Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Unauthorized entry

If vessels are open but entry is not yet authorized, the manhole should be covered by a barrier. Do not rely on contractors reading rules. Explain the mles to them. [Pg.237]

A process foreman had a last look in a vessel before it was boxed up. He saw an old gasket lying on the floor. He decided to go in and remove it. Everyone else was at lunch, so he decided to go in alone. On the way out, while climbing a ladder, he slipped and fell and was knocked out. His tongue blocked his throat, and he suffocated. [Pg.237]

The operators returned at 10 15 a.m. They saw the welding machine, but the lighting was dim, and they did not see the leads entering the vessel. They filled the vessel with water, turned on the impeller, and fed dry pulp into the vessel. [Pg.237]

At 2 30 p.m. the welders were reported missing. Their job card led to No. 3 repulper. It was stopped and drained. Inside were the remains of a rope ladder, welding equipment, and human bones [22]. [Pg.238]

The welders should have known that they should never enter a vessel until they or their foreman has checked that the vessel is isolated. by slip-plates or disconnection, and has accepted (and signed) an entry permit. Power supplies should have been disconnected, or if merely locked off, each person entering should have added his or her personal lock and kept the key. It is hard to believe that this was the first time normal good practice had not been followed. The management system was at fault. [Pg.238]


All laminated glass iacreases the level of secutity to some extent. However, depending on the appHcation, secutity glass is constmcted of multiple layers of glass, PVB, polycarbonate, polyurethane, or other polymer matenals. Laminated glass permits the same visual observation as normal glass but prevents or delays unauthorized entry (or exit) until the attempt can be detected. It complies with test UL 972 (38). [Pg.529]

Facilities should be provided with appropriate barriers to prevent unauthorized entries to the general public and employees not required to be put at risk from their normal job duties. [Pg.246]

Because they are the main entries into a facility or a room, doorways are often prime targets for unauthorized entry into a facility or an asset. Therefore, securing doorways may be a major step in providing security at a facility. [Pg.195]

On resolution of this incident, the catalyst preparation area was secured against unauthorized entry, and plant management assembled for a meeting to discuss immediate actions. They decided to call in a corporate risk analyst to lead the team. With his help, by teleconference, management selected the following incident investigation team ... [Pg.365]

The area must be secured against unauthorized entry ... [Pg.100]

Regular safety and routine physical security activities will continue to protect personnel, facilities, and materiel from pilferage, unauthorized use, sabotage, and violation of community rules and regulations by any source, internal or external (U.S. Army, 1995, 2000f). Conceivably, the island could be the target of unauthorized entry and trespassing from the air or sea. Thus, a security presence appears to be warranted until final ownership of the island is established. [Pg.44]

Finding 15. Security requirements for Johnston Atoll following the departure of USACAP include (1) protection of personnel, facilities, and materiel, (2) prevention of pilferage, unauthorized use, sabotage, and violation of com-mnnity rules and regulations, and (3) prevention of unauthorized entry and trespass from either air or sea until the island s end state has been reached and final ownership has been established. [Pg.59]

Data should only be entered or amended by authorized people. Suitable methods of deterring unauthorized entry of data include the use of keys, pass cards, personal codes, and restricted access to computer terminals. There should be a defined... [Pg.831]

What security measures are used to prevent unauthorized entry into the network, and... [Pg.67]

There was a lack of a secure system to prevent unauthorized entry in restricted data systems. Data edit authorizations were available to all unauthorized users, not only the system administrator. [FDA Warning Letter, 2000]... [Pg.297]

A small storage room whose dimensions are 2 m X 1.5 m x 3 m contains a number of expensive and dangerous chemicals. To prevent unauthorized entry, the room door is always locked and can be opened with a key from either side. A cylinder of liquid carbon dioxide is stored in the room. The valve on the cylinder is faulty and some of the contents have escaped over the weekend. The room temperature is 25°C. [Pg.217]

B. The spike board (see PMA Vol.l 3). [Pg.44]

Data should be entered or amended only by persons authorized to do so. Suitable security systems should be in place to prevent unauthorized entry or manipulation of data. The activity of entering data, changing or... [Pg.142]

Preventing unauthorized access into a warehouse may require certain security features. Unauthorized access may be motivated by theft or other illegal or destructive purposes. There may also be a need to restrict employee access into an area of a warehouse storing toxic or potentially hazardous materials. The type and extent of security features utilized should be based upon the risk associated with unauthorized entry. Security features, such as door locks, alarm systems, closed circuit television (CCTV) monitors, should not interfere with required means of egress. [Pg.107]

