Center for Mining Safety & Health Excellence Risk & Change Management in Mining



Similar documents
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

3.0 Risk Assessment and Analysis Techniques and Tools

So#ware quality assurance - introduc4on. Dr Ana Magazinius

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING

HIPAA Breaches, Security Risk Analysis, and Audits

IT Change Management Process Training

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Project Management Introduc1on

First Na)on Project Management Boot Camp

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

Range of Organiza7onal Approaches

The Road To Project Governance at Utah State University

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

NFPA 70E: What Contractors and Employers Need to Know

The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework. FASP Annual Conference October 29, 2015

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010

What is Assessment? Assessment is a process of collec3ng data for the purpose of making decisions about individuals and groups

Outline. Setting the Stage. Se#ng the stage for precep0ng drug therapy assessment Elements of drug therapy assessment Hierarchy Flow chart

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Controlling Risks Risk Assessment

10 Steps to Preparedness

Bank of America Security by Design. Derrick Barksdale Jason Gillam

Change Leadership A view from the front seat

Update on the Cloud Demonstration Project

Capitalize on your carbon management solu4on investment

Advanced Project Management Training Course

Innovation Quality Flexibility

Council Monitoring & Assessment Program Development

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces

Legacy Archiving How many lights do you leave on? September 14 th, 2015

REVIEW OF HAZARD IDENTIFICATION TECHNIQUES

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

The Great Lakes Futures Project Assessing what the state of the Great Lakes St. Lawrence River Basin could be in 50 years.

Office of Business and Financial Services. Department Budget Presenta0on

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.

The importance of supply chain

Fixed Scope Offering (FSO) for Oracle SRM

DDC Sequencing and Redundancy

Computer Security Incident Handling Detec6on and Analysis

Let s Get Nerdy: Inside Tips on Florida s Workers Compensa:on with a Dose of PEOs. Meet Your Presenter. Going Beyond the Basics.

2013 Copyright ComFit Learning Prep

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World

VENDOR MANAGEMENT Presented By:

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management

Application of Supply Chain Concepts to the Analysis Process

Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University

DRDC Centre for Security Science (CSS)

Business Analysis Center of Excellence The Cornerstone of Business Transformation

A quality healthcare social enterprise serving Kenyan slums

Informa.on Systems in Organiza.ons

Emergency Management - County 911 Rescue Planning

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.

DTCC Data Quality Survey Industry Report

Achieving Global Cyber Security Through Collaboration

Best Practices in Hazardous Waste Information Management. Presented by Mike Ryan Product Manager of Technical Service at 3E Company

HIPAA Basics. Health Insurance Portability and Accountability Act of 1996

The Pros and Cons of Organiza2on

Complying with NFPA 652 and AHJ s Recommenda(ons. OSHA Combus(ble Dust Na(onal Emphasis Program (NEP) Overview

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

ECIA RiSE Initiative. Risk Assessment Database

AIS TECHNOLOGY SOLUTIONS GUIDE

Case Study. The SACM Journey at the Ontario Government

Managed Services. An essen/al set of tools for today's businesses

Reali9es of Being PCI Compliant

Title: OHS Risk Management Procedure

Performance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv.

HIPAA Privacy Policy (Revised Feb. 4, 2015)

Introduc4on 6/29/12. Welcome to the SAFEGUARD PROPERTIES VENDOR CONFERENCE 2012

Research in Simulation: Research and Grant Writing 101

What s Driving Adop2on of IT Governance? ISACA North Texas Chapter. Aus2n Hu@on Hu@on Consul2ng October 11, 2012

The SPE Foundation through member donations and a contribution from Offshore Europe

ISO 14971:2012 Ensuring Compliance to Annex Z Requirements

David S. Lee, MPH. Campus sexual violence preven;on: An overview of opportuni;es and challenges in policy and programs

Shell s Health, Safety and Environment (HSE) management system (see Figure 11-1) provides the framework for managing all aspects of the development.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

The system approach in human resources. Functional Analysis of the System for Human Resources Management. Introduction. Arcles

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Ch. 5 The Loose Coupling

Nodes, Ties and Influence

identify hazards, analyze or evaluate the risk associated with that hazard, and determine appropriate ways to eliminate or control the hazard.

