Guidelines for Analyzing and Managing the Security by CCPS (Center for Chemical Process Safety)

By CCPS (Center for Chemical Process Safety)

This new initiative demonstrates a technique and instruments for dealing with the safety vulnerability of web sites that produce and deal with chemical substances, petroleum items, prescription drugs, and similar fabrics resembling fertilizers and water remedy chemical substances. contains: company screening; web site screening; safeguard research; safety vulnerability review; motion making plans and monitoring.

Show description

Read Online or Download Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites PDF

Similar weapons & warfare books

Gulf War and Health: Volume 2. Insecticides and Solvents

Gulf conflict and wellbeing and fitness, quantity 2, is the second one in a sequence of congressionally-mandated stories via the Institute of medication that gives a accomplished overview of the to be had clinical literature on power overall healthiness results of publicity to convinced organic, chemical, and environmental brokers linked to the Gulf battle.

The Dirty Dozen: Toxic Chemicals and the Earth's Future

40 years after the ebook of Rachel Carson's Silent Spring, this crucial examine examines the heritage, commercial makes use of, and damaging results of the twelve most typically used organochloride chemical substances. All were absolutely or partly banned by way of the Stockholm Protocol, a world treaty signed by way of approximately a hundred and twenty nations in December 2000.

Death By Mustard Gas: How Military Secrecy and Lost Weapons Can Kill

In 1943 a most sensible mystery consignment of chemical guns, together with lethal mustard gasoline, arrived in Australia by way of send. yet there has been an issue - it was once leaking. army gurus speedy realised this yet, within the pursuits of secrecy, despatched unprotected and unsuspecting wharf labourers right into a deadly atmosphere.

Chemical Warfare in Australia: Australia's Involvement in Chemical Warfare 1914 - Today (Australian Army History Collection)

This meticulously researched ebook finds a sixty yr mystery. because the eastern swept south in the direction of Australia in past due 1941, they carried chemical guns, already used with lethal impression in China. compelled to counter the chemical battle danger, Australia covertly imported a million chemical guns - together with sixteen kinds of mustard gasoline - and concealed them in tunnels and different websites round the kingdom.

Extra resources for Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites

Example text

Gov/ceppo) 4. gov) 5. org/ ccpssecurity) 6. 1: Copyright © 2003 by the American Institute of Chemical Engineers. All rights reserved. 1 Classification of Assets 121 Category List Types Primary Consequences Primary Threat/ Vulnerability Primary Countermeasures Strategy A PSM, RMP Category A chemicals are, in general, inhalation poisons. Examples include chlorine and anhydrous ammonia. Release from containment causing onsite and offsite fatalities Attack of process from outsider or insider The primary security objective in regards to these chemicals is to protect them against intentional release, especially on a large scale.

These can be effective countermeasures and the tank is certainly at a lower risk from a vehicle attack. By comparison, the scenario-based approach, which will be further explained in the following section, might take the gross level scenario of an explosive charge in a vehicle affecting a storage tank and expand that to include a wide variety of ways that may occur. In the end, both methods may come to the same general conclusion on level of risk and the countermeasures chosen may be equal. 62 Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites This can provide a consistent performance standard for similar potential targets, while allowing for a great deal of flexibility in the selection of specific security and/or mitigation infrastructure and procedures.

It may be that some targets of very high value and very high consequence may be more of interest to the SVA team, and that studying them in a scenario-based approach may be required. In CCPS® Security Vulnerability Analysis (SVA) Methodology 61 any case, it is anticipated that both approaches follow the same preliminary steps and have the same goals in mind. 2a—Asset-Based Approach to Vulnerability Analysis The asset-based approach is a “top-down” approach. For the assetbased approach, the details of numerous scenarios to cause those events are not further documented.

Download PDF sample

Rated 4.87 of 5 – based on 41 votes