Search
Access Activity Risks
Perform the following steps to review Access Risk:
- As access risk is primarily associated with sensitive data (e.g., Confidential or Restricted), we recommend excluding non-sensitive files (e.g., Internal or Public) as they typically do not pose a material risk concern. This also assists in having a stronger focus to more efficiently assess key access risks.
Next, select whatever account (e.g., user, title, group or departmental) or folder or file you’re looking to assess.

In the example above, the key access risk identifies the following risk factors for User Account [email protected]:
- Held the position of Engineer with R&D department
- The 385 files are in the record types Safety, Incident Report, Meeting Report, Agreements & Contracts, Proposals, and Audits & Assessments
- The associated files contain Email Addresses
