service at no cost, does not have to pay for the Faulty Service and the customer may seek reimbursement for cost of substitute services and the expenses resulting from having to purchase substitute services. Robust governance framework prior to changes going live. Progress meetings as part of contract management.Financial (2) Project (2)Possible (2)Moderate (4)$ 0.5 million11Failure to complete the project by the specified implementation date(Clause I) - Party to Party Liability, (Clause J) Indirect LossesBudget required for an interim solution Project delayed General conditions of contract protects the customer against Faulty or Unsatisfactory services where the Contractor must re-supply the service at no cost, does not have to pay for the Faulty Service and the customer may seek reimbursement for cost of substitute services and the expenses resulting from having to purchase substitute services. Robust project management process Service level agreement and financial penalties imposed if contractors fail to meet service levels. Progress meetings and regular reporting as part of contract management. Agencies implement pricing models linked to key milestones and key performance indicators. Financial (3) Project (3) Possible 2Moderate (6)$5m12Unacceptable system performance, both in relation to availability and response timesProfessional Indemnity (Clause I) - Party to Party Liability, (Clause J) Indirect LossesAgencys services to their customers affected System downtime Budget required to rectify errors Project delayedClear unambiguous scope Customers need to clearly articulate controls and measures in the order form. Customers have a responsibility to manage the performance of the Contractor. Service level agreement and financial penalties imposed if contractors fail to meet service levels. Progress meetings as part of contract management. User Acceptance Testing clauses in General Conditions of Contract and Schedule 13 in Request. Agencies have an implementation plan prior to any environment going live. Contractors will only work on test environments and have strict checks before implementation in production environments. Financial (2) Project (2)Possible (2)Moderate (4)$ 0.5 million13Contractor with government email misuse the government identity Professional Indemnity (Clause I) - Party to Party Liability, (Clause J) Indirect LossesFraud Conflict of Interest General conditions