🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

environment final ppt 2.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

SCI100 Environmental, Health and Safety (EHS) 1 1 SCI-100 Environmental, Health and Safety (EHS) Risk Management Learning Outcome Differentiate Hazard and Risk Understand risk rating and risk assessment...

SCI100 Environmental, Health and Safety (EHS) 1 1 SCI-100 Environmental, Health and Safety (EHS) Risk Management Learning Outcome Differentiate Hazard and Risk Understand risk rating and risk assessment Implement risk assessment process Risk Hazard Risk relates to exposure to the danger The probability (likelihood)of injury or loss”. RISK occurs only when there are: Hazard Exposure Exposure Also known as vulnerability, threat or prospect. Hazard vs. Risk HAZARD RISK Risk ( Shark + Human) Any source of HAZARD (Shark alone) The probability of potential damage, injury or loss if harm or adverse exposed to a hazard. health effects. The measure of the “probability” Causing or potential to cause “risk” and “severity” of an adverse effect caused by a hazard Environmental Health and Safety Risk Risk is the probability or likelihood of incident to happen in relation to the severity of the incident when it happens. R isk = Probabilit y X Severit y Risk Rating & Risk Assessment Probability X Severity “something is likely to “the condition of being very happen” bad, serious, unpleasant, or harsh” Risk Management Risk management is still not a culture expenses/cost Vs. investment. Risk management is the continuing process to identify, analyze, evaluate, and treat loss exposures and monitor risk control and financial resources to mitigate the adverse effects of loss. Requirements and benefits of risk management OSHAD-SF – Element 2 Requirements Employee Health and Safety Entity to develop, implement, and maintain a risk management program. Conduct an OSH review of all activities, products, and services. Benefit of Risk Management: Protects employees and other people from harm. Protect the reputation and public image of the entity. Increasing the stability of operations Preventing and reducing legal liability OSHAD-SF – Technical Guideline – Process of Risk Management When to undertake Risk Management Planning or making a change to a work; Introducing new plant, equipment, materials or substances; After an OSH incident/near misses; Introduction of new workers; Presence of a high level of risk associated with a specific work activity. Scheduled intervals appropriate to the nature of the workplace; Legislative obligations change Before work activities begin Hazard Identification, Risk Assessment and Risk Control (HIRARC)  In recent years, Hazard Identification, Risk Assessment and Risk Control (HIRARC) has become fundamental to the practice of planning, management and the operation of a business as a basic of risk management. Hazard identification, risk assessment and risk control A process of identifying hazard source or situation (measuring hazard) Estimating level of risk and determine tolerability (assessing hazard) Reducing or eliminating risk (control risk) HIRARC Evaluates: Workplace Equipment Training Procedure Five (5) Steps Risk Assessment Identify Hazard Steps may be conducted differently Identify Losses based on each organizational environment. Evaluate Risk Risk Controls Implementations Prerequisite: Classify Work Activities A set of tasks that need to be done and classified in accordance with their similarity:  It can be in the same working area.  Based on stages of production  Based on stages of the service process. It should not be too big (for building a motorcycle) or too small (for turning a screw). STEP 1: Identify Hazard Generate a comprehensive list of sources of risk and events that might have an impact on the safety and health of employees. Best practice for Identifying Hazard Involving Employees involved in tasks Referring to an accident or near-miss record Referring to the safety audit record Direct observation STEP 2: Identify Losses (Harmed or Damaged) employees; visitors; contractors; members of the public; Bhopal Explosion consumers of products or services; specific sensitive or protected environment areas; Fukushima Daichi plant / equipment / property damage. STEP 3: Evaluate Risk Risk = Probability X Severity Sources of information: past records; Practice/relevant experience; published literature; specialist and expert judgments. Risk Evaluation Tools A properly constructed risk matrix will be able to define the various levels of risk as the product of the probability categories and severity categories. Risk matrix is actually a simple mechanism to help in presenting the risk as visible as possible. R is k = P r o b a b i l i t y X S e v e r i t y STEP 4: Risk Control Consideration Most Effective Elimination Remove the hazard Risk Control Consideration legal requirements; Engineering & Design & Modification to reduce Substitution exposure to hazard international standards / Administrative Control Control the way the work is done guidelines; Personal Protective Equipment to reduce direct entities OSH policy / objectives; Equipment exposure availability of resources; Interim Short term measures costs and benefits; and Least Effective the status of scientific and technical knowledge STEP 5: Implementation (Monitor and Review) Enforcing the risk control Identify Hazard Reviewing either the control introduced is adequate or a better control may be implemented. Identify Losses The process will always cycle back to Evaluate Risk the identification of hazards.  The possibility of a new risk may be identified due to many reasons. Risk Controls  Possibilities of hazards controlled introduced new hazards. Implementations  A new process was introduced. Risk Assessment Tools Risk Assessment Tools HAZOP - Hazard Operability HAZID - Hazard Identification FMEA - Failure mode effect analysis Bow tie PHA - Process Hazard Analysis Fault Tree Analysis etc. Risk Register Risk Register Tool in risk management and project management. Records: nature of the risk level of risk, who owns it control measures in place Why risk register? Risk inherent in everything Entity can never be able to anticipate everything that could go astray Due diligence & legal ramification (OSHAD-SF – Element 2) Set up mechanism to collect risk/potential risks Planning to respond quickly How Risk Register Work? Collect the Risks Record possible risks in managing a project Monitor the Risks requires a systematic approach Person responsible (PIC) for monitoring the risk and leading Place to put all data and follow the specific any actions required to mitigate risk throughout the project that risk Keep track of the risk over the A risk tracking document keeps the risk course of project monitored at all time. Document the Risks Resolve the Risks Single place to identify the risk Close when resolved. Note risk history—from Ensuring risk is no longer a problem in the project. where it occurred to resolve effectively manage Tag the risk to the person who identified resources against a problem that it and owns its management might no longer exists. Remark how likely the risk will impact the project Generic Template Generic Template Security Risk Assessment Emergency Exercise report Emergency Assurance Audit Risk Register (Comprehensive) Analysing Risk Register

Use Quizgecko on...
Browser
Browser