SlideShare a Scribd company logo
1 of 81
Download to read offline
Risk	
  Assessments	
  

The	
  Forgo1en	
  Art	
  
#riskapi	
  

1	
  
Presenta7on	
  Overview	
  
Introduc7ons	
  
What	
  is	
  Risk?	
  
Overview	
  of	
  the	
  Risk	
  Assessment	
  Process	
  
Governmental	
  regula7ons	
  and	
  standards	
  
requiring	
  risk	
  assessments	
  
•  Types	
  of	
  risk	
  assessment	
  methodologies	
  
•  Why	
  is	
  this	
  important?	
  
•  Risk	
  assessments	
  as	
  part	
  of	
  a	
  potent	
  compound	
  
safety	
  program	
  
• 
• 
• 
• 

2	
  
What is Risk?

3	
  
Risk = _________

4	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

5	
  
6	
  
Risk Assessment Attempts to Answer

•  What can happen and why?
•  What are the consequences?
•  What is the probability of their
future occurrence?
•  Are there any factors that mitigate
the consequence of the risk or
that reduce the probability of the
risk?
•  Is the level of risk tolerable or
acceptable?
7	
  
History

8	
  
1947

9	
  
’50s	
  –	
  ‘60s	
  Minuteman	
  ICBMs	
  

History	
  

•  1947:	
  “Engineering	
  for	
  Safety”	
  paper	
  
presented	
  at	
  the	
  Ins7tute	
  for	
  Aeronau7cal	
  
Science	
  
•  1950	
  –	
  1960:	
  Minuteman	
  ICBM	
  
•  NASA	
  
•  Nuclear	
  reactors	
  

10	
  
NASA	
  

11	
  
Nuclear	
  Reactors	
  

12	
  
Governmental Regs & Standards

13	
  
OSHA’s	
  Process	
  Safety	
  Management	
  

Governmental	
  Regula7ons	
  and	
  
Standards	
  Requiring	
  Risk	
  Assessments	
  
•  OSHA’s	
  Process	
  Safety	
  Management	
  of	
  Highly	
  Hazardous	
  
Chemicals:	
  29	
  CFR	
  1910.119(e)	
  
•  OSHA’s	
  Voluntary	
  Protec7on	
  Program	
  
•  EPA’s	
  Risk	
  Management	
  Plan	
  Standard:	
  40	
  CFR	
  68.67	
  
•  UK’s	
  The	
  Management	
  of	
  Health	
  and	
  Safety	
  at	
  Work	
  Regula7ons	
  
1999	
  Chapter	
  3	
  
•  ANSI/AIHA	
  Z10-­‐2012	
  Occupa7onal	
  Health	
  and	
  Safety	
  Management	
  
Systems	
  
•  IEC/FDIS	
  31010:	
  Risk	
  Management	
  –	
  Risk	
  Assessment	
  Techniques	
  
•  BS	
  OHSAS	
  18001:	
  Occupa7onal	
  health	
  and	
  safety	
  management	
  
systems	
  
•  MIL-­‐STD-­‐882E	
  

14	
  
EPA’s	
  Risk	
  Management	
  Plan	
  

Governmental	
  Regula7ons	
  and	
  
Standards	
  Requiring	
  Risk	
  Assessments	
  
•  OSHA’s	
  Process	
  Safety	
  Management	
  of	
  Highly	
  Hazardous	
  
Chemicals:	
  29	
  CFR	
  1910.119(e)	
  
•  OSHA’s	
  Voluntary	
  Protec7on	
  Program	
  
•  EPA’s	
  Risk	
  Management	
  Plan	
  Standard:	
  40	
  CFR	
  68.67	
  
•  UK’s	
  The	
  Management	
  of	
  Health	
  and	
  Safety	
  at	
  Work	
  Regula7ons	
  
1999	
  Chapter	
  3	
  
•  ANSI/AIHA	
  Z10-­‐2012	
  Occupa7onal	
  Health	
  and	
  Safety	
  Management	
  
Systems	
  
•  IEC/FDIS	
  31010:	
  Risk	
  Management	
  –	
  Risk	
  Assessment	
  Techniques	
  
•  BS	
  OHSAS	
  18001:	
  Occupa7onal	
  health	
  and	
  safety	
  management	
  
systems	
  
•  MIL-­‐STD-­‐882E	
  

15	
  
16	
  
17	
  
18	
  
19	
  
20	
  
Risk Assessments Gone Bad!

