SlideShare a Scribd company logo
1 of 81
Download to read offline
Risk	
  Assessments	
  

The	
  Forgo1en	
  Art	
  
#riskapi	
  

1	
  
Presenta7on	
  Overview	
  
Introduc7ons	
  
What	
  is	
  Risk?	
  
Overview	
  of	
  the	
  Risk	
  Assessment	
  Process	
  
Governmental	
  regula7ons	
  and	
  standards	
  
requiring	
  risk	
  assessments	
  
•  Types	
  of	
  risk	
  assessment	
  methodologies	
  
•  Why	
  is	
  this	
  important?	
  
•  Risk	
  assessments	
  as	
  part	
  of	
  a	
  potent	
  compound	
  
safety	
  program	
  
• 
• 
• 
• 

2	
  
What is Risk?

3	
  
Risk = _________

4	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

5	
  
6	
  
Risk Assessment Attempts to Answer

•  What can happen and why?
•  What are the consequences?
•  What is the probability of their
future occurrence?
•  Are there any factors that mitigate
the consequence of the risk or
that reduce the probability of the
risk?
•  Is the level of risk tolerable or
acceptable?
7	
  
History

8	
  
1947

9	
  
’50s	
  –	
  ‘60s	
  Minuteman	
  ICBMs	
  

History	
  

•  1947:	
  “Engineering	
  for	
  Safety”	
  paper	
  
presented	
  at	
  the	
  Ins7tute	
  for	
  Aeronau7cal	
  
Science	
  
•  1950	
  –	
  1960:	
  Minuteman	
  ICBM	
  
•  NASA	
  
•  Nuclear	
  reactors	
  

10	
  
NASA	
  

11	
  
Nuclear	
  Reactors	
  

12	
  
Governmental Regs & Standards

13	
  
OSHA’s	
  Process	
  Safety	
  Management	
  

Governmental	
  Regula7ons	
  and	
  
Standards	
  Requiring	
  Risk	
  Assessments	
  
•  OSHA’s	
  Process	
  Safety	
  Management	
  of	
  Highly	
  Hazardous	
  
Chemicals:	
  29	
  CFR	
  1910.119(e)	
  
•  OSHA’s	
  Voluntary	
  Protec7on	
  Program	
  
•  EPA’s	
  Risk	
  Management	
  Plan	
  Standard:	
  40	
  CFR	
  68.67	
  
•  UK’s	
  The	
  Management	
  of	
  Health	
  and	
  Safety	
  at	
  Work	
  Regula7ons	
  
1999	
  Chapter	
  3	
  
•  ANSI/AIHA	
  Z10-­‐2012	
  Occupa7onal	
  Health	
  and	
  Safety	
  Management	
  
Systems	
  
•  IEC/FDIS	
  31010:	
  Risk	
  Management	
  –	
  Risk	
  Assessment	
  Techniques	
  
•  BS	
  OHSAS	
  18001:	
  Occupa7onal	
  health	
  and	
  safety	
  management	
  
systems	
  
•  MIL-­‐STD-­‐882E	
  

14	
  
EPA’s	
  Risk	
  Management	
  Plan	
  

Governmental	
  Regula7ons	
  and	
  
Standards	
  Requiring	
  Risk	
  Assessments	
  
•  OSHA’s	
  Process	
  Safety	
  Management	
  of	
  Highly	
  Hazardous	
  
Chemicals:	
  29	
  CFR	
  1910.119(e)	
  
•  OSHA’s	
  Voluntary	
  Protec7on	
  Program	
  
•  EPA’s	
  Risk	
  Management	
  Plan	
  Standard:	
  40	
  CFR	
  68.67	
  
•  UK’s	
  The	
  Management	
  of	
  Health	
  and	
  Safety	
  at	
  Work	
  Regula7ons	
  
1999	
  Chapter	
  3	
  
•  ANSI/AIHA	
  Z10-­‐2012	
  Occupa7onal	
  Health	
  and	
  Safety	
  Management	
  
Systems	
  
•  IEC/FDIS	
  31010:	
  Risk	
  Management	
  –	
  Risk	
  Assessment	
  Techniques	
  
•  BS	
  OHSAS	
  18001:	
  Occupa7onal	
  health	
  and	
  safety	
  management	
  
systems	
  
•  MIL-­‐STD-­‐882E	
  

15	
  
16	
  
17	
  
18	
  
19	
  
20	
  
Risk Assessments Gone Bad!

