Skip to main content

What is a risk assessment?

“….a careful examination of what, in your work, could cause harm to people, so that you can weigh up whether  you have taken enough precautions or should do more to prevent harm….”
Why do a risk assessment?
A risk assessment will protect your workers and your business, as well as complying with law
A person from your organisation needs to attend risk assessment training as it will ensure that this person is competent within your organisation and will gain abilities such as hazard identification, ability to categorise and evaluate risk(s). These abilities will allow a ‘suitable and sufficient’ risk assessment to be conducted within your own organisation.
 How to do a risk assessment
There are no fixed rules on how a risk assessment should be carried out, but there are a few general principles that should be followed.
Five steps to risk assessment can be followed to ensure that your risk assessment is carried out correctly, these five steps are:
1.     Identify the hazards
2.     Decide who might be harmed and how
3.     Evaluate the risks and decide on control measures
4.     Record your findings and implement them
5.     Review your assessment and update if necessary
Step 1: Identify the hazards
In order to identify hazards you need to understand the difference between a ‘hazard’ and ‘risk’. A hazard is ‘something with the potential to cause harm’ and a risk is ‘the likelihood of that potential harm being realised’.
Hazards can be identified by using a number of different techniques such as walking round the workplace, or asking your employees.
There are many “assets” at risk from hazards. First and foremost, injuries to people should be the first consideration of the risk assessment. Hazard scenarios that could cause significant injuries should be highlighted to ensure that appropriate emergency plans are in place. Many other physical assets may be at risk. These include buildings, information technology, utility systems, machinery, raw materials and finished goods. The potential for environmental impact should also be considered. Consider the impact an incident could have on your relationships with customers, the surrounding community and other stakeholders. Consider situations that would cause customers to lose confidence in your organization and its products or services.
As you conduct the risk assessment, look for vulnerabilities—weaknesses—that would make an asset more susceptible to damage from a hazard. Vulnerabilities include deficiencies in building construction, process systems, security, protection systems and loss prevention programs. They contribute to the severity of damage when an incident occurs. For example, a building without a fire sprinkler system could burn to the ground while a building with a properly designed, installed and maintained fire sprinkler system would suffer limited fire damage.
The impacts from hazards can be reduced by investing in mitigation. If there is a potential for significant impacts, then creating a mitigation strategy should be a high priority.

Risk Assesment process diagram
Step 2: Decide who might be harmed and how
Once you have identified a number of hazards you need to understand who might be harmed and how, such as ‘people working in the warehouse’, or members of the public.
Step 3: Evaluate the risks and decide on control measures
After ‘identifying the hazards’ and ‘deciding who might be harmed and how’ you are then required to protect the people from harm. The hazards can either be removed completely or the risks controlled so that the injury is unlikely.
Step 4: Record your findings
Your findings should be written down it’s a legal requirement where there are 5 or more employees; and by recording the findings it shows that you have identified the hazards, decided who could be harmed and how, and also shows how you plan to eliminate the risks and hazards.
Step 5: Review your assessment and update as and when necessary
You should never forget that few workplaces stay the same and as a result this risk assessment should be reviewed and updated when required.

Comments

Popular posts from this blog

Black swan

A  black swan event  is an incident that occurs randomly and unexpectedly and has wide-spread ramifications. The event is usually followed with reflection and a flawed rationalization that it was inevitable. The phrase illustrates the frailty of inductive reasoning and the danger of making sweeping generalizations from limited observations. The term came from the idea that if a man saw a thousand swans and they were all white, he might logically conclude that all swans are white. The flaw in his logic is that even when the premises are true, the conclusion can still be false. In other words, just because the man has never seen a black swan, it does not mean they do not exist. As Dutch explorers discovered in 1697, black swans are simply outliers -- rare birds, unknown to Europeans until Willem de Vlamingh and his crew visited Australia. Statistician Nassim Nicholas Taleb uses the phrase black swan as a metaphor for how humans deal with unpredictable events in his 2007...

A Graphics Processing Unit (GPU)

A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images. A GPU may be found integrated with a central processing unit (CPU) on the same circuit, on a graphics card or in the motherboard of a personal computer or server. In the early days of computing, the CPU performed these calculations. As more graphics-intensive applications such as AutoCAD were developed; however, their demands put strain on the CPU and degraded performance. GPUs came about as a way to offload those tasks from CPUs, freeing up their processing power. NVIDIA, AMD, Intel and ARM are some of the major players in the GPU market. GPU vs. CPU A graphics processing unit is able to render images more quickly than a central processing unit because of its parallel processing architecture, which allows it to perform multiple calculations at the same time. A single CPU does not have this capability, although multi...

6G (sixth-generation wireless)

6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency. One of the goals of the 6G Internet will be to support one micro-second latency communications, representing 1,000 times faster -- or 1/1000th the latency -- than one millisecond throughput. The 6G technology market is expected to facilitate large improvements in the areas of imaging, presence technology and location awareness. Working in conjunction with AI, the computational infrastructure of 6G will be able to autonomously determine the best location for computing to occur; this includes decisions about data storage, processing and sharing.  Advantages of 6G over 5G 6G is expected to support 1 terabyte per second (Tbps) speeds. This level of capacity and latency will be unprecedented and wi...