of contract and applicable legislation and regulation. Contractors have to sign acceptable use agreement. Contractors may not have access to agencys computer network. Agencies requests for Police clearances and integrity check if Contractor is required to work with agencys email and resources.Reputation (2) Legal (2)Possible (2)Moderate (4)None14Staff proposed in the tender response are not provided under the contract.N/AFailure to complete the project by the specified implementation date. Financial and resource blow out This transition of resources may cause some time delaysGeneral terms and conditions protect for this, the resources provided must have similar skills and experience and it is at agencys discretion to accept alternate staff proposed. Contract management processes to ensure alternate staff is performing to the required standards. General conditions of contract protects the customer against Faulty or Unsatisfactory services where the Contractor must re-supply the service at no cost, does not have to pay for the Faulty Service and the customer may seek reimbursement for cost of substitute services and the expenses resulting from having to purchase substitute services. Financial (2) about $500k Reputation (2) Project (2) Tech (2) Legal (2) Possible (2) (at an individual agency level)Moderate (4)$1.5 million15Loss of key project staff during the contract period N/A (Potential for (Clause J) -Indirect losses)Project delayed Financial loss Loss of knowledge in respect to key aspects of the project part way through the projectTender documents require Contractors to provide methodology to ensure continuity of service for the duration of the project, transition in and out approach and resourcing strategy. This will be assessed during the evaluation. Service level agreement and financial penalties imposed if contractors fail to meet service levels. Progress meetings as part of contract management.Financial (2) about $500k Reputation (2) Project (2) Tech (2) Legal (2) Possible (2) (at an individual agency level)Moderate (4)$1.5 million16Insert any additional risks that may arise in your procurement      Risk Assessment Guide under CUA ICTS2021 *For CUA ICTS2021 procurements only. Please do not circulate for use beyond procurements under CUA ICTS2021* Page |  PAGE \* MERGEFORMAT 2 ^_   ) 0 I J R Z [ \ ] P Z   p q r ʾƺƶxhHhm5B*phh,h(5 h i5h,hH5h,hm5hHhm>*hmhmh)5h)hHhy]hxh(h1h1h10J5CJjh1h15Ujh1h15Uh1h15- q r e =>abgdx&$d%d&d'dNOPQgdPj & Fgdm & FgdH$a$gd,   ! & ( @ X ! 