About the Board. Minnesota Board of Behavioral Health and Therapy 10/24/12. Minnesota Board of Behavioral Health and Therapy

Disrup've Innova'ons Track

Occupational safety risk management in Australian mining

Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models

The Data Quality Planning Guide

PROJECT PORTFOLIO SUITE

Framework for Improving Critical Infrastructure Cybersecurity

ICD- 10: Learning for a Successful Transi:on Part 2. Objec.ves for the Webinars. ICD- 10 Webinar Topics

The model of SWOT-analysis is the most

Update on the Cloud Demonstration Project

Project Por)olio Management

QUALITY RISK MANAGEMENT (QRM): A REVIEW

Governance as Leadership: Reframing the Work of Nonprofit Boards

Exchange of experience from a SuccessFactors LMS Implementa9on

Transcription:

Risk & Change Management in Mining Tom Hethmon Associate Professor & Western Presiden5al Endowed Chair in Mine Safety Director, Center for Mine Safety & Health Excellence Department of Mining Engineering University of Utah 135 South 1460 East Salt Lake City, Utah, USA 84112 tom.hethmon@utah.edu

Risk Management The heart of safety management in mining is risk management, i.e., iden4fica4on of hazards, assessment of their risk, applica4on of appropriate controls. Regardless of the nature of the hazard (e.g., geological or other energy sources, environmental, process, human error & behavioral, etc.), they should all be addressed through effec4ve risk management. This is the core work within CORESafety. Everything else within COREsafety is there in support of risk management (leadership, culture, behavior, training, engineering, control measures, audi4ng, etc.).

MSHA vs. CORESafety Risk Management MSHA: Hazards are addressed through standards. The MineAct doesn t address all hazards/risk. If your mine has any of the list of hazards in 30 CFR you need to implement the controls specified therein. Once you have completed that work, document it to establish that you are in compliance. You know you have done it correctly if you are inspected by MSHA and/or if you experience a reportable incident and receive and received no cita5ons. If you receive cita5ons, you must abate the iden5fied the problem and pay the assessed fine. CORESafety: All appropriate risk is addressed systema5cally and priori5zed. Assess all of the hazards in your mine. There are many different techniques available to help you do this. Once the risk has been assessed, priori5ze the risks and develop a strategy to op5mize control of the risks. Implement the controls and maintained that level un5l there is a change to the underlying hazard and then reassess the risk to ensure controls are appropriate. You know if you ve done it correctly if your level of risk allows you have the level of safety and health performance you seek.

Hazard Iden5fica5on Machismo Culture Behavior Pressure Budget Communica5on Engineering Procedures Housekeeping Direc5on Awareness Distrac5on Fa5gue Planning Incidents Weather Accountability Over- exer5on Inexperience Controls Geology Actude Values Health Training Drugs & Alcohol Mechanical failure Maintenance Complacency 4

Risk Risk = Probability X Consequence of occurrence of outcome

Risk Matrix Frequency, Likelihood, Probability 5 4 3 2 1 Lowest risk Medium risk 1 2 3 4 5 Severity, Impact, Consequences Highest risk

Risk Matrix What is the likelihood that a specific hazard will result in an expressed injury, fatality, or other outcome? Frequency, Likelihood, Probability 5 4 3 2 1 Could happen every day? Very unlikely to occur? 1 2 3 4 5 Severity, Impact, Consequences

Risk Matrix Frequency, Likelihood, Probability 5 4 3 2 1 What is the most probable (or worst case) impact or consequence from the hazard? Catastrophic consequence? Inconsequen5al outcome? 1 2 3 4 5 Severity, Impact, Consequences

Mining Hazards Example U/G coal risk ranking: 1. Gas/dust explosion 2. Ground fall 3. Proximity 4. Pinch points (proximity) 5. Hazard #5 6. Hazard #6 7. Hazard #7 8. Hazard #8 9. Hazard #9 10. Hazard #10 11. Hazard #11 12. Hazard #12 13. Hazard #13 14. Hazard #14 15. Hazard #15 Likelihood/Probability 16. Hazard #16 Consequence/Severity 12 6 3rd 17 15 8 9 11 16 18 3 2nd 1 5 10 13 14 1st 4 2 7

