Security Vulnerability Assessment (SVA) Revealed
|
|
|
- Barnard Manning
- 9 years ago
- Views:
Transcription
1 Security Vulnerability Assessment (SVA) Revealed An iomosaic Corporation Whitepaper By: R. Peter Stickles, Henry Ozog and Sanjeev Mohindra Nature of Threats Security threats can come from internal or external adversaries. Internal threats include disgruntled employees and/or contractors, employees forced into cooperation by threat of extortion or violence. External sources include criminals, extremists or terrorists. The most important objective of an adversary, next to successfully completing the mission, is not being detected. Detection usually results in a failed mission. Because the external adversaries may not need to enter your plant, there are few mitigation options for increasing the likelihood of detection prior to the attack. Furthermore, as a recent article in USA Today The Forum states, Terrorists focus on simple means (to avoid detection). They are going to use stuff that s available. We need to think like terrorists if we want to prevent an attack. We re looking for this big, magical attack, and the terrorists are looking for stuff that s already in the environment. Some chemical companies have already decided that protecting their assets from attack by armed combatants with military caliber weapons is the responsibility of government and local authorities. Furthermore, coupled with the terrorist s desire to be unobtrusive, such a scenario is not a high priority for prevention. Given that a chemical plant became the target, a more plausible scenario is the detonation of an SUV filled with ammonium nitrate and distillate fuel oil next to a storage tank. This only requires stuff that is already in the local environment. The most important objective of an adversary, next to successfully completing the mission, is not being detected. Why is SVA Important? While the likelihood of the terrorist threat is arguable, the consequences for a company aside from the obvious losses, could be quite harsh. Firstly, any significant emergency response effort due to a chemical plant attack would become a news media event. This guarantees high visibility. Secondly, if it were learned that the company had completely ignored the security risk and was unprepared, there would be a public outcry. [In addition, the industry has already been drawn into homeland security initiatives, whether it likes it or not]. So chemical and energy companies need to address the risk to some extent, but how much is an ongoing debate? At the very least, understanding the security risk is a necessity. Many chemical companies have already screened their facilities and operations for security vulnerability potential, and are conducing Security Vulnerability Analyses (SVAs) on the high priority concerns. Furthermore, there is no lack of ideas on how to assess the risks. Industry trade associations (e.g., American Chemical Council), professional societies (e. g., AIChE s Center for Chemical Process Safety) and the Justice Department have sponsored the development of SVA methodologies. The question is where do we go from here?
2 Path Forward Where Do We Go from Here? A standard or code can be viewed as codified risk mitigation for a hazard (threat) that is pervasive throughout industry. For example, frequent boiler explosions in the past led to mechanical design codes for boilers and pressure vessels. More recently, the development of American Petroleum Institute Recommended Practice (API RP 752) for siting of buildings in process plants, addresses a common hazard to process plant control rooms, especially for plants designed when pneumatic controls were prevalent. The CCPS SVA Guidelines; Appendix A, addresses this aspect from the standpoint of the SVA methodology. At the moment there is much passion and activity expended on SVA. What is missing is a practical industry consensus standard or recommended practice (similar to API RP 752) that allows companies to benchmark their individual security mitigation efforts. The development of such a recommended practice would allow pooling of the collective wisdom of CPI/HPI manufactures and consultants. It would also provide practical and consistent guidelines for addressing an industry wide potential problem. Such a standard would not limit individual companies from establishing internal practices that exceeded the established recommended practice if they so desire. The focus should be on practical and implementable risk reduction based on deter, detect, and delay mechanisms incorporated into internal policies/procedures, perimeter security systems, and a rapid robust response. The recommended practice should also incorporate a risk-based assessment approach that puts terrorist attacks in context with other plant risks. Finally, enhancement of post-incident response capabilities should be addressed. This would include a review of internal capabilities such as emergency isolation and shutdown, release mitigation options, communication, etc. Externally this might include a review of local emergency response coordination and resources leading to the development of a coordinated contingency plan for a high public impact event. Issues September 11, 2001 is to chemical plant security vulnerability what Bhopal, India was to plant process hazards vulnerability. Then, as now, awareness of the issue was strikingly revealed by a catastrophic event. In the case of process hazards vulnerability, government and industry initiatives were set in motion that eventually produces the OSHA Process Safety Management Rule (29CFR ). It remains to be seen whether security vulnerability will be codified in a similar fashion. There are some indications that this may happen. The U.S. Department of Justice, Office of Justice Programs has already supported the development of the Chemical Facility Vulnerability Assessment Methodology (VAM), which was prepared by Sandia National Laboratories. Chemical industry groups including the American Chemical Council (ACC) and The American Institute of Chemical Engineers Center for Chemical Process Safety (CCPS) have also responded with there own guidelines and methodologies for assessing treats of attack from internal and external activities. As of this writing there is no single consensus methodology for evaluating security vulnerability. In fact there is hardly a consensus on how much effort needs to be expended on events that are highly unlikely for a given site, and that are all but impossible to control for some scenarios. One of the questions is just how desirable is a chemical facility to a terrorist when considered in the context of all potential targets. Firstly, their prime objective is to cause mass casualties or massive disruption because they are expending resources over a considerable time period. As the 9/11 pre-attack activities demonstrate, it took many months of planning to orchestrate and implement that incident. The target must have a high probability of achieving the prime objective, once attacked. Targets that would meet this criterion include dams, nuclear power stations, energy pipelines, and rail systems (especially toxic chemical shipments). In many cases targeting chemical plants may not achieve the same level of assurance for success. As we know from risk assessment studies and experience, the occurrence of a toxic or flammable chemical release does not always have a catastrophic consequence, especially for the offsite public. A review and interpretation of the Chemical Safety Board incident database provides some additional perspective. Of 167 reactive chemical incidents, there are about 40 that had a public impact of some kind (Table 1). An iomosaic Corporation Whitepaper By: R. Peter Stickles, Henry Ozog and Sanjeev Mohindra
