Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security site controls

Site security and control Evacuation routes and procedures Decontamination... [Pg.172]

Table 13.16 sets out the major waste disposal methods, and potential hazards from toxic waste deposition are indicated in Table 13.17. The range of precautions required at land tips depends upon the risk, e.g. the nature and degree of contamination and the work to be undertaken. It will, however, encompass personal protective equipment a high standard of personal hygiene enclosure, possibly pressurization, and regular cleaning of vehicle cabs vehicle washing facilities site security, and control of designated dirty areas. Air monitoring and medical surveillance may be required. Table 13.16 sets out the major waste disposal methods, and potential hazards from toxic waste deposition are indicated in Table 13.17. The range of precautions required at land tips depends upon the risk, e.g. the nature and degree of contamination and the work to be undertaken. It will, however, encompass personal protective equipment a high standard of personal hygiene enclosure, possibly pressurization, and regular cleaning of vehicle cabs vehicle washing facilities site security, and control of designated dirty areas. Air monitoring and medical surveillance may be required.
It will, however, encompass personal protective equipment a high standard of personal hygiene enclosure, possibly pressurization and regular cleaning of vehicle cabs vehicle washing facilities site security, and control of designated dirty areas. Air monitoring and medical surveillance may be required. [Pg.533]

Site control and security Ensure the drivers of the contaminated vehicles know when to move into position at the washdown location. Ensure the contaminated unit has provided site security. [Pg.58]

Emergency recognition and prevention Safe distances Places of refuge Evacuation routes Site security and control Decontamination procedures Emergency medical treatment and first aid Emergency alerting and response procedures Personal protective equipment (PPE)... [Pg.729]

Pre-emergency planning and coordination with outside parties Personnel roles, lines of authority, training, and communication Emergency recognition and prevention Safe distances and places of refuge Site security and control Evacuation routes and procedures... [Pg.370]

E) An understanding of the role of the first responder awareness individual in the employer s emergency response plan including site security and control and the U.S. Department of Transportation s Emergency Response Guidebook. [Pg.309]

Many of the site controls have been covered earlier in this chapter (Section 7.2 - General hazards and controls). Site controls can be conveniently subdivided under four headings - site planning, site preparation, site security and the arrangements with the client and/or occupier of the premises. [Pg.107]

The candidate tollers security policy should emphasize the importance of protecting people, property and the operational practices against loss by intentional destruction or theft. During the site visit, check to see if appropriate methods are taken to control entiy and movement of people and vehicles as a security measure. One telltale sign is that you may be denied access to an area because of another company s confidential process. Though an interference, it affirms a sound security practice. Determine whether security inspections are being held during off-duty hours. [Pg.33]

Security issues involving access controls are typically line management responsibilities. However, it is not unheard of to have the SSHO in charge of site access or other security-related matters. However, if the field team leader or site supervisors are in charge of access issues or other security matters, they should always strive for SSHO participation. The nature of a project may warrant assigning a member of the site security staff to the project team. Key duties of the security officer may include the following ... [Pg.37]

As said previously, records are the property of the organization and not personal property so their destruction should be controlled. The controls should ensure that records are not destroyed without prior authorization and, depending on the medium on which data is recorded and the security classification of the data, you may also need to specify the method of disposal. The management would not be pleased to read details in the national press of the organization s performance, collected from a waste disposal site by a zealous newspaper reporter ... [Pg.499]

Perimeter fencing may enhance the security of any premises. Not only does the fence present an obstacle for intruders to overcome but also it establishes the principle of defensible space and constitutes a psychological barrier to access. A perimeter fence, when supplemented by gates, traffic barriers and gatehouses (manned by security personnel or some other system of access control), allows the site operator to have control and supervision over all vehicles and pedestrians entering and leaving the site. [Pg.167]

Control of access to site maintenance of security Designation of restricted areas, e.g. containing flammable materials, eye protection zones, hearing protection zones, radiological hazards, microbiological hazards... [Pg.279]

We will discuss the main features of the offered system. At the lower level the state of all potentially dangerous sites - both natural and technogenic will be controlled. The periodicity and the facilities for carrying out the control over these sites is the concern of special expert subsystems, established on the basis of technical documents (for technical sites) or of data from the Ministry for ecological protection (for natural objects). For example, the sites of the first category should be equipped with special checking for the reliability of the security systems located directly on the site and continuous supervision of the status. [Pg.168]

A chemical engineer may have a choice of inherent safety variables, such as quantity stored or process temperatures and pressures, or process safety measures such as emergency isolation valves or containment systems, all of which may greatly reduce the vulnerabilities or the consequences of intentional loss. These are in addition to traditional security measures, which may include physical security, background checks, administrative controls, access controls, or other protective measures. For a more complete discussion of the options, refer to the AIChE Center for Chemical Process Safety Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites and other references.f... [Pg.106]

Spill/Leak Disposal Evacuate/Isolate the area, ensure control of ignition sources, stop leak or spill if possible, control/contain/ventilate the gas dispersion area if possible, ground all equipment, attend to security of the site, and wear proper protective clothing and equipment. [Pg.228]

Where backdoor or vendor connections do exist in SCADA systems, strong authentication must be implemented to ensure secure communications. Modems, wireless, and wired networks used for communications and maintenance represent a significant vulnerability to the SCADA network and remote sites. Successful war dialing or war driving attacks could allow an attacker to bypass all other controls and have direct access to the SCADA network or resources. To minimize the risk of such attacks, disable inbound access and replace it with some type of callback system. [Pg.130]


See other pages where Security site controls is mentioned: [Pg.208]    [Pg.593]    [Pg.840]    [Pg.143]    [Pg.970]    [Pg.57]    [Pg.69]    [Pg.244]    [Pg.245]    [Pg.301]    [Pg.305]    [Pg.307]    [Pg.326]    [Pg.393]    [Pg.69]    [Pg.414]    [Pg.143]    [Pg.608]    [Pg.414]    [Pg.77]    [Pg.371]    [Pg.435]    [Pg.117]    [Pg.207]    [Pg.27]    [Pg.369]   
See also in sourсe #XX -- [ Pg.109 ]




SEARCH



Site-control

Sites security

© 2024 chempedia.info