Risk Management Check & Act Step 5: Assess effectiveness Do Step 4: Implement controls Plan Step 1: Identify hazards As low as reasonably practicable Do Step 2: Assess risks Do Step 3: Decide controls

Risk Assessment Tools (Methods, Techniques) Job Hazard Analysis (JHA) Vulnerability Assessment Control Hazards Iden4fica4on Structural Reliability Analysis Hierarchical Task Analysis (HTA) Maintenance & Operability Study (MOP) Failure Mode and Effect Analysis (FMEA) Predic4ve Human Error Analysis (PHEA) Structured Analysis & Design Techniques (SADT) Sneak Analysis Failure Modes, Effects, and Cri4cality Analysis (FMECA) DELPHI Method Bow Tie Analysis (BTA) Ac4on Error Analysis (AEA) Human Reliability Analysis

Risk Assessment Tools (con t) Hazard & Operability Studies (HAZOP) Computer HAZOP (CHAZOP) Concept Hazard Analysis (CHA) Concept Safety Review Preliminary Hazard Analysis (PHA) Fault Tree Analysis (FTA) Cause Consequence Analysis (CCA) Goal- Oriented Failure Analysis (GOFA) Func4onal Integrated Hazard Iden4fica4on (FIHI) Cri4cal Examina4on of System Safety (CEX) Checklists What if? Analysis What if- Checklist Analysis Inherent Hazard Analysis Method Organized Systema4c Analysis of Risk (MOSAR) Hardware Hazards Iden4fica4on

Which RA* Techniques Should U.S. Mines Consider? Brainstorming What If/Checklist Bow Tie Analysis (BTA) Fault Tree Analysis (FTA) Event Tree Analysis (ETA) Hazard & Operability Study (HAZOP) Workplace Risk Assessment & Control (WRAC) Failure Mode, Effects & Cri4cality Analysis (FMEA) *RA = Risk assessment

Risk Management It s not rocket science it s more complicated Coordinated ac4vi4es to direct & control an organiza4on with regard to risk. Systema4c applica4on of management policies, procedures & prac4ces to the ac4vi4es of communica4ng, consul4ng, establishing context, analyzing, evalua4ng, trea4ng, monitoring and reviewing risk. (ISO 31000)

Standards of Acceptable Risk in U.S. Mining Occupa4onal Health & Hygiene: The OSHA PEL s XXXXX Environmental Management: Many EPA groundwater, soil and emissions standards (where chronic endpoints are the focus) are based on a 1:1,000,000 reference risk criteria. Safety: Neither MSHA 30 CFR or accepted good prac5ce in mine design are based on formal risk standards or criteria. Each company must determine their level of acceptable risk. 0:50:0, Zero harm & zero injuries are aspira4onal goals and expecta4ons, but do not reflect any specified level of risk.

Which Risk Are You Trying to Manage? Total Risk Risk Controls Residual Risk All the risk in your mining opera5on Everything you do to manage risk in your mining opera5on The risk that is not controlled, i.e., the poten5al for your people to be hurt or other assets damaged

Acceptable (Residual) Risk Intolerable ALARA Australia? Canada? U.S.? 1:10,000? 1:?????? UK? Chile? Safe 1:10,000,000? ALARA: As Low As Reasonably Achievable

Generic Risk Registry Center for Mining Safety & Health Excellence

The Risk Management Process (ISO 31000) Communication & Consultation Establishing the context Risk identification Risk analysis Risk evaluation Risk treatment Monitoring & Review Who are the internal & external stakeholders? Which stakeholders are essen4al to RM decision- making? How oren does consulta4on need to occur? To whom does RM report: financial RM vs opera4onal RM? Can you communicate too much re: RM?

Is mining risk acceptable when 1. it falls below an arbitrary defined probability? 2. it falls below some level that is already tolerated? 3. the cost of reducing the risk would exceed the costs saved? 4. the cost of reducing the risk would exceed the costs saved when the costs of suffering are also factored in? 5. public health (or safety) professionals say it is acceptable? 6. the general public say it is acceptable (or more likely, do not say it is not)? 7. poli4cians say it is acceptable?

ALARA (As Low As Reasonably Achievable) Refers to the residual risk needing to be as low as reasonably prac4cable. A risk is ALARA when it s possible to demonstrate that the cost involved in reducing the risk further would be grossly dispropor4onate to the benefit gained. It should not be understood as simply a quan4ta4ve measure of benefit versus harm.

