Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Securing the Site

During site characterization, contamination of groundwater by organic compounds (total hydrocarbons and PAH) has been detected. PAH contamination is diffuse, with concentrations of about 1 mg/1, but also localized, with hot spots in the [Pg.382]

We thank C. Sears and H. E. Belkin for their constructive reviews and we also thank S. Albanese for his help in figure graphics. [Pg.383]

Armienti, P., Barberi, F., Bizouard, H., Clocchiatti, R., Innocenti, F., Metrich, N., Rossi, M., and Sbrana, A. (1983). The Phlegraean Fields Magma evolution within a shallow magma chamber. J. Vokanol. Geotherm. Res. 17, 289—311. [Pg.384]

Senechal, R. G., and Erlebach, W. E. (1970). Isotopic composition as a natural tracer of lead in the environment. Environ. Sci. Technol. 4, 305—313. [Pg.384]

Belkin, H. E., De Vivo, B., Lima, A., and Torok, K. (1996). Magmatic silicate/saline/sulphur rich/ CO2 immiscibility and zirconium and REE enrichment from alkaline magma chamber margins evidence from Ponza island, Pontine archipelago, Italy. Eur.J. Miner. 8, 1401—1420. [Pg.384]


You need to inform someone fast so that they can secure the site before something happens, says Peter. [Pg.886]

Reading the facts, it looks as if a honest mistake was made by the contractor employed by EPA. Karen and Peter are both correct about the need to inform someone about the error. However, should sounds too weak. Karen must report the mistakes to EPA and secure the site ASAP. [Pg.887]

The plan should include measures to secure the site and prevent unauthorized access following an incident. This is necessary not only for safeguarding employees and contractors, but also to prevent tampering with the area before a loss investigation can be conducted. [Pg.139]

The upper, open-ended band represents low-probability severe reactor accidents with consequences beyond the facility boundary. It is not expected that any off-site evacuation of the public would be needed under any circumstances for small power reactors, however, minor releases of radioactivity within the specified regulatory limits may occur. The accident response team would secure the site, restore a safe, contained shutdown state, and perform any required cleanup. [Pg.33]

PCs to plan, manage and monitor the construction phase in liaison with contractors prepare, develop and implement a written plan (the initial plan to be completed before the construction phase begins) make sure suitable welfare facilities are provided from the start and maintained throughout the construction phase check the competence of all their appointees provide site inductions consult with the workers liaise with the co-ordinator on ongoing design issues and secure the site... [Pg.405]

Upon the inspection team s arrival at the alternative perimeter or final perimeter, whichever occurs first, securing the site, which means exit monitoring procedures by the inspection team, shall begin. [Pg.89]

All activities for securing the site and exit monitoring shall take place within a band around the outside of the perimeter, not exceeding 50 metres in width, measured outward. [Pg.89]

Irrespective of whether the investigation is carried ont on the scene or after the event, the scene of the accident has to be made safe and preserved for the forthcoming investigation. This is the responsibility of the immediate supervisor. The first task is to take immediate corrective actions to secure the site in order to avoid secondary accidents. It is then necessary to prevent physical items from being operated or moved. It is advisable at this stage to take photos of any physical evidence. When an investigation commission is appointed, the chairperson of the commission will take over responsibility for the site. It will not be released for clean-up and return to normal operation until all physical evidence has been secured. [Pg.175]

In a recent case, a developer was found guilty of polluting a river with oil. Vandals had entered a derelict site awaiting redevelopment and damaged pipework on an oil tank. Over 6 kilometres of river were affected and the clean-up operation took more than a month. In this case failure to secure the site and ensure that the oil could not escape resulted in a 7,500 fine, the bill for the clean-up and some very bad publicity. [Pg.79]

Develop long-term projections for landfill requirements and initiate a program to secure the needed sites. [Pg.2261]

The candidate tollers security policy should emphasize the importance of protecting people, property and the operational practices against loss by intentional destruction or theft. During the site visit, check to see if appropriate methods are taken to control entiy and movement of people and vehicles as a security measure. One telltale sign is that you may be denied access to an area because of another company s confidential process. Though an interference, it affirms a sound security practice. Determine whether security inspections are being held during off-duty hours. [Pg.33]

