Treceți la conținutul principal

SAFETY AUDIT NEW METHOD -1

INTRODUCTION

Why a new methodology ? |Because there are a lot of situations in which you want to assess the safety of a specific location without wanting to invest actually very much. Minimal resources should not mean by any circumstances the neglect of safety.

PROPOSED OBJECTIVES


The objective of the safety audit is to evaluate the effectiveness of the company’s safety effort  and make recommendations which lead to a reduction in accidents and minimisation of loss potential. Safety audits are an important part of a company’s control system and these checks ensure that deteriorating standards are detected. Examination of the defects exposed in this review results in hazardous conditions and potential accidents being avoided.
Regular audits should be based on the premise that resources should be made available to identify and eliminate hazards before accidents occur, rather than use the resource of manpower and materials only after injuries and damage to equipment have resulted in human suffering, significant monetary loss which, in certain circumstances, affect the profitability severely.Mistaken belief that management and sites are operating satisfactorily within the requirements of appropriate legislation/regulations and standards/codes of practice is eradicated, and the direct contact with individual workers has as its aim the resultant change in attitude and commitment to the use of safe working practices, which continual involvement and education generate. The safety audits will monitor all activities performed on site, and in particular:
• The basic safety policy and organisation of the company.
• Management commitment and example on safety matters.
• Administration and safety activity.
• Accident reporting and investigation.
• Opportunity of injury – and record of every injury.
• Safety committees.
• Working rules and practices for each company location, including visitors and contractors.
• Compliance with statutory regulations and company standards.
• Behaviour and unsafe acts of personnel and their relationship to compliance with safety rules.
• Activity related certification of employees.
• First Aid certified employees.
• Training needs and activities.
• Hazards review of process equipment for either new or existing facilities.
• Operating procedures.
• Safety work permits.

• Emergency procedures.

METHODOLOGY

The audit system uses as a basis a three sided pyramid shown in the next figure.


Figure 1 The safety audit structure

Facet 1: is represented by Operational Safety Audit
Facet 2: is represented by Management Safety Audit
Facet 3: is represented by Safety Indicators Audit which are also the output of the system.
The checklist is composed by:
-main items, questions or statements- which should be assessed on a 1(not good) to 5 (excellent) scale with the help of
-auxiliary items- which are questions to be answered with yes and no.

If all the auxiliary questions are responded with yes the main question could be assessed at 5.
A evaluation on the 1...5 scale which is below or equal to 3 should be considered as a weak point ,all the evaluations above 3 are giving strong points.
All the weak points should be mitigated.
An average value would be computed for the three facets of the pyramid. The average value of those averages gives the safety value of the audited enterprise, workplace, etc. This safety value could be a very serious warning- for values below 3- as there is no  proper safety inside such unit.

The results should be concentrated in the following tables.

OPERATIONAL SAFETY AUDIT
No
Weak Point Name
Weak Point assessment value at Date:
Proposed measures to improve the Weak Point
Responsible
Weak Point re-assessment value at Date:







MANAGEMENT SAFETY AUDIT
No
Weak Point Name
Weak Point assessment value at Date:
Proposed measures to improve the Weak Point
Responsible
Weak Point re-assessment value at Date:







SAFETY INDICATORS AUDIT
No
Weak Point Name
Weak Point assessment value at Date:
Proposed measures to improve the Weak Point
Responsible
Weak Point re-assessment value at Date:






Comentarii

Postări populare de pe acest blog

IDENTIFICAREA ȘI ANALIZA CAUZELOR RĂDĂCINĂ -1

Analiza cauzelor rădăcină este o metodă extrem de folosită de către managementul de performanță  din firmele dezvoltate. Metoda este considerată ca o metodă primară- care trebuie utilizată în primele faze ale analizei specifice procesului managerial. Ne propunem să prezentăm o metodă de analiză a cauzelor rădăcină care să poată fi aplicată atât pentru managementul calității cât și pentru managementul securității – ținând seama de faptul că în cea mai mare parte, cauzele rădăcină ale problemelor de calitate și problemelor de securitate și sănătate sunt comune. Figura 1 prezintă modul  global de analiză pentru cauzele rădăcină Din figură se poate observa că avem 2 procese distincte: ·         -un proces de identificare- care va fi realizat pe baza metodei cunoscute și ca 5 W ( 5 Why); ·         -un proces de analiză; procesul de analiză urmărește: o   stabilirea cauzelor specifice managementului calității și managementului de SSM; o   ierarhizarea cauzelor identificate;

Figura 1  Structurare…

VULNERABILITY METRICS AND KPI

KPI definitionA key performance indicator(KPI) is a measure of performance, commonly used to help an organization defineand evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.
–KPIs provide business-level context to security-generated data –KPIs answer the “so what?” question –Each additional KPI indicates a step forward in program maturity –None of these KPIs draw strictly from security data
COBITControl Objectives for Information and Related Technology (COBIT) is a framework created by ISACA for information technology (IT) management and IT governance. It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT was first released in 1996; the current version, COBIT 5, was published in 2012. Its mission is “to research, develop, publish and promote an authoritative, up-to-date, international set of generally accepted information technology control obj…

APLICAȚII ALE GRAFULUI DE RISC-1

Așa după cum s-a văzut dintr-o postare trecută, graful de risc poate fi un instrument util- și nu numai în cazul bolilor profesionale. Vom adapta în continuare  teoria existentă la teoria și practica din România și vom detalia câteva aspecte considerate de interes.
Este interesant de adaptat  graful de risc pornind de la clasicul sistem Om-Mașină folosit în practica de specialitate din domeniul SSM din România. În acest sens, folosind experiența existentă și datele statistice putem dezvolta în mod corespunzător- așa cum se prezintă în continuare în acest material.
Tabelul 1- Atribute folosite în graf Atribut Descriere I (Inițiatori) Operator(O): a. operator pregătit necorespunzător[1] b.operator malevolent [2] c.operator surprins de un eveniment neprevăzut datorat sarcinii[3] d. operator surprins de un eveniment neprevăzut datorat mașinii;[4] e. operator surprins de un eveniment neprevăzut datorat mediului/factorilor naturali. [5] Sarcină(S): a. sarcină incorect formulată- care dete…