21	
  
22	
  
23	
  
24	
  
25	
  
Risk = Hazard X Probability

26	
  
Benefits of Risk
Assessments
•  Compliance with regulatory, customer,
and internally derived requirements.
•  Adequate identification of potential
exposure risks prior to the design or
operation.
•  Early identification of the effects of
engineering or operational decisions.
•  May minimize the need for industrial
hygiene monitoring for similar
operations.
27	
  
Types of Risks Assessments

28	
  
WHAT-­‐IF	
  
29	
  
30	
  
HAZOP	
  
31	
  
32	
  
Preliminary	
  Hazard	
  Analysis	
  
33	
  
34	
  
35	
  
36
BREAK

37
Introducing OEL Fastrac™
•  High quality OEL
monographs
•  Browse or search
our online catalog
•  Order online
•  Instant download

Go to oelfastrac.com to place an order

38
Affytrac QEA tool
•  Perform qualitative exposure assessments
•  Extremely flexible

39
Follow	
  Affygility	
  
dcalhoun@affygility.com	
  

twi1er.com/affygility	
  
h1p://www.linkedin.com/in/affygilitysolu7ons	
  
facebook.com/affygilitysolu7ons	
  

Search “Google+ Affygility Solutions

Go	
  affygility.com/podcasts	
  or	
  go	
  to	
  iTunes	
  and	
  search	
  for	
  “Biopharma	
  EHS	
  
40
30 seconds

2 minutes till start

41
42
43
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

44	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

45	
  
46
47
48
49
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

50	
  
51	
  
52	
  
53	
  
54	
  
55	
  
56	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

57	
  
58	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

59	
  
60	
  
61	
  
62	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

63	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

64	
  
65	
  
66	
  
67	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

68	
  
69	
  
70	
  
71	
  
72	
  
73	
  
74	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

75	
  
76	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

77	
  
78	
  
79
Risk = Hazard X Probability

80	
  
Follow	
  Affygility	
  
dcalhoun@affygility.com	
  

twi1er.com/affygility	
  
h1p://www.linkedin.com/in/affygilitysolu7ons	
  
facebook.com/affygilitysolu7ons	
  
Search	
  “Google+	
  Affygility	
  Solu7ons	
  
Go	
  affygility.com/podcasts	
  or	
  go	
  to	
  iTunes	
  and	
  search	
  for	
  “Biopharma	
  EHS	
  
81	
  

More Related Content

What's hot

P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.pptP-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.pptKrishna Yadav
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk managementhealthpoint
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysisSandip Sonawane
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesRoger Johnston
 
Risk Management
Risk ManagementRisk Management
Risk Managementysshah
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides SlideTeam
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementBiju Nair
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Association for Project Management
 
Kim sandhu
Kim sandhuKim sandhu
Kim sandhuNASAPMC
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesSlideTeam
 

What's hot (20)

P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.pptP-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
 
SIL.ppt
SIL.pptSIL.ppt
SIL.ppt
 
Risk management
Risk managementRisk management
Risk management
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysis
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk
RiskRisk
Risk
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
 
LAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSISLAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSIS
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Kim sandhu
Kim sandhuKim sandhu
Kim sandhu
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation Slides
 
Risk management case study
Risk management case studyRisk management case study
Risk management case study
 

Viewers also liked

Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelinesHaris Tahir
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment trainingBrian Larkin
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentationmmagario
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 
Dynamic risk assessment lrg
Dynamic risk assessment lrgDynamic risk assessment lrg
Dynamic risk assessment lrgLance Grindley
 
