Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security Hazards

Worksite hazard identification and analysis identifies existing hazards and conditions, operations and situations that create or contribute to hazards, and areas where hazards may develop. This includes close scrutiny and tracking of injury or illness and incident records to identify patterns that may indicate causes of aggressive behavior and assaults. The objectives of worksite hazard identification and analyses are to recognize, identify, and plan to correct security hazards. Analysis uses existing records and worksite evaluations should include record review and identification of security hazards. [Pg.299]

Analyze medical, safety, and insurance records, including the Organizational Safety and Health Administration (OSH A) 300 log and information compiled for incidents or near incidents of assaultive behavior from workers or visitors. This process should ensure confidentiality of records of employees and others. This information should be used to identify incidence and severity and to establish a baseline for identifying change. [Pg.299]

Identify and analyze any apparent trends in injuries relating to particular departments, units, job titles, unit activities or workstations, activities, or time of day. It may include identification of sentinel events such as threatening of workers or identification and classification of where aggressive behavior could be anticipated, and by whom. [Pg.299]

Worksite hazard identification and analysis should use a systematic method to identify the areas needing in-depth scrutiny of security hazards. This analysis should do the following  [Pg.299]

OCCUPATIONAL HEALTH AND SAFETY MANAGEMENT A PRACTICAL APPROACH [Pg.300]


Ensure appropriate levels of security, hazard warning notices, fences, patrols. Control access including vehicles Segregate/seal drains... [Pg.248]

Gas-collector systems are installed directly beneath the low-permeability clay cap in a hazardous waste landfill. Landfills dedicated to receiving only hazardous wastes are relatively new and gas has never been detected in these systems. It may take 40 years or more for gas to develop in a closed secure hazardous waste landfill facility. Because the long-term effects of gas generation are not known, and costs are minimal, U.S. EPA strongly recommends the use of gas-collector systems. [Pg.1142]

Secure hazardous materials in locked buildings or fenced areas. Have a sign-out system for keys. [Pg.129]

Operation against rules lies in not only direct individual harms, but also the potential indirect harm to the enterprises. That unsafe operation behaviors continues to occur leads to enterprises security hazards and they are difficult to troubleshoot. That affects the lives and safety of workers. If a person s death causes the direct economic loss of 800, 000 yuan, losses caused by accidents are very serious, shown in Table 2. [Pg.1153]

Training and education ensure that employees know about potential security hazards and ways to protect themselves and their co-workers. [Pg.467]

Dimming controls are available for fluorescent as well as mercury vapor lamps. They reduce light output to what is required for the tasks involved. The percentage of light reduction is close to the percentage of energy consumption reduction. In no case should lighting levels be reduced to less than what is required. Worker productivity will suffer safety and security hazards may be created. [Pg.719]

We consider in a second stage security-related events that may lead to the same undesirable event a burglar can attack the person in the house to get the combination of a safe. The burglar can enter the house directly if the door is unlocked or he can force it if it is locked. We give in Fig. 2 the BDMP model covering both safety and security hazards. The Petri net models the fact that the door can be initially locked or unlocked with a probability of 0.5 for each alternative. Initially, a token is placed in pi. This token enables to activate at t=0 the transition locked door and at t > 0, the token is definitively either in place locked or in place unlocked. The Petri leaf door locked (resp. door unlocked) is true when there is a token in the locked (resp. unlocked) place (this is ensured through a non-graphical link between Petri leaves and the places). [Pg.331]

The service providers in public transport systems for passengers and goods are expected to ensure security during the entire process of such transportation. The air and water transport systems have fairly well controlled access control mechanisms. Therefore, they suffer far less from security hazards than the road and rail transport... [Pg.367]

Commitment and involvement are essential elements in any safety and health program. Management provides the organizational resources and motivating forces necessary to deal effectively with safety and security hazards. Employee involvement, both individually and collectively. [Pg.297]

Demonstration of management s concern for employee emotional and physical safety and health by placing a high priority on eliminating safety and security hazards. [Pg.298]

A system for communicating with employees about workplace security hazards, including a means that employees can use to inform the employer of security hazards at the worksite without fear of reprisal. [Pg.310]

Procedures for identifying workplace security hazards including scheduled periodic inspections to identify unsafe conditions and work practices whenever the employer is made aware of a new or a previously unrecognized hazard. [Pg.310]

Procedures for correcting unsafe conditions, work practices, and work procedures, including workplace security hazards, and with attention to procedures for protecting employees from physical... [Pg.310]

Training and instruction about how to recognize workplace security hazards, measures to prevent workplace assaults and what to do when an assault occurs, including emergency action and postemergency procedures. [Pg.310]

A system for workers to inform management about workplace security hazards or threats of violence Procedures for protecting workers who report threats from retaliation by the person making the... [Pg.482]

We will be performing workplace hazard assessment for workplace security in the form of periodic inspections. Periodic inspections to identify and evaluate workplace security hazards and threats of workplace violence are performed by the following observers in the following areas of our workplace ... [Pg.482]

When new, previously unidentified security hazards are recognized... [Pg.482]

Periodic inspections for security hazards consist of identification and evaluation of workplace security hazards and changes in worker work practices and may require assessing for more than one type of workplace violence. Our establishment performs inspections for each type of workplace violence using the methods specified below to identify and evaluate workplace security hazards. [Pg.482]

Inspections for Type I workplace security hazards include assessing... [Pg.483]

Hazards that threaten the security of workers shall be corrected in a timely manner based on severity when they are first observed or discovered. Corrective measures for Type I workplace security hazards can include... [Pg.484]

Corrective measures for Type II workplace security hazards can include... [Pg.484]

Recognition of workplace security hazards including the risk factors associated with the three types... [Pg.485]


See other pages where Security Hazards is mentioned: [Pg.414]    [Pg.45]    [Pg.46]    [Pg.303]    [Pg.10]    [Pg.79]    [Pg.80]    [Pg.278]    [Pg.278]    [Pg.88]    [Pg.57]    [Pg.57]    [Pg.170]    [Pg.298]    [Pg.299]    [Pg.304]    [Pg.305]    [Pg.310]    [Pg.310]    [Pg.312]    [Pg.481]    [Pg.485]   


SEARCH



Security plans .Transporting hazardous materials

Security plans .Transporting hazardous materials requirements

© 2024 chempedia.info