Scoping (the risk assessment) Center for Mining Safety & Health Excellence Defines objec4ve, scope & breadth of the risk assessment. Must be completed in advance of the risk assessment exercise. Typical contents: Risk assessment objec4ve; Boundaries of the equipment, system, process being assessed; Hazards to be included; Risk assessment technique(s) to be u4lized; External influences to be considered; Consequences of interest; Core assump4ons; Facilitator & team composi4on; Date, 4me & loca4on of risk assessment exercise; Data, deliverables & documenta4on requirements.

Risk Assessment Facilitator Design the RA exercise based on the scoping (document). Introduce the RA team to the scope & RA technique(s). Keep the RA process on track throughout the exercise. Promote crea4ve thinking in iden4fying appropriate controls. Guide the RA team through the exercise. Resolve any conflicts within the RA team. Help reach consensus, where required. Ensure the objec4ves are achieved within specified 4me.

Risk Assessment Team Composi5on Poten/al members depending on issue & loca/on: Facilitator (internal vs external) Recorder/Secretary Opera4ons management and/or miners/operators S&H professional Engineer: Mining, geology, engineer/project design, process. Maintenance management and/or personnel Other subject mauer experts (SME)

Is There a Best Prac5ce? The most common risk assessment strategy adopted by interna4onal mining companies today is layered risk assessment or a varia4on on this approach. The approach grew from a benchmarking trip by a U.S. mining company in Australia. It advocates that companies take a (ini4al) broad view of risk

Layered Risk Management Model 1 Major hazard, full site, baseline 2 Project, selec4ve risk assessment 3 Work processes & procedures 4 Personal/crew risk assessment

Layered Risk Management Model 1 Major hazard, full site, baseline Used to assess major, principal or catastrophic risks. Consider life cycle of mine/facility: - Start with explora4on, end with remedia4on. Include major incidents for exis4ng & prospec4ve sites. Look at the nature, magnitude, poten4al impacts & uncertain4es of hazards encountered. Link major risks with selec4ve layers 2-4.

Layered Risk Management Model 2 Project, selec4ve risk assessment Used to assess projects, changes & serious incidents: - Issues not covered in layer 1. Need to define triggers for risk assessment: - What kind of change, projects and incidents undergo RA? Define RA tools to be used for types of change: - Equipment, process, work prac4ces. Track all outcomes in a risk registry.

Layered Risk Management Model 3 Work processes & procedures Used for rou4ne & unique work processes & procedures: - Issues not covered in Layer 2. Define RA tools to be used for types of change: - SOP & work guidelines or plans. Outcome: documenta4on, training, competence, audi4ng. Include change management process for documenta4on.

Layered Risk Management Model 4 Personal/crew risk assessment Used for pre- task risk assessment: - Stop & think before star4ng a task. Cri4cal for non- rou4ne tasks w/out Layer 3 assessment. Ensure individuals know what safe is before proceeding. Elevate excessive risk to supervisor and/or Layer 3. Discuss outcomes with other doing the same work.

Risk Assessment Tools 1 Full site review PHA, FTA, WRAC, BTA 2 Selec5ve risk assessment FMEA, HAZOP, FTA 3 Work processes & procedures 4 Personal/crew risk assessment JSA, WRAC Take 5, SLAM

Bow Tie Analysis (BTA) Powerful technique in risk and control measures assessment. Structured approach for risk assessment of events where quan4fica4on is not possible or desirable. Combines causes and consequence analysis into one diagram. The diagram when ploued resembles a bow4e. The theory behind BTA is found in the Swiss Cheese model of Reason and concepts of layer of protec4on. Earliest men4on of concept by ICI in 1979 and Royal Dutch/ Shell Group was the first company fully integrate the method into business prac4ces.

Bow Tie Analysis (BTA) Understanding of exis4ng risk decision- making process. Decision framework based on stakeholder & opera4onal needs should be developed to maximize the strength of each tool. Develop criteria for evalua4ng barrier effec4veness & importance. The bow- 4e model is not intended for use in quan4fica4on of risks, however, it supports frequency & consequence analysis & allow detailed quan4fied risk analysis to be developed.

