0% found this document useful (0 votes)
575 views

ARM5 1UserGuide

This document provides an overview and instructions for using Active Risk Manager (ARM), a software tool for identifying and managing risks. It describes the ARM desktop interface and tools, how to enter and review risks, search and view risks, and generate reports. Key functions covered include starting new risks, approving risks, scoring and planning mitigations, and customizing views. The document is a user guide for navigating the ARM system.

Uploaded by

Katie Benson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
575 views

ARM5 1UserGuide

This document provides an overview and instructions for using Active Risk Manager (ARM), a software tool for identifying and managing risks. It describes the ARM desktop interface and tools, how to enter and review risks, search and view risks, and generate reports. Key functions covered include starting new risks, approving risks, scoring and planning mitigations, and customizing views. The document is a user guide for navigating the ARM system.

Uploaded by

Katie Benson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

IM Training

Active Risk Manager 5.1 User Guide


Version 1.0
Contents
What Is ARM? ...........................................................................................................................5
Folder Hierarchy.................................................................................................................... 5
What is a Risk? ...................................................................................................................... 5
Who can Identify Risks? ....................................................................................................... 6

Accessing ARM from the Desktop .........................................................................................7

ARM Desktop............................................................................................................................9
ARM Toolbar .......................................................................................................................11

Detailed Risk Entry ................................................................................................................ 12


Starting a New Risk .............................................................................................................12
The Risk Details Screen ......................................................................................................13
Approving Risks ..................................................................................................................16
Scoring Tab ..........................................................................................................................17
Plan Tab ...............................................................................................................................21
Actions Tab .........................................................................................................................22

Reviewing Risks ..................................................................................................................... 24

Searching for Risks, Plans and Actions ............................................................................... 25

Viewing Risks, Plans and Actions ........................................................................................ 26


Using the Control Bar.........................................................................................................26
Customise Columns ...........................................................................................................26

Moving a Risk ......................................................................................................................... 29


Copy .....................................................................................................................................29
Cut ........................................................................................................................................29
Paste .....................................................................................................................................30
Copying a Risk .....................................................................................................................30
Cutting a Risk ......................................................................................................................31

Filtering Records ................................................................................................................... 32


Create a Filter ......................................................................................................................32
Applying a Saved Filter .......................................................................................................34
Editing and Deleting Saved Filters ....................................................................................35

Creating a Probability Impact Diagram ............................................................................... 36

2 | Active RiskManager 5.1 User Guide


Reports ................................................................................................................................... 38
Create a Report ...................................................................................................................38
Amend a Report ..................................................................................................................40
Export Report Data.............................................................................................................40

Audits ..................................................................................................................................... 41
General Audit Search ..........................................................................................................41

Additional Help ..................................................................................................................... 42


System Support...................................................................................................................42
Conventions used in this book:
Where instructions are given for using the mouse, this refers to the left mouse button unless
otherwise indicated.
Limitation of Liability:
While every precaution has been taken in the preparation of this material the author and
publisher assume no responsibility for errors or omissions, nor for the uses made of the
material contained herein and the decisions based on such use. No warranties are made,
express or implied, with regard to the contents of this work, its merchantability, or fitness for
a particular purpose. Neither the author nor the publisher should be liable for direct, indirect,
incidental or consequential damages arising out of the use or inability to use the contents of
this material.
Terminology
Listed below are some of the commonly used acronyms within this manual.
Risk The threat that an event or action will adversely affect the ability to
achieve business objectives. Something that could happen in the
future
Issue Has already happened - probability 100%. (There may be uncertainty
over the full impact of the risk)
Interested Party If any other person other than the owner has an interest in the risk
Mitigation Steps taken to minimise the likelihood of the occurrence or impact of
the risk were it to occur

4 | Active RiskManager 5.1 User Guide


What Is ARM?
Active Risk Manager (ARM) provides users with a standard process for identifying and
managing risks that could affect the way TfL (Transport for London) operates. Any project or
business activity will have a number of risks associated. These risks can affect the outcome
of the project with negative effect.
By actively recording and managing each risk, they can be mitigated, meaning the minimum
impact will be caused to the overall project. ARM will help standardise the quality of
information relating to risks that affect TfL.

