Request Risks

You can define levels of risk that requests can represent to your organization. Risk levels can then be selected from the Risk list on the Request Details window.

Defining a Request Risk

Before you start

You must have Workflow Management Set Up enabled within your General Access Security Role to work with request risks.

  1. Select the Menu button , then Admin, and then select System Administration. The System Administration window is displayed, with a menu of options available . In the Explorer pane, expand the Workflow Management group of options, scrolling down if necessary .
  2. Select the Request Risk option to display the window . (You may like to adjust the column widths to see all of the columns.)
  3. Select . A blank row is inserted in the browse table.
  4. Type the name for the risk in the Name field.
  5. To set a particular risk as the default, select the checkbox in the Default column. The selected risk will be set by default on the Request Details window.
  6. A default must be selected. This is then used if the Analyst does not specify a risk level when creating a request.

  7. Select to save the changes. Provide the Change Reasons if prompted to do so.

Changing the Order of Request Risks

You can change the order in which request risks appear in the drop-down list in the Request Details window.

Before you start

You must have Workflow Management Set Up enabled within your General Access Security Role to work with request risks.

  1. Select the Menu button , then Admin, and then select System Administration. The System Administration window is displayed, with a menu of options available . In the Explorer pane, expand the Workflow Management group of options, scrolling down if necessary .
  2. Select the Request Risk option. The Request Risk window appears. A browse table displays all of the existing risks.
  3. Adjust the order of the priorities in the table by using the and buttons.
  4. Select to save the changes. Provide the Change Reasons if prompted to do so.

Deleting a Request Risk

Before you start

You must have Workflow Management Set Up enabled within your General Access Security Role to work with request risks.

If you delete a risk, you cannot reverse this procedure. Even if you create another request risk with the same name as a deleted one, the links to existing requests will not be re-established. Requests linked to deleted risks display an asterisk beside the risk name.
You cannot delete the risk designated as the Default.

  1. Select the Menu button , then Admin, and then select System Administration. The System Administration window is displayed, with a menu of options available . In the Explorer pane, expand the Workflow Management group of options, scrolling down if necessary .
  2. Select Request Risk. A browse table displays all of the existing risks.
  3. Select the risk you want to delete. Select . If you attempt to delete the system default, you will receive a warning message.
  4. Select to save the changes. Provide the Change Reasons if prompted to do so.