3 The breakdown by severity of impact is given below: TABLE 1: Breakdown of Impact An iomosaic Corporation Whitepaper By: R. Peter Stickles, Henry Ozog and Sanjeev Mohindra Severity of Impact Number of Incidents Percentage of Incidents Public Evacuation Only Injury to Public Public Fatality Other (Sheltered in place) TOTAL These incidents were not screened for size of release and are not all worst-case scenarios. But the numbers do show that public impact events are less that half (40/167), and suggest that mass casually events are a small percentage of public impact events. Perhaps the main insight derived from this data set is that only worst-case scenarios need to be considered in security vulnerability assessment, because smaller events will not produce the desired impact. Another factor is the degree of access. Energy or chemical pipelines and rail lines and storage yards are less secure and much easier to attack without notice. Protecting such assets is also difficult. A 60 Minutes documentary noted that rebels in Colombia blowup the same petroleum pipeline about every two weeks, even though it is expected. What Does Security Vulnerability Assessment (SVA) Involve? The chemical security vulnerability assessment is basically a review of a companies assets for handling, storing, and processing hazardous materials from the perspective of an individual or group intent on causing a catastrophic event with large-scale injury/fatality or supply disruption impacts. It considers possible scenarios by looking at inventories or production steps involving hazardous material, potential pathways of attack, and existing security countermeasure or ring of protection. The scenarios are priority ranked using a system of risk-based factors, which estimate (usually qualitatively) the frequency and consequence of each scenario. High priority scenarios are subjected to further assessment to consider appropriate mitigation options (countermeasures). In some cases (controversial or expensive fixes), more quantitative risk assessment tools may be employed to help reach a decision. FIGURE 1: Security & Vulnerability Assessment Methodology
4 Get Started - Security Vulnerability Screening For some guidance, it is useful to again return to the period following Bhopal, to consider how some large multi-product, multi-facility chemical companies were approaching risk assessment. At that time, a tiered or layered risk analysis concept (Ref.1) was applied, because the effort involved a full quantitative risk assessment (QRA) was resource (personnel and time) intensive and not warranted in many cases. This tiered concept is illustrated in Reference 1, and gives examples of the tools that are appropriate for each tier. This same approach makes a lot of sense for the current situation with SVA, and is supported by the American Chemistry Council (Ref. 2). The first step involves security vulnerability (SV) screening using Tier 1 tools. Tools that are available that fall into this category include: Chemical Hazards Evaluation (Ref. 2) CCPS Security Vulnerability Enterprise Screening Tool (Ref. 3) These tools are not complex and are intended to facilitate the prioritizing of facilities processing or handling chemicals, prior to conducting a Security Vulnerability Analysis (SVA). Table 2 provides a comparison of the factors that are considered in the screening. While not a tool per se, Step 1.0 of the VAM is also included for completeness. The CCPS screening tool is basically an index method that incorporates difficulty of attack and target attractiveness. It builds on the RMP worst-case scenarios by incorporating the results of those consequence analyses. However, for non-rmp scenarios, the CCPS consequence evaluation is less quantitative. For these scenarios, other tools like the DOW Chemical Exposure Index (CEI), or Facility Initial Risk Screening Tool (iofirst), available from iomosaic Corporation can be utilized. The latter computerized screening tool incorporated simplified hazard models for toxic and flammable materials, which are sufficiently robust for screening purposes. The SV screening produces a list of sites or facilities that is divided into several priority tiers (e.g., 1 to 4 for CCPS tool). TABLE 2: Comparison Of The Factors Considered In Screening ACC General Approach 1.0 Chemical Hazard Evaluation: 1. How likely is a chemical release, and 2. How harmful would it be? 4.0 Physical Factors 1. Size of Container? 2. Where is it located? 3. What surrounds the plant site, and at what distance? CCPS Enterprise Level Screening 1. Relative Difficulty of Attack factor considers ease of access and complexity of logistical support 2. Relative Severity factor considers population density within the radius of impact of RMP worst case scenario. 1. Relative Severity factor is based on worst case release 2. Relative Attractiveness factor considers proximity to national landmarks, critical infrastructure, etc. 3. Addressed by Relative Severity factor population density aspect Non-RMP covered facilities or chemicals with potential offsite impact: 1. Determine Relative Severity factor base on engineering estimate of hazard distance and impacted population When utilizing off-site consequences is inappropriate (e.g., small quantities of chemical warfare chemicals, FBI list chemicals) 1. Computation (by spread sheet) of a Material Factor based on toxicity, explosivity, reactivity an storage method. VAM Step 1 Screening An iomosaic Corporation Whitepaper By: R. Peter Stickles, Henry Ozog and Sanjeev Mohindra 1. Specify undesirable events 2. Evaluate consequences of undesirable events Considers: 1. Number of people affected 2. Recognized importance, history/symbolism 3. Accessibility If on-site inventory is less than threshold quantities (TQs) for covered chemicals under 40 CFR , then a VA is unlikely to be needed to help protect against unacceptable off-site consequences. Second question is whether the loss of a facility would result in a significant national impact (e.g., sole source for a chemical vital to national defense industries).