Folder Hierarchy
To further aid the management of risks, ARM has a predetermined hierarchy where specific
information can be stored. The ARM Administrator is responsible for adding new projects as
and when required.
The 4 levels consist of:

Business Unit

Project

Activity

Risk

What is a Risk?
TfL has defined business risk as the threat that an event or action will adversely affect the
ability to achieve business objectives. Business risk arises as much from the possibility that
opportunities will not be realised as it does from the possibility that threats will materialise or
that errors will be made.

5 | Active Risk Manager 5.1 User Guide


Who can Identify Risks?
Any employee can identify a risk. Where an employee identifies a risk to the running of the
business they should escalate this to the appropriate KRR (Key Risk Representative) within
their area.
A full list of Key Risk Representatives can be found on the LUL Intranet. The full intranet
address is:
http://luintranet.tfl/static/documents/fso/LU_Key_Risk_Representatives_Apr_2011.pdf

Note: This link can be saved as a Favourite in Internet Explorer.

6 | Active RiskManager 5.1 User Guide


Accessing ARM from the Desktop
Once you have logged onto your PC, Active Risk Manager (ARM) can be accessed via the Start
Menu.
1. Click on the Start Menu
2. Move the cursor to Programs
3. Navigate to the Active Risk Manager folder
4. Select Active Risk Manager (ARM)

Note: If the Remember my password box is checked, the system by-passes the log in
dialogue, and takes you directly to the welcome screen.

The Risk Management welcome screen is displayed.

The welcome screen includes the following options:


Change Instance Currently not applicable as there is only one live instance
Help Launches the ARM Online Help
What's New? Displays information about new features in the current version of
ARM
Support A hyperlink to the Strategic Thought website
Exit Exits the welcome screen without starting ARM
Auto Start Check this box if you wish to bypass the main screen on the next
start up

5. Click the Start button

7 | Active Risk Manager 5.1 User Guide


If ARM has been previously accessed on your PC, the ARM Desktop for the business area you
last worked in will be displayed. If not, then a window will open allowing a Business Area to
be selected. Your profile setting will determine the viewable business areas, which is most
cases will be only one.

8 | Active RiskManager 5.1 User Guide


ARM Desktop
It is from the ARM Desktop that all operations within the system are executed. When other
options are selected, the Desktop will always remain active.
The ARM Desktop is split into three key areas; Control Bar (Menus, toolbar and viewing
controls), Activity View (Business Folders, Activities and Processes), View Panel (display risk
data) These areas are indicated in the screen below.

Control Bar

Activity View View Panel

Control Bar gives access to ARM menus, toolbar and viewing controls to select data
to be shown in the Viewing Panel

Activity View (default view) displays, in a tree structure, the business areas within TfL

View Panel data shown here can relate to risks, plans and actions from a business
area or filtered data across many areas

After all data is entered each risk accumulates a Risk Level. This indicates the impact the risk
could potentially have on the project if not appropriately mitigated.

9 | Active Risk Manager 5.1 User Guide


The Control Bar contains 3 specific areas as shown below:

Menu The menus provide access to the all the functions within ARM

The ARM toolbar contains a set of buttons that allows you to perform
specific functions in the specific area you are working in. Note: The
Toolbar
majority of these functions are also available as shortcuts when you use the
right mouse click

None not used by TfL


Risk, Issue.. Click the dropdown to what data is displayed in the View Panel
below
View
controls No Filter Click to select an existing filter to be displayed in the View Panel
below
Click to create a new filter

10 | Active RiskManager 5.1 User Guide


ARM Toolbar
There are a number of icons used within ARM. Some can be selected and used by users.
Others show an indication of the state of the Risk or Related items.
Below are the most commonly used/viewed icons.