4 d ﴇyk]hCJOJQJ^JaJhz.CJOJQJ^JaJhHCJOJQJ^JaJhkCJOJQJ^JaJh/{CJOJQJ^JaJ hHhHCJOJQJ^JaJhPjCJOJQJ^JaJ hHhmCJOJQJ^JaJhxCJOJQJ^JaJh1CJOJQJ^JaJ hHhz.CJOJQJ^JaJd e :<=>abϾϞn`ZTTTNZNEAhxhHhPj^J hDkK^J hH^J hPj^Jhz.CJOJQJ^JaJ hxhxCJOJQJ^JaJhxCJOJQJ^JaJ hHhHCJOJQJ^JaJh1CJOJQJ^JaJ#hHhH5CJOJQJ^JaJ h1hHCJOJQJ^JaJhHCJOJQJ^JaJ#h,hH5CJOJQJ^JaJ hHh1CJOJQJ^JaJ4Up}HIghklvwz{ŹŹŘŘthmhz.6CJaJhmhz.5CJaJh4jhH5CJaJhH5CJaJh4jhz.6CJaJh4jhz.6CJaJh4jhz.5CJaJhz.5CJaJhPjhxh(6B*phDEhy]6B*phDEhk6B*phDEhxhx6B*phDE&Ihlw{7$<<$Ifa$gdDkK$<<$Ifa$gdz.FfA$J$If^Ja$gdJ$If]^JgdPj J$If^JgdDkK$J$If^Ja$gdz.7Puv46./4COXbcdq³thtttttttth_JB*CJaJphhxhz.B*CJaJphh4jhz.CJhz.CJOJPJQJhhnCJOJPJQJhhhnCJOJPJQJhhz.CJOJPJQJh4jhz.CJaJhz.CJaJh4jhz.CJ^Jhz.CJ^J h4jhz. hmhz.6B*CJaJph(7Pv64COXbc $$Ifa$gd$<<$Ifa$gd$<<$If]a$gdPj&$ & F d<<$If]^`a$gdPj & Fs$If^`sgdDkK H$If^HgdDkKcdq%?w $If^gdDkK & Fs$If^`sgdDkK H$If^HgdDkK$<<$Ifa$gdDkK$<<$Ifa$gdz.Ff$H$If^Ha$gd$ H$If^Ha$gd$ $Ifa$gd q%?+fx #1@JVWd,øøh4jhz.CJOJPJQJhz.CJOJPJQJ^JaJ$hhz.CJOJPJQJ^JaJh4jhz.CJaJhz.CJaJh4jhz.CJ hz.CJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJph4#1@JVWd$<<$Ifa$gdz.Ffv $H$If^Ha$gd$ H$If^Ha$gd&$ & F d<<$If]^`a$gdPj,S#a'hw$H$If^Ha$gd$ H$If^Ha$gd&$ & F d<<$If]^`a$gdPj & Fs$If^`sgdDkK H$If^HgdDkK$<<$Ifa$gdDkK,45QS#F`aw%'HfghwҲ²£~xooh4jhz.CJ hz.CJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJphh4jhz.CJOJPJQJh,CJOJPJQJ^JaJhz.CJOJPJQJ^JaJ$h*hz.CJOJPJQJ^JaJh4jhz.CJaJh/\CJaJhz.CJaJ) )9+:HUb$ H$If^Ha$gd"$ & Fsd<<$If]^`sa$gdPj & Fs$If^`sgdDkK H$If^Hgdz@%$<<$Ifa$gdDkK$<<$Ifa$gdz.Ff  )9=+:HUbopqr@Hҽ}wnnween]hz.CJaJhJ*hz.CJh4jhz.CJ hz.CJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJphh4jhz.CJOJPJQJhz.CJOJPJQJ(hVhz.CJOJPJQJaJnH tH hg7hz.CJOJPJQJh,CJOJPJQJh4jhz.CJaJhI1CJaJ$boprIqqq$ H$If^Ha$gd"$ & Fsd<<$If]^`sa$gdPj & Fs$If^`sgdDkK H$If^HgdDkK$<<$Ifa$gdDkK$<<$Ifa$gdz.Ff$H$If^Ha$gd HI - !!!!!$!%!?!f!n!o!p!!!!!!""+","?"@"^"""˼˼h/\CJaJ(h4jhz.CJOJPJQJaJnH tH hz.CJaJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJphhz.CJOJPJQJhJ*hz.CJOJPJQJh4jhz.CJaJ8- !!!!|Ff$H$If^Ha$gd$ H$If^Ha$gd"$ & Fsd<<$If]^`sa$gdPj & Fs$If^`sgdDkK H$If^HgdDkK$H$If^Ha$gdz.FfA!!