Use case

A new activity needs a risk assessment. Who's doing it and how?

Create a structured risk assessment using templates, score each risk, document mitigations, assign follow-up tasks. Send it to everyone involved; they acknowledge before the activity starts. Six months later, acknowledgements stay timestamped on one record.

Right now, risk assessments are created once, filed somewhere, and rarely revisited.

A school trip is being planned. Someone creates a risk assessment in Word, emails it to the trip leaders, and it gets saved in a folder. Whether everyone actually read it, and whether the version they read is the current one, is anyone's guess.

Risk assessments exist, but they sit in isolation: away from the people they cover, the activities they describe, and any proof that the right people read and signed them.

See it in action

With modules connected, the workflow looks like this.

Built from a structured template

Start from a template. Score each risk. Document your controls.

Create a new risk assessment for the trip, activity, or premises change, from scratch or from a reusable template. Add risk items using the structured format: describe the hazard, score severity and likelihood, record existing controls, and document mitigations. Assign follow-up tasks to specific people, linked directly to the risk item they're addressing.

Start from a template, not a blank page.
Reusable templates and modular risk sets mean common assessment types are ready to go. Adapt for this activity rather than starting from scratch.
Severity × likelihood scoring built in.
Score each risk and the matrix calculates overall risk level automatically, flagging high-priority items.
Mitigations and tasks linked to each risk.
Record control measures and assign follow-up tasks directly against the risk item they address.
Risk assessment creation showing structured risk items and scoring matrix

Distributed and acknowledged

Everyone who needs to sign it, signs it. With a timestamp.

The completed risk assessment is distributed to all staff involved. They must acknowledge it before the activity starts. Each acknowledgement is timestamped and linked to their record. You can see at a glance who has and hasn't signed, and anyone who hasn't receives a reminder automatically.

Distributed directly from the risk assessment.
Select who needs to see it. They receive it on their device and must acknowledge before the activity.
Every acknowledgement timestamped.
Signed, dated, linked to the person's record. Provable evidence that it was read.
Outstanding acknowledgements chased automatically.
If someone hasn't signed, a reminder goes out. You see who's still outstanding at a glance.
Risk assessment list showing distribution status and acknowledgement counts

Six months later

Someone asks who signed off what. You open one record.

A parent raises a concern. A regulator asks for evidence. An insurer wants to see the risk management process. You open the risk assessment record. There's the assessment as it was distributed, with acknowledgements timestamped, linked to each staff member's record, and the follow-up task that was assigned and completed.

Version history maintained automatically.
Every change tracked. The distributed version is preserved exactly as it was signed.
Acknowledgements linked to staff records.
Not just a name: linked to the person's role and their record in the system.
Complete audit trail, provable on demand.
From creation to acknowledgement to follow-up, everything in one record.
Risk assessment detail showing complete audit trail with acknowledgements and linked actions

What you're replacing

Before
After
Risk assessment created in Word, saved in a folder.
Created in the system from a structured template. Linked to the activity, people, and assets it covers.
Emailed to trip leaders. Maybe read, maybe not.
Distributed with required acknowledgement. Every sign-off timestamped.
Printed, filed in a ring binder, found 20 minutes before the inspector arrives.
Open one record. Assessment, acknowledgements, actions: all there.
When someone asks who signed off, you search email chains.
Every acknowledgement linked to the person's record, dated and provable.
Background

See it for yourself.

Book a demo and we'll walk through how risk assessment creation, distribution, and acknowledgement works using a scenario relevant to your organisation.

Try Today
CalmCompliance dashboard showing connected compliance workflow