5 TABLE 3: Summary Of The Features Of Three Public Domain Methodologies Element Screening Threat Identifica- tion Assessment Risk Analysis ACC SSG Step 1: Chemical Hazard Evaluation: How likely is a chemical release, and How harmful would it be? Step 2: Process Hazard Analysis Step 3: Consequence Assessment Step 4: Physical Factors Assessment CCPS SVA Enterprise Level Screening Relative Difficulty of Attack factor considers ease of access and complexity of logistical support Relative Severity factor considers population density within the radius of impact of RMP worst case scenario. Step 2: Facility Characterization: Assets/hazard ID, Consequence analysis Attractiveness analysis, Layers of protection review Step 3: Threats Assessment: Adversary ID/ characterization Step 4: Vulnerability Analysis Target classification or Site security review and scenario development Risk analysis Sandia VAM 1.0 Screening Specify undesired events Evaluate consequences of Undesired Events 3.0 Planning: Characterize facility Derive severity levels Threat Assessment 4.0 Site Survey 5.0 Analysis Systems effectiveness analysis Risk Analysis Mitigation Step 5: Mitigation Assessment Step 5: Identify Countermeasures 6.0 Risk Reduction LESS Formalized Methodology MORE The next step is to subject the high priority facilities to a more detailed vulnerability analysis that considers specific attack scenarios and existing countermeasures or layers of protection. The techniques and the sequence of use in a VA are discussed next. Vulnerability Assessment A summary of the features of three public domain methodologies is presented in Table 3. The three approaches presented are: 1. Site Security Guidelines (SSG), a product of American Chemical Council (ACC) et. al. 2. CCPS R Security Vulnerability Analysis (SVA) Methodology 3. National Institute of Justice Chemical Facility Vulnerability Assessment Methodology (VAM) developed by Sandia. TABLE 4: Level 2 Tools Methodology Element Tool Description Threat Identification SV Risk Survey Experienced-based approach that employs a team to conduct a facility survey of potential security vulnerabilities SV What-if Process Hazards Analysis al. a. SVA Generic What-if checklist with questions specifically tailored to SV threats and existing protection layers Incorporation of SV into PHA techniques such as HAZOP etc. Risk Analysis Layers of Protection Analysis LOPA is a simplified risk analysis tool which assigns probability reduction credits to various engineered and procedural independent protection layers (IPLs) Rings of Protection Analysis ROPA is similar to LOPA, but is a more qualitative approach used by security specialists for considering protection layers
6 As can be seen, they have many risk assessment elements in common with variability in the sequence of when they are used. The three methodologies also vary from left to right in terms of the degree of formality and documentation involved. There was an attempt to make VAM a regulated standard (S.1602), but this appears to be less likely due to the change in the political landscape in Congress (Ref. 8). By distilling the essences of these approaches, what emerges is a generic SVA methodology shown in Figure 1 that incorporates the layered risk assessment concepts discusses above. Some applicable Level 1 and Level 2 tools are shown in the major activity boxes. Specific tools that are available from iomosaic Corporation are shown as flags. Level 1 Tools have been already described. Some Level 2 Tools that may be employed are shown in Table 4. Risk Management Most companies have the tools and where with all to assess their vulnerabilities. The big question is what do you do to address the potential threat? As mentioned, there are two groupings of adversaries, namely, insiders and outsiders. Risk mitigation controls need to be implemented to deal with both. Some of these will deal with the frequency component of risk and others address consequence mitigation. 1. Internal threats: Mitigation mostly involves administrative controls such as: Employee hiring screening Contractor screening Perimeter security procedures Behavior observation program Inventory reduction Emergency response planning 2. External threats: Mitigation involves more engineered controls: Inventory reduction Relocation of storage Obscuring storage, installing decoy tanks Improvements to physical perimeter systems (double fence line, lighting, motion sensor alarms, video cameras, Jersey barriers, etc.) Pre-planning/coordination with local emergency response agencies. Another way of look at security is using the Rings of Protection concept. This is analogous to the Layers of Protection concept used in process safety management. For example, the following ring structure could be considered: Ring 1: Internal policies and practices Ring 2: Parameter security systems and procedures Ring 3: Storage inventory management and siting Ring 4: Policing by local authorities As Table 5 shows, the degree of company control, effectiveness, and cost can vary a lot, especially at the outer rings. In Step 11 of the Sandia VAM, the value of protection for common vulnerabilities is presented. Outer ring protections can help provide early detection to some threats, but inner ring protections often address more threats and places delay and response features closer to a target. Furthermore, delaying an adversary is one of the important features of a good protection system because it impedes progress (which may also make the target less desirable) and allows time to mobilize an effective response. The value of deterministic risk assessment is limited in security vulnerability analyses, particularly for the frequency dimension of risk. Placing probability/frequency estimates on some of the initial events involved an at-
7 TABLE 5: The Degree Of Company Control, Effectiveness And Cost Ring of Protection Threat Addressed 1 Internal due to sabotage by third party or employee 2 External due to unauthorized entry to plant site 3 External due to munitions delivered from outside the fence 4 External due to munitions delivered from outside the fence Mitigation Concepts Internal policies and practices: Sign-in policies Badge checks, receptionist New employee and contractor screening Behavior observation program Parameter security systems: Double fence line Trenches Lighting Motion sensor alarms TV cameras Storage inventory management and siting: Reduced inventory Relocated storage Obscure visibility of storage Install shielding or berms Increased policing by local law enforcement and/or improved ER coordination Ability of Company to Control Entirely within plant s control. Generally low cost for implementation. Entirely within plant s control. Low to medium cost for implementation. Mostly within plant s sphere of control but fixes may not be practical nor completely effective and can be costly. Risk/benefit analysis needed for deciding action Actions can be influenced by plant, but not totally controlled. Cost to plant may be negotiable. tack scenario is pure speculation. The initial vulnerability screening values are generally sufficient to identify the higher risk situations. A methodology like Layers of Protection Analysis (LOPA) could be used to evaluate the relative risk reduction benefit of mitigation options or rings of protection (ROP). One also has to ask how many rings are enough? If two good rings provide an expected frequency of < 10-6 /yr., what more is needed? Companies have found it more useful to apply quantification techniques to the consequence aspects of risk. Explosion and vapor dispersion hazard models, like those in iomosaic s SuperChems software, can be utilized to evaluate pre- and post mitigation concepts. Blast modeling of worst-case bomb threats coupled with structural dynamics can provide guidance on setting access exclusion zones and possibly hardening of the target structure. Dispersion models can be used to evaluate the effectiveness of post-release mitigation concepts (i.e., covers on liquid pools) as presented on the CCPS Book Guidelines for Post-release Vapor Mitigation.
