SlideShare a Scribd company logo
1 of 81
Download to read offline
Risk	
  Assessments	
  

The	
  Forgo1en	
  Art	
  
#riskapi	
  

1	
  
Presenta7on	
  Overview	
  
Introduc7ons	
  
What	
  is	
  Risk?	
  
Overview	
  of	
  the	
  Risk	
  Assessment	
  Process	
  
Governmental	
  regula7ons	
  and	
  standards	
  
requiring	
  risk	
  assessments	
  
•  Types	
  of	
  risk	
  assessment	
  methodologies	
  
•  Why	
  is	
  this	
  important?	
  
•  Risk	
  assessments	
  as	
  part	
  of	
  a	
  potent	
  compound	
  
safety	
  program	
  
• 
• 
• 
• 

2	
  
What is Risk?

3	
  
Risk = _________

4	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

5	
  
6	
  
Risk Assessment Attempts to Answer

•  What can happen and why?
•  What are the consequences?
•  What is the probability of their
future occurrence?
•  Are there any factors that mitigate
the consequence of the risk or
that reduce the probability of the
risk?
•  Is the level of risk tolerable or
acceptable?
7	
  
History

8	
  
1947

9	
  
’50s	
  –	
  ‘60s	
  Minuteman	
  ICBMs	
  

History	
  

•  1947:	
  “Engineering	
  for	
  Safety”	
  paper	
  
presented	
  at	
  the	
  Ins7tute	
  for	
  Aeronau7cal	
  
Science	
  
•  1950	
  –	
  1960:	
  Minuteman	
  ICBM	
  
•  NASA	
  
•  Nuclear	
  reactors	
  

10	
  
NASA	
  

11	
  
Nuclear	
  Reactors	
  

12	
  
Governmental Regs & Standards

13	
  
OSHA’s	
  Process	
  Safety	
  Management	
  

Governmental	
  Regula7ons	
  and	
  
Standards	
  Requiring	
  Risk	
  Assessments	
  
•  OSHA’s	
  Process	
  Safety	
  Management	
  of	
  Highly	
  Hazardous	
  
Chemicals:	
  29	
  CFR	
  1910.119(e)	
  
•  OSHA’s	
  Voluntary	
  Protec7on	
  Program	
  
•  EPA’s	
  Risk	
  Management	
  Plan	
  Standard:	
  40	
  CFR	
  68.67	
  
•  UK’s	
  The	
  Management	
  of	
  Health	
  and	
  Safety	
  at	
  Work	
  Regula7ons	
  
1999	
  Chapter	
  3	
  
•  ANSI/AIHA	
  Z10-­‐2012	
  Occupa7onal	
  Health	
  and	
  Safety	
  Management	
  
Systems	
  
•  IEC/FDIS	
  31010:	
  Risk	
  Management	
  –	
  Risk	
  Assessment	
  Techniques	
  
•  BS	
  OHSAS	
  18001:	
  Occupa7onal	
  health	
  and	
  safety	
  management	
  
systems	
  
•  MIL-­‐STD-­‐882E	
  

14	
  
EPA’s	
  Risk	
  Management	
  Plan	
  

Governmental	
  Regula7ons	
  and	
  
Standards	
  Requiring	
  Risk	
  Assessments	
  
•  OSHA’s	
  Process	
  Safety	
  Management	
  of	
  Highly	
  Hazardous	
  
Chemicals:	
  29	
  CFR	
  1910.119(e)	
  
•  OSHA’s	
  Voluntary	
  Protec7on	
  Program	
  
•  EPA’s	
  Risk	
  Management	
  Plan	
  Standard:	
  40	
  CFR	
  68.67	
  
•  UK’s	
  The	
  Management	
  of	
  Health	
  and	
  Safety	
  at	
  Work	
  Regula7ons	
  
1999	
  Chapter	
  3	
  
•  ANSI/AIHA	
  Z10-­‐2012	
  Occupa7onal	
  Health	
  and	
  Safety	
  Management	
  
Systems	
  
•  IEC/FDIS	
  31010:	
  Risk	
  Management	
  –	
  Risk	
  Assessment	
  Techniques	
  
•  BS	
  OHSAS	
  18001:	
  Occupa7onal	
  health	
  and	
  safety	
  management	
  
systems	
  
•  MIL-­‐STD-­‐882E	
  

15	
  
16	
  
17	
  
18	
  
19	
  
20	
  
Risk Assessments Gone Bad!

