Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security, inherent

Hazardous substances released from plants could cause serious problems to plant employees as well as to the nearby public. The release could be due to accidents (human error), instrument failure, control failure, and natural calamities or through deliberate acts of vandalism, terrorism, or sabotage. The application of inherent security can help in two ways (1) by reducing the likelihood that a facility will be targeted and (2) by minimizing the severity of an incident should an attack occur. Similar to inherent safety principles, one can consider a set of guidelines for inherent security ... [Pg.224]

In e- Voting Requirements and Implementation ], the complexity of the deployment of e-voting systems and the inherent security issues that arise from the underlying distributed system is considered. An architecture that focuses on the security of the election servers and the channels between client machines and the servers is proposed. Unfortunately, the authors identify a major weakness in their... [Pg.96]

QuaHtative arguments deal primarily with the sense of ownership and security which result from individually owned generation systems. Additional complexity will arise from the aesthetic criteria specific to both individual homes and the surrounding community. Of course, the autonomy inherent in distributed rooftop arrays probably constitutes an institutional barrier to their acceptance by some utiHty companies, unless they are involved in the financing and/or marketing chain. [Pg.475]

Operation includes nonual start-up, normal and emergency shutdown, and most activities performed by die production team. Whilst inlierently safe plant design limits inventories of hazardous substances, inherently safe operation ensures die number of individuals at risk are minimized. Access to die plant for non-essendal operational people such as maintenance engineers, post staff, administrators, quality control samplers, warehouse staff delivering raw material or plant items or collecting finished product, members of security, visitors etc., must be controlled. [Pg.413]

Resonance such as (5.28a)-(5.28c) is inherently a quantal phenomenon, with no classical counterpart. In NBO language, each of the resonance interactions (5.28a)-(5.28c) corresponds to a donor-acceptor interaction between a nominally filled (donor Lewis-type) and unfilled (acceptor non-Lewis-type) orbital, the orbital counterpart of G. N. Lewis s general acid-base concept. As mentioned above, Lewis and Werner (among others) had well recognized the presence of such valence-like forces in the dative or coordinative binding of free molecular species. Thus, the advent of quantum mechanics and Pauling s resonance theory served to secure and justify chemical concepts that had previously been established on the basis of compelling chemical evidence. [Pg.592]

A chemical engineer may have a choice of inherent safety variables, such as quantity stored or process temperatures and pressures, or process safety measures such as emergency isolation valves or containment systems, all of which may greatly reduce the vulnerabilities or the consequences of intentional loss. These are in addition to traditional security measures, which may include physical security, background checks, administrative controls, access controls, or other protective measures. For a more complete discussion of the options, refer to the AIChE Center for Chemical Process Safety Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites and other references.f... [Pg.106]

Emergency responses to incidents involving weapons of mass destruction are much different from responses to incidents involving conventional explosives. For example, while the debris from conventional explosives may be extensive and present hazards to the individuals responding, such as fires or structural instability, the materials are not inherently hazardous. In this situation, the site can be secured and forensic investigations can be conducted similarly to investigations at other crime scenes. [Pg.166]

Feature 9. Incorporate security considerations into decisions about acquisition, repair, major maintenance, and replacement of physical infrastructure include consideration of opportunities to reduce risk through physical hardening and adoption of inherently lower-risk design and technology options. [Pg.220]

Nebraska All persons are by nature free and independent, and have certain inherent and inalienable rights among these are. . . the right to keep and bear arms for security or defense of self, family, home, and others, and for lawful common defense, hunting, recreational use, and all other lawful purposes, and such rights shall not be denied or infringed by the state or any subdivision thereof (Article I, Section 1)... [Pg.254]

All aspects of the electronic records and electronic signature systems in place have been designed to provide a level of security and control equal to or exceeding the equivalent controls inherent to manual (paper) systems. This equivalency principle provides evaluative criteria for all electronic signatures. There is not a mandate to make a system perfect, error-free, or completely hacker-proof, although these are all appropriate ultimate goals rather, sufficient controls are required to assure that an electronic system is as secure or more secure than an equivalent manual system. [Pg.132]

Still Operation. Functionally, the still operated satisfactorily, though there were certain mechanical troubles not basically inherent in the design. The struts securing the downspouts snapped, the upper bearing housing required replacement, and the vacuum seal on the blower shaft failed from time to time. The still was given many runs between minor repairs, but delivered only 68% of the predicted yield from sea water (17,000 instead of 25,000 gallons per day). [Pg.133]

The need to design inherently safer plants has been expanded to encompass designing evironmentally acceptable plants. Environmentally acceptable plants generate minimum quantities of potentially hazardous wastes either as potential emissions to the environment or as materials requiring disposal. Wastes are recycled and reused where possible. If this is not possible, they may be treated to reduce or eliminate the hazard or destroyed through incineration. Disposal in a secure landfill is the final option. [Pg.315]


See other pages where Security, inherent is mentioned: [Pg.192]    [Pg.138]    [Pg.174]    [Pg.224]    [Pg.192]    [Pg.138]    [Pg.174]    [Pg.224]    [Pg.419]    [Pg.107]    [Pg.460]    [Pg.90]    [Pg.111]    [Pg.1187]    [Pg.66]    [Pg.460]    [Pg.121]    [Pg.305]    [Pg.172]    [Pg.176]    [Pg.272]    [Pg.297]    [Pg.24]    [Pg.51]    [Pg.107]    [Pg.20]    [Pg.139]    [Pg.15]    [Pg.482]    [Pg.64]    [Pg.157]    [Pg.117]    [Pg.288]    [Pg.25]    [Pg.27]    [Pg.33]    [Pg.68]    [Pg.84]    [Pg.244]    [Pg.424]    [Pg.2]   
See also in sourсe #XX -- [ Pg.224 ]




SEARCH



Inherent

Security, managing inherent safety

© 2024 chempedia.info