8 Case Study The following case study illustrates how hazard modeling can assist in the quantification of the impact of threats and the development of mitigation concepts. Consider the following scenario where a terrorist loads an explosive on the back of a truck, and parks the vehicle in close proximity to a storage tank containing a toxic chemical. The vehicle is parked on the side of the road outside the plant fence line. The storage tank is located about 200 ft. from the road. For illustrative purposes, let us assume that the vehicle contains the equivalent of about 1200 lbs. of TNT. The overpressure caused by the explosion of 1200 lbs of TNT is shown in Table 6. The damage resulting from overpressure is shown in Table 7. TABLE 6: Overpressrue Profile From A TNT Explosive Blast Overpressure (psi) Distance (ft.) TABLE 7: Consequences Of Selected Overpressure (based on [Clancy, 1972] And [Glasstone and Dolan, 1997]). Peak Side-on Overpressure (psi) Consequences 5 Most buildings completely destroyed, except for concrete reinforced (or masonry) shear wall buildings 3 Total destruction of unreinforced masonry wall buildings. Typical design criteria for many blastresistant buildings. Rupture of oil storage tanks. 1 Upper limit of blast-resistance for most buildings of ordinary construction. Partial collapse of unreinforced concrete or masonry walls. Typical houses made uninhabitable. Persons knocked down by blast wave Typical lower limit for glass window breakage. Based on these rough calculations, the overpressure will cause the storage tank to rupture. This will result in a toxic release. Based on dispersion calculations, the release will go a distance of 5 miles to the ERPG-2 level of concern. The scenario therefore has a severe offsite impact, and the security needs for mitigating this scenario needs be explored in greater detail. On further analysis of the scenario using more detailed explosion models and structural dynamics, it was found that the tank would not fail given at a distance more than 150 ft. from the blast epicenter. Based on these results, the facility ownership decided to install greater perimeter security including electronic surveillance to monitor vehicular activity on the road. Re (Re (Re (Re
9 FIGURE 2: Overpressrue Profile From A TNT Explosive Blast Upcoming Standards NFPA is developing two new codes pertaining to security. The NFPA 730 (Premises Security Code) covers the overall security program for the protection of premises, people, property, and information specific to a particular occupancy. The NFPA 731 is a standard for the installation of electronic security systems. Reference: (Ref.1) Stickles, P., Ozog, H., Long, M., Major Risk Survey, AIChE National Meeting, Orlando, 1990 (Ref.2) Security Vulnerability Enterprise Screening Tool, Center for Chemical Process Safety, (Ref. 3) Site Security Guidelines for the U.S. Chemical Industry, American Chemistry Council (ACC), Chlorine Institute (Ci), Synthetic Organic Chemical Manufacturers Association (SOGMA), P.6 Ref. 4 CCPS SVA Book Ref. 5 The Forum, Terrorists focus on simple means, USA TODAY, December 3, 2002 Ref. 6 Johnson, J., Locking Down U.S. Industry, C & E News, October 28, 2002 Ref.7 Guidelines for Postrelease Mitigation Technology in the Chemical Industry, Center for Chemical Process Safety, American Institute of Chemical Engineers, New York, 1997 Ref. 8 Washington Update, Passage of Chemical Security Act Seems Unlikely, CEP November 2002
10 An iomosaic Corporation Whitepaper By: R. Peter Stickles, Henry Ozog and Sanjeev Mohindra Consulting Services: Auditing Calorimetry, Reactivity, and Large-Scale Testing Due Diligence Support Effluent Handling Design Facility Siting Fire and Explosion Dynamics Incident Investigation and Litigation Support Liquefied Natural Gas Pipeline Safety Pressure Relief Design Process Engineering Design and Support Process Hazards Analysis Risk Management Program Development Quantitative Risk Assessments Software Structural Dynamics Training Software Services: Software Development: Outsourcing Engineering Customized Software Mobile Devices Process Safety Training Simulation Software Products: ioxpress Knowledge Manager SuperChems iofirst HAZOPtimizer 93 Stiles Road Salem, New Hampshire U.S.A. Phone: Fax: About the Authors Mr. Stickles is a Partner at iomosaic Corporation. Prior to joining iomosaic Corporation, Mr. Stickles worked for Stone and Webster Engineering Corp. for eight years as a process engineer specializing in olefin plant design. He then joined Arthur D. Little, Inc., where he spent 28 years with a variety of responsibilities. He has participated in numerous projects involving hazard and risk assessment of petroleum upstream and downstream operations, petrochemical facilities, pulp and paper mills, primary metals facilities, and energy generation and transmission systems. Earlier in his career at ADL, he conducted many assessments of fuel cell technologies, included a study of fuels and fuel processing options for EPRI. Mr. Stickles has extensive experience in failure analysis and quantitative risk assessment (QRA) applied to a variety of facilities. He is also a senior Hazard and Operability (HAZOP) study facilitator. He is a training instructor for hazard identification, fault tree analysis, and safeguarding memorandum courses. He has also participated in several major industrial incident investigations, and has provided expert testimony in the area of process safety management. R. Peter Stickles received his Bachelor of Science in Chemical Engineering and his Master of Science in Engineering from Northeastern University. He is a member of the American Institute of Chemical Engineers, and is a registered Professional Engineer in the Commonwealth of Massachusetts. He was also a member of the National Research Council s Board on Army Science & Technology. Mr. Ozog is a General Partner at iomosaic Corporation. Prior to joining iomosaic, Mr. Ozog was a consultant with Arthur D. Little, Inc. for twenty