“…1) the following attributes in the field of information security: access to sensitive documents, confidentiality of the processed data, integrity of documents, fulfillment of security requirements included in the security policy, losses understood as a costs incurred due to the loss of security attributes [7,8,[35][36][37]; 2) the following elements in the field as resulting from the legal norms regulating such security issues: appointment of a representative to protect classified information, creation of a security division in the organization to perform tasks related to the processing of sensitive documents in the organization, adaptation of the office facilities to the requirements on creation, processing, acceptance, assignment, delivery and protection of sensitive documents according to the provisions of law; organization of a secret office, organization of a special location (place, facility) for the processing of sensitive data, including ICT systems for executing and processing sensitive documents; 3) the following documents in the field of basic quality and security documents: risk analysis reports, security policy, ICT security plan, special security requirements for the ICT system, safe use procedures and business continuity plan; 4) the following attributes/measures in the field of the sensitive information security processing process: importance of the Office and its Clients, fulfillment of the requirements included in the quality policy; 5) the following attributes in the field of security of business continuity: fulfillment of the requirements included in the business continuity management policy, financial effects of suspension/interruption of the process, nonfinancial effects of suspension/interruption of the process, costs and time of the process unavailability; 6) In other fields: flexibility of the process of sensitive data processing, costs and time of the process of sensitive data processing, efficiency of the change management process, efficiency of the management process architecture related to the processing of sensitive data, reliability. Last but not least, it should be stressed that the risk of sensitive documents may result from such an allegedly prosaic reason as wrongly designed user interface in the ICT system.…”