@"^"""""$E$%R%l%{%%%%$<<$Ifa$gd&$ & F d<<$If]^`a$gdPj $IfgdDkK & Fs$If^`sgdDkK H$If^Hgd~9 H$If^HgdDkK""""#$$E$$%Q%R%f%g%l%{%%%%%%%%%%%%&5&6&T&&&&&'((A(W((((())))")+)³}}}泧hz.CJOJPJQJhz.CJaJ h4jhz.hmhz.B*CJaJphh_JB*CJaJphhxhz.B*CJaJph(h4jhz.CJOJPJQJaJnH tH hMhz.CJOJPJQJhg7hz.CJOJPJQJh4jhz.CJaJ1%%%%%%%&6&T&&&&(x&$ & F d<<$If]^`a$gdPj & Fs$If^`sgdDkK H$If^HgdDkK $IfgdDkK $$Ifa$gdz.Ffs#$H$If^Ha$gd$ H$If^Ha$gd ((())")+)5)6)C)K)Y)Z)\)) $IfgdDkK $$Ifa$gdz.Ff ($H$If^Ha$gd$ H$If^Ha$gd$<<$Ifa$gd&$ & F d<<$If]^`a$gdPj+)5)6)C)K)Y)Z)[)\))))))))))!*B*R*S**+++++m,,,,,,,,,,--"-+-5-øððøøzzkhhz.CJOJPJQJhhnCJOJPJQJhMhz.CJOJPJQJhz.CJOJPJQJhg7hz.CJOJPJQJh/\CJaJh4jhz.CJaJhz.CJaJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJphhxhz.B*CJaJph*)))!*B*R*S*+m,,,--"-+-5-$<<$Ifa$gd&$ & F d<<$If]^`a$gdPj $IfgdDkK & Fs$If^`sgdDkK H$If^HgdDkK5-6-C-K-Y-Z-\-]------ ..!.".C.S.T..////000$000=0I0J0X0Y0[0\000000000 1111t2u2øððøøøððøøhhz.CJOJPJQJhz.CJOJPJQJhg7hz.CJOJPJQJh/\CJaJh4jhz.CJaJhz.CJaJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJphhxhz.B*CJaJph25-6-C-K-Y-Z-]---".C.S.T./x&$ & F d<<$If]^`a$gdPj & Fs$If^`sgdDkK H$If^HgdDkK $IfgdDkK $$Ifa$gdz.Ff,$H$If^Ha$gd$ H$If^Ha$gd //0$000=0J0X0Y0\000 11xx & Fs$If^`sgdDkK H$If^HgdDkK $IfgdDkK $$Ifa$gdz.Ff>1$H$If^Ha$gd$ H$If^Ha$gd&$ & F d<<$If]^`a$gdPj 11u222C3333333333324 $$Ifa$gdz.Ff5$H$If^Ha$gd$ H$If^Ha$gd&$ & F d<<$If]^`a$gdPj $IfgdDkKu22222222 3"3A3B3C3333333333333333333333324I4Q4R4į~vkkvvch/\CJaJh4jhz.CJaJhz.CJaJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJphhIB*CJaJph(h4jhz.CJOJPJQJaJnH tH "hz.CJOJPJQJaJnH tH hz.CJOJPJQJhhz.CJOJPJQJhhz.CJOJPJQJ&24I444444c556F66g7h7v7777$ H$If^Ha$gd $If]gdPj&$ & F d<<$If]^`a$gdPj & Fs$If^`sgdDkK H$If^HgdDkKR4x4y444444444c55555566D6F66666g7h7v77777777777778885868I8J8P8f8ʻʻ嬬 h4jhz.hmhz.B*CJaJphhxhz.B*CJaJphhxhz.B*CJaJphhMhz.CJOJPJQJhz.CJOJPJQJhhz.CJOJPJQJh4jhz.CJaJh/\CJaJhz.CJaJ0777778J8P8f888!999x$ H$If^Ha$gd&$ & F d<<$If]^`a$gdPj & Fs$If^`sgdDkK H$If^HgdDkK $IfgdDkK $$Ifa$gdz.Ffp:$H$If^Ha$gd f8x88888889 9!979H9M9\999999999999(:):-:s:::::::ʻ~~~uj__~hhz.CJaJhhz.CJaJhhz.CJh4jhz.CJaJh4jhz.CJ^JaJh4jhz.CJ hz.CJ h4jhz.hmhz.B*CJaJphhxhz.B*CJaJph$hhz.CJOJPJQJ^JaJhz.CJOJPJQJ^JaJ$h*hz.CJOJPJQJ^JaJ#9999999):-:s:::;m&$ & F d<<$If]^`a$gdPj & Fs$If^`sgdDkK H$If^HgdDkK$<<$Ifa$gdDkK$<<$Ifa$gdz.Ff ?$H$If^Ha$gd$ H$If^Ha$gd :9;};;;;<7=8=L=M=R=a=m=v============>>>>>>1>2>B>Q>¯~vkkckkvv[vkkkh/\CJaJhCJaJh4jhz.CJaJhz.CJaJ h4jhz.hmhz.B*CJaJphh_JB*CJaJphhxhz.B*CJaJph$h4jhz.CJOJPJQJ^JaJ$hhz.CJOJPJQJ^JaJhz.CJOJPJQJ^JaJhz.CJOJPJQJhhz.CJOJPJQJ#;;7=8=R=a=m=v========FfC$H$If^Ha$gd$ H$If^Ha$gd$<<$Ifa$gd$ d<<$If]^a$gdPj&$ & F d<<$If]^`a$gdPj==>>2>>>>??"