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX projectMulti-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX projectGlobal Risk Forum GRFDavos
 
Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!Richard Duszczak
 
Hazard Recognition Training Generic
Hazard Recognition Training   GenericHazard Recognition Training   Generic
Hazard Recognition Training Genericaljingst
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safetyjchsafety
 

Viewers also liked (20)

Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelines
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment training
 
Risk Assessment and Reduction
Risk Assessment and ReductionRisk Assessment and Reduction
Risk Assessment and Reduction
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC 131024
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC  131024Lab'InSight Toxicological Risk Assessment présentation UNamur NNC  131024
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC 131024
 
Dynamic risk assessment lrg
Dynamic risk assessment lrgDynamic risk assessment lrg
Dynamic risk assessment lrg
 
Flra training ppt
Flra training  pptFlra training  ppt
Flra training ppt
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX projectMulti-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
 
What are risk assessments
What are risk assessmentsWhat are risk assessments
What are risk assessments
 
Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Hazard Recognition Training Generic
Hazard Recognition Training   GenericHazard Recognition Training   Generic
Hazard Recognition Training Generic
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Hazard identification
Hazard identificationHazard identification
Hazard identification
 
Safety: Hazard Identification and Recognition Program
Safety: Hazard Identification and Recognition ProgramSafety: Hazard Identification and Recognition Program
Safety: Hazard Identification and Recognition Program
 
إدارة المخاطر
إدارة المخاطرإدارة المخاطر
إدارة المخاطر
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safety
 

Similar to Risk assessment Presentation by Affygility Solutions

QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304Robert Ginsberg
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk AnalysisUBMCanon
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Luis Atencio
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...Cam Fulton
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisEvan Francen
 
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedKeeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedLife Sciences Network marcus evans
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdfdotco
 
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptxzeidali3
 
Understanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesUnderstanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesKeerthi Gunasekaran
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
ISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk RequirementsISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk RequirementsMasterControl
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Greenlight Guru
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment KateKazhan
 

Similar to Risk assessment Presentation by Affygility Solutions (20)

Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedKeeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
ICH Q9 Quality Risk Management
ICH Q9 Quality Risk ManagementICH Q9 Quality Risk Management
ICH Q9 Quality Risk Management
 
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
 
Understanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesUnderstanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical Devices
 
module_1.pptx
module_1.pptxmodule_1.pptx
module_1.pptx
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
ISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk RequirementsISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk Requirements
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Risk assessment Presentation by Affygility Solutions