Icon Meaning

Maximise the screen by hiding the Control Bar area and Activity View
area

Help guide

Start and ARM tutorial

Create new Risk

Run Reports

Search by ID for a risk, issue, plan or action

Paste data

Copy selected records

Cut data

Aggregate PID

Activity / Business folder properties

Open business area

Refresh

Note: Some of these functions are available when the right mouse button is clicked

11 | Active Risk Manager 5.1 User Guide


Detailed Risk Entry
There are two ways of adding a new risk within ARM:

Enter a new risk from scratch

Copying an existing risk

Using the Detailed Risk entry screens, allows all details of a risk and its mitigation to be
entered. It ensures sufficient data recorded about the risk at hand.
The detailed risk entry screen is split into 4 tabs, each one reflecting part of the risk:

Risk: Detail about the risk, including ownership and description

Scoring: Quantification/Qualification on the likelihood and consequence of the risk


and its timeframe

Plan: What can be done to manage the risk, including high level strategies/fallback as
well as listing all related Actions

Action: What will be done to manage the risk, proactive actions, controls and
recovery fallback Actions

Starting a New Risk


1. Click on the appropriate mode in the Activity View (you may need to expand areas)

2. Click New on the menu bar, then select Risk

Note: You can also right-click in the View Panel to create a new risk or click on the
toolbar.

12 | Active RiskManager 5.1 User Guide


The Risk Details Screen
The Risk Details screen will display showing the 4 tabs (Risk, Scoring, Plan and Action). The
first tab, Risk, is shown and there are a number of mandatory fields on this screen, indicated
by the shaded yellow field.

1. Enter an ID that conforms to departmental procedure

Note: If an ID is not entered, ARM will create one when the risk is saved.

2. Enter a Title for the risk. This should be a brief high level statement that describes the
risk
3. Select an Owner by typing in a name in the format: surname, first name or by clicking on
the Group List button . This should initially be the KRR unless the Risk Owner has
already been identified
After clicking the Group List button the Owner window displays. Names appear against 2
background colours. Blue indicates a Risk Manager, and white indicates a resource that has
been assigned to a risk.

13 | Active Risk Manager 5.1 User Guide


The search function can be used to search using; Last Name, First Name or Job Title.
4. Click the required name then click Select. The name is now populated on the Risk Details
window
The Status defaults to Emerging.

Note: Your business area will have a specific process for approving risks and will be able to
choose from the list below.

Emerging - Initial status when risk is first entered

Approved - Status when the risk and mitigation plans have been approved

Closed Mitigation - Select this status if the risk cannot occur, i.e. the probability is =
zero

Closed Impacted - Status if the risk crystallises. Probability is 100% and risk/issue flag
is set to issue

Closed Expired - Status when the period in which the risk could occur has ended.
Probability = zero

KBase -XXXX

Rejected Risk was set up incorrectly and is not actually a risk

Note: For a new risk the initial risk status by default is Emerging.

Categories can be entered to make it easier to identify a risk.


Click the dropdown to the right of the category field

5. Select an appropriate Category by checking the box. Multiple selections can be made
here. Move the mouse away from the dropdown box to continue
6. Enter any Interested Parties using the Group List button. An interested party is any
person who is interested in the specific risk
7. Project Phase - Select an appropriate phase
(for non-projects choose Undefined)
8. Enter a date into the Risk due for review by field

14 | Active RiskManager 5.1 User Guide


9. Enter a Cause by clicking on the field. Use as much detail as possible so it is clear to
others what has caused the risk
10. Enter an Effect. It is important to describe what affect the risk may have on the project
11. Enter a Risk Description. A full description of the risk event

Note: Clicking the plus sign next to any of the fields expands a comments box. Or click the
Maximize Fields button (located bottom right).This is also the case when viewing existing risks.

12. Once completed, click Save

Note: If a change has not been saved, on any of the tabs, a pen symbol will be displayed to
indicate this.

If the Close button is clicked prior and changes not saved a pop up window will appear to
confirm user intention

Spell Check
Each tab holds a spell check facility.

After entering all text, click on the Spell Check button (located bottom left)

A pop up box appears, offering alternative suggestions for incorrectly spelt words.

15 | Active Risk Manager 5.1 User Guide


Approving Risks
As anyone can identify and log a risk, some areas have a process where a manager may need
to approve it. The outcome may be that they reject the risk.
Your business area will have a process for approving risks, and this must be adhered to.
1. Click on the Risk tab on the Risk Details sheet
2. Click on the Status drop-down menu

3. Select Approved
Once approved the Approval date filed will populate with the days date.
4. Click Save
Once save is pressed the Risk Status Change window appears.