<@K@~~nn$<<$Ifa$gd&$ & F d<<$If]^`a$gdPj"$ & Fsd<<$If]^`sa$gdPj & Fs$If^`sgdDkK H$If^HgdDkK $IfgdDkK $$Ifa$gdz. Q>>>????????? @!@"@6@7@<@K@W@`@j@k@x@@@@@@@@@@ѿ敉zzk``h4jhPjCJaJhPjhPjB*CJaJphhPjCJaJ h4jhz.h_JB*CJaJphhxhz.B*CJaJphhz.CJOJPJQJhhz.CJOJPJQJ"hz.CJOJPJQJaJnH tH (h4jhz.CJOJPJQJaJnH tH hMhz.CJOJPJQJh4jhz.CJaJ K@W@`@j@k@x@@@@@@@@@ & Fs$If^`sgdDkK H$If^HgdDkK $IfgdDkK $$Ifa$gdz.Ff;H$H$If^Ha$gd$ H$If^Ha$gd$<<$Ifa$gd @@@@@@@@AAAAAAAAA A A A A AAA$A.A6A7A8A?A@AHAIAUAĶsdUsdhy]56B*CJaJphh i56B*CJaJphh 56B*CJaJph#h h 56B*CJaJph hy]5 h 5hHh 5hr+rjhr+rUh(jhPjUmHnHuhH h4jhPjhmhPjB*CJaJphh4jhPjCJaJhPjCJaJhMhPjCJOJPJQJ!@@@@@@@@AAAAAA A A AAgdHFfL$H$If^Ha$gd$ H$If^Ha$gd$<<$Ifa$gd"$ & Fsd<<$If]^`sa$gdPjA7AAAAAAAAA$a$gdH UA\AAAAAAAAAAAAAAAAAAûûîh(hr+rh imHnHujh Uh hHh 5hy]56B*CJaJph#h h 56B*CJaJphh 56B*CJaJph9&P1h0:p(] A!"#$% @=+δˊC!5]j4bpK+x͝]Uun0  z/L)a"&Ĥꘌ4hBI2fB*SմE><߶c_[bk[5笹g=grU>ʳZ}9ܛZ$5IV~Xr)IrS=AA4Y[]KF"لB` ({zҠէ/FG/_=UHvuk3d~|`q! #ұ'NPG3?}}dL,g,K~u|%^z. uzò[-K.ћЯ܍(k3O{sy0O%g n$& e_fntnY&=y*/6)OnKv$ˡ:TX=d,x514܈;sd?#2m2(6 U>6f'ԫc$_m_l_``? (] *]av`ټ 㗳{Sg[_֥ne3򪬔_֠W_yUR$gWIfl':nDf G !/r^QAYpLvf+mgߛL$FwOF }׺[eH#mά7ݙtu'qwgNDvۍ{Y5= 9ΛmCvB&/ʠ;yYѢ+}km8r7a:e4"|ؚ-ͥc}||zrYy%ϼ22[i`#^r~@*J %Bx*UJ7ͪh.29C;^K<1V8ʹGy W޵G疱su17fe2B.7ryYiv> bluDNJS>ٳݷ_j/?֥2״ڳݰ)ɳ>/#%&<<L?A?9)eu$iO~:ܓ&OvOZkZ+'%s:Kx[v ֈ4^uD2o-8_clWݧXC?4v?;t _,9e5=+|ſk`vO;e$ 1ha< P >-:@1ڶ4󏪹C]ճܒ·?9ܱ+4+3.#O|;+3ҝP><q>B"ǖ Zdςo[}Fmڨ=kvZ]2FzkNk dkZdWDjv/G?گ9hVyZC1xAΗg:o-)ۓq>%0\zUey| rUvS 5יڳ ƋtYyoNSclQos}AW^mr'VK3تڵ;C DLӠ]E}q-X:"ʋ|_+2tǘc4s}b,Yn;ϳ-P^8}k4UrAz\L^ jFhڠ,O{γt{gu>O[yюA;.l_ ;(&OS&cs'ǯ1 yЪlؤ<\iPZr8PcyiXkǽw y4/QDKVLu ^3InSo:s>쵱X;><Qצo]S{mϜtWSw>Q]{m-fO{[ƹ&?Ο+3"M^c# eq7oٿ`Puw:\m@fP?:~>w1΁leJ?3S Pwn|0o\NiY[ =zhЎ_i!R~#@^_O_N}!pLǿDݶv<|Ʈ?yq.rU1'{;{I?<zigsem}Y{< lׇo OjV0 BOZ֥9"O';GUV7yZvO±GƬ eY hoߢvy2.Tc̰EqA9cs!6:sZ2 d58!xjerҌ~܀ںbVyj6:sCIf_Fh#.(|]%v[=}N|=\GP>n?1ϗRq~ȵAϛ_꒞ٽX82gƹRW0N_Fm5zm5ڀy1 cХ //Og"e:w@Ooe݈7b'ͅV<À;S)/ͼ_#.E{TǙ8Ş,]?|Γ2஫욫^Mul6Dž@o]W&m墟Щl'S>[8>2?v1ȵ9"x0ݡ֤L{D̫>Xמ ln[Yl8.:Y6!e6OB|́s=CzzA:-bs"MUib|ik 6(u [AL!̒,eJ8O{˒G<%|'|wKXofߣ8Ao"%hر?wwzp;wf8v/qK<({`<bN~s{?{B s{B?\xG9b$'O j=!?{BżfOH{~sc<ύ+WՇ3=._o}Gi]w=t܁u^BkKϽ&y)_C}-R=5Zh_|#Ç(ۖe_DůヾyRCʗ1xMpDcqVOU][6$yAJDlih-2# ƳOUݱ'<1hqly]zbꎿ1b2KK쐧ꩲc ^8?Ku&Og#Ws s{{iF܍Lg;VѬ.D}9nUo$?!Oȵ͙#P|^;ÌV(M1W"]mآMmMCȵAMOvn-&¦5Ե],E (#MUzEˣ/P.%ɳ3>68y✓?ۖ> ]Dc+S,˻ߠ f zdo3ݛLyv!cF308vs{?;?Cj=9>ͫ G1zyڠ,Wl۵Q?"ꮪuGϰ{i~U3cǹ2JS/ŜzWaʫ{ :ttC*{y5ۻ;pڱw>ձ'ؤ4g$W-2>ͳ{2gKc <EiC 68b0 mG[S:OAJzw܈.~m׏7Of:+)鼣kUx^̺ᱟ"yu7W1:}w>iHf+{^?