SlideShare a Scribd company logo
1 of 43
Tools For Sustaining Safety Phil La Duke
Introduction ,[object Object],[object Object]
Uses For Safety Tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
Process Monitoring Tools ,[object Object],[object Object],[object Object]
Sample Score Card
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Dashboard
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Report
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Change Reinforcement Tools ,[object Object],[object Object],[object Object],[object Object]
HICCAT
HICCAT Demo ,[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Reports
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Devices
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Tools ,[object Object],[object Object],[object Object],[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Structure and Infrastructure Tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
HICCAT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security ,[object Object],[object Object],[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID tagging ,[object Object],[object Object],[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Professional Collaboration Platform ,[object Object],[object Object],[object Object],[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unified Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Training and Reference Tools ,[object Object],[object Object],[object Object]
Electronic Performance Support Tools ,[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safety Kiosks w/ embedded Safety LMS
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OSHA Accepted On-Line Safety Training ,[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Integration Tools ,[object Object],[object Object],[object Object]
Safety Certifications ,[object Object],[object Object],[object Object],[object Object],[object Object]
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safety Training ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object]
Thank You! This presentation is available at www.safety-impact.com.

More Related Content

What's hot

Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIshrath Sultana
 
Permit to Work Software from Safetymint
Permit to Work Software from SafetymintPermit to Work Software from Safetymint
Permit to Work Software from SafetymintSafetymint
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"WrikeTechClub
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnairePriyanka Aash
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems ManagementSecPod Technologies
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy AutomationTufin
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlcAvancercorp
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!Greg Parmer
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Company Profile
Company ProfileCompany Profile
Company Profile3SC World
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for HealthcareSteve Dunn
 

What's hot (18)

Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
 
Permit to Work Software from Safetymint
Permit to Work Software from SafetymintPermit to Work Software from Safetymint
Permit to Work Software from Safetymint
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
2016_Brochure_Book
2016_Brochure_Book2016_Brochure_Book
2016_Brochure_Book
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
 
Soc
SocSoc
Soc
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
AGSL brochure
AGSL brochureAGSL brochure
AGSL brochure
 

Viewers also liked

A culture of myths
A culture of mythsA culture of myths
A culture of mythsPhil La Duke
 
Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety culturesPhil La Duke
 
Selling Safety In Tough Times
Selling Safety In Tough TimesSelling Safety In Tough Times
Selling Safety In Tough TimesPhil La Duke
 
Shifting the Paradigm for Workforce Management
Shifting the Paradigm for Workforce ManagementShifting the Paradigm for Workforce Management
Shifting the Paradigm for Workforce ManagementSirenum
 
Safety As A Competitve Advantage
Safety As A Competitve AdvantageSafety As A Competitve Advantage
Safety As A Competitve AdvantagePhil La Duke
 
Role Of Safety In Operations Excellence
Role Of Safety In Operations ExcellenceRole Of Safety In Operations Excellence
Role Of Safety In Operations ExcellencePhil La Duke
 
The Challenge of Safety Leadership - Steve Skarke, Kaneka Texas Corporation
The Challenge of Safety Leadership - Steve Skarke, Kaneka Texas CorporationThe Challenge of Safety Leadership - Steve Skarke, Kaneka Texas Corporation
The Challenge of Safety Leadership - Steve Skarke, Kaneka Texas Corporationmarcus evans Network
 
Inda's top 10 eco-friendly companies
Inda's top 10 eco-friendly companiesInda's top 10 eco-friendly companies
Inda's top 10 eco-friendly companiesParam Singh
 
Safety Leadership Training PPT
Safety Leadership Training PPTSafety Leadership Training PPT
Safety Leadership Training PPTJoeTavs
 
Safety Leadership - Clark Peterson, SKANSKA USA Civil West
Safety Leadership - Clark Peterson, SKANSKA USA Civil WestSafety Leadership - Clark Peterson, SKANSKA USA Civil West
Safety Leadership - Clark Peterson, SKANSKA USA Civil WestAGC of California
 
Process Safety Management System
Process Safety Management SystemProcess Safety Management System
Process Safety Management SystemACM Facility Safety
 

Viewers also liked (14)

Not Just Average
Not Just AverageNot Just Average
Not Just Average
 
A culture of myths
A culture of mythsA culture of myths
A culture of myths
 
Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety cultures
 
Selling Safety In Tough Times
Selling Safety In Tough TimesSelling Safety In Tough Times
Selling Safety In Tough Times
 
Shifting the Paradigm for Workforce Management
Shifting the Paradigm for Workforce ManagementShifting the Paradigm for Workforce Management
Shifting the Paradigm for Workforce Management
 
Safety As A Competitve Advantage
Safety As A Competitve AdvantageSafety As A Competitve Advantage
Safety As A Competitve Advantage
 
Role Of Safety In Operations Excellence
Role Of Safety In Operations ExcellenceRole Of Safety In Operations Excellence
Role Of Safety In Operations Excellence
 
