SlideShare a Scribd company logo
1 of 31
Hazard Identification, Risk Assessment and
Determining Controls – Foundation Stone of OHSAS 18001
Muhammad Dawood
General Manager
Sustainable Business Solution
muhammad.dawood@sbs.org.pk
info@sbs.org.pk
• To enable the participants to carry out risk assessments
in their own areas of responsibility.
• To develop competent teams who can further lead OHS
risk assessments at their respective locations.
• To develop competence for prioritization of OHS Risks
for implementation of operational controls
Objectives
4
Introduction
• What is Risk Assessment?
• It is the careful examination of what could
cause harm to people, equipment,
environment or property.
Why Risk Assessment?
• Legal requirement
• To meet the requirements of OHSAS 18001.
• To know the OH&S hazards and risks involved in our
jobs.
• To classify high risk activities, processes and to
establish objectives and / or controls to avoid harm
humans & assets by eliminating or controlling hazards
and risks.
• Prevent Death and personal injury and the direct and indirect
costs that follow on from accidents
• “reasonable practicability”
– balance of cost vs risk of harm
– Cost is time, effort and money
• Basis of a risk assessment
Reasonably Practicable
• Accident
• Injury accident
• Damage only accident
• Near-miss
• Dangerous occurrence
• Work related Ill-health
Types of Incident
Hazard Near Miss Injury
Relation Between Types of Incident
Frank Bird Accident Triangle
Accident Ratios
• Competent people
– training, knowledge, experience
• Team approach is beneficial
– workers familiar with tasks
– H&S specialists
– technical specialists
– line managers
– worker safety representatives
Risk Assessors
• State the name/competence of assessor
• Identify significant hazards and risks
• Identify persons at risk
– Workers and others e.g. visitors and vulnerable
• Evaluate current controls
• Identify additional controls
• Enable employer to priorities controls
• Appropriate to nature of work
• Proportionate to risks
• State time period valid
Suitable and Sufficient Risk Assessment
• HAZOP
• FMEA
• What-If
• LOPA
• Bow-Tie
• Fault Tree Analysis
• Event Tree Analysis
• Checklist
Risk Assessment Methods
HSL/2005/58
The 5 Steps of Risk Assessment
Safety
Physical injury:
•Slips, trips and falls
•Falling objects
•Collisions
•Trapping/crushing
•Machinery
•Electricity
•Transport
•Chemicals
•Drowning
•Asphyxiation
•Fire/explosion
•Animals
•Violence
Health
Occupational disease or ill-health:
•Physical
•Chemical
•Biological
•Ergonomic
•Psychological
Step 1: Identify The Hazards
Use M.E.E.P.
In both manufacturing and non-manufacturing
operations personnel face a range of hazards everyday
and some of these hazards are not very obvious! By
analysing accidents and other incidents we can identify
areas for improvement.
The Range of Hazards
Hazard - Source, situation or act with a potential of
harm in terms of human injury or health or
combination of these ( OHSAS 18001)
Some Basic definition
Risk – combination of the likelihood of an occurrence
of a hazardous event or exposure, multiplied by the
severity of injury of ill health that can be caused by
the event or exposure
Some Basic definition
• Employees
• Maintenance staff
• Cleaners
• Contractors
• Visitors
• Members of the public
Step 2: Identify People at Risk
Lone Workers, New and Expectant
Mothers, Disabled
What is risk?
It is a measure of the likelihood of harm
occurring and the severity of that harm.
Or to put it more simply:
Risk = Likelihood × Severity
Step 3: Evaluate the Risk
Consequence Description
1 - MINOR Minor injuries only; First Aid treatment required.
2 - MODERATE
Injuries which could result in temporary disability;
Medical treatment required; whenever there is a
possibility that long term effect of activity can cause
some disability or health problem such as hearing
loss; asthma etc.
3 - MAJOR
Serious injuries that could result in permanent
disability; Hospitalisation admission required.
4 - SEVERE Death or permanent disability to 1-2 persons.
5 - CATASTROPHIC Several fatalities.
Likelihood Description
5 - CERTAIN
It is expected to occur at some time in the near future
(daily).
4 - LIKELY Will probably occur in most circumstances (weekly).
3 - POSSIBLE Might occur at some time (monthly).
2 - UNLIKELY Could occur at some time (six months to a year).
1 - RARE
The event could occur in exceptional circumstances
only
Step 3: Evaluate the Risk
LEVEL OF RISK
LIKELIHOOD
CONSEQUENCES
Minor Moderate Major Severe Catastrophic
1 2 3 4 5
Almost Certain 5 5 10 15 20 25
Likely 4 4 8 12 16 20
Possible 3 3 6 9 12 15
Unlikely 2 2 4 6 8 10
Rare 1 1 2 3 4 5
LEGEND
20-25 EXTREME RISK
Immediate action required. If possible, the activity
should be ceased immediately
12-18 HIGH RISK
Notify supervisor and safety and health
representative and implement immediate action to
minimize injury. remedial action required within two
working days
6-10
MODERATE
RISK
Implement immediate action to minimize injury e.g.
Signs; supervisor remedial action required within
five working days
1-5 LOW RISK
Remedial action within one month (if possible),
supervisor attention required
Risk Assessment Matrix
Q1. Of being run over by a vehicle when
crossing the road in the Thar desert ?
Estimate The Risk
Q2. Of being run over by a vehicle when
crossing a busy roads in Karachi?
Estimate The Risk
Q3. Of being run over when crossing a
quiet cycle path in the countryside?
Estimate The Risk
Likelihood
increases
Likelihood
low
R = S X L
R = S X L
Risk and Decision Making
Eliminate the hazard
Reduce or substitute the hazard
I solate (people from hazard/ hazard from people)
C ontrol exposure (engineering, Management)
Personal protective equipment
Hierarchy of Control
• Refer to your procedure
Priorities and Time Scale
Risk Priority
20-25 Extreme First priority
12-18 High Second priority
6-10 Medium Third Priority
1-5 Low Forth Priority
Typical content:
• Activity/area assessed and hazards
• Groups at risk
• Evaluation of risks and adequacy of existing
control measures
• Further precautions needed
• Date and name of
competent person
Step 4: Record Your Findings
Significant change in:
• Process
• Substances
• Equipment
• Workplace environment
• Personnel
• Law
If it is no longer valid
• Accident
• Near miss
• Ill-health
Periodically e.g. annually
Step 5: Review Your Findings
PECB Webinar: Hazard Identification, Risk Assessment and Determining Controls – Foundation Stone of OHSAS 18001