*g-`,G;вѣ_|Kd'ȑnAwTNCoJv~a[zZ.B5E۱6LjϞ9zڠ∵dgn7s8l=x&x9> oS齢yb53w$~uż3/}fƾ f-\[ZG-`f9VFr<Э4yVvLc^KkΟ<篆\&Xj:q:p< J~xݧ>Ǩ'®;ձm"0=ư,slɺحն/1ۀ(+z"s{Xzǿ~Uw_m;-Y|>-ץ\XElD;V1ǹ啋q\ Pvx!|N?[ʹeKz9رC[#l2|XO;2k7NCv\lAqnB>ӽR,~=qFxdc?Bti>[J !q}y]C(#X7X8g2d۠,VǡyV;[D6q}Uq*M[si_Fb[߭_ش2r8_Z]?} ]˼}͌f|==sd# ȴAY̟|3Ji~+4ZལW`՘|Ӿ59zd~|\#Nƻ0>D/bҭ/deFl;?."N}q±9c>aƬS~$v赞;]y^Fj1ZE3?IwI}ָx+'}nd#w7*|-їaq ۍSED񰮜yz\}G^cEiu:8w~k)g iAq=+@~.oط#/⼷Oڸ cW٠\E][Xs/,!O;ʎ1x>³ٰղϧssq: vd:sS"|> 3}wyMN\oZ5byuc]F^e"fbףoduFoO=Kr[6֞K@ Q]%g>1c(tz)O94+Uh[ȋ8f:Oh~d qЇ%:婳\Xzҧ͎11 |{Kw%0׊CJv7][w(`,<=ak?9>y_UqOr\ kl1.9\SK3h>ZiEC.s=373g*,OӧgqmNkw.;:?]`ĥN]io+r+ȧkm]Хa?!=t87_ƋqO6e=61ro0cޱ3vnqK Wo;3)~7'u~(龹S^?:'3[շLkSQrmPq\o֯8{^ O}ϝކ%#OthUccׁs׍ϝmIxS?OG񰰿بն*4tyr^X2_mPqun Bh:vBZyR霄w)fE&|n""/P|m=F~hʲw+z~Fw|=6} f%w?3xqU~ؘ3-}]VF;t(z{QVcU-?2B~^>/0{#z8׵г*x <=3 jN&0vwh=; :Ľ\U"uGw!G־'-rO1cf/][^?cW'Ww1a9[aLǾdly~koܕ|^䩳\XTO|>^<'61ceQ%A9}d\ydޙ|D~u@WٹJ U/;=P%l ~8o vMux&/y&z~%'~+=|wd{i|(c&p0l+rjKluG&8"&Tvl:'cG )U~yc @GL~ӔEiC?1A6tq%:s))OgSVj ^ٿFA9Aa]̥<-ʴ@^>sVU7VG=9"9_Uex^eK?I eS3dw>M)Vw׻DzH ,ӦwU߱O˅0hs,PʋuK4!68"g'!xP.ǚ3Av&a[h>8gڰЎSֳ1h-tnT:]S:=6(u%Џ'[U$/S1arU6lgA+C[#b6nƞb=5?*G^q~csasGGyUz87;밾 @RZv/97R뙀NyM{17'˕qހJ^{iRtq&s%ݷ>$^ x7v])d3)Rlܽt`/<-+)k;_~3*#=7tIau81]7ȵAYL7CF캟u4&c P?pqahQ56 Se vv%fiIo;!#>һf繷p+~772Agފsb9ZYΧ4kۣ tx~bX'PVRY=8sDyK yK https://www.finance.wa.gov.au/cms/uploadedFiles/Government_Procurement/Guidelines_and_templates/gs_risk_workbook.docyX;H,]ą'c$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V 4  tZþþþ0O65S5 5C555V555 W4apZþþþytPjkds$$If4 r4;BGOS CVW  tZþþþ0O6$$$$4apZþþþytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd $$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkdD$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkdv$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd!$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkdA&$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd*$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkds/$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd 4$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd8$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd>=$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkdA$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkdpF$$If r4;BGOS CVW  tZ0O6$$$$4apZytPj$$If!v h#vS#v #vC#v#v#vV#v#v#v W:V   tZ0O65S5 5C555V555 W4apZytPjkd K$$If r4;BGOS CVW  tZ0O6$$$$4apZytPjx>666666666vvvvvvvvv666666666666666666666666666666666666666666666666666666686666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p0PV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666OJQJ_HmH nH sH tH @`@ (NormalCJ_HaJmH sH tH bb ?