Insider Threat Evaluation Form
Evaluator Information
Name
Email
Date
Subject Details
Subject Name
Role/Department
Employee ID
Behavioral Indicators
Describe any unusual behavior observed
Access & Activity Review
Suspicious system/network activity
Potential data accessed/exfiltrated
Risk Evaluation
Risk Level
Low
Medium
High
Justification
Recommendations
Action(s) to be taken