The Challenge of Safety Leadership - Steve Skarke, Kaneka Texas Corporation
The Challenge of Safety Leadership - Steve Skarke, Kaneka Texas CorporationThe Challenge of Safety Leadership - Steve Skarke, Kaneka Texas Corporation
The Challenge of Safety Leadership - Steve Skarke, Kaneka Texas Corporation
 
Inda's top 10 eco-friendly companies
Inda's top 10 eco-friendly companiesInda's top 10 eco-friendly companies
Inda's top 10 eco-friendly companies
 
Safety leadership
Safety leadershipSafety leadership
Safety leadership
 
Safety Leadership Training PPT
Safety Leadership Training PPTSafety Leadership Training PPT
Safety Leadership Training PPT
 
Safety Leadership - Clark Peterson, SKANSKA USA Civil West
Safety Leadership - Clark Peterson, SKANSKA USA Civil WestSafety Leadership - Clark Peterson, SKANSKA USA Civil West
Safety Leadership - Clark Peterson, SKANSKA USA Civil West
 
Process Safety Management System
Process Safety Management SystemProcess Safety Management System
Process Safety Management System
 
Gemba Walk
Gemba WalkGemba Walk
Gemba Walk
 

Similar to Tools for Sustaining Workplace Safety

Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapAlan McSweeney
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
SAFE: Safety Management Software - One Platform to Manage all EHS Process
SAFE: Safety Management Software - One Platform to Manage all EHS ProcessSAFE: Safety Management Software - One Platform to Manage all EHS Process
SAFE: Safety Management Software - One Platform to Manage all EHS ProcessASK EHS Engineering & Consultants
 
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case StudyRackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case StudySylvain Reiter
 
LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to productionЮрий Чудинов
 
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Veeva Systems
 
Software System Engineering - Chapter 4
Software System Engineering - Chapter 4Software System Engineering - Chapter 4
Software System Engineering - Chapter 4Fadhil Ismail
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
A real-world introduction to PSM’s 14 Elements
A real-world introduction to PSM’s 14 ElementsA real-world introduction to PSM’s 14 Elements
A real-world introduction to PSM’s 14 Elements360factors
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodologyciso_insights
 
Securing the Remote Working Environment
Securing the Remote Working EnvironmentSecuring the Remote Working Environment
Securing the Remote Working EnvironmentDizzion, Inc.
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
Presentation tritan erp service
Presentation tritan erp servicePresentation tritan erp service
Presentation tritan erp serviceTritan solution
 

Similar to Tools for Sustaining Workplace Safety (20)

Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
SAFE: Safety Management Software - One Platform to Manage all EHS Process
SAFE: Safety Management Software - One Platform to Manage all EHS ProcessSAFE: Safety Management Software - One Platform to Manage all EHS Process
SAFE: Safety Management Software - One Platform to Manage all EHS Process
 
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case StudyRackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
 
LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to production
 
Lob app-12012018
Lob app-12012018Lob app-12012018
Lob app-12012018
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
 
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
 
Software System Engineering - Chapter 4
Software System Engineering - Chapter 4Software System Engineering - Chapter 4
Software System Engineering - Chapter 4
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
A real-world introduction to PSM’s 14 Elements
A real-world introduction to PSM’s 14 ElementsA real-world introduction to PSM’s 14 Elements
A real-world introduction to PSM’s 14 Elements
 
Technology ahia 2012 jmk
Technology ahia 2012 jmkTechnology ahia 2012 jmk
Technology ahia 2012 jmk
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 
2015 Inspection Summit Presentation 300
2015 Inspection Summit Presentation 3002015 Inspection Summit Presentation 300
2015 Inspection Summit Presentation 300
 
Securing the Remote Working Environment
Securing the Remote Working EnvironmentSecuring the Remote Working Environment
Securing the Remote Working Environment
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Presentation tritan erp service
Presentation tritan erp servicePresentation tritan erp service
Presentation tritan erp service
 

More from Phil La Duke

The role of technology in safety traininng
The role of technology in safety traininngThe role of technology in safety traininng
The role of technology in safety traininngPhil La Duke
 
You get what you measure tips for establishing safety metrics
You get what you measure tips for establishing safety metricsYou get what you measure tips for establishing safety metrics
You get what you measure tips for establishing safety metricsPhil La Duke
 
Creating a safety infrastructure
Creating a safety infrastructureCreating a safety infrastructure
Creating a safety infrastructurePhil La Duke
 
A culture of myths
A culture of mythsA culture of myths
A culture of mythsPhil La Duke
 
Detroit breakfast nov2015 slides pcl
Detroit breakfast nov2015 slides  pclDetroit breakfast nov2015 slides  pcl
Detroit breakfast nov2015 slides pclPhil La Duke
 
Changing culture means changing values
Changing culture means changing valuesChanging culture means changing values
Changing culture means changing valuesPhil La Duke
 
Be the change you want to see
Be the change you want to seeBe the change you want to see
Be the change you want to seePhil La Duke
 
Complacency the silent killer
Complacency the silent killerComplacency the silent killer
Complacency the silent killerPhil La Duke
 