21	
  
22	
  
23	
  
24	
  
25	
  
Risk = Hazard X Probability

26	
  
Benefits of Risk
Assessments
•  Compliance with regulatory, customer,
and internally derived requirements.
•  Adequate identification of potential
exposure risks prior to the design or
operation.
•  Early identification of the effects of
engineering or operational decisions.
•  May minimize the need for industrial
hygiene monitoring for similar
operations.
27	
  
Types of Risks Assessments

28	
  
WHAT-­‐IF	
  
29	
  
30	
  
HAZOP	
  
31	
  
32	
  
Preliminary	
  Hazard	
  Analysis	
  
33	
  
34	
  
35	
  
36
BREAK

37
Introducing OEL Fastrac™
•  High quality OEL
monographs
•  Browse or search
our online catalog
•  Order online
•  Instant download

Go to oelfastrac.com to place an order

38
Affytrac QEA tool
•  Perform qualitative exposure assessments
•  Extremely flexible

39
Follow	
  Affygility	
  
dcalhoun@affygility.com	
  

twi1er.com/affygility	
  
h1p://www.linkedin.com/in/affygilitysolu7ons	
  
facebook.com/affygilitysolu7ons	
  

Search “Google+ Affygility Solutions

Go	
  affygility.com/podcasts	
  or	
  go	
  to	
  iTunes	
  and	
  search	
  for	
  “Biopharma	
  EHS	
  
40
30 seconds

2 minutes till start

41
42
43
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

44	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

45	
  
46
47
48
49
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

50	
  
51	
  
52	
  
53	
  
54	
  
55	
  
56	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

57	
  
58	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

59	
  
60	
  
61	
  
62	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

63	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

64	
  
65	
  
66	
  
67	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

68	
  
69	
  
70	
  
71	
  
72	
  
73	
  
74	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

75	
  
76	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

77	
  
78	
  
79
Risk = Hazard X Probability

80	
  
Follow	
  Affygility	
  
dcalhoun@affygility.com	
  

twi1er.com/affygility	
  
h1p://www.linkedin.com/in/affygilitysolu7ons	
  
facebook.com/affygilitysolu7ons	
  
Search	
  “Google+	
  Affygility	
  Solu7ons	
  
Go	
  affygility.com/podcasts	
  or	
  go	
  to	
  iTunes	
  and	
  search	
  for	
  “Biopharma	
  EHS	
  
81	
  

More Related Content

What's hot

Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysis
Sandip Sonawane
 
Risk Management
Risk ManagementRisk Management
Risk Management
ysshah
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
Biju Nair
 
Kim sandhu
Kim sandhuKim sandhu
Kim sandhu
NASAPMC
 

What's hot (20)

P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.pptP-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
 
SIL.ppt
SIL.pptSIL.ppt
SIL.ppt
 
Risk management
Risk managementRisk management
Risk management
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysis
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk
RiskRisk
Risk
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
 
LAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSISLAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSIS
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Kim sandhu
Kim sandhuKim sandhu
Kim sandhu
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation Slides
 
Risk management case study
Risk management case studyRisk management case study
Risk management case study
 

Viewers also liked

Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
mmagario
 
Dynamic risk assessment lrg
Dynamic risk assessment lrgDynamic risk assessment lrg
Dynamic risk assessment lrg
Lance Grindley
 

Viewers also liked (20)

Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelines
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment training
 
Risk Assessment and Reduction
Risk Assessment and ReductionRisk Assessment and Reduction
Risk Assessment and Reduction
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC 131024
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC  131024Lab'InSight Toxicological Risk Assessment présentation UNamur NNC  131024
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC 131024
 
Dynamic risk assessment lrg
Dynamic risk assessment lrgDynamic risk assessment lrg
Dynamic risk assessment lrg
 
Flra training ppt
Flra training  pptFlra training  ppt
Flra training ppt
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX projectMulti-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
 
What are risk assessments
What are risk assessmentsWhat are risk assessments
What are risk assessments
 
Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Hazard Recognition Training Generic
Hazard Recognition Training   GenericHazard Recognition Training   Generic
Hazard Recognition Training Generic
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Hazard identification
Hazard identificationHazard identification
Hazard identification
 
Safety: Hazard Identification and Recognition Program
Safety: Hazard Identification and Recognition ProgramSafety: Hazard Identification and Recognition Program
Safety: Hazard Identification and Recognition Program
 
إدارة المخاطر
إدارة المخاطرإدارة المخاطر
إدارة المخاطر
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safety
 

Similar to Risk assessment Presentation by Affygility Solutions

implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
zeidali3
 

Similar to Risk assessment Presentation by Affygility Solutions (20)

Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedKeeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
ICH Q9 Quality Risk Management
ICH Q9 Quality Risk ManagementICH Q9 Quality Risk Management
ICH Q9 Quality Risk Management
 
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
 
Understanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesUnderstanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical Devices
 
module_1.pptx
module_1.pptxmodule_1.pptx
module_1.pptx
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
ISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk RequirementsISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk Requirements
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Risk assessment Presentation by Affygility Solutions