one years, where he managed the process safety consulting business. He also worked for seven years at the DuPont Company as a process and startup engineer. Mr. Ozog is an expert in process safety and risk management, process hazard analysis (HAZOP, FMEA, FTA), and process safety auditing. He has helped numerous companies and governmental agencies identify process risks and implement cost effective mitigation measures. He teaches courses in each of these areas and is also an instructor for the American Institute of Chemical Engineers' Educational Services. Mr. Ozog has a B.S. and M.S. in Chemical Engineering from the Massachusetts Institute of Technology. He is a member of the American Institute of Chemical Engineers and serves on various sub-committees for them. Dr. Mohindra is a Partner at iomosaic Corporation. His areas of specialty include consequence modeling, hazards analysis, quantitative risk assessments, reliability analysis, system modeling, and software development. Over the years, Dr. Mohindra was involved in several projects in the area of process safety and risk management. Some of his recent projects are: fixed facility and transportation QRAs; Design of relief systems and flares; Evaluation of codes and methodologies for the analysis of explosions and other energetic events; evaluation of likelihood and consequences of releases of toxic and flammable materials; Design of relief systems for reactive chemicals; Large scale experiments in fire and explosion modeling; Authoring a book on design solutions for process equipment failures; authoring a book on safety in batch reaction systems and, developing models and software for advanced consequence analysis. Prior to joining iomosaic, Dr. Mohindra was a manager in the Technology and Innovation division, and a Senior Consultant in the Safety and Risk Management division of Arthur D. Little where he provided consulting services in process safety, and managed the safety and risk software development group. Prior to joining Arthur D. Little, Dr. Mohindra managed and participated in several process safety studies as a consultant at DNV Technica. Dr. Mohindra obtained his Ph.D. from Cornell University with a major in Chemical Engineering and a minor in Computer Science. He got his B.Tech. in Chemical Engineering from the Indian Institute of Technology.
Designing an Effective Risk Matrix
Designing an Effective Risk Matrix HENRY OZOG INTRODUCTION Risk assessment is an effective means of identifying process safety risks and determining the most cost-effective means to reduce risk. Many organizations
On-Site Risk Management Audit Checklist for Program Level 3 Process
On-Site Risk Management Audit Checklist for Program Level 3 Process Auditor name: Date: I. Facility Information: Facility name: Facility location: County: Contact name: RMP Facility I.D. Phone Number:
MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0
MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:
Why Process Safety Management Audits Fail?
Why Process Safety Management Audits Fail? iomosaic Corporation Most companies have completed at least three process safety management (PSM) compliance audits of their covered facilities since the promulgation
CYBER SECURITY RISK ANALYSIS FOR PROCESS CONTROL SYSTEMS USING RINGS OF PROTECTION ANALYSIS (ROPA)
YBER SEURITY RISK ANALYSIS FOR PROESS ONTROL SYSTEMS USING RINGS OF PROTETION ANALYSIS (ROPA) by Paul Baybutt Primatech Inc. [email protected] 614-841-9800 www.primatech.com A version of this paper appeared
A PROGRESSIVE RISK ASSESSMENT PROCESS FOR A TYPICAL CHEMICAL COMPANY: HOW TO AVOID THE RUSH TO QRA
A PROGRESSIVE ASSESSMENT PROCESS FOR A TYPICAL CHEMICAL COMPANY: HOW TO AVOID THE RUSH TO QRA R. Gowland European Process Safety Centre, U.K. The Seveso Directive and the Establishment operators own internal
LNG and Petrochemical Security Risk Assessment and Management
LNG and Petrochemical Security Risk Assessment and Management American Association of Port Authorities Port Security Seminar Seattle, WA July 20, 2006 David A. Moore, PE, CSP AcuTech Consulting Group 2001
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
FAQ SHEET - LAYERS OF PROTECTION ANALYSIS (LOPA)
FAQ SHEET - LAYERS OF PROTETION ANALYSIS (LOPA) Acronyms and Abbreviations Used ANSI - American National Standards Institute IPL - Independent Protection Layer ISA - The Instrumentation, Systems and Automation
October 2004. Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries, Second Edition
October 2004 Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries, Second Edition October 2004 Security Vulnerability Assessment Methodology for the Petroleum and
Guidance on Process Safety Performance Indicators
Guidance on Process Safety Performance Indicators Table of contents 01 INTRODUCTION 02 OBJECTIVE 02 SCOPE 03 CRITERIA 06 DATA REPORTING 08 PROCESS SAFETY PERFORMANCE 08 CONCLUSIONS 09 DEFINITIONS 09 REFERENCES
APPLICATION OF QUALITATIVE AND QUANTITATIVE RISK ANALYSIS TECHNIQUES TO BUILDING SITING STUDIES
APPLICATION OF QUALITATIVE AND QUANTITATIVE RISK ANALYSIS TECHNIQUES TO BUILDING SITING STUDIES John B. Cornwell, Jeffrey D. Marx, and Wilbert W. Lee Presented At 1998 Process Plant Safety Symposium Houston,
Site Security Standards and Strategy
Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards
EPA RISK MANAGEMENT PROGRAM RULE TO IMPACT DISTRIBUTORS AND MANUFACTURERS
EPA RISK MANAGEMENT PROGRAM RULE TO IMPACT DISTRIBUTORS AND MANUFACTURERS I. Introduction Under an EPA rule designed to prevent chemical accidents, certain distributors, formulators and manufacturers of
DEVELOPMENT OF A RISK ASSESSMENT PROGRAM AGAINST TERRORISM IN REPUBLIC KOREA
DEVELOPMENT OF A RISK ASSESSMENT PROGRAM AGAINST TERRORISM IN REPUBLIC KOREA Younghee Lee, Jinkyung Kim and Il Moon Department of Chemical Engineering, Yonsei University, 134 Sinchon-dong, Seodaemun-gu,
SCREENING FACILITIES FOR CYBER SECURITY RISK ANALYSIS. by Paul Baybutt Primatech Inc. [email protected] 614-841-9800 www.primatech.com.
