Share this content:

It is necessary to put in the right mechanisms to bring to fruition a RIM Audit in an organisation. Some of the steps one has to go through are:

(I)ย  Defining the Stakeholders and Drivers
Like people, every organization is unique. Each has its own personality, objectives, stakeholders, drivers, and performance measures. The audit team must identify and understand each of these elements in order to shape the audit to meet the organizationโ€™s unique needs.

A significant step in the audit is to identify the stakeholders involved in and affected by the RIM program and those stakeholdersโ€™ drivers. Recognizing the stakeholders and
understanding their diverse drivers will provide insight into the needs driving the
RIM program audit and empower the audit team with the ability to connect
with the stakeholders in the context of their functions.

Although everyone within an organization creates records and information
and is responsible for that content, the audit team must identify and use key personnel,
or champions, from within each stakeholder group to keep the process moving. This step requires buy-in from these individuals โ€“ a task that can be handled now that their organizational drivers have been uncovered and the auditors can communicate with them on their level and in their language.

View My Business Consulting/Planning Expert Profile on mosaicHUB

Leave a Reply

Explore More

INSIDE BUSINESS: THE MAKE OR BREAK OF FIRST IMPRESSIONS

Share this content: MAKE YOUR FIRST IMPRESSION MATTER Every time someone walks into your office, they are always the first people that the visitors interact with. They say that first

CCTV INSTALLATION & MANAGEMENT: SICK OF GUESSING WHAT TO DO?

Share this content: Knowledge is power. Appended to this statement is that: “A little knowledge is dangerous”. Here is an extract from An Essay on Criticism, 1709 by Alexander Pope

Managing Cyber-crime Menace: Train, train, and more training!

Share this content: According to Techopedia, Cyber-crime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a