Skip to Content
Advanced Safety Management, 3rd Edition
book

Advanced Safety Management, 3rd Edition

by Fred A. Manuele
April 2020
Intermediate to advanced
560 pages
15h 33m
English
Wiley
Content preview from Advanced Safety Management, 3rd Edition

CHAPTER 24ON SYSTEM SAFETY

Identifying and analyzing hazards and making risk assessments as early as practicable in the design and redesign processes, and additionally as needed, are the bases on which system safety is built. For system safety initiatives, the outcome is to be having acceptable risk levels.

Consider these selected sections in Z10.0 as they relate to hazards, risks, risk assessments, the design process, and acceptable risks. These citations are abbreviated substantially. There are close to identical provisions in 45001.

  • Section 6.2 – Assessment and Prioritization – the process shall assess the level of risk for identified hazards; establish priorities based on factors such as the level of risk; and identify factors related to system deficiencies that lead to hazards and risks.
  • Section 8.2 – Identification of OHSMS Issues: Processes shall be in place for the identification of hazards.
  • Section 8.3 – Risk Assessment: The organization shall establish and implement a risk assessment process(es) appropriate to the nature of hazards and level of risk.
  • Section 8.4 – Hierarchy of Controls: The organization shall establish a process for achieving feasible risk reduction based upon a preferred and given order of controls.
  • Section 8.5 – Design Review and Management of Change: The organization shall establish a process to identify and take appropriate steps to prevent or otherwise control hazards at the design and redesign stages.

There is a direct relationship between ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Computer and Information Security Handbook, 3rd Edition

Computer and Information Security Handbook, 3rd Edition

John R. Vacca
Information Security Management Principles, 3rd Edition

Information Security Management Principles, 3rd Edition

Andy Taylor, David Alexander, Amanda Finch, David Sutton

Publisher Resources

ISBN: 9781119605416Purchase Link