21	
  
22	
  
23	
  
24	
  
25	
  
Risk = Hazard X Probability

26	
  
Benefits of Risk
Assessments
•  Compliance with regulatory, customer,
and internally derived requirements.
•  Adequate identification of potential
exposure risks prior to the design or
operation.
•  Early identification of the effects of
engineering or operational decisions.
•  May minimize the need for industrial
hygiene monitoring for similar
operations.
27	
  
Types of Risks Assessments

28	
  
WHAT-­‐IF	
  
29	
  
30	
  
HAZOP	
  
31	
  
32	
  
Preliminary	
  Hazard	
  Analysis	
  
33	
  
34	
  
35	
  
36
BREAK

37
Introducing OEL Fastrac™
•  High quality OEL
monographs
•  Browse or search
our online catalog
•  Order online
•  Instant download

Go to oelfastrac.com to place an order

38
Affytrac QEA tool
•  Perform qualitative exposure assessments
•  Extremely flexible

39
Follow	
  Affygility	
  
dcalhoun@affygility.com	
  

twi1er.com/affygility	
  
h1p://www.linkedin.com/in/affygilitysolu7ons	
  
facebook.com/affygilitysolu7ons	
  

Search “Google+ Affygility Solutions

Go	
  affygility.com/podcasts	
  or	
  go	
  to	
  iTunes	
  and	
  search	
  for	
  “Biopharma	
  EHS	
  
40
30 seconds

2 minutes till start

41
42
43
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

44	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

45	
  
46
47
48
49
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

50	
  
51	
  
52	
  
53	
  
54	
  
55	
  
56	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

57	
  
58	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

59	
  
60	
  
61	
  
62	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

63	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

64	
  
65	
  
66	
  
67	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

68	
  
69	
  
70	
  
71	
  
72	
  
73	
  
74	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

75	
  
76	
  
Establish	
  the	
  Context	
  

Hazard	
  Iden7fica7on	
  
Communica7on	
  
&	
  
Consulta7on	
  

Probability	
  Determina7on	
  

Monitoring	
  
&	
  
Review	
  

Risk	
  Evalua7on	
  

Addi7onal	
  Controls?	
  

77	
  
78	
  
79
Risk = Hazard X Probability

80	
  
Follow	
  Affygility	
  
dcalhoun@affygility.com	
  

twi1er.com/affygility	
  
h1p://www.linkedin.com/in/affygilitysolu7ons	
  
facebook.com/affygilitysolu7ons	
  
Search	
  “Google+	
  Affygility	
  Solu7ons	
  
Go	
  affygility.com/podcasts	
  or	
  go	
  to	
  iTunes	
  and	
  search	
  for	
  “Biopharma	
  EHS	
  
81	
  

More Related Content

What's hot

P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.pptP-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.pptKrishna Yadav
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk managementhealthpoint
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysisSandip Sonawane
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesRoger Johnston
 
Risk Management
Risk ManagementRisk Management
Risk Managementysshah
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides SlideTeam
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementBiju Nair
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Association for Project Management
 
Kim sandhu
Kim sandhuKim sandhu
Kim sandhuNASAPMC
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesSlideTeam
 

What's hot (20)

P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.pptP-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
P-4 [14]=Ch.2=HIRA---(43)--Nov.2011.ppt
 
SIL.ppt
SIL.pptSIL.ppt
SIL.ppt
 
Risk management
Risk managementRisk management
Risk management
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysis
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk
RiskRisk
Risk
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
Where do risks (threats and opportunities) arise from?, presented by Lynn Sta...
 
LAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSISLAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSIS
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Kim sandhu
Kim sandhuKim sandhu
Kim sandhu
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation Slides
 
Risk management case study
Risk management case studyRisk management case study
Risk management case study
 

Viewers also liked

Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelinesHaris Tahir
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment trainingBrian Larkin
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentationmmagario
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentTechnoSysCon
 
Dynamic risk assessment lrg
Dynamic risk assessment lrgDynamic risk assessment lrg
Dynamic risk assessment lrgLance Grindley
 
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX projectMulti-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX projectGlobal Risk Forum GRFDavos
 
Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!Richard Duszczak
 
Hazard Recognition Training Generic
Hazard Recognition Training   GenericHazard Recognition Training   Generic
Hazard Recognition Training Genericaljingst
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safetyjchsafety
 

Viewers also liked (20)