Security issues involving access controls are typically line management responsibilities. However, it is not unheard of to have the SSHO in charge of site access or other security-related matters. However, if the field team leader or site supervisors are in charge of access issues or other security matters, they should always strive for SSHO participation. The nature of a project may warrant assigning a member of the site security staff to the project team. Key duties of the security officer may include the following ... [Pg.37]

Where potential flooding to the site is minimal an alternative to the balance pond could be an open-trench system that could provide on-site storage and added security to watercourses. [Pg.21]

The location of any premises has a considerable influence on the overall standard of security. With new building, and other things being equal, the site with a low level of local crime should be chosen. In most instances, however. [Pg.167]

Perimeter fencing may enhance the security of any premises. Not only does the fence present an obstacle for intruders to overcome but also it establishes the principle of defensible space and constitutes a psychological barrier to access. A perimeter fence, when supplemented by gates, traffic barriers and gatehouses (manned by security personnel or some other system of access control), allows the site operator to have control and supervision over all vehicles and pedestrians entering and leaving the site. [Pg.167]

At these sites, Maurice passed his childhood, a period he enjoyed very much and where he learned country pursuits and animal husbandly—as he said, We always had two pigs in the sty, one to sell and one to keep. Subsequently, after several transitory jobs, his father secured the position of general builder on a local estate. He did not live to see Maurice s major successes. In his early sixties, he tried to release a cat from a trap and was badly bitten. From this incident, he died from septicemia in 1938. Maurice always spoke with gratitude of the encouragement he received from his parents. [Pg.2]

We will discuss the main features of the offered system. At the lower level the state of all potentially dangerous sites - both natural and technogenic will be controlled. The periodicity and the facilities for carrying out the control over these sites is the concern of special expert subsystems, established on the basis of technical documents (for technical sites) or of data from the Ministry for ecological protection (for natural objects). For example, the sites of the first category should be equipped with special checking for the reliability of the security systems located directly on the site and continuous supervision of the status. [Pg.168]

Spill/Leak Disposal Evacuate/Isolate the area, ensure control of ignition sources, stop leak or spill if possible, control/contain/ventilate the gas dispersion area if possible, ground all equipment, attend to security of the site, and wear proper protective clothing and equipment. [Pg.228]

The system parameter values depend on the particular application. When a house or a factory is to be monitored for intrusion detection, the cost of false alarms is relatively low. On the other hand, the financial and personnel cost of a false alarm is significantly higher when the perimeter security of a nuclear reactor is to be provided by deploying a SWSN to monitor unauthorized access. The cost of a false alarm might involve the transportation of special forces and/or personnel of related government agencies to the site, as well as the evacuation of residents in the surrounding area. [Pg.103]

If the test substance is a solid or a semisolid, a 0.5-g portion is weighed and placed on the gauze patch. The test substance patch is placed on the appropriate skin site and secured. The patch is subsequently moistened with 0.5 ml of physiological saline. [Pg.369]

Pre-enginecred concrete boxes can be used to provide smaller buildings. These buildings are manufactured in a factory, are pre-wired, come with HVAC installed and are truck delivered to the site ready to be secured to a foundation and connected to desired utilities. These buildings are economically designed to withstand 1 to 3 psi (0.9 to 21 kPa) side-on overpressures,... [Pg.25]


See other pages where Securing the Site is mentioned: [Pg.207]    [Pg.109]    [Pg.22]    [Pg.355]    [Pg.382]    [Pg.383]    [Pg.632]    [Pg.412]    [Pg.88]    [Pg.1008]    [Pg.207]    [Pg.109]    [Pg.22]    [Pg.355]    [Pg.382]    [Pg.383]    [Pg.632]    [Pg.412]    [Pg.88]    [Pg.1008]    [Pg.88]    [Pg.817]    [Pg.167]    [Pg.610]    [Pg.50]    [Pg.579]    [Pg.411]    [Pg.796]    [Pg.491]    [Pg.727]    [Pg.169]    [Pg.318]    [Pg.437]    [Pg.20]    [Pg.198]    [Pg.38]    [Pg.130]   


SEARCH



Sites security

© 2024 chempedia.info