5. Enter a reason for changing the Status, i.e. risk has been approved by KRR name/Meeting
etc on 1 April 2012

Note: Meaningful information must be entered into the reason box. This will ensure that
another user has a clear understanding as to why the change had occurred. This can also be
viewed in the Audit Trail. For further information refer to page 37

6. Click OK

16 | Active RiskManager 5.1 User Guide


Scoring Tab
An Impact is the loss suffered to the organisation in terms of achieving its objectives; this
may be cost, time, a decrease in quality of service or an adverse effect on LUs reputation.
The Scoring tab is used to detail the impact the risk may have. The commonly used options
to register impact are Cost and Time.
To add Impact details:
1. Open the risk and click the Scoring tab

The Risk title is copied across to this tab and an Impact ID automatically generated.
2. Select an option from the Timeframe Impact scored over drop-down menu
3. Enter a date into the Exposure Start Date field
4. Enter a date into the Exposure End Date field

Note:
Exposure Start Date This field should be used when the risk exposure commences if the
other timeframe option has been selected from the Timeframe Impact scored over field.
Exposure End Date This field should be used to state when the risk exposure concludes if
the other timeframe option has been selected from the Time Impact scored over field.

The bottom half of the screen is where the Current Impact details (left hand side) and Target
Impact details (right hand side) are logged.

17 | Active Risk Manager 5.1 User Guide


Current Impact Exposure
This is used to record the current estimate of Probability and Impacts.
The Threshold for determining whether an impact is low or high is preset by a system
Administrator. The Administrator sets the Scoring Scheme; the most commonly used is
Business Unit.
The Distribution drop-down menu defaults to Single Point. If the impact requires a Minimum
and Maximum figure added, then the Distribution menu can be changed Triangular.
5. Enter the Probability Percentage of the likelihood of the risk impact in the appropriate
field
If you are unsure of the percentage you can select from the status drop-down list, the
Probability field will automatically be populated. (E.g. if medium status selected the
probability percentage will be 35%).

The Cost and Time impact fields always remain greyed out as they are common impacts to
monitor.
6. Enter the Expected Cost impact per 1000
7. Enter the Expected Time impact in weeks
8. If any other impacts need to be logged, click on the drop-down menu under Time and
select the appropriate Impact option

9. Once selected the Expected field displays and the figures can be added. Repeat this
process if necessary
10. Click Save
Once saved, the Impact category is displayed. This is used as a guide to interpret the
consequence of a risk.
The Overall Risk Level is also calculated. Colours are also used to aid quick interpretation.

18 | Active RiskManager 5.1 User Guide


Click on the Alternative Assessment symbol

This chart can be used to directly select the rating of each impact type, based on the current
Scoring Scheme, simply by clicking in its box; however it is best practice to enter figures into
the Expected field rather then using the reasoning of low, medium, high etc. If the figures
have already been entered they will be shown on the Scoring Assessment screen.

Target Impact Exposure


When detailing risks, it is always important to note targets expected to achieve when the risk
is mitigated. The fields are identical to that in the Current Impact section.
11. Select whether the outcome is a potential Threat or Opportunity
12. Enter the Probability Percentage or alternatively use the drop-down menu to select a
level
13. Enter the Expected Targets for all of the Current Impacts populated

Note: The Target should always be lower then the Current.

14. Click Save


The Individual and Overall Risk Level are calculated.

19 | Active Risk Manager 5.1 User Guide


One Click View
It is also possible to override the Scoring Scheme and enter current and target impact
exposures directly using One Click View.

15. Click the One Click View icon


16. Click the rating for each of the Impacts (probability, cost, time etc...). The overall impact
will dynamically change as different ratings are clicked

20 | Active RiskManager 5.1 User Guide


Plan Tab
The Plan tab is used to record the planned mitigation approach for the risk. It will describe
the high-level approach and will specify the mitigation strategy to be utilised. Actions to be
undertaken as a result of the strategy to be used are created on this tab. Also, the tab will
show a list of all currently assigned actions.
1. Click on the Plan tab
On this tab, high level mitigation and contingency information of the risk can be entered.
Users are able to add, update or delete actions from this tab.