Bow Tie Analysis (BTA) Source: THESIS Sorware

Bow Tie Analysis Terminology Hazard: Any situa4on that has a poten4al to cause harm. Top event: The release of the hazard. Threat : Any possible cause that will poten4ally release a hazard and result in a undesirable top event. Preven5ve barrier: A protec4ve measure to prevent threat(s) from releasing a hazard. Recovery measure: A preparedness measure to recover or reduce risks if the top event occurs or measure to limit the severity of the outcome. Consequence: Condi4on or event(s) that result from the release of hazard / top event.

Bow Tie Analysis (BTA) By linking hazards and consequences through a series of event lines it is possible to develop a diagram illustra4ng the routes to accidents. On the diagram, preven4ve and recovery controls are illustrated to show the fundamental components of the safety management system. Further understanding is gained by examining the routes by which the controls can fail and iden4fying the cri4cal components of the system that prevent these failures.

BTA: The Process Develop bow- 4e to show the problem (hazard & top event) Iden4fy the threats that can cause the problem Display the barriers to prevent the problem occurring Describe the poten4al consequences Iden4fy the recovery measures required if the problem occurs Iden4fy escala4on factor and escala4on factors control Iden4fy tasks and responsibili4es Link the controls to safety management system

Building the Bow- Tie Ques5ons Top Event (hazard): What is the poten4al to cause harm? What happens when the hazard is released? What happens when control is lost? Threat: What causes the hazard to be released? How can we keep control? Consequence: How can the event develop? What are the poten4al outcomes?

Building the Bow- Tie Ques5ons (Con t) Threat Barrier: How do we prevent the hazard from being released? How do we keep control? Recovery Preparedness: How do we limit the severity of the event? How do we minimize the effects? Escala5on Factor: How might controls fail? How could their effec4veness be undermined? Escala5on Factor Control: How do we make sure controls do not fail?

Building the Bow- Tie Ques5ons (Con t) Tasks: What tasks do we do to make sure the control con4nues to work? Include design, opera4ons, maintenance & management. How do we verify that the tasks have been done? Who does the task? How do they know when to do the task? How do they know what to do? Is there a procedure, checklist, instruc4on?

BTA: Advantages & Disadvantages Advantages: The Bow Tie graph can give a clear picture of complex safety management systems; Clear links between management systems & risks are shown. Disadvantages: Requires a high level of knowledge regarding a system & the components of the system that relate to its safety; It is difficult to link to quan4ta4ve techniques.

Hazard & Operability Studies (HAZOP) Used extensively in the chemical industry. Used to assess devia4ons from normal procedure. Assump4on: normal is safe. Conducted at any stage of a project. Op4mal: lauer stages of project design. Typically lacks a risk calcula4on. Guide Deviation Consequence Causes Suggested Action

HAZOP Structured cri4cal examina4ons of plant or processes, either batch or con4nuous. Undertaken by an experienced team to iden4fy all possible devia4ons from an intended design, along with the consequent undesirable effects concerning safety, operability and the environment. The possible devia4ons are generated by rigorous ques4oning, prompted by a series of standard guidewords applied to the intended design.

HAZOP: The Process Select process for review Explain process Select node for review Iden4fy causes Iden4fy consequences Iden4fy current controls Make ini4al recommenda4ons Explain intent of node Apply other guidewords? Select parameters Apply other parameters Apply guidewords & develop devia4ons Address other nodes? Document

HAZOP Guidewords & Meaning Guideword No (not, none) More (more of, higher) Less (less of, lower) As well as (more than) Part of Reverse Other than (other) Meaning None of the design intent is achieved Quan4ta4ve increase in a parameter Quan4ta4ve decrease in a parameter An addi4onal ac4vity occurs Only some of the design inten4on is achieved Logical opposite of the design inten4on occurs Complete subs4tu4on. Another ac4vity takes place

PI&D (Piping & Instrumenta5on Diagram)

Typical HAZOP Worksheet DEVIATION CAUSE CONSEQUENCE SAFEGUARDS ACTION

HAZOP: Advantages & Disadvantages Advantages: Group/team ac4vity; Effec4ve for making sense f highly complex process flows; Can be used at any stage of system or process development. Works for batch & con4nuous processes. Disadvantages: Design must be somewhat mature to effec4vely use HAZOP; Can be very complex and 4me- consuming analysis.

