Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security, sabotage

Startup, low power, shutdown Spent fuel storage Security, sabotage protection... [Pg.13]

The use of component logic models to build system fault logic has been discussed by several authors for chemical and electrical systems (Powers and Thompkins, 1974 Fussell, 197.S and Powers and Lapp, 1976). In addition, generic sabotage fault trees have been used for some time in the analysis of security concerns for nuclear power plants (NUREG /CR-0809, NUREG/CR. 121,... [Pg.119]

General Considerations 1 Location of people relative to the unit 2 Location of critical systems 3 Dominant wind direction 4 Climate and weather extremes earthquake, flooding, windstorms 5 Site topography 6 External hazards or threats (fire/explosion/toxic release from nearby process or facility aircraft subsidence sabotage) 7 Traffic flow patterns and clearances from process vessels and lines 8 Security and reliability of all critical feeds and utilities 9 Command center and alternate command center locations 10 Evacuation routes, emergency exits, safe rally spots... [Pg.31]

Introduction Priorto September 11, 2001, known as 9/11, chemical process safety activities primarily focused on accidental release risks and excluded most considerations of intentional releases. Security was provided mostly for lesser threats than such extreme acts of violence, and terrorism was generally not provided for except in high-security areas of the world. Exceptions to this included general concerns for sabotage. This was due to a perception that these risks were managed adequately, and that the threat of a terrorist attack, particularly on U.S. chemical manufacturing facilities or transportation system, was remote. [Pg.105]

Chemical plant security managers were very pessimistic about their ability to deter sabotage by employees, yet none of them had implemented simple background checks for key employees such as chemical process operators. [Pg.8]

Finding 15. Security requirements for Johnston Atoll following the departure of USACAP include (1) protection of personnel, facilities, and materiel, (2) prevention of pilferage, unauthorized use, sabotage, and violation of community rules and regulations, and (3) prevention of... [Pg.25]

Storage for security of gas supplies to Georgia i.e. a strategic gas reserve is mainly associated with the difficult political situation between Georgia and Russia, not least in connection with the situation in Chechnya. The existing 2 import pipelines are located close to Chechnya and may be exposed to sabotage and other incidents that may jeopardise the reliability of the gas supply to Georgia and the transit to Armenia. [Pg.209]

As pipelines per se are fairly vulnerable to sabotage and terrorist actions, the social and political stability in the involved countries are of greatest importance for the security of natural gas supply. This especially applies to transit countries that - per definition - are not part of the gas supply contracts. It is therefore mandatory that transit countries are enabled to make use of their compensation in a prosperous manner for the sake of improving the social stability. It is assumed that this in the next run will increase the safety of energy supply that is crucial to all parties. [Pg.430]

Involvement of the supervisors and workers is another key factor in the success of such programs. They have the hands-on involvement with each of the individual activities of the factory. In order to make the best use of their day-to-day experience with the machineries, processes, and a myriad of issues with the factory processes, audit exercise should be carried out with their full involvement and support. Typically, the barrier to such an involvement is fear on the part of certain supervisors and workers that a waste audit will expose inefficiencies that lead to job cuts. In order to overcome such a barrier, supervisors and workers should be assured of their job security, barring evidence of Fraud or sabotage. [Pg.133]

Safeguards and Security. In general, the reactor design should make adequate provisions to prevent unauthorized entry to the site or buildings on the site in order to prevent theft or unauthorized removal of nuclear materials and sabotage to the reactor. [Pg.46]

Security cameras should be robustly fixed and cable runs designed so that they cannot be sabotaged by a potential intruder. [Pg.350]

The site survey and analysis should include a vehicular traffic plan that highlights areas for material deliveries, truck routes, parking, and building entries and exits. The site analysis should address traffic patterns of vehicles and pedestrians over 24-hour periods on normal workdays and weekends, physical protection and security features, building uses, and which persons are allowed access. Such a comprehensive review is necessary to permit an accurate survey of physical vulnerability and to put into place operational procedures for detection, delay, and assessment systems to protect physical assets and to protect operations on the campus or in a facility that could be interrupted or sabotaged. [Pg.50]

The U.S. Department of Homeland Security regulates about 300 chemicals that could be used to make chemical agents or could be used in chemical attacks. - This program is also known as Top Screen. While the focus of the regulations is on chemical facilities, the regulations also cover academic institutions, if quantities of these chemicals reach a certain threshold amount. The focus of the regulations is to prevent the release of these chemicals in the environment, theft of these chemicals, or sabotage and contamination by these chemicals. [Pg.534]

Hazardous substances released from plants could cause serious problems to plant employees as well as to the nearby public. The release could be due to accidents (human error), instrument failure, control failure, and natural calamities or through deliberate acts of vandalism, terrorism, or sabotage. The application of inherent security can help in two ways (1) by reducing the likelihood that a facility will be targeted and (2) by minimizing the severity of an incident should an attack occur. Similar to inherent safety principles, one can consider a set of guidelines for inherent security ... [Pg.224]

The loss control programme should examine such areas as the physical security of premises cash collection, handling, and distribution theft and pilfering vandalism storage of valuable and attractive items sabotage industrial espionage and the control of confidential data and methods. Consideration should also be given to defensive techniques, such as... [Pg.150]

One special security control mentioned several times in the literature is the locking of all sprinkler control valves in the open position. Many times, arsonists will render or attempt to render the fire protection systems ineffective by sabotaging the automatic sprinkler system (NFPA 921, 2011). The locking of all sprinkler valves will help to ensure that the sprinkler system has a water supply and will be effective during a fire. [Pg.142]

The physical security system provides physical features to detect, delay, assist response to, and defend against the design basis threat (DBT) for radiological sabotage. The physical security system consists of physical barriers and an intrusion detection system. The details of the physical security system are protected information. The physical security system provides protection for vital equipment and plant persormel. [Pg.277]


See other pages where Security, sabotage is mentioned: [Pg.19]    [Pg.19]    [Pg.236]    [Pg.800]    [Pg.297]    [Pg.254]    [Pg.43]    [Pg.536]    [Pg.25]    [Pg.522]    [Pg.1531]    [Pg.1585]    [Pg.336]    [Pg.45]    [Pg.55]    [Pg.210]    [Pg.212]    [Pg.10]    [Pg.347]    [Pg.135]    [Pg.285]    [Pg.671]    [Pg.199]    [Pg.304]    [Pg.386]    [Pg.12]    [Pg.488]    [Pg.521]   
See also in sourсe #XX -- [ Pg.453 ]




SEARCH



Sabotage

© 2024 chempedia.info