EMERGENCY
A serious, unexpected and often dangerous situation requiring immediate action.
TYPES
- Work place Accidents
- Medical emergency
- Fire emergency
- Bomb threat
- Disaster
HEALTHsimply it is absence of Disease or ill health
SAFETYabsence of uncontrolled Hazards & Risks of serious personal injury or equipment damage
WELFARELooking after people’s basic needs by providing basic facilities such as: toilets, hand wash station, rest rooms
DANGEROUS OCCURRENCEIt is an unwanted & unplanned event which has the VERY HIGH potential to Result in SEVERE loss or harm of any kind such as injury to person, damage to equipment BUT IT DID NOT RESULT OF ANY LOSS AT ALL
HAZARDHAZARD A hazard is something that can cause harmExample:
- Electricity
- Chemicals
- Knife
- Working up a ladder
- Noise
RISKA risk is the chance, high or low, that any hazard will actually cause somebody harm.Example:
- Working alone away from your office can be a hazard. The risk of personal danger may be high.
- Cut injury from knife.
DISASTER/CALAMITYA sudden occurrence of an accident that cause huge loss of life and property is called as a disaster or calamity.TYPES
- Natural disaster - Earthquake, cyclone, flood
- Manmade disaster - Wars, fire accidents, exposition, industrial accidents
CRISISA time of intense difficulty or danger.TYPES
- Natural disasters – floods, earthquakes
- Technological Crisis
- Malware, Spyware or Data Leaks
- Confrontation Crisis
- Personnel Crisis
- Financial Crisis
- Reputation Crisis
- Organizational Crisis
ACCIDENTAn accident is defined as an unplanned event that result in personal injury or property damage.
INCIDENT/Near MissAn incident is defined as an unplanned event that does not result in personal injury but may result in property damage
UNSAFE ACTUnsafe activities are the action of the person which is possible or certainly leads to accidents or increase the risk of accidents.
UNSAFE CONDITIONAny condition or situation which increase the risk & danger of accidents can be called as unsafe condition.
EMERGENCY COLOUR CODE
1
WHITE
Violent situations/ fight
2
BLACK
Bomb threat/ suspicious object
3
RED
Fire / smoke
4
GREEN
Evacuation
5
BLUE
Medical Emergency
6
YELLOW
Missing adult
7
PINK
Child theft
8
BROWN
Hazardous material spill
9
SILVER
Active shooter
10
ORANGE
External disaster
11
GREY
Infrastructure loss
12
PURPLE
Hostage situation
RISK ASSESSMENT
A risk assessment is a process used to identify potential hazards and analyze what could happen if a disaster or hazard occurs
KEY STEPS IN RISK ASSESSMENT:
1.Identify Hazards: Determine the potential sources of harm or damage. identify the people who might be harmed & how?
2.Assess Risks: Analyze the likelihood and potential consequences of each hazard.
3.Control Risks: Implement measures to eliminate or reduce the identified risks.
4.Record Findings: Document the assessment process, including hazards, risks, and control measures.
5.Review and Update: Periodically review and update the assessment to ensure its continued relevance and effectiveness.
BENEFITS OF RISK ASSESSMENT:
·Reduced Risk: By identifying and addressing potential hazards, risk assessment helps to prevent accidents, incidents, and other adverse events.
·Improved Efficiency: Understanding risks allows for better resource allocation and prioritization of safety measures.
·Cost Savings: By preventing damage and injuries, risk assessment can help reduce costs associated with incidents, lawsuits, and lost productivity.
·Compliance: Risk assessment can help organizations meet legal and regulatory requirements related to safety and health.
·Enhanced Reputation: A strong risk assessment program can demonstrate a commitment to safety and build trust with stakeholders.
SEVERE WEATHER AND NATURAL DISASTERS
Tornado:
· When a warning is issued by sirens or other means, seek inside shelter. Consider the following:
v Small interior rooms on the lowest floor and without windows,
v Hallways on the lowest floor away from doors and windows, and
v Rooms constructed with reinforced concrete, brick, or block with no windows.
· Stay away from outside walls and windows.
· Use arms to protect head and neck.
· Remain sheltered until the tornado threat is announced to be over
Earthquake:
· Stay calm and await instructions from the Emergency Coordinator or the designated official.
· Keep away from overhead fixtures, windows, filing cabinets, and electrical power.
· Assist people with disabilities in finding a safe place.
· Evacuate as instructed by the Emergency Coordinator and/or the designated official.
Flood:
If indoors:
· Be ready to evacuate as directed by the Emergency Coordinator and/or the designated official.
· Follow the recommended primary or secondary evacuation routes.