  • 1. Risk  Assessments   The  Forgo1en  Art   #riskapi   1  
  • 2. Presenta7on  Overview   Introduc7ons   What  is  Risk?   Overview  of  the  Risk  Assessment  Process   Governmental  regula7ons  and  standards   requiring  risk  assessments   •  Types  of  risk  assessment  methodologies   •  Why  is  this  important?   •  Risk  assessments  as  part  of  a  potent  compound   safety  program   •  •  •  •  2  
  • 5. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   5  
  • 7. Risk Assessment Attempts to Answer •  What can happen and why? •  What are the consequences? •  What is the probability of their future occurrence? •  Are there any factors that mitigate the consequence of the risk or that reduce the probability of the risk? •  Is the level of risk tolerable or acceptable? 7  
  • 10. ’50s  –  ‘60s  Minuteman  ICBMs   History   •  1947:  “Engineering  for  Safety”  paper   presented  at  the  Ins7tute  for  Aeronau7cal   Science   •  1950  –  1960:  Minuteman  ICBM   •  NASA   •  Nuclear  reactors   10  
  • 13. Governmental Regs & Standards 13  
  • 14. OSHA’s  Process  Safety  Management   Governmental  Regula7ons  and   Standards  Requiring  Risk  Assessments   •  OSHA’s  Process  Safety  Management  of  Highly  Hazardous   Chemicals:  29  CFR  1910.119(e)   •  OSHA’s  Voluntary  Protec7on  Program   •  EPA’s  Risk  Management  Plan  Standard:  40  CFR  68.67   •  UK’s  The  Management  of  Health  and  Safety  at  Work  Regula7ons   1999  Chapter  3   •  ANSI/AIHA  Z10-­‐2012  Occupa7onal  Health  and  Safety  Management   Systems   •  IEC/FDIS  31010:  Risk  Management  –  Risk  Assessment  Techniques   •  BS  OHSAS  18001:  Occupa7onal  health  and  safety  management   systems   •  MIL-­‐STD-­‐882E   14  
  • 15. EPA’s  Risk  Management  Plan   Governmental  Regula7ons  and   Standards  Requiring  Risk  Assessments   •  OSHA’s  Process  Safety  Management  of  Highly  Hazardous   Chemicals:  29  CFR  1910.119(e)   •  OSHA’s  Voluntary  Protec7on  Program   •  EPA’s  Risk  Management  Plan  Standard:  40  CFR  68.67   •  UK’s  The  Management  of  Health  and  Safety  at  Work  Regula7ons   1999  Chapter  3   •  ANSI/AIHA  Z10-­‐2012  Occupa7onal  Health  and  Safety  Management   Systems   •  IEC/FDIS  31010:  Risk  Management  –  Risk  Assessment  Techniques   •  BS  OHSAS  18001:  Occupa7onal  health  and  safety  management   systems   •  MIL-­‐STD-­‐882E   15  
  • 16. 16  
  • 17. 17  
  • 18. 18  
  • 19. 19  
  • 20. 20  
  • 21. Risk Assessments Gone Bad! 21  
  • 22. 22  
  • 23. 23  
  • 24. 24  
  • 25. 25  
  • 26. Risk = Hazard X Probability 26  
  • 27. Benefits of Risk Assessments •  Compliance with regulatory, customer, and internally derived requirements. •  Adequate identification of potential exposure risks prior to the design or operation. •  Early identification of the effects of engineering or operational decisions. •  May minimize the need for industrial hygiene monitoring for similar operations. 27  
  • 28. Types of Risks Assessments 28  
  • 30. 30  
  • 32. 32  
  • 34. 34  
  • 35. 35  
  • 36. 36
  • 38. Introducing OEL Fastrac™ •  High quality OEL monographs •  Browse or search our online catalog •  Order online •  Instant download Go to oelfastrac.com to place an order 38
  • 39. Affytrac QEA tool •  Perform qualitative exposure assessments •  Extremely flexible 39
  • 40. Follow  Affygility   dcalhoun@affygility.com   twi1er.com/affygility   h1p://www.linkedin.com/in/affygilitysolu7ons   facebook.com/affygilitysolu7ons   Search “Google+ Affygility Solutions Go  affygility.com/podcasts  or  go  to  iTunes  and  search  for  “Biopharma  EHS   40
  • 41. 30 seconds 2 minutes till start 41
  • 42. 42
  • 43. 43
  • 44. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   44  
  • 45. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   45  
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   50  
  • 51. 51  
  • 52. 52  
  • 53. 53  
  • 54. 54  
  • 55. 55  
  • 56. 56  
  • 57. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   57  
  • 58. 58  
  • 59. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   59  
  • 60. 60  
  • 61. 61  
  • 62. 62  
  • 63. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   63  
  • 64. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   64  
  • 65. 65  
  • 66. 66  
  • 67. 67  
  • 68. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   68  
  • 69. 69  
  • 70. 70  
  • 71. 71  
  • 72. 72  
  • 73. 73  
  • 74. 74  
  • 75. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   75  
  • 76. 76  
  • 77. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   77  
  • 78. 78  
  • 79. 79
  • 80. Risk = Hazard X Probability 80  
  • 81. Follow  Affygility   dcalhoun@affygility.com   twi1er.com/affygility   h1p://www.linkedin.com/in/affygilitysolu7ons   facebook.com/affygilitysolu7ons   Search  “Google+  Affygility  Solu7ons   Go  affygility.com/podcasts  or  go  to  iTunes  and  search  for  “Biopharma  EHS   81