Procedures should be established to prevent unauthorized entries or changes to existing data Systems should identify and document the persons entering or verifying critical data Input to and output from the computer or related system should be checked for accuracy at appropriate intervals. Where critical data are entered manually, there should be an additional check on the accuracy of the entry. This may be performed by a second operator or by the system itself. Appropriate controls should be exercised over computers and related systems to ensure that changes in master... [Pg.731]

Whenever entry is not authorized (e.g., before column atmosphere is tested), the manholes should be blocked with barriers to ward off unauthorized entry (210). [Pg.262]

The security function usually includes fire prevention and reporting, crime prevention and detection, risk management, and administration of security personnel. A security survey should be taken to determine the scope of the security function, the condition of this service, and the steps necessary to bring security up to standmd. Outside gumds may be necessary to prevent unauthorized entry to critical manufacturing areas, laboratories, computer rooms, and other sensitive areas. The level of security depends on the sensitivity emd confidentiality of the work, the labor situation, the local crime situation, and the proximity of fire and police protection (Piper 1988b). [Pg.1568]

If the incident points to any immediate security issues, such as unauthorized entry into the facility, immediate corrective action should be taken. Also, the appropriate law enforcement agencies should be contacted. [Pg.467]

Building and construction contractors often demarcate their entire work area by erecting a fence around it. This ensures that the construction site is demarcated and prevents unauthorized entry onto the site. [Pg.139]

In place of the three alternatives just listed, the licensee provides continuous direct or electronic surveillance that is capable of preventing unauthorized entry. [Pg.542]

Safeguards and Security. In general, the reactor design should make adequate provisions to prevent unauthorized entry to the site or buildings on the site in order to prevent theft or unauthorized removal of nuclear materials and sabotage to the reactor. [Pg.46]

Circuits are controlled by switchgear which is assembled so that the circuit may be operated safely under normal conditions, isolated automatically under fault conditions, or isolated manually for safe maintenance. These requirements are met by good workmanship carried out by electrically skilled persons and the installation of approved British Standard materials such as switches, isolators, fuses or circuit-breakers (IET Regulation 131.1.1). The switchgear must also be non-combustible or housed in a non-combustible cabinet or enclosure (IET Regulation 421.1.200). The equipment belonging to the supply authority is sealed to prevent unauthorized entry, because if connection were made to... [Pg.158]

Potential targets (2) Unauthorized entry into or tampering with tank supply area could threaten life and/or equipment. [Pg.109]

Barriers and controls (2) The entire exterior oxygen storage area is fenced off and locked shut to prevent unauthorized entry. [Pg.109]

Procedures must allow for the identification and evaluation of all permit space hazards before entry. Employers must establish and implement means to prevent unauthorized entry. Employers must also establish and implement means to eliminate or control hazards necessary for safe entry by specifying acceptable entry conditions and isolating the space. The employer must purge, make inert, flush, or continuously ventilate the permit space as necessary to eliminate or control atmospheric hazards. Additionally, the employer must provide, maintain, and require the use of PPE necessary for safe entry. Employers ensure the testing of atmospheric conditions inside the SPACE BEFORE ENTRY (Table 5.10). [Pg.111]

Inform non-authorized employees and the controUing contractor of the location of the PRCS, the hazards in it, and the steps to prevent unauthorized entry. [Pg.134]

Extensive automated security systems will be provided in LEADIR-PS 200. These will detect the unauthorized entry of persons onto the premises, and detect any unauthorized attempt to enter the LEADIR-PS 200 buildings. The security system will provide data to both local authorities (such as police) and to the central control and monitoring facility. [Pg.101]

Are electrical power source covers secured to prevent unauthorized entry Yes No N/A... [Pg.218]

After identifying and labeling all site permit-required confined spaces, the employer has two choices (1) designate such spaces as off limits to entry by any employee (unauthorized entry must be prevented), or (2) develop a written confined space program. The requirements for a written confined space program are covered in the next section. [Pg.312]


See other pages where Unauthorized entry is mentioned: [Pg.236]    [Pg.26]    [Pg.30]    [Pg.146]    [Pg.60]    [Pg.160]    [Pg.125]    [Pg.336]    [Pg.192]    [Pg.316]    [Pg.1569]    [Pg.681]    [Pg.733]    [Pg.2398]    [Pg.306]   


SEARCH



© 2024 chempedia.info