2. Enter the Mitigation Title


3. Search for and accept the Mitigation Owner details
4. Select a Mitigation Strategy

21 | Active Risk Manager 5.1 User Guide


There are seven Strategy options:

Treat Mitigation action can be completed

Tolerate Risk should be tolerated as mitigation actions are not possible or not cost
effective

Transfer The risk can be transferred to an external organisation and impacts, were
the risk to occur, would not impact TfL

Terminate The risk can be terminated

Ignore (Opp) Equivalent for Tolerate for opportunities

Monitor (Opp) Regularly review an opportunity to see if benefit can be realised

Actively Pursue (Opp) Equivalent of Treat for opportunities

5. Enter details into the Mitigation Strategy Overview fields


6. Enter details into the Contingency Plan Description field
7. Click the OK or Save button to record this plan

Actions Tab
If the plan requires actions then they must be recorded.
Having recorded a Risk click the Plan tab and click the New Action button

The Action tab becomes active

22 | Active RiskManager 5.1 User Guide


8. Enter a Title for the Action
9. Enter the Action Owner using the Group List button
10. Enter the Type of Action that is being entered

Action: One off action

Control: On going mitigation

Fall Back: Contingency

11. Choose a option from the drop down menu for the Delivery Urgency field
12. Enter the Planned Cost
13. Enter the Start Date (valid from) and Due Date (Review Date)
As Actions can be edited at any time, the Percent Complete and/or Due Date can be updated
when required.
14. Enter a Description of the Action
15. Enter any additional Comments
16. Click Save
17. Click the Plan tab to see the new action with its automatically generated Action ID

Editing Actions
Basic action data can be edited by clicking on the Action within the Plan tab.
To edit the full Action data first click in the Action on the Plan tab then click on the Action
tab. You can use the up / down arrows to navigate through them.

23 | Active Risk Manager 5.1 User Guide


Reviewing Risks
The TfL risk community have agreed that best practice indicates that all risks should be
reviewed at least every Quarter. This new Review functionality assists Users in this by
prompting them when Risks are due for Review. As part of this, the Risk due for Review
by: field has been made mandatory and should be populated with a date no more than 3
months forward of the current date.

To review a risk:
1. Locate the risk and open it
2. Click on File and select Review Risk
A Comments box will open:

3. Enter your comments to and click on OK


The current date will populate into the Last Review field
4. Enter the new Due for Review By: date

Note: The person undertaking the review should consider all aspects of the risk including
whether the scoring is still appropriate and whether the mitigation actions are progressing as
expected

24 | Active RiskManager 5.1 User Guide


Searching for Risks, Plans and Actions
If the ID of a risk, Plan or Action is already known, it can be found much quicker by using the
Go To function.
1. Click the Go Directly To button

The Go To window displays.

2. Enter the ID
3. Select the Element Type
4. Click OK
The relevant screen will open, displaying all recorded data.

25 | Active Risk Manager 5.1 User Guide


Viewing Risks, Plans and Actions
There are a number of different ways of viewing and reviewing risk information directly in the
ARM Desktop.

Using the Control Bar


From the main ARM Desktop use the Control bar to filter on Risks, Plans and Actions.

1. Click the Risk, Issue.. dropdown and select an item to view

2. From the resulting list click a column headings to sort

Customise Columns
A default set of column headings is set by your ARM Administrator. If desired you can create
and save your own set of customised headings
1. Click the Select Column Configuration button below the toolbar

26 | Active RiskManager 5.1 User Guide


2. Click New / Edit

3. The Default column configuration is shown which is non editable. Click the New
button to create your own

27 | Active Risk Manager 5.1 User Guide


4. Give a name to this configuration then check/uncheck field. You can also reorder the
list by clicking and dragging a column name.

5. To save a configuration click OK or Save


6. To apply this new configuration click the Select Column Configuration icon

Note. Once created configurations can be edited or deleted.

28 | Active RiskManager 5.1 User Guide


Moving a Risk
There may be occasions where you have entered a risk incorrectly against the wrong node
and you need to move it to the correct node. Or there may be circumstances where the
structure has changed and risks need to be relocated to new nodes within a structure. This
can be achieved by using Cut and Paste functionality.
It may also be that a risk can be shared between two structures/nodes as the new risk has
similar properties to one that already exists. This can be achieved by using the Copy and
Paste functionality.
There are a variety of methods to carry out these functionalities.
Remember that single or multiple selections can be made when copying, cutting or pasting.