More Related Content

What's hot (20)

Risk & opportunities register
Risk & opportunities registerRisk & opportunities register
Risk & opportunities register
 
Process Safety Management
Process Safety ManagementProcess Safety Management
Process Safety Management
 
Emergency response planning
Emergency response planningEmergency response planning
Emergency response planning
 
HIRA training
HIRA   trainingHIRA   training
HIRA training
 
Hazard identification
Hazard identificationHazard identification
Hazard identification
 
Leadership and safety culture
Leadership and safety cultureLeadership and safety culture
Leadership and safety culture
 
Job Safety Analysis
Job Safety AnalysisJob Safety Analysis
Job Safety Analysis
 
Behavior based safety
Behavior based safetyBehavior based safety
Behavior based safety
 
HSE PRESENTATION
HSE PRESENTATIONHSE PRESENTATION
HSE PRESENTATION
 
Health & safety training
Health & safety trainingHealth & safety training
Health & safety training
 
Hazard Identification _ Risk Assessment.ppt
Hazard Identification _ Risk Assessment.pptHazard Identification _ Risk Assessment.ppt
Hazard Identification _ Risk Assessment.ppt
 
Near Miss Reporting
Near Miss ReportingNear Miss Reporting
Near Miss Reporting
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
 
Hse Action Plan
Hse Action PlanHse Action Plan
Hse Action Plan
 
Behavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide TemplateBehavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide Template
 
Safety induction presentation
Safety induction presentationSafety induction presentation
Safety induction presentation
 
Industrial Safety
Industrial SafetyIndustrial Safety
Industrial Safety
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
7 Keys for Creating A Safety Culture
7 Keys for Creating A Safety Culture7 Keys for Creating A Safety Culture
7 Keys for Creating A Safety Culture
 
Health and Safety Induction Training
Health and Safety Induction TrainingHealth and Safety Induction Training
Health and Safety Induction Training
 

Similar to PECB Webinar: Hazard Identification, Risk Assessment and Determining Controls – Foundation Stone of OHSAS 18001

pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptAsifHussain654789
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptShahbazAhmad736457
 
Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...
Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...
Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...Muizz Anibire
 
hazardidentificationriskassessment-221203161833-f78f65bf.pdf
hazardidentificationriskassessment-221203161833-f78f65bf.pdfhazardidentificationriskassessment-221203161833-f78f65bf.pdf
hazardidentificationriskassessment-221203161833-f78f65bf.pdfHalimyAbdulHamid
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...AMIT SAHU
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –AMIT SAHU
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisGaurav Singh Rajput
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RAGaurav Singh Rajput
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptGkMechanical
 
Manie information needed to evaluate risky investment.
Manie information needed to evaluate risky investment.Manie information needed to evaluate risky investment.
Manie information needed to evaluate risky investment.mtlobrido
 
HIGH-Risk-Sport-and-Society-Health-and-safety-session.ppt
HIGH-Risk-Sport-and-Society-Health-and-safety-session.pptHIGH-Risk-Sport-and-Society-Health-and-safety-session.ppt
HIGH-Risk-Sport-and-Society-Health-and-safety-session.pptDEPEDTVRodolfoELayca
 
Military + Civilian Best Practices: Risk Management ver 1.1
Military + Civilian Best Practices: Risk Management ver 1.1Military + Civilian Best Practices: Risk Management ver 1.1
Military + Civilian Best Practices: Risk Management ver 1.1Alejandro Perez
 
Particpate in whs processes recap wks 2 13
Particpate in whs processes recap wks 2  13Particpate in whs processes recap wks 2  13
Particpate in whs processes recap wks 2 13catherinejyoung
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazMDAnwarIbrahimMiraz
 
Purpose of Risk Assessment.pptx
Purpose of Risk Assessment.pptxPurpose of Risk Assessment.pptx
Purpose of Risk Assessment.pptxCruiseCH
 
11 hazardrecognition
11 hazardrecognition11 hazardrecognition
11 hazardrecognitionFahad Hashmi
 

Similar to PECB Webinar: Hazard Identification, Risk Assessment and Determining Controls – Foundation Stone of OHSAS 18001 (20)

pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.ppt
 
pilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.pptpilot-Risk_Assessment_at_Workplace.ppt
pilot-Risk_Assessment_at_Workplace.ppt
 
Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...
Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...
Construction Safety Training_Session 10_Risk Assessment, Hierarchy of Control...
 
hazardidentificationriskassessment-221203161833-f78f65bf.pdf
hazardidentificationriskassessment-221203161833-f78f65bf.pdfhazardidentificationriskassessment-221203161833-f78f65bf.pdf
hazardidentificationriskassessment-221203161833-f78f65bf.pdf
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –
 
Topic 04 risk mangement
Topic 04 risk mangementTopic 04 risk mangement
Topic 04 risk mangement
 
Risk Assessment and Job Safety Analysis
Risk Assessment and Job Safety AnalysisRisk Assessment and Job Safety Analysis
Risk Assessment and Job Safety Analysis
 
Risk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RARisk Assessment & Job Safety Analysis | JSA | RA
Risk Assessment & Job Safety Analysis | JSA | RA
 
HSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.pptHSE-BMS-006 Risk Assessment & JSA.ppt
HSE-BMS-006 Risk Assessment & JSA.ppt
 
Topik5
Topik5Topik5
Topik5
 
Manie information needed to evaluate risky investment.
Manie information needed to evaluate risky investment.Manie information needed to evaluate risky investment.
Manie information needed to evaluate risky investment.
 
HIGH-Risk-Sport-and-Society-Health-and-safety-session.ppt
HIGH-Risk-Sport-and-Society-Health-and-safety-session.pptHIGH-Risk-Sport-and-Society-Health-and-safety-session.ppt
HIGH-Risk-Sport-and-Society-Health-and-safety-session.ppt
 
Hirarc
HirarcHirarc
Hirarc
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Military + Civilian Best Practices: Risk Management ver 1.1
Military + Civilian Best Practices: Risk Management ver 1.1Military + Civilian Best Practices: Risk Management ver 1.1
Military + Civilian Best Practices: Risk Management ver 1.1
 
Particpate in whs processes recap wks 2 13
Particpate in whs processes recap wks 2  13Particpate in whs processes recap wks 2  13
Particpate in whs processes recap wks 2 13
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim miraz
 
