Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Hazard Identification and Safety Audit

Frank Lees begins chapter 8 of Loss Prevention in the Process Industries, Hazard Identification and Safety Audit, [17] with the following paragraphs ... [Pg.282]

Frank Lees [17] has cataloged and presented a number of checklists in Hazard Identification and Safety Audit. Lees states One of the most useful tools of hazard identification is the checklist. Like a standard or code of practice, a checklist is a means of passing on hard-won experience. It is impossible to envisage high standards in hazard control unless this experience is effectively utilized. The checklist is one of the main tools available to assist in this. [Pg.283]

A one-page, memory-jogging safety assessment checklist was made available by Trevor Kletz in 1976. [6] The checklist is still valid today. After a review of several Management of Change policies from several major companies, it appears that Kletz s checklist or a similar checklist was used as a basis for a few companies procedures, Frank Lees [14] has cataloged and presented a number of checklists in Hazard Identification and Safety Audit. Lees states ... [Pg.244]

Identification can be as simple as asking what-iP questions at design reviews. It can also involve the use of a checklist outlining the normal process hazards associated with a specific piece of equipment. The major weakness of the latter approach is that items not on the checklist can easily be overlooked. The more formalized hazard-assessment techniques include, but are not limited to, hazard and operability study (HAZOP), fault-tree analysis (FTA), failure mode-and-effect analysis (FMEA), safety indexes, and safety audits. [Pg.62]

The first task, hazard identification, is crucial in process system safety analysis, because the effectiveness of the other two tasks depends on it. The traditional methods for identifying hazards during the 1960 s (including process reviews , codes of practice , checklists , and safety audit ) were no longer considered adequate in the 1970 s. There was a need for a technique which could anticipate hazardous problems, particularly in areas of novelty and new technology where past experience was limited. [Pg.38]

In contrast, the Department of Energy s MORT-based approach provides excellent accident investigation, audit, and appraisal tools oriented to ongoing operations. Despite emphasis on the importance of the upstream process, however, system safety programs based on MORT tend to lack the early, detailed, systematic hazard identification and analysis efforts that are characteristic of MIL-STD-882B programs. [Pg.48]

Supervisors Continuously practice, educate and involve employees in hazard identification and use of safe work practices Lead daily pre-job safety briefings that review activities, hazards, and controls Participate in audits/ inspections ... [Pg.7]

The commonly used management systems directed toward eliminating the existence of hazards include safety reviews, safety audits, hazard identification techniques, checklists, and proper application of technical knowledge. [Pg.4]

On the other hand, there is now available a whole battery of safety audit and hazard identification methods to solve these problems. ... [Pg.282]

There exists a whole battery of methods for the identification of hazards in the literature.4 The hazard identification techniques suitable for various stages of a project are shown in Table 3.1. Among the techniques noted in Table 3.1 the most important method is safety audits, which cover the management system and specific technical features at site level and the management system at plant level. [Pg.181]

Conducting worksite inspections, safety and health audits, job hazard analyses, and other types of hazard identification. [Pg.98]

This chapter comments on the Management Review elements pertaining to Hazard identification Risk assessment and prioritization Progress made in risk reduction The effectiveness of procedures to eliminate or control identified hazards and risks Actions taken on the recommendations made in safety and health audits and The extent to which set objectives have been met. [Pg.6]

The identification of risk may be achieved by a multiplicity of techniques, including physical inspections, management and worker discussions, safety audits, job safety analysis and Hazard and Operability (HAZOPS) studies. It can also involve the study of past accidents to identify areas of high risk. Typical risks include those associated with ... [Pg.159]

The written safety and health program establishes procedures and responsibilities for the identification and correction of workplace hazards. The following activities can be nsed to identify and control workplace hazards hazard reporting system, jobsite inspections, accident investigation, and expert audits. [Pg.75]

An initial inventory of all chemicals should be made of all new work areas and facilities. A routine audit, the HazCom Inventory, should be conducted thereafter. We have found that this should be done on a quarterly basis (during a regularly scheduled in-house audit, for example). Additionally, someone should be designated (for example, shipping and receiving personnel) to identify new chemicals and ensure they are accompanied by an MSDS. After identification and listing on the HazCom Inventory, employees who may come into contact with the new chemical must be notified and made aware of the products potential hazards. A copy of the HazCom Inventory for each work area should be kept with the MSDS for that area and the updated inventory lists provided to the Environment, Health Safety office. [Pg.52]

The hazard identification process started during the business decision anaiysis (ciauses 2.1 2.2). it is one of the most important functions of the PHA team, and is ongoing untii the process is turned over to plant operations and becomes subject to operational safety review and audit programs. [Pg.16]

Setting up a safety information system for a single project or product may be easier. The effort starts in the development process and then is passed on for use in operations. The information accumulated during the safety-driven design process provides the baseline for operations, as described in chapter 12. For example, the identification of critical items in the hazard analysis can be used as input to the maintenance process for prioritization. Another example is the use of the assumptions underlying the hazard analysis to guide the audit and performance assessment process. But first the information needs to be recorded and easily located and used by operations personnel. [Pg.441]

Hazardous material (HAZMAT)-. Effective HMIS (hazardous material identification system) and MSDS (material safety data sheet) programs are both essential elements of a safety program The HMIS system identifies and labels substances that may pose some hazard to those who use them. The MSD sheets, provided by the suppliers of materials deemed to be hazardous, are kept on file to quickly identify all hazards and the appropriate responses in emergency situations. This mandated part of a safety program can be handed off to a subteam that ensures the MSDS database in updated and the HMIS labeling program is audited for compliance. [Pg.98]


See other pages where Hazard Identification and Safety Audit is mentioned: [Pg.460]    [Pg.460]    [Pg.150]    [Pg.181]    [Pg.397]    [Pg.74]    [Pg.131]    [Pg.10]    [Pg.105]    [Pg.149]    [Pg.58]    [Pg.181]    [Pg.198]    [Pg.344]    [Pg.233]    [Pg.533]    [Pg.10]    [Pg.359]    [Pg.360]    [Pg.276]    [Pg.513]    [Pg.194]   
See also in sourсe #XX -- [ Pg.387 ]




SEARCH



Hazard Audits

Hazardous, identification

Hazards and Safety

Hazards identification

Safety auditing

Safety audits

Safety hazards

Safety identification

© 2024 chempedia.info