Risk assessment principles and guidelines
Risk assessment principles and guidelinesRisk assessment principles and guidelines
Risk assessment principles and guidelines
 
Presentation risk assessment training
Presentation risk assessment trainingPresentation risk assessment training
Presentation risk assessment training
 
Risk Assessment and Reduction
Risk Assessment and ReductionRisk Assessment and Reduction
Risk Assessment and Reduction
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
OHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessmentOHSAS Hazard identification & Risk assessment
OHSAS Hazard identification & Risk assessment
 
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC 131024
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC  131024Lab'InSight Toxicological Risk Assessment présentation UNamur NNC  131024
Lab'InSight Toxicological Risk Assessment présentation UNamur NNC 131024
 
Dynamic risk assessment lrg
Dynamic risk assessment lrgDynamic risk assessment lrg
Dynamic risk assessment lrg
 
Flra training ppt
Flra training  pptFlra training  ppt
Flra training ppt
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX projectMulti-hazard and multi-risk assessment methods for Europe: the MATRIX project
Multi-hazard and multi-risk assessment methods for Europe: the MATRIX project
 
What are risk assessments
What are risk assessmentsWhat are risk assessments
What are risk assessments
 
Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!Health and Safety cartoons slideshow!
Health and Safety cartoons slideshow!
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Hazard Recognition Training Generic
Hazard Recognition Training   GenericHazard Recognition Training   Generic
Hazard Recognition Training Generic
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Hazard identification
Hazard identificationHazard identification
Hazard identification
 
Safety: Hazard Identification and Recognition Program
Safety: Hazard Identification and Recognition ProgramSafety: Hazard Identification and Recognition Program
Safety: Hazard Identification and Recognition Program
 
إدارة المخاطر
إدارة المخاطرإدارة المخاطر
إدارة المخاطر
 
Risk Assessment Training | JCH Safety
Risk Assessment Training | JCH SafetyRisk Assessment Training | JCH Safety
Risk Assessment Training | JCH Safety
 

Similar to Risk assessment Presentation by Affygility Solutions

QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304Robert Ginsberg
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk AnalysisUBMCanon
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Luis Atencio
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...Cam Fulton
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisEvan Francen
 
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedKeeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedLife Sciences Network marcus evans
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdfdotco
 
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptxzeidali3
 
Understanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesUnderstanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesKeerthi Gunasekaran
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
ISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk RequirementsISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk RequirementsMasterControl
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Greenlight Guru
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment KateKazhan
 

Similar to Risk assessment Presentation by Affygility Solutions (20)

Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
Monica Caballero, risk management in times of COVID 19 and beyond, SIGMA 10 M...
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedKeeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
ICH Q9 Quality Risk Management
ICH Q9 Quality Risk ManagementICH Q9 Quality Risk Management
ICH Q9 Quality Risk Management
 
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
 
Understanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesUnderstanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical Devices
 
module_1.pptx
module_1.pptxmodule_1.pptx
module_1.pptx
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
ISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk RequirementsISO 9001-2015: New Risk Requirements
ISO 9001-2015: New Risk Requirements
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment
 

Recently uploaded

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 

Recently uploaded (20)