If outdoors:
· Climb to high ground and stay there.
· Avoid walking or driving through flood water.
· If car stalls, abandon it immediately and climb to a higher ground.
|
|
SOME COMMON AND WIDELY USED MANAGEMENT SYSTEM STANDARDS ARE:
• ISO 45001 (Occupational Health and Safety Management System)
• ISO 14001 (Environmental Management System)
• ISO 9001 (Quality Management System)
• ISO 50001 (Energy Management System)
National Regulations
The National Building Code of India (NBC) sets fire safety provisions for residential, commercial, and industrial buildings. The Fire Services Act empowers state governments to enforce fire safety laws.
TOP IMPORTANT LAWS RELATED TO HSE
· The factories act, 1948
· The building & other construction workers act, 1996 & rule 1998
· The child & adolescent labor (prohibition & regulation) act, 1986
· The contract labor (regulation & abolition) act ,1970
· The employee’s compensation act, 1923 (amendment 2017)
· The gas cylinders rules 2016 (amendment 2018)
· The central motor vehicles rules, 1989 (amendment 2018)
· The electricity act, 2003 (amendment 2007)
· The air (prevention & control of pollution) act, 1981 (amendment 2018)
· The water (prevention & control of pollution) act, 1974 (amendment 2014)
· The environment protection act, 1986
WORKPLACE HAZARDS AND RISK CONTROL.
·
Health, welfare & environment
requirements
·
drinking water
·
toilet facilities
·
washing facilities
·
changing room
·
accommodation for clothing such as
lockers or other storage facilities
· resting and eating facilities
NEBOSH - National Examination Board in Occupational Safety and Health
OSHA - Occupational Safety and Health Administration
IOSH - The Institution of Occupational Safety and Health
NEBOSH IGC - National Examination Board in Occupational Safety and Health International General Certificate
ASIS - American Society for Industrial Security
CPP - Certified Protection Professional
PCI - Professional Certified Investigator
APP - Associate Protection Professional
PMP - Project Management Professional
Investigate potential security threats
- Gather as much information as possible about the threat. This can include collecting data from security cameras, speaking to witness and reviewing any relevant documentation.
- Try to identify any patterns associated with the threat.
- Work with other departments within the organization such as IT & HR, to gather additional information about the threat.
- Use all available resources to investigate the threat, including hiring outside consultants or bringing in law enforcement if necessary.
- Keep detailed records of all aspects of the investigation, as this can be helpful in case there are future incidents or legal proceedings.
THEFT CONTROL
- Positioning security personnel
- By using surveillance system
- Access control measures
- Employee training
- Behavioral analysis
- Loss prevention technologies like RFID tags, EAS System
RFID – RADIO FREQUENCY IDENTIFICATIONThese are small electronic devices that store information and communicate with other devices using radio waves. RFID tags are used in a variety of applications from tracking inventory to monitoring the movements of livestock
ALARM 4 TYPES
Life safety
- Fire alarm
- Building lockdown
- Security assistance requested
- Duress
Intrusion
- Crawl over
- Door forced open
- Glass break
- Motion detector
- Emergency exit door
- Tailgate
- Suspended/ terminated badge
- Door held open
Space managementsystem health
- Anti-pass back
- Invalid badge
- Power failure
- Cabinet tamper
- Temperature
- Communication lost
- Data base error
- Foreign voltage
- Grounded loop/ fault
- line error
- non- setting voltage
- open line
- panel event/memory/option mismatch
- reader offline
- shorted line
- video server is not recording
PHYSICAL SECURITY LAYERSPerimeter SecurityThis is the first line of defense. It involves safeguarding the boundary of a facility, often with fences, walls, barriers, and gates. It's complemented by security lighting, surveillance cameras, and patrol guardsExterior SecurityAfter the perimeter, the next layer focuses on the external features of a facility. This includes windows, doors, and open spaces like parking lots. Adequate lighting, surveillance cameras, and sensor-triggered alarms play a role here.Interior SecurityThis targets the inside of the facility. Measures include door access control systems, internal CCTV monitoring, motion detectors, and protected zones or safes for highly valuable assets.
Email communication
To:This field is for the main recipients of the email. When you send an email, you typically put the primary recipient(s) in this field.CC:When you use the CC field, you are sending a copy of the email to someone who needs to be aware of the message but may not need to take any action. All recipients in the "To" and "CC" fields can see who else received a copy.BCC:The BCC field allows you to send a copy of the email to someone without the other recipients knowing. This is useful when you want to keep the recipient's identity private or when sending to a large group where you don't want everyone's email address visible.