Copy
1. Click Edit on the menu > Select Copy

2. Right-click on the risk from the Desktop > Select Copy from the pop-up menu
3. Click on the Copy button in the toolbar

Cut
1. Click Edit on the menu > Select Cut
2. Right-click on the risk from the Desktop > Select Cut from the pop-up menu

3. Click on the Cut button in the toolbar

29 | Active Risk Manager 5.1 User Guide


Paste
1. Click Edit on the menu > Select Paste Here
2. Right click on the Risk View area > Select Paste Risk Here from the pop-up menu
3. Click on the Paste button in the toolbar

Copying a Risk
1. Check the box of the required risk(s)
2. Copy the selected risk(s) using the preferred method. The selected records will be shown
in red text
3. Select the destination node within the relevant structure
4. Paste the copied risk(s) using the preferred method

Note: Using the Paste Risk Linked Here function, the established link does not enforce
any special behaviour on the copied risk, i.e. there is no logic of interdependencies created. It
is simply a way for users to identify that risk X has been created as a copy of risk Y.

Once the paste function has been selected, the Copy Masking window appears.

5. Check the box to indicate whether the Static, Ownership, Scoring, Risk or Mitigation Data
should be masked (removed) when copied. Multiple selections can be made here.
6. Click OK

30 | Active RiskManager 5.1 User Guide


Cutting a Risk
1. Check the box of the required risk(s)
2. Cut the selected risk(s) using the preferred method. A dashed box will be shown around
the title of each risk
3. Select the destination node within the relevant structure
4. Paste the cut risk(s) using the preferred method
5. Click OK
This method unlinks the risk from the old node and re-links it to the new node. Moving a risk
preserves any risk impact and action data. The risk may need to be re-assessed within the
new Business folder. Similarly the strategy and actions may need to be revised.

31 | Active Risk Manager 5.1 User Guide


Filtering Records
Filters provide search, filter and ordering options which can be used to locate specific groups
of items based on specified criteria. You can use the filter options on an ad hoc basis to
select what you want to view on the ARM Desktop or you can create saved filters which can
easily be used again in the future. Filters can also be used as a basis for reporting.

Create a Filter
1. Create a new filter by clicking the funnel icon from the Control bar

2. The filter screen is displayed. Click the New button

3. Enter Filter name in the mandatory field

You now need to specify the criteria:


4. Select which business areas to filter:

All Nodes Filter records from all business area to which you have access

Current Node Filter records from the currently selected business area

Select Tree Nodes Allows specific business areas to be selected

32 | Active RiskManager 5.1 User Guide


Select the filter criteria

5. Click the dropdown to select a field to filter

6. Select the appropriate logic from the dropdown

7. Enter criteria to be filtered

8. Click the Add Criteria button to further refine the filter

9. Include risks scored using a specific scoring scheme by selecting from the dropdown

Note. If this section is not visible then click the icon to expand

33 | Active Risk Manager 5.1 User Guide


Finally you need to provide a sort order

10. From the Ordering section you can specify up to 3 fields with which to order the filtered
records and their sort order (ascending / descending)

11. Click the Save button

12. Click Run Filter to apply your setting

13. Your results will be displayed and the Control bar will show the name of the filter
currently applied

14. To remove a filter click the filter dropdown on the Control bar and select No filter

Note. Filters can be set up without saving them for future use. Simply create the filter but do
not save. Just click the Run Filter button to see results. The filter button will read Ad hoc for
an unsaved set of criteria

Applying a Saved Filter


1. From the Control bar click the No Filter button to select and apply an existing filter

34 | Active RiskManager 5.1 User Guide


Editing and Deleting Saved Filters
1. From the Control bar click the No Filter button and select Edit from the bottom of the
list.
2. Click the Filter Name dropdown to select an existing filter

