Week 3 and 4 - Identify, Assess and Treat Risks

Cards (16)

  • What is the first step in the risk management process?
    Set the scope, context and criteria
  • What are the 3 activities that comprise risk assessment? List them in the order that they should be conducted.
    1. Risk Identification
    2. Risk Analysis
    3. Risk Evaluation
  • What are the three activities that comprise risk treatment in the extended version of the risk management process?
    1. Treatment Identification
    2. Control Analysis
    3. Implementation Assurance
  • State one example of a hazard identification and analysis technique
    Examples include:
    • Hazard identification (HAZID)
    • Process or Preliminary Hazard Analysis (PHA)
    • Job Hazard Analysis (JHA)
  • What does HAZID and analysis techniques include? List the four.
    1. Identify the hazards which could cause harm to the assets that matter
    2. Identify the threats which are scenarios that can release a hazard (e.g. corrosion, lightning)
    3. Describe the consequences which are the possible outcomes that might result from an unwanted scenario where a threat has released a hazard (i.e. loss of assets, personal injury, etc.)
    4. Assess the level of harm (impact) that might result if these hazards are not eliminated, substituted or controlled.
  • State one example of a process deviation analysis technique.
    Hazard and Operability study (HAZOP) - a systematic and structured examination of an operational process or procedure
  • State one example of a plant failure analysis technique.
    Failure Modes Effects and Criticality Analysis (FMECA)
  • What is ALARP? Give an illustrative example. 

    ALARP - As Low As Reasonably Practicable
    In practice, this means that the operator has to show through reasoned and supported arguments thtat there are no other practicable options that could reasonably be adopted to reduce risks further
  • List the hierarchy of risk treatment controls in order of increasing effectiveness.
    1. Implement controls that i) Reduce likelihood of occurrence of unwanted events; ii) Mitigate consequences of unwanted events
    2. Eliminate threats that release hazards (design them out)
    3. Reduce exposure occurrences (isolate hazard, reduce number and duration that risk receptors are exposed to hazard)
    4. Substitute hazard (replace with something better)
    5. Eliminate hazard (design it out)
  • What is the name of the controls on the left side of the bow tie?
    Arresting Controls
  • What is the name of the controls on the right side of the bow tie?
    Mitigating Controls
  • What is the difference between a basic and advanced bow tie?
    Basic and Advanced - Threats, Arresting Controls, Unwanted Event, Mitigating Controls, Consequences

    Advanced - Erosion factor with CAMS activity to address
    *Erosion factors are factors that can cause a control's performance to decline over time and/or fail thereby undermining the effectiveness of the controls
  • What is the role of a CAMS?

    CAMS (Control Assurance Management System) which describes the activities required to monitor, maintain and improve control performance
  • State three examples of control erosion factors
    • For physical controls - wear and tear
    • For technological system controls - Failure of services (e.g. electricity, instrument air)
    • Human action - (Normalisation of deviance)
  • List the three types of arresting controls in order of their intervention time (decreasing)
    • Controls that minimise/eliminate exposure to a threat (Years/months/days)
    • Controls that detect and deflect threats (Minutes/seconds)
    • Last chance intervention controls (Seconds/milliseconds)
  • List the three types of mitigating controls in order of their intervention time (increasing)
    • Protection controls that provide instantaneous protection against harm (Milliseconds/seconds)
    • Isolation/containment controls that minimise damage to people, assets, environment production and reputation (second/minutes/hours)
    • Recovery/restoration controls which ensure system is returned to safe options (Minutes/hours/days)