Purpose of Risk Assessment.pptx
Purpose of Risk Assessment.pptxPurpose of Risk Assessment.pptx
Purpose of Risk Assessment.pptx
 
11 hazardrecognition
11 hazardrecognition11 hazardrecognition
11 hazardrecognition
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

PECB Webinar: Hazard Identification, Risk Assessment and Determining Controls – Foundation Stone of OHSAS 18001

  • 1.
  • 2. Hazard Identification, Risk Assessment and Determining Controls – Foundation Stone of OHSAS 18001 Muhammad Dawood General Manager Sustainable Business Solution muhammad.dawood@sbs.org.pk info@sbs.org.pk
  • 3. • To enable the participants to carry out risk assessments in their own areas of responsibility. • To develop competent teams who can further lead OHS risk assessments at their respective locations. • To develop competence for prioritization of OHS Risks for implementation of operational controls Objectives
  • 4. 4 Introduction • What is Risk Assessment? • It is the careful examination of what could cause harm to people, equipment, environment or property.
  • 5. Why Risk Assessment? • Legal requirement • To meet the requirements of OHSAS 18001. • To know the OH&S hazards and risks involved in our jobs. • To classify high risk activities, processes and to establish objectives and / or controls to avoid harm humans & assets by eliminating or controlling hazards and risks. • Prevent Death and personal injury and the direct and indirect costs that follow on from accidents
  • 6. • “reasonable practicability” – balance of cost vs risk of harm – Cost is time, effort and money • Basis of a risk assessment Reasonably Practicable
  • 7. • Accident • Injury accident • Damage only accident • Near-miss • Dangerous occurrence • Work related Ill-health Types of Incident
  • 8. Hazard Near Miss Injury Relation Between Types of Incident
  • 9. Frank Bird Accident Triangle Accident Ratios
  • 10. • Competent people – training, knowledge, experience • Team approach is beneficial – workers familiar with tasks – H&S specialists – technical specialists – line managers – worker safety representatives Risk Assessors
  • 11. • State the name/competence of assessor • Identify significant hazards and risks • Identify persons at risk – Workers and others e.g. visitors and vulnerable • Evaluate current controls • Identify additional controls • Enable employer to priorities controls • Appropriate to nature of work • Proportionate to risks • State time period valid Suitable and Sufficient Risk Assessment
  • 12. • HAZOP • FMEA • What-If • LOPA • Bow-Tie • Fault Tree Analysis • Event Tree Analysis • Checklist Risk Assessment Methods HSL/2005/58
  • 13. The 5 Steps of Risk Assessment
  • 14. Safety Physical injury: •Slips, trips and falls •Falling objects •Collisions •Trapping/crushing •Machinery •Electricity •Transport •Chemicals •Drowning •Asphyxiation •Fire/explosion •Animals •Violence Health Occupational disease or ill-health: •Physical •Chemical •Biological •Ergonomic •Psychological Step 1: Identify The Hazards Use M.E.E.P.
  • 15. In both manufacturing and non-manufacturing operations personnel face a range of hazards everyday and some of these hazards are not very obvious! By analysing accidents and other incidents we can identify areas for improvement. The Range of Hazards
  • 16. Hazard - Source, situation or act with a potential of harm in terms of human injury or health or combination of these ( OHSAS 18001) Some Basic definition
  • 17. Risk – combination of the likelihood of an occurrence of a hazardous event or exposure, multiplied by the severity of injury of ill health that can be caused by the event or exposure Some Basic definition
  • 18. • Employees • Maintenance staff • Cleaners • Contractors • Visitors • Members of the public Step 2: Identify People at Risk Lone Workers, New and Expectant Mothers, Disabled
  • 19. What is risk? It is a measure of the likelihood of harm occurring and the severity of that harm. Or to put it more simply: Risk = Likelihood × Severity Step 3: Evaluate the Risk
  • 20. Consequence Description 1 - MINOR Minor injuries only; First Aid treatment required. 2 - MODERATE Injuries which could result in temporary disability; Medical treatment required; whenever there is a possibility that long term effect of activity can cause some disability or health problem such as hearing loss; asthma etc. 3 - MAJOR Serious injuries that could result in permanent disability; Hospitalisation admission required. 4 - SEVERE Death or permanent disability to 1-2 persons. 5 - CATASTROPHIC Several fatalities. Likelihood Description 5 - CERTAIN It is expected to occur at some time in the near future (daily). 4 - LIKELY Will probably occur in most circumstances (weekly). 3 - POSSIBLE Might occur at some time (monthly). 2 - UNLIKELY Could occur at some time (six months to a year). 1 - RARE The event could occur in exceptional circumstances only Step 3: Evaluate the Risk
  • 21. LEVEL OF RISK LIKELIHOOD CONSEQUENCES Minor Moderate Major Severe Catastrophic 1 2 3 4 5 Almost Certain 5 5 10 15 20 25 Likely 4 4 8 12 16 20 Possible 3 3 6 9 12 15 Unlikely 2 2 4 6 8 10 Rare 1 1 2 3 4 5 LEGEND 20-25 EXTREME RISK Immediate action required. If possible, the activity should be ceased immediately 12-18 HIGH RISK Notify supervisor and safety and health representative and implement immediate action to minimize injury. remedial action required within two working days 6-10 MODERATE RISK Implement immediate action to minimize injury e.g. Signs; supervisor remedial action required within five working days 1-5 LOW RISK Remedial action within one month (if possible), supervisor attention required Risk Assessment Matrix
  • 22. Q1. Of being run over by a vehicle when crossing the road in the Thar desert ? Estimate The Risk
  • 23. Q2. Of being run over by a vehicle when crossing a busy roads in Karachi? Estimate The Risk
  • 24. Q3. Of being run over when crossing a quiet cycle path in the countryside? Estimate The Risk
  • 27. Eliminate the hazard Reduce or substitute the hazard I solate (people from hazard/ hazard from people) C ontrol exposure (engineering, Management) Personal protective equipment Hierarchy of Control
  • 28. • Refer to your procedure Priorities and Time Scale Risk Priority 20-25 Extreme First priority 12-18 High Second priority 6-10 Medium Third Priority 1-5 Low Forth Priority
  • 29. Typical content: • Activity/area assessed and hazards • Groups at risk • Evaluation of risks and adequacy of existing control measures • Further precautions needed • Date and name of competent person Step 4: Record Your Findings
  • 30. Significant change in: • Process • Substances • Equipment • Workplace environment • Personnel • Law If it is no longer valid • Accident • Near miss • Ill-health Periodically e.g. annually Step 5: Review Your Findings

