Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Threat evaluation

Stage 1 Is the threat possible If a chemical facility is faced with a terrorism threat, it should evaluate the available information to determine whether or not the threat is possible (i.e., could something have actually happened). If the threat is possible, immediate operational response actions might be implemented, and activities such as site characterization would be initiated to collect additional information to support the next stage of the threat evaluation. [Pg.102]

While site characterization can be considered and implemented as a discrete process, it is important to regard it as an element of the threat evaluation process. In particular, site characterization is an activity initiated in response to a possible accidental... [Pg.107]

Following rapid field testing, samples of the potentially contaminated air/water/ soil will be collected for potential lab analysis. The decision to send samples to a lab for analysis should be based on the outcome of the threat evaluation. If the threat is determined to be credible, then samples should be immediately delivered to the lab for analysis. The analytical approach for samples collected from the site should be developed with input from the supporting lab(s), based on information from the site characterization and threat evaluation. [Pg.109]

In order to provide useful information to support the threat evaluation process and the development of an analytical approach, the findings of the site characterization should be summarized in a report. This report is not intended to be a formal document, but simply a concise summary of information from the site activities that can be quickly assembled within an hour or two. The recommended content of the report includes... [Pg.114]

Terrain analysis. . Weather analysis. . Threat evaluation Threat integration... [Pg.5]

The first step with any assessment of personal armour is to evaluate the threat to the wearer. What is it Which direction does it come from How frequently does it occur How intense is it These questions underpin threat evaluation. [Pg.197]

Threat evaluation mrrst include what the threat is (e.g. krrives, bullets, fragmentation or blast) where it comes from (from above, the fiorrt, below, etc.) how frequently it occurs (single or mrrltiple hits) how irtterrse it is arrd also the relative proportions of different attacks to be endured. [Pg.210]

Skin contact with methanol may present a greater health threat than skin contact with gasoline and diesel fuel and is being evaluated. [Pg.434]

Considerable concern has been raised over the carcinogenic potential of 2,4-D. However, the World Health Organization (WHO) has evaluated the environmental health aspects of this chemical and concluded that 2,4-D posed an insignificant threat to the environment. They did indicate, however, that... [Pg.49]

Carsel RF, Mulkey LA, Lorber MN, et al. 1985. The pesticide root zone model (PRZM) A procedure for evaluating pesticide leaching threats to groundwater. Ecological Modeling 30 49-69. [Pg.198]

If the PA reveals that a contamination problem exists, but does not pose an immediate threat that warrants a removal, U.S. EPA will continue to study the site during a site inspection (SI). Based on data collected during the PA and the SI, U.S. EPA will evaluate the site using the hazard... [Pg.468]

U.S. EPA may list a waste as hazardous for any and all of the above reasons. The majority of listed wastes fall into the toxic waste category. To decide if a waste should be a toxic listed waste, U.S. EPA first determines whether it typically contains harmful chemical constituents. An appendix to RCRA contains a list of chemical compounds or elements that scientific studies have shown to have toxic, carcinogenic, mutagenic, or teratogenic effects on humans or other life forms. If a waste contains chemical constituents found on the appendix list, U.S. EPA then evaluates 11 other factors to determine if the wastestream is likely to pose a threat in the absence of special restrictions on its handling. These additional considerations include a risk assessment and study of past cases of damage caused by the waste. [Pg.501]

VerBerkmoes, N. C. Hervey, W. J. Shah, M. Land, M. Hauser, L. Larimer, F. W. Van Berkel, G. J. Goeringer, D. E. Evaluation of shotgun proteomics for identification of biological threat agents in complex enviromental matrices Experimental simulations. Anal. Chem. 2005,27, 923-932. [Pg.276]

Environmental contamination, either from diffuse or point sources, may compromise the ability of ecosystems to provide society with those goods and services that we require. Contamination is also linked to other widely recognised anthropogenic threats to sustainable functioning of our planet, such as the loss of biodiversity. As many soil properties and processes are conferred by soil biota, it is currently widely agreed that biological characteristics should be taken into account when evaluating the quality, or health, of soil [13, 16]. [Pg.12]

This material has been used by the military as a simulant of a nonpersistent agent to evaluate chemical equipment. It is also used to activate detector kits and alarms. It has been used during field exercises to simulate the threat posed by toxic agent vapor and assist in training soldiers on the proper use of protective equipment. [Pg.446]

Finally, in presenting this broad spectrum, I do not offer an evaluation of the efficacy or viability of the agent classes or any of the individual agents. I have included agents classified by the military as obsolete along with those that are still considered a major threat. It is important to remember that while an agent may have been a failure on the battlefield, it could still be a very successful weapon in the hands of a terrorist. [Pg.787]

M. G. Prodanchuk, V. I. Medvedev, R. Yu. Sova. - Evaluation of Threat of Environmental Pollution with Dioxins and Biphenyls under Thermal Treatment of Solid Domestic Waste. In the book Cleanness of the Environment in Our City.- Theses of Reports.- Ukraine, Lviv.- 1999.-p.l6-18... [Pg.91]

Security Vulnerability Assessment A security vulnerability assessment is intended to identify security vulnerabilities from a wide range of threats ranging from vandalism to terrorism. With the recognition of threats, consequences, and vulnerabilities, the risk of security events can be evaluated, and a security management system can be organized that will effectively mitigate those risks. [Pg.106]


See other pages where Threat evaluation is mentioned: [Pg.607]    [Pg.32]    [Pg.32]    [Pg.37]    [Pg.107]    [Pg.108]    [Pg.109]    [Pg.111]    [Pg.196]    [Pg.197]    [Pg.199]    [Pg.31]    [Pg.607]    [Pg.32]    [Pg.32]    [Pg.37]    [Pg.107]    [Pg.108]    [Pg.109]    [Pg.111]    [Pg.196]    [Pg.197]    [Pg.199]    [Pg.31]    [Pg.146]    [Pg.82]    [Pg.397]    [Pg.251]    [Pg.18]    [Pg.18]    [Pg.41]    [Pg.827]    [Pg.89]    [Pg.229]    [Pg.285]    [Pg.566]    [Pg.1385]    [Pg.108]    [Pg.376]    [Pg.141]   
See also in sourсe #XX -- [ Pg.210 ]




SEARCH



Environmental threats, evaluation

Health threats, evaluation

Threat

© 2024 chempedia.info