Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Access control

A policy for site access control should state reasons for buildings and doors to be open or locked and the time at which doors will be open or locked. [Pg.38]

The administration building doors will be unlocked Monday Friday at 7 a.m. Access at other times is by key, or contact the safety department [Pg.38]

The policy should dictate who is entitled to a key, and a log should be maintained of all keys issued. The policy should require human resources to withhold final pay until keys are returned for example  [Pg.38]

Keys are issued to all full-time employees for their office. Keys shall not be duplicated and are to remain in the possession of the employee at all times. Keys shall be returned upon resignation or termination for example, supervisors are authorized a master key for all offices in their area. Master keys shall not be loaned out and shall remain in the possession of the supervisor at all times. [Pg.38]

Electronic access control systems should dictate the times and days at which personnel are allowed to enter the premises. Access control cards and fobs shall be returned on resignation or termination. Employees should be aware that their card may be deactivated for security or safety reasons for example  [Pg.38]


As noted above, one of the goals of NAMD 2 is to take advantage of clusters of symmetric multiprocessor workstations and other non-uniform memory access platforms. This can be achieved in the current design by allowing multiple compute objects to run concurrently on different processors via kernel-level threads. Because compute objects interact in a controlled manner with patches, access controls need only be applied to a small number of structures such as force and energy accumulators. A shared memory environment will therefore contribute almost no parallel overhead and generate communication equal to that of a single-processor node. [Pg.480]

Most emphasis is placed on a program of rigorous preventive maintenance. Appropriate climate conditions can help to prevent mold attack, which typically only occurs at elevated relative humidity. Storage furniture which provides an effective barrier for insects, regular inspection of the collections, monitoring of all collection areas with insect traps, and access control measures which minimize the chance of insect entry into the collection areas, are some aspects of an effective pest control management program (175). [Pg.429]

Stores and work areas should be designated No Smoking areas and access controlled. Depending upon scale, explosion-proof electrics and static elimination may be required. [Pg.243]

For exposure to occur, workers should have access to the hazard (e.g., they should work in or near contaminated areas). Under normal circumstances, those workers who are prevented from entering contaminated areas (by using access controls) are not exposed to contaminated material. In many cases these workers do not fall under the requirements, provided that they are not exposed to other safety hazards as a result of the operation. Conversely, workers in contaminated areas are covered because they have access to health hazards and could be potentially exposed [1]. [Pg.19]

Security issues involving access controls are typically line management responsibilities. However, it is not unheard of to have the SSHO in charge of site access or other security-related matters. However, if the field team leader or site supervisors are in charge of access issues or other security matters, they should always strive for SSHO participation. The nature of a project may warrant assigning a member of the site security staff to the project team. Key duties of the security officer may include the following ... [Pg.37]

Perimeter fencing may enhance the security of any premises. Not only does the fence present an obstacle for intruders to overcome but also it establishes the principle of defensible space and constitutes a psychological barrier to access. A perimeter fence, when supplemented by gates, traffic barriers and gatehouses (manned by security personnel or some other system of access control), allows the site operator to have control and supervision over all vehicles and pedestrians entering and leaving the site. [Pg.167]

The choice of access-control technology depends upon the level of security to be achieved, number of users and traffic at peak periods, etc. Proper design of the system is critical to its performance (and user acceptance), and reliability and expert advice should be obtained from equipment manufacturers and system installers. [Pg.169]

Adequate access control to areas of concentration of electrical equipment ... [Pg.172]

Under adequate access control, management chooses an administrator who grants privileges and individual passwords to authorized users, thereby defining the scope of the functions that are available to each user. Whenever an individual user logs on to a system that is subject to access control using a password, his or her unique set of privileges become available to him or her. [Pg.1039]

Be aware that the LIBNAME statement approach allows for both reading and writing to and from Microsoft Office files, which means the contents of the Microsoft Office files can be changed by SAS. There are many libref options not covered here that provide further access control features to Microsoft Excel and Access files. See the SAS documentation on the LIBNAME statement for PC files for more details. [Pg.59]

Delineation of these three zones should be based on sampling and monitoring results and on an evaluation of the potential routes and amount of contaminant dispersion in the event of a release. Movement of personnel and equipment among these zones should be minimized and restricted to specific access control points to prevent cross-contamination from contaminated areas to clean areas. A decision for evaluating health and safety aspects of decontamination methods is presented in Figure 16.22.105... [Pg.658]

A chemical engineer may have a choice of inherent safety variables, such as quantity stored or process temperatures and pressures, or process safety measures such as emergency isolation valves or containment systems, all of which may greatly reduce the vulnerabilities or the consequences of intentional loss. These are in addition to traditional security measures, which may include physical security, background checks, administrative controls, access controls, or other protective measures. For a more complete discussion of the options, refer to the AIChE Center for Chemical Process Safety Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites and other references.f... [Pg.106]

All such areas would require strict access control. [Pg.218]

A determination should be made as to what chemical processing opera-tion/facility should be immediately locked down, which specific access control procedures implemented, what initial security perimeter established, and whether a possible secondary malevolent event may occur. The initial act may be a diversionary act. [Pg.143]

Alarm systems can be integrated with fire detection systems, intrusion detection systems (IDSs), access control systems, or closed circuit television (CCTV) systems, so that these systems automatically respond when the alarm is triggered. For example, a smoke detector alarm can be set up to automatically notify the fire department when smoke is detected, or an intrusion alarm can automatically trigger cameras to turn on in a remote location so that personnel can monitor that location. [Pg.167]

The important features of ladder access control are the size and strength of the cover and its ability to lock or otherwise be secured from unauthorized access. [Pg.190]

Operational. In addition to having a strong culture and awareness of security within an organization, an active and effective security program makes security part of operational activities, from daily operations (such as monitoring physical access controls) to scheduled annual reassessments. Chemical industries will often find that by implementing security into operations they can also reap cost benefits and improve the quality or reliability of the chemical service. [Pg.216]

Examples of procedural access controls include inventorying keys, changing access codes regularly, and requiring security passes to pass gates and access sensitive areas. In addition, facilities should establish the means to readily identify all employees, including contractors and temporary workers with unescorted access to facilities. [Pg.218]

Portals have been developed with and without doors. Open portals without doors permit easy passage for passengers and a less claustrophobic environment. Closed portals with doors offer access control and more efficient sample collection. Figure 11.12 shows a portal with doors and Figure 11.13 shows the internal components for collecting and analyzing sample. For this particular portal the airflow is done in a closed loop using a blower and concentrator without interaction with external air that can dilute the sample concentration. [Pg.240]


See other pages where Access control is mentioned: [Pg.189]    [Pg.161]    [Pg.169]    [Pg.169]    [Pg.643]    [Pg.1038]    [Pg.1038]    [Pg.11]    [Pg.13]    [Pg.115]    [Pg.171]    [Pg.232]    [Pg.576]    [Pg.582]    [Pg.583]    [Pg.585]    [Pg.144]    [Pg.174]    [Pg.174]    [Pg.189]    [Pg.190]    [Pg.218]    [Pg.224]   
See also in sourсe #XX -- [ Pg.1038 ]

See also in sourсe #XX -- [ Pg.193 ]

See also in sourсe #XX -- [ Pg.332 ]

See also in sourсe #XX -- [ Pg.91 , Pg.93 ]

See also in sourсe #XX -- [ Pg.36 ]

See also in sourсe #XX -- [ Pg.104 , Pg.107 , Pg.109 ]

See also in sourсe #XX -- [ Pg.50 ]




SEARCH



Controlled access

© 2024 chempedia.info