Failure Mode & Effects Analysis (FMEA) Risk analysis technique used to assess failure of mechanical/ hardware/system components, i.e., how does a component or sub- component failure affect the whole system? Team- based. Requires technical & engineering exper4se of system in ques4on. Determine the mode of failure and assess the probability & consequence of those failures. Qualita4ve, induc4ve technique, but requires quan4ta4ve failure probabili4es.

Fault Versus Failure Failures are basic abnormal occurrences in a system or system component. Faults are higher order or more general events. Fault are ini4ated by other events or condi4ons. All failures are faults, but not all faults are failures. A fault requires the specifica4on of not only what the undesirable component state is but also when it occurs. A fault may be repairable or not, depending on the nature of the system. Under condi4ons of no repair, a fault that occurs will con4nue to exist.

1. Iden4fy the component (opera4ons state). 2. Define component func4on. 3. Define failure modes: all external failures modes. 4. Define effects on other components/subcomponents. 5. Determine how the whole system is affected by failure. 6. Define correc4ve measure: to prevent or mi4gate failure. 7. Assign probability for modes & consequences (total freq.) 8. Rank failures according to reliability and safety. 9. Document.

FMEA/FMECA: The Process Iden4fy the component (opera4on state) Define component func4on Define failure modes: all external failure modes Define effects on other components/subcomponents Document Determine how the whole system is affected by failure Define correc4ve measure to prevent /mi4gate failure Assign probability for modes & consequences (total freq.) Rank failures according to reliability & safety

Center for Mining Safety & Health Excellence FMEA

FMEA/FMECA: Advantages & Disadvantages Advantages: Very systema4c approach for evalua4ng systems or procedures; Broad range of applica4ons. Disadvantages: Need to know what failure is and what success is in advance of applying FMEA/FMECA; Requires a strong technical understanding of the system, process, system, subsystem, design, sorware, being evaluated.

Job Hazard Analysis/Job Safety Analysis A simple risk assessment technique that focuses on job or work tasks as a way to iden4fy hazards and control their risks. It focuses on the rela4onship between the worker, the task, the tools, and the work environment. It normally results in a wriuen document that is used to standardize the job or work task, e.g., SOP which addresses mul4ple issues associated with the task/job, e.g., process, specifica4on(s), materials, 4ming, quality, cost, etc. Best if JHA/JSA is conducted by the people who will conduct the work. The JHA/JSA can form the basis of task training, e.g., the workers.

When to Apply JHA/JSA Jobs (tasks) with the highest injury or illness rates. Jobs with the poten4al to cause severe or disabling injuries or illness, even if there is no history of previous incidents. Jobs in which one simple human error could lead to a severe incident or injury. Jobs that are new or have undergone changes in processes and procedures. Jobs complex enough to require wriuen instruc4ons: Rou4ne job tasks; Non- rou4ne job tasks.

Job Hazard Analysis: The Process Select job task to be analysed Check any relevant documenta5on Iden5fy the step or stages involved in doing the job and write them down Iden5fy all the hazards in each step of the job Find ways to eliminate or reduce exposures to the hazards Incorporate the JHA results into the new procedure to ensure cri5cal hazards within the job task are addressed Update and maintain records and revisions

JHA/JSA: Advantages & Disadvantages Advantages: Easy to use; Can increase involvement of workers in risk assessment; Can use used as an auditable training guide; Clear links between management systems & risks are shown. Disadvantages: Subjec4ve (garbage in, garbage out); Tendency to miss steps & minimize complexity even if that means missing hazard/risk. It is difficult to link to quan4ta4ve techniques.

Personal Risk Assessment Simple extemporaneous risk assessment. Informal in nature. Personal brainstorming. Normally conducted just before the actual work task. Can use used individually or in small groups. Applied during a task when the work/condi4ons change. Good to use for both rou4ne & non- rou4ne work. If the task risk can not be confidently assessed using personal risk assessment, pause and go back to JHA/JSA. Can be used off- the- job as well.