  • 1. Risk  Assessments   The  Forgo1en  Art   #riskapi   1  
  • 2. Presenta7on  Overview   Introduc7ons   What  is  Risk?   Overview  of  the  Risk  Assessment  Process   Governmental  regula7ons  and  standards   requiring  risk  assessments   •  Types  of  risk  assessment  methodologies   •  Why  is  this  important?   •  Risk  assessments  as  part  of  a  potent  compound   safety  program   •  •  •  •  2  
  • 5. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   5  
  • 7. Risk Assessment Attempts to Answer •  What can happen and why? •  What are the consequences? •  What is the probability of their future occurrence? •  Are there any factors that mitigate the consequence of the risk or that reduce the probability of the risk? •  Is the level of risk tolerable or acceptable? 7  
  • 10. ’50s  –  ‘60s  Minuteman  ICBMs   History   •  1947:  “Engineering  for  Safety”  paper   presented  at  the  Ins7tute  for  Aeronau7cal   Science   •  1950  –  1960:  Minuteman  ICBM   •  NASA   •  Nuclear  reactors   10  
  • 13. Governmental Regs & Standards 13  
  • 14. OSHA’s  Process  Safety  Management   Governmental  Regula7ons  and   Standards  Requiring  Risk  Assessments   •  OSHA’s  Process  Safety  Management  of  Highly  Hazardous   Chemicals:  29  CFR  1910.119(e)   •  OSHA’s  Voluntary  Protec7on  Program   •  EPA’s  Risk  Management  Plan  Standard:  40  CFR  68.67   •  UK’s  The  Management  of  Health  and  Safety  at  Work  Regula7ons   1999  Chapter  3   •  ANSI/AIHA  Z10-­‐2012  Occupa7onal  Health  and  Safety  Management   Systems   •  IEC/FDIS  31010:  Risk  Management  –  Risk  Assessment  Techniques   •  BS  OHSAS  18001:  Occupa7onal  health  and  safety  management   systems   •  MIL-­‐STD-­‐882E   14  
  • 15. EPA’s  Risk  Management  Plan   Governmental  Regula7ons  and   Standards  Requiring  Risk  Assessments   •  OSHA’s  Process  Safety  Management  of  Highly  Hazardous   Chemicals:  29  CFR  1910.119(e)   •  OSHA’s  Voluntary  Protec7on  Program   •  EPA’s  Risk  Management  Plan  Standard:  40  CFR  68.67   •  UK’s  The  Management  of  Health  and  Safety  at  Work  Regula7ons   1999  Chapter  3   •  ANSI/AIHA  Z10-­‐2012  Occupa7onal  Health  and  Safety  Management   Systems   •  IEC/FDIS  31010:  Risk  Management  –  Risk  Assessment  Techniques   •  BS  OHSAS  18001:  Occupa7onal  health  and  safety  management   systems   •  MIL-­‐STD-­‐882E   15  
  • 16. 16  
  • 17. 17  
  • 18. 18  
  • 19. 19  
  • 20. 20  
  • 21. Risk Assessments Gone Bad! 21  
  • 22. 22  
  • 23. 23  
  • 24. 24  
  • 25. 25  
  • 26. Risk = Hazard X Probability 26  
  • 27. Benefits of Risk Assessments •  Compliance with regulatory, customer, and internally derived requirements. •  Adequate identification of potential exposure risks prior to the design or operation. •  Early identification of the effects of engineering or operational decisions. •  May minimize the need for industrial hygiene monitoring for similar operations. 27  
  • 28. Types of Risks Assessments 28  
  • 30. 30  
  • 32. 32  
  • 34. 34  
  • 35. 35  
  • 36. 36
  • 38. Introducing OEL Fastrac™ •  High quality OEL monographs •  Browse or search our online catalog •  Order online •  Instant download Go to oelfastrac.com to place an order 38
  • 39. Affytrac QEA tool •  Perform qualitative exposure assessments •  Extremely flexible 39
  • 40. Follow  Affygility   dcalhoun@affygility.com   twi1er.com/affygility   h1p://www.linkedin.com/in/affygilitysolu7ons   facebook.com/affygilitysolu7ons   Search “Google+ Affygility Solutions Go  affygility.com/podcasts  or  go  to  iTunes  and  search  for  “Biopharma  EHS   40
  • 41. 30 seconds 2 minutes till start 41
  • 42. 42
  • 43. 43
  • 44. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   44  
  • 45. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   45  
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   50  
  • 51. 51  
  • 52. 52  
  • 53. 53  
  • 54. 54  
  • 55. 55  
  • 56. 56  
  • 57. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   57  
  • 58. 58  
  • 59. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   59  
  • 60. 60  
  • 61. 61  
  • 62. 62  
  • 63. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   63  
  • 64. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   64  
  • 65. 65  
  • 66. 66  
  • 67. 67  
  • 68. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   68  
  • 69. 69  
  • 70. 70  
  • 71. 71  
  • 72. 72  
  • 73. 73  
  • 74. 74  
  • 75. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   75  
  • 76. 76  
  • 77. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   77  
  • 78. 78  
  • 79. 79
  • 80. Risk = Hazard X Probability 80  
  • 81. Follow  Affygility   dcalhoun@affygility.com   twi1er.com/affygility   h1p://www.linkedin.com/in/affygilitysolu7ons   facebook.com/affygilitysolu7ons   Search  “Google+  Affygility  Solu7ons   Go  affygility.com/podcasts  or  go  to  iTunes  and  search  for  “Biopharma  EHS   81