SCREENING FACILITIES FOR CYBER SECURITY RISK ANALYSIS by Paul Baybutt Primatech Inc. [email protected] 614-841-9800 www.primatech.com Abstract Many chemical companies have performed security vulnerability
Ten Tips for Completing a Site Security Plan
TRANSPORTATION LOGISTICS PETROCHEMICal Commercial Industrial Retail Federal Systems Banking Ten Tips for Completing a Site Security Plan Introduction The Chemical Facility Anti-Terrorism Standards (CFATS)
BUILDING DESIGN FOR HOMELAND SECURITY. Unit I Building Design for Homeland Security
BUILDING DESIGN FOR HOMELAND SECURITY Unit I Building Design for Homeland Security Participant Introductions Name Affiliation Area of Concentration BUILDING DESIGN FOR HOMELAND SECURITY Unit I-2 Course
A Method to Assess the Vulnerability of U.S. Chemical Facilities
NOV. 02 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special REPORT Final Version A Method to Assess the Vulnerability of U.S. Chemical Facilities U.S. Department
QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE
QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE I. A. PAPAZOGLOU System Reliability and Industrial Safety Laboratory National Center for Scientific
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
U.S. DoD Physical Security Market
U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request
Physical Security Reliability Standard Implementation
Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014
Safety Integrity Level (SIL) Assessment as key element within the plant design
Safety Integrity Level (SIL) Assessment as key element within the plant design Tobias WALK ILF Consulting Engineers GmbH Germany Abstract Special attention has to be provide to safety instrumented functions
"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
Ir. NOORAZMAN BIN SOUD. Deputy Director Petroleum Safety Division
Ir. NOORAZMAN BIN SOUD Deputy Director Petroleum Safety Division 1 OUTLINES Introduction of DOSH Classification of CIMAH 1996 What is ERP? Objectives of ERP Why need ERP? Types of ERP Onsite ERP Components
Decontamination of the victim. Protection of medical personnel. Disposing of contaminated protective equipment and wash solutions.
Decontamination: Standard Operating Procedure This procedure should be followed in the event of an emergency where a victim or equipment should need to be decontaminated due to a chemical, biological,
Process Safety Management of Highly Hazardous & Explosive Chemicals. Application, Exclusions & Definitions
Process Safety Management of Highly Hazardous & Explosive Chemicals Application, Exclusions & Definitions Application 1910.119(a)(i) A process which involves a chemical at or above the specified threshold
Security Vulnerability Assessment
Security Vulnerability Assessment Deter, Detect, Delay, Respond the elements for minimizing your operational risk. A detailed SVA assists you to understand how best to do so. Security Vulnerability Assessment
Security Risk Assessment and Mitigation Prioritization
Security Risk Assessment and Mitigation Prioritization Stephanie King, PhD, PE Weidlinger Associates, Inc. FFC Committee on Physical Security and Hazard Mitigation July 15, 2008 www.wai.com New York Massachusetts
Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services
Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current
CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE
1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million
Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries. May 2003
Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries May 2003 May 2003 Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries
How To Improve Process Safety In Singapore
Contents Preface... 2 1. Introduction... 3 1.1 The Process Industry... 3 1.2 Process Safety versus Personnel Safety... 4 1.3 Business Case for Process Safety Performance Indicators... 6 2. Performance
MSC/Circ.1002 26 June 2001 GUIDELINES ON ALTERNATIVE DESIGN AND ARRANGEMENTS FOR FIRE SAFETY
INTERNATIONAL MARITIME ORGANIZATION 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: 020 7735 7611 Fax: 020 7587 3210 Telex: 23588 IMOLDN G IMO E Ref. MSC/Circ.1002 26 June 2001 GUIDELINES ON ALTERNATIVE
Security at San Onofre
Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2
E3211. DOT Hazmat Security Awareness. Leader s Guide
E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the
A Guide to the Legal Framework of the PSM Standard for Engineers
A Guide to the Legal Framework of the PSM Standard for Engineers Christopher Cunio, Esq. Cooley Manion Jones LLP 21 Custom House Street Boston, MA 02110 [email protected] Georges Melhem, Ph.D. iomosaic
Controlling Risks Risk Assessment
Controlling Risks Risk Assessment Hazard/Risk Assessment Having identified the hazards, one must assess the risks by considering the severity and likelihood of bad outcomes. If the risks are not sufficiently
SAFE TRANSFER OF POWDERS INTO FLAMMABLE LIQUIDS David E. Kaelin Sr., Senior Process Safety Specialist
Hazards Control & Assess- SAFE TRANSFER OF POWDERS INTO FLAMMABLE LIQUIDS SAFE TRANSFER OF POWDERS INTO FLAMMABLE LIQUIDS David E. Kaelin Sr., Senior Process Safety Specialist A major consideration in
File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)
File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) Appendix A -- Minimum Security Standards for Level Federal
DOT HAZMAT SECURITY AWARENESS TRAINING
ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader
The SPE Foundation through member donations and a contribution from Offshore Europe
Primary funding is provided by The SPE Foundation through member donations and a contribution from Offshore Europe The Society is grateful to those companies that allow their professionals to serve as
The case for rail transportation of hazardous materials
ABSTRACT The case for rail transportation of hazardous materials H. Barry Spraggins University of Nevada, Reno Safe transportation of hazardous materials in the United States is an important national issue.
Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
FAQ SHEET - OSHA REVISED HAZARD COMMUNICATION STANDARD (HCS) (29 CFR 1910.1200, MARCH 26, 2012)
FAQ SHEET - OSHA REVISED HAZARD OMMUNIATION STANDARD (HS) (29 FR 1910.1200, MARH 26, 2012) Acronyms and Abbreviations Used AGIH - American onference of Government Industrial Hygienists ANSI - American
Safety Assessment for a major hazard facility
Guidance Note Safety Assessment Advice for operators of major hazard facilities on conducting and documenting a Safety Assessment. May 2011 1. Introduction 1 1.1. What is a Safety Assessment? 1 1.2. Features
CHAPTER 4: OFFSITE CONSEQUENCE ANALYSIS
CHAPTER 4: OFFSITE CONSEQUENCE ANALYSIS RMP OFFSITE CONSEQUENCE ANALYSIS GUIDANCE This chapter is intended for people who plan to do their own air dispersion modeling. If you plan to do your own modeling,
Anti-Terrorism Officer (ATO) Course Seminar Description & Outline
Anti-Terrorism Officer (ATO) Course Seminar Description & Outline Copyright 2004 by the S2 Safety & Intelligence Institute S2 Safety & Intelligence Institute, 1261 South Missouri Ave, Clearwater, FL 33756
Security Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
Emergency Preparedness Guidelines
DM-PH&SD-P7-TG6 رقم النموذج : I. Introduction This Guideline on supports the national platform for disaster risk reduction. It specifies requirements to enable both the public and private sector to develop
RISK ASSESSMENT APPLICATIONS FOR THE MARINE AND OFFSHORE OIL AND GAS INDUSTRIES
GUIDANCE NOTES ON RISK ASSESSMENT APPLICATIONS FOR THE MARINE AND OFFSHORE OIL AND GAS INDUSTRIES JUNE 2000 American Bureau of Shipping Incorporated by Act of Legislature of the State of New York 1862
Re: INGAA s Comments to OSHA s Request for Information concerning Process Safety Management
March 28, 2014 OSHA Docket Office Occupational Safety and Health Administration U.S. Department of Labor Room N-2625 200 Constitution Avenue NW Washington, DC 20210 Via electronic submission: www.regulations.gov
An inventory of hazardous materials used in your workplace will prove useful.
Introduction Fire Protection is an organized approach designed to prevent fires. In the event of a fire, a fire protection program will help prevent or minimize personal injuries, losses, and harm to the
RE: Notice of Proposed Rulemaking, Request for Comments: Operation and Certification of Small Unmanned Aircraft Systems [Docket No.