3. The filter criteria will be displayed. Make the changes and click Save
4. Delete the filter using the Delete button

35 | Active Risk Manager 5.1 User Guide


Creating a Probability Impact Diagram
The Probability Impact Diagram (PID) is a key visual aid to understanding your current and
target risk exposure. It represents risk impacts in terms of their probability (vertical scale) and
impact (horizontal scale). The chart is divided into cells, according to your configured
probability and impact score bands. Each cell represents the conjunction of one probability
band and one impact band. The colour of the cell indicates the overall status band, which is
assigned to that point.
When run from the Impact folder on a risk, the PID shows data for a single impact only (two
points: current and target). When run from the risk ARM Desktop an aggregate PID is
displayed, showing points for all risk impacts linked to the selected folder or activity. This
gives a quick view of the "scatter" of severity of risks linked to that folder or activity. The
user can select which risks to include in the PID Diagram.
1. Check the box(s) of the required risks
2. Click Analysis on the menu
3. Select PID

Alternatively, select PID from the toolbar.

The Aggregate PID Filter displays. If relevant the user can select whether all children
elements should be included in the PID Diagram. Users can also select whether the data
should display Summary & Stand-alone Risks or Detailed & Stand-alone Risks as well as
applying an alternative scoring scheme for reassessment.

4. Select the Detail radio button

36 | Active RiskManager 5.1 User Guide


The PID is displayed.

The above example has five probability band (vertical) and five impact bands (horizontal). The
black boxes illustrate the number of risks. White boxes illustrate the number of targets
recorded.

Changing the PID Display


The default display is Show Count. Using the options available, this can be changed to show
a count in dots or the Risk IDs in each square. The display can be manipulated to the users
requirements.

The chart can also be copied and used for use in external reports.
When in Point mode, users can interact with the chart by hovering over the dots to show the
link to the relevant target.

A summary of the risk is shown at the bottom of the screen

37 | Active Risk Manager 5.1 User Guide


Reports
ARM provides a broad range of reports driven by filtered data and produces the following
report types:

List/Data Reports

Analysis Reports

Domain Reports

Custom Reports (defined by an ARM administrator)

Create a Report
Reoports can be access by choosing Open Reports from the Reports menu

The reporting screen is displayed

To run a report use the Filter Selection to choose your parameters for the report you want to
run:
1. Under the Filter Selection section click on Change Business Area & change the Business
Area if required you require by clicking the tick box from the list available.

38 | Active RiskManager 5.1 User Guide


2. Click the Back To Reporting Menu button
3. The report will be based on filtered criteria. Click Configure Filter to select and run an
existing filter or choose new criteria (see page 28 for details on how to create filters)

4. Choose a report to run from the list

Your report will be shown

Note. Your report will be displayed in the same browser window. Use the browsers Back
button to get back to the previous screen.

39 | Active Risk Manager 5.1 User Guide


Amend a Report
If required you can amend the fields shown on the report
1. From the top of the report click the arrow to expand the options.

2. Make any required changes and click the View Report button to apply the changes

Export Report Data


1. Run the report
2. From the report toolbar click the export icon dropdown and select an option

3. You will be prompted to open or save the exported data

40 | Active RiskManager 5.1 User Guide


Audits
Most update operations within ARM are audited. This allows you to track the history of
records, e.g. when a risk was added, updated or deleted.
ARM allows you to search the audit log, if you have the appropriate role privilege.

General Audit Search


To carry out a general search, a user can enter search parameters.
1. Click on the View Menu
2. Select Audit

The Audit Search window displays.

3. Select a Function
4. Select methods to Sort the audit search using the drop-down menu. They can be sorted
by Date or by User Name, Ascending or Descending.
If there are more results than can be displayed on one page, they will be split across multiple
pages
5. Enter a Start and End Date if applicable
6. Click Search
The search data is displayed.

41 | Active Risk Manager 5.1 User Guide


Additional Help
If additional help is required, ARM has an in-depth help function.

Click on the Help menu

Select Active Risk Manager Help

Alternatively, <F1> can be used, or the Help button.

Use help by entering key words or using the hyperlinks.

Note: The Tutorial is not currently active.

System Support
If you experience any problems with ARM and require system support, contact IM Helpdesk
on Auto 1555.

42 | Active RiskManager 5.1 User Guide


43 | Active Risk Manager 5.1 User Guide
Version: August 2013

44 | Active RiskManager 5.1 User Guide

You might also like