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 

Risk assessment Presentation by Affygility Solutions

  • 1. Risk  Assessments   The  Forgo1en  Art   #riskapi   1  
  • 2. Presenta7on  Overview   Introduc7ons   What  is  Risk?   Overview  of  the  Risk  Assessment  Process   Governmental  regula7ons  and  standards   requiring  risk  assessments   •  Types  of  risk  assessment  methodologies   •  Why  is  this  important?   •  Risk  assessments  as  part  of  a  potent  compound   safety  program   •  •  •  •  2  
  • 5. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   5  
  • 7. Risk Assessment Attempts to Answer •  What can happen and why? •  What are the consequences? •  What is the probability of their future occurrence? •  Are there any factors that mitigate the consequence of the risk or that reduce the probability of the risk? •  Is the level of risk tolerable or acceptable? 7  
  • 10. ’50s  –  ‘60s  Minuteman  ICBMs   History   •  1947:  “Engineering  for  Safety”  paper   presented  at  the  Ins7tute  for  Aeronau7cal   Science   •  1950  –  1960:  Minuteman  ICBM   •  NASA   •  Nuclear  reactors   10  
  • 13. Governmental Regs & Standards 13  
  • 14. OSHA’s  Process  Safety  Management   Governmental  Regula7ons  and   Standards  Requiring  Risk  Assessments   •  OSHA’s  Process  Safety  Management  of  Highly  Hazardous   Chemicals:  29  CFR  1910.119(e)   •  OSHA’s  Voluntary  Protec7on  Program   •  EPA’s  Risk  Management  Plan  Standard:  40  CFR  68.67   •  UK’s  The  Management  of  Health  and  Safety  at  Work  Regula7ons   1999  Chapter  3   •  ANSI/AIHA  Z10-­‐2012  Occupa7onal  Health  and  Safety  Management   Systems   •  IEC/FDIS  31010:  Risk  Management  –  Risk  Assessment  Techniques   •  BS  OHSAS  18001:  Occupa7onal  health  and  safety  management   systems   •  MIL-­‐STD-­‐882E   14  
  • 15. EPA’s  Risk  Management  Plan   Governmental  Regula7ons  and   Standards  Requiring  Risk  Assessments   •  OSHA’s  Process  Safety  Management  of  Highly  Hazardous   Chemicals:  29  CFR  1910.119(e)   •  OSHA’s  Voluntary  Protec7on  Program   •  EPA’s  Risk  Management  Plan  Standard:  40  CFR  68.67   •  UK’s  The  Management  of  Health  and  Safety  at  Work  Regula7ons   1999  Chapter  3   •  ANSI/AIHA  Z10-­‐2012  Occupa7onal  Health  and  Safety  Management   Systems   •  IEC/FDIS  31010:  Risk  Management  –  Risk  Assessment  Techniques   •  BS  OHSAS  18001:  Occupa7onal  health  and  safety  management   systems   •  MIL-­‐STD-­‐882E   15  
  • 16. 16  
  • 17. 17  
  • 18. 18  
  • 19. 19  
  • 20. 20  
  • 21. Risk Assessments Gone Bad! 21  
  • 22. 22  
  • 23. 23  
  • 24. 24  
  • 25. 25  
  • 26. Risk = Hazard X Probability 26  
  • 27. Benefits of Risk Assessments •  Compliance with regulatory, customer, and internally derived requirements. •  Adequate identification of potential exposure risks prior to the design or operation. •  Early identification of the effects of engineering or operational decisions. •  May minimize the need for industrial hygiene monitoring for similar operations. 27  
  • 28. Types of Risks Assessments 28  
  • 30. 30  
  • 32. 32  
  • 34. 34  
  • 35. 35  
  • 36. 36
  • 38. Introducing OEL Fastrac™ •  High quality OEL monographs •  Browse or search our online catalog •  Order online •  Instant download Go to oelfastrac.com to place an order 38
  • 39. Affytrac QEA tool •  Perform qualitative exposure assessments •  Extremely flexible 39
  • 40. Follow  Affygility   dcalhoun@affygility.com   twi1er.com/affygility   h1p://www.linkedin.com/in/affygilitysolu7ons   facebook.com/affygilitysolu7ons   Search “Google+ Affygility Solutions Go  affygility.com/podcasts  or  go  to  iTunes  and  search  for  “Biopharma  EHS   40
  • 41. 30 seconds 2 minutes till start 41
  • 42. 42
  • 43. 43
  • 44. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   44  
  • 45. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   45  
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   50  
  • 51. 51  
  • 52. 52  
  • 53. 53  
  • 54. 54  
  • 55. 55  
  • 56. 56  
  • 57. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   57  
  • 58. 58  
  • 59. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   59  
  • 60. 60  
  • 61. 61  
  • 62. 62  
  • 63. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   63  
  • 64. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   64  
  • 65. 65  
  • 66. 66  
  • 67. 67  
  • 68. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   68  
  • 69. 69  
  • 70. 70  
  • 71. 71  
  • 72. 72  
  • 73. 73  
  • 74. 74  
  • 75. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   75  
  • 76. 76  
  • 77. Establish  the  Context   Hazard  Iden7fica7on   Communica7on   &   Consulta7on   Probability  Determina7on   Monitoring   &   Review   Risk  Evalua7on   Addi7onal  Controls?   77  
  • 78. 78  
  • 79. 79
  • 80. Risk = Hazard X Probability 80  
  • 81. Follow  Affygility   dcalhoun@affygility.com   twi1er.com/affygility   h1p://www.linkedin.com/in/affygilitysolu7ons   facebook.com/affygilitysolu7ons   Search  “Google+  Affygility  Solu7ons   Go  affygility.com/podcasts  or  go  to  iTunes  and  search  for  “Biopharma  EHS   81