- Heading 1$dx@&$B*CJ,PJ\_H mH phNj]sH tH PP ?- Heading 2 $@&B*CJ PJ\phLj]tH hh ?- Heading 3$<@&,B*CJPJ\^J_H aJmH phNj]sH tH ZZ ?-0 Heading 4 $@&!B*CJPJ_H aJmH phDEsH DA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List PP ?-Heading 1 CharB*CJ,PJ\^JaJphNj]\\ ?-Heading 2 Char(B*CJ PJ\^J_HaJmH phLj]sH PP ?-Heading 3 CharB*CJPJ\^JaJphNj]N!N ?-0Heading 4 CharB*CJPJ^JphDEtH V>V ?-Title,a$m$!@B*CJ4KHPJ^JaJ4phNj]^A^ ?- Title Char1@B*CJ4KHPJ^J_HaJ4mH phNj]sH tH FU@QF ?- Hyperlink>*B*CJOJQJ^JphDE.X a. ?-0Emphasis6]^ ^ ?-p TOC Heading$@& B*CJPJ^JaJphtH ** ?-TableDD ?-Table-no spacing^Jf@f ( List Paragraphd^m$CJOJPJQJaJtH 4@4 H0Header  B#FF H0 Header CharCJ_HaJmH sH tH 4 @4 H0Footer  B#FF H0 Footer CharCJ_HaJmH sH tH PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vj\{cp/IDg6wZ0s=Dĵw %;r,qlEآyDQ"Q,=c8B,!gxMD&铁M./SAe^QשF½|SˌDإbj|E7C<bʼNpr8fnߧFrI.{1fVԅ$21(t}kJV1/ ÚQL×07#]fVIhcMZ6/Hߏ bW`Gv Ts'BCt!LQ#JxݴyJ] C:= ċ(tRQ;^e1/-/A_Y)^6(p[_&N}njzb\->;nVb*.7p]M|MMM# ud9c47=iV7̪~㦓ødfÕ 5j z'^9J{rJЃ3Ax| FU9…i3Q/B)LʾRPx)04N O'> agYeHj*kblC=hPW!alfpX OAXl:XVZbr Zy4Sw3?WӊhPxzSq]y 9I  d q,H"+)5-u2R4f8:Q>@A!#$%'*-/1479=?7!%()5-/12479;=@A"&()+,.023568:;<>@BDEGIJ^9X!l,"$δˊC!5]j+;@(  V  3 A #" `?B S  ?99,#03t@ pr99999 9 9 9999 99999 9 9 99993345 +,!!!!%% &&((((Q,R,x,y,005060669945 +,!!!!%% &&((((Q,R,x,y,0050606699U0 PN%,pX!u\b^h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH!uU0%,p P                                    j"Hy]@ OC [ ,i(9 M"z@%;(e)k,?-z.-A0I1>4oHDkK(O'Q-Uh[/\q`#ame=fPjUlBmhnr+r\mv5x/{#}x1.WCN>^YbiY0 i-]0_Jod6C$m #a>WYy[KL;k:~U4: ^} S2-9Ia$r3~9N fJA#uxT) ).Z99@     9H@UnknownG.[x Times New Roman5Symbol3. .[x Arial7..{$ CalibriC.,.{$ Calibri Light?= .Cx Courier New;WingdingsA$BCambria Math"qhʒʒ0g0g!n2088bE  3qHX $P(!xx8  Jessie YeowOsment, Olivia    Oh+'0d   , 8DLT\ Jessie Yeow Normal.dotmOsment, Olivia2Microsoft Office Word@ @B$ @B$ 0 ՜.+,D՜.+,@ hp  Department of Financeg8  Titlel 8@ _PID_HLINKSA$N;uhttps://www.finance.wa.gov.au/cms/uploadedFiles/Government_Procurement/Guidelines_and_templates/gs_risk_workbook.doc  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abdefghijklmnopqrstuvwxyz{|}~Root Entry F?c$ Data cO1Table2WordDocument$SummaryInformation(DocumentSummaryInformation8CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q