Improving safety without going broke
Improving safety without going brokeImproving safety without going broke
Improving safety without going brokePhil La Duke
 
Whats wrong with safety training and what to do about it
Whats wrong with safety training and what to do about itWhats wrong with safety training and what to do about it
Whats wrong with safety training and what to do about itPhil La Duke
 
The seventh value asse show
The seventh value asse showThe seventh value asse show
The seventh value asse showPhil La Duke
 
The seventh value asse
The seventh value asseThe seventh value asse
The seventh value assePhil La Duke
 
Challenging Performance Improvement
Challenging Performance ImprovementChallenging Performance Improvement
Challenging Performance ImprovementPhil La Duke
 
selling safety in tough times (Semanario International De Seguridad Minera ve...
selling safety in tough times (Semanario International De Seguridad Minera ve...selling safety in tough times (Semanario International De Seguridad Minera ve...
selling safety in tough times (Semanario International De Seguridad Minera ve...Phil La Duke
 
Maintaining a Safe workplace Despite Radical Downsizing
Maintaining a Safe workplace Despite Radical DownsizingMaintaining a Safe workplace Despite Radical Downsizing
Maintaining a Safe workplace Despite Radical DownsizingPhil La Duke
 
Applying Deming to safety
Applying Deming to safetyApplying Deming to safety
Applying Deming to safetyPhil La Duke
 

More from Phil La Duke (20)

Causing safety
Causing safetyCausing safety
Causing safety
 
The role of technology in safety traininng
The role of technology in safety traininngThe role of technology in safety traininng
The role of technology in safety traininng
 
You get what you measure tips for establishing safety metrics
You get what you measure tips for establishing safety metricsYou get what you measure tips for establishing safety metrics
You get what you measure tips for establishing safety metrics
 
Creating a safety infrastructure
Creating a safety infrastructureCreating a safety infrastructure
Creating a safety infrastructure
 
5S Your Workplace
5S Your Workplace5S Your Workplace
5S Your Workplace
 
A culture of myths
A culture of mythsA culture of myths
A culture of myths
 
Detroit breakfast nov2015 slides pcl
Detroit breakfast nov2015 slides  pclDetroit breakfast nov2015 slides  pcl
Detroit breakfast nov2015 slides pcl
 
Changing culture means changing values
Changing culture means changing valuesChanging culture means changing values
Changing culture means changing values
 
Be the change you want to see
Be the change you want to seeBe the change you want to see
Be the change you want to see
 
Complacency the silent killer
Complacency the silent killerComplacency the silent killer
Complacency the silent killer
 
Improving safety without going broke
Improving safety without going brokeImproving safety without going broke
Improving safety without going broke
 
Causing safety
Causing safetyCausing safety
Causing safety
 
Whats wrong with safety training and what to do about it
Whats wrong with safety training and what to do about itWhats wrong with safety training and what to do about it
Whats wrong with safety training and what to do about it
 
Bridging the gap
Bridging the gapBridging the gap
Bridging the gap
 
The seventh value asse show
The seventh value asse showThe seventh value asse show
The seventh value asse show
 
The seventh value asse
The seventh value asseThe seventh value asse
The seventh value asse
 
Challenging Performance Improvement
Challenging Performance ImprovementChallenging Performance Improvement
Challenging Performance Improvement
 
selling safety in tough times (Semanario International De Seguridad Minera ve...
selling safety in tough times (Semanario International De Seguridad Minera ve...selling safety in tough times (Semanario International De Seguridad Minera ve...
selling safety in tough times (Semanario International De Seguridad Minera ve...
 
Maintaining a Safe workplace Despite Radical Downsizing
Maintaining a Safe workplace Despite Radical DownsizingMaintaining a Safe workplace Despite Radical Downsizing
Maintaining a Safe workplace Despite Radical Downsizing
 
Applying Deming to safety
Applying Deming to safetyApplying Deming to safety
Applying Deming to safety
 

Recently uploaded

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 

Recently uploaded (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 

Tools for Sustaining Workplace Safety

Editor's Notes

  1. This presentation was first presented by Phil La Duke, on Tuesday, October 27, 2009 from 1:30PM - 3:00PM. This presentation is an update of Selling Safety In Tough Economic Times which had previously been presented at the Michigan Safety Council in April of 2009.
  2. Do: Welcome the participants. Identify the emergency exits and procedures. Make any announcements that are required of the conference. Say: In this presentation, I will be sharing ways to get Operations buy-in for safety. I’m using the term “sell” in a very broad sense----when I say “sell safety” I am not just talking to purveyors of safety goods and services, but also to those of you who are internal providers of safety. Unless we know how to convince Operations that safety is more than a nuisance or a necessary evil we will never truly be successful in creating a corporate culture where safety is hardwired into how the organization operates. Do: Once you have explained what the session is about, allow people who might have expected something else to excuse themselves and leave. Introduce yourself and establish your credibility for speaking on this topic
  3. What I would like you to do now is go back to your organization and take a look at your information.
  4. Scorecards Dashboards Reports