Editor's Notes

  1. Discuss examples of
  2. Accident ratios (often referred to as accident triangles) display the relationship between numbers of accidents with different outcomes. Research shows that this relationship forms a triangle, with the most serious outcomes being the least numerous (at the top) and those with proportionally higher numbers but less serious results forming the base. There are a number of different triangles used to display these relationships; one proposed by Bird Important point is to mention Ratio numbers change depending on the study (this is one example only) It doesn’t mean that every near miss could result in a fatality – its simply a ratio which means the more we report and eliminate the less chance we have of having injuries and fatalities Serious accidents tend to happen randomly and are hard to predict Acting to eliminate near misses will prevent injuries There is an excellent free DVD from SGS scaffold called “the cost of accidents” which illustrates this beautifully!!
  3. Stress that this is an approach detailed in the UK in HSE publications
  4. Use discussion and explanation of the 1-5 scales to take the students from identification of likelihood and severity through to a risk rating. Then show them the risk assessment matrix on the following slide. Explain that this is just one approach and that there is no prescribed process which must be followed – it depends upon the needs of the organisation (as we discussed earlier)
  5. This is an aide memoire that we encountered earlier. Some students may like to use it.
  6. A straightforward link can be made between the level of risk associated with a particular hazard and the prioritisation of that hazard: the higher the risk the higher the priority.   You might also assume that a high risk demands a short timescale for corrective action and a low risk can be allowed to persist for a longer period of time, but there are two problems with this simple link: • A low risk level might be low priority, but it might also have a very simple, low cost remedy. A law court might not accept that a long timescale could be applied to a simple, low cost remedy; it should be implemented immediately because it can be done immediately. • A medium risk might demand a medium priority, but that does not necessarily mean that a law court would accept that an intermediate timescale would be acceptable. The level of risk to workers should always be acceptable - not just acceptable after 24 hours of working.   This may mean that some interim precautions are put in place which control tolerable risk to an acceptable level but do not represent to be an ideal long-term solution to the problem.