April 24, 2015 Docket Management Facility (M-30) U. S. Department of Transportation West Building Ground Floor Room W12-140 1200 New Jersey Ave. Washington, DC 20590-0001 RE: Notice of Proposed Rulemaking,
FLAMMABLE LIQUIDS COMPLIANCE NOTE
Issued by: Heather Rice Page: 1 of 7 COMPLIANCE NOTE INTRODUCTION This document provides additional guidance to support the Arrangement on Flammable Liquids (Ref No. CYC/HS/A27) CONTENTS Section Topic
Physical Security for Drinking Water Facilities
Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland
Process Safety Management
Process Safety Management U.S. Department of Labor Occupational Safety and Health Administration OSHA 3132 2000 (Reprinted) This informational booklet is intended to provide a generic, non-exhaustive overview
Using the Linear Risk Integral (LRI) approach in pipeline QRA for a better application of risk mitigation measures
Using the Linear Risk Integral (LRI) approach in pipeline QRA for a better application of risk mitigation measures Urban Neunert, ILF Consulting Engineers, Germany Abstract Minimizing the risks resulting
Risk Matrix as a Tool for Risk Assessment in the Chemical Process Industry
Risk Matrix as a Tool for Risk Assessment in the Chemical Process Industry Content 1. BASF Process Safety 2. Qualitative risk assessment 3. Semi-quantitative risk assessment Description of the BASF Risk
3.0 Risk Assessment and Analysis Techniques and Tools
3.0 Risk Assessment and Analysis Techniques and Tools Risks are determined in terms of the likelihood that an uncontrolled event will occur and the consequences of that event occurring. Risk = Likelihood
Preparedness in the Southwest
Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance
Hazardous Materials Transportation Security Planning
Objectives To better understand security threats; To detail new security requirements; and To provide guidance and resources to assist in developing and adhering to a security plan. PART I Understanding
Practical Implementation of Safety Management Systems at Unregulated Upstream Oil & Gas Facilities
Practical Implementation of Safety Management Systems at Unregulated Upstream Oil & Gas Facilities Kristin D. Norton, PE CFSE Risk Management Professionals, Inc. 300 Goddard, Suite 200 Irvine, California
Hospital Emergency Operations Plan
Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,
Design of a Fuel Oil Storage Facility
Design of a Fuel Oil Storage Facility Background The goal of this project is to design a new, state-of-the-art fuel oil storage facility for the Kanawha Valley Facility, such as the one illustrated in
Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland
Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland B. Wieland Swiss Federal Office of Energy, CH 3003 Berne, Switzerland ABSTRACT: The presentation describes the
by Paul Baybutt and Remigio Agraz-Boeneker Primatech Inc. 50 Northwoods Blvd. Columbus, Ohio, 43235 USA
A COMPARISON OF THE HAZARD AND OPERABILITY (HAZOP) STUDY WITH MAJOR HAZARD ANALYSIS (MHA): A MORE EFFICIENT AND EFFECTIVE PROCESS HAZARD ANALYSIS (PHA) METHOD by Paul Baybutt and Remigio Agraz-Boeneker
ALVERNIA UNIVERSITY OSHA REGULATION: 29 CFR 1910.252 WELDING, CUTTING, AND BRAZING ( HOT WORK ) SECTION: 3600
OSHA REGULATION: 9 CFR 90.5 WELDING, CUTTING, AND BRAZING ( HOT WORK ) A. POLICY. This procedure follows requirements set forth in 9 CFR 90.5.. This policy applies to all Hot Work operations being done
www.chilworth.cn Process Safety Training (Shanghai)
www.chilworth.cn Process Safety Training (Shanghai) PREVENTING INDUSTRIAL DISASTERS THROUGH LEADERSHIP, PROCESS SAFETY EDUCATION PREVENTING INDUSTRIAL DISASTERS THROUGH LEADERSHIP, PROCESS SAFETY EDUCATION,
Singapore s Approach to Process Safety Management
Process Safety Management Seminar - APCChE 2012 Singapore s Approach to Process Safety Management Go Heng Huat Deputy Director OSHD, Ministry of Manpower 1 Presentation Outline 1. Development of Process
Hazardous Materials Training for First Responder Operations (FRO)
Hazardous Materials Training for First Responder Operations (FRO) Course Duration: The course includes 24 hours of instruction. It can be taught in three 8-hour days or it may be divided into other blocks
CHAPTER 1: GENERAL APPLICABILITY
CHAPTER 1: GENERAL APPLICABILITY 1.1 INTRODUCTION The purpose of this chapter is to help you determine if you are subject to Part 68, the risk management program rule. Part 68 covers you if you are: The
Vulnerability Assessment. U.S. Food Defense Team
Vulnerability Assessment U.S. Food Defense Team Vulnerability A weakness in a processing, handling or storage facility or operation that would allow for intentional contamination of a food product Vulnerability
RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay
RC-17 Radiation Protection in Waste Management and Disposal Implementing the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management Alejandro V. Nader
During the Clinton administration, the
8 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129, PAGES 8-12, OCTOBER 2004 Assessing the Vulnerabilities of U.S. Drinking Water Systems Jeffrey J. Danneels and Ray E. Finley Sandia National Laboratories
Risk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies
Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business
How To Manage A Security System
SANDIA REPORT SAND2008-81438143 Unclassified Unlimited Release Printed December 2008 Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures Calvin D. Jaeger,
Section VI Principles of Laboratory Biosecurity
Section VI Principles of Laboratory Biosecurity Since the publication of the 4th edition of BMBL in 1999, significant events have brought national and international scrutiny to the area of laboratory security.
SOCMA Frequently Asked Questions on CFATS and Appendix A
Facility Coverage/Exemptions Q: Research and development labs will from time to time have chemicals on site which exceed an STQ. Some chemicals will be used and never be used again. Other chemicals currently
EMP OF VIDYUT NAGAR GRAHA NIRMAN SAHAKARI SAMITI MARYADIT, GWALIOR
DISASTER MANAGEMENT PLAN 1.1 INTRODUCTION A disaster is a catastrophic situation in which suddenly, people are plunged into helplessness and suffering and, as a result, need protection, clothing, shelter,
3.4.4 Description of risk management plan Unofficial Translation Only the Thai version of the text is legally binding.
- 1 - Regulation of Department of Industrial Works Re: Criteria for hazard identification, risk assessment, and establishment of risk management plan B.E. 2543 (2000) ---------------------------- Pursuant
Surveillance and Security Technologies for Bridges and Tunnels
Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean
VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN
VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN Prepared by: Alice L. Lenthe, PE 24 April 2014 1 INTRODUCTION: The U.S. Transportation
Process Safety Management of Highly Hazardous & Explosive Chemicals. Management of Change
Process Safety Management of Highly Hazardous & Explosive Chemicals Management of Change What if Our PHA s Reveal the Need to Change Something In our System to Minimize the Potential for Release We Must
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection. OSHA Office of Training and Education 1
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection OSHA Office of Training and Education 1 Introduction Fires and explosions kill more than 200 and injure more than 5,000 workers