Personal Risk Assessment Five steps to personal risk assessment: Iden4fy the hazard(s) Decide who might be hurt and how (what if) Evaluate the risks and decide on controls Record findings for future reference Review your assessment and update if necessary. Examples: Take 5, Take Time, Take Charge, SLAM, PLAN, Hudson s Rule of Three, Stepback 5X5, Posi4ve Aytude Safety System (PASS), Take 2, etc.

Control of Hazards Must integrate MSHA compliance. Apply the hierarchy of control ins4tu4onalize? Always consider human factors implica4ons: Will human factors be a considera4on regarding maintaining controls? For cri4cal risks, ensure control verifica4on is systema4c: Responsibility Mechanism of verifica4on Frequency Procedure Determina5on of Control Competency

Risk Control & Treatment 1. Iden4fy treatment op4ons: o Use risk rank order & consequence rank to priori4ze. 2. Evaluate & select treatment op4ons. 3. Prepare & implement treatment op4ons: o Design, engineer & build. o o Training & new procedures required? Change management implica4ons? 4. Monitor control efficacy: o Internal & external audits. 5. Make modifica4ons as necessary (based on step 4).

The Hierarchy of Control Center for Mining Safety & Health Excellence Hazard Work from the center outward.

Effec5veness of Controls Control Category Major Control Issue Poten5al for Human Error Risk Reduc5on Effec5veness Eliminate Economic & strategic None Complete Minimize/Subs5tute Engineering Minor High Physical barrier Engineering Minor High Warning device Assessing Possible Medium Procedures & rules Personal skills & training Administra4ve Important! Low

Change Management Define change requiring management review. Communicate this process to all affected employees, contractors & other stakeholders. Develop a change management procedure that defines the who, what, when and how for the reviews. Define who is authorized to approve change ac4ons. Ensure that the procedure includes provisions to verify that change management ac4ons have been completed and that they do not significantly result in new, nega4ve risk.

Change Management Integrate change management ac4ons into the S&H communica4on system to ensure all affected par4es are aware of the new reality. Check for understanding. Document change management decisions for tracking and verifica4on purposes, and for future reference. Pre- start up safety reviews should be conducted on all new mines, mine expansions, processing facili4es, major mobile and fixed equipment and control systems. Ensure that change management is fully integrated with risk management.

Change Management What to Include in Change Management Assessment: The technical basis for the proposed change. Impact of change on safety and health. Modifica4ons to opera4ng procedures. Necessary 4me period for the change. Authoriza4on requirements for the proposed change. Update of exis4ng RA informa4on & opera4ng procedures.

CORESafety SHMS Occupa5onal health Contractor mgt & purchasing Mgt system coordina5on Responsibility & accountability High risk procedures Risk management Safe work procedures & permits Change mgt Training & competence Emergency mgt Planning & resources Leadership Engineering & construc5on Collabora5on & communica5on Behavior op5miza5on Reinforcement & recogni5on S&H mgt assurance Incident repor5ng & inves5ga5on Audit & review Documenta5on & info mgt

Benefits of Effec5ve Risk Management Reduce mining incidents and associated costs; Iden4fy threats and opportuni4es to the business; Improve decision- making and planning; Improve alloca4on and u4liza4on of resources; Emphasize proac4ve versus reac4ve management; Improve stakeholder confidence and trust; Improve compliance with relevant legisla4on; Improve corporate governance.

Center for Mining Safety & Health Excellence Integrated systems (sprint) (run) Effec5ve system (walk) Basic system (crawl) Programs Conveyance Process safety Behavior Mine planning Fire preven5on Training Blas5ng Ergonomics Development Inspec5on Guards Engineering Wellness LOTO Proximity Loading Hoisting MSDS Repor5ng Methane CSE MSHA Rules Actude SOPs Dust Maintenance Fire Metrics Contractors PPE Fa5gue SOPs Cranes Processing Housekeeping Electricity Geology Haulage Ven5la5on Emergencies Electrical Communica5on Weather As with other opera5onal systems (e.g., produc5on, maintenance, procurement, HR, IT, etc) it takes 5me to develop an effec5ve SHMS and it requires responsibility, accountability and a high degree of integra5on.

Thank You For Your Aqen5on Tom Hethmon Associate Professor Department of Mining Engineering Director, Center for Mining Safety and Health Excellence University of Utah 801.581.7521 tom.hethmon@utah.edu