0% found this document useful (0 votes)
63 views12 pages

Network Basics for IT Professionals

CNS and OHS review

Uploaded by

pamymendiola1305
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views12 pages

Network Basics for IT Professionals

CNS and OHS review

Uploaded by

pamymendiola1305
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Data and Digital Communication Refresher

Elaborate the Difference BANDWIDTH vs. THROUGHPUT Encoding Message sent across the network will be into bits
BANDWIDTH Is the capacity of a medium to carry data. Bandwidth is by the sending host. Each bit is encoded
typically measured in the number of bits that (theoretically) can be sent depending on the network media which the bits are
across the media in a second. transmitted. The destination host receive and
Common bandwidth measurements are as follows: decodes the signal to interpret the message
• Thousands of bits per second (Kbps)
• Millions of bits per second (Mbps) Encapsulation The message transmitted on a network must
• Billions of bits per second (Gbps) include a header that contains addressing
Physical media properties, current technologies, and the laws of physics all information that identifies the source and
play a role in determining available bandwidth. destination host; else, it cannot be delivered.
THROUGHPUT
The measure of the transfer of bits across the media over a given period of Message Some messages requires an acknowledgement
time. It can be influence by: Pattern before the next message can be sent, this type of
• The amount of data being sent and received over the connection request/response pattern is a common aspect of
• The types of data being transmitted many networking protocols.
• The latency created by the number of network devices encountered
between source and destination Network Defense
Latency refers to the amount of time, including delays, for data to travel Our Goal is providing order
from one given point to another. The 3 key areas of Cyber Security that needs to be protected.
Network Infrastructure and its categories Confidentiality
Information must not be exposed or accessed by any unauthorized
individual.
Integrity Information must be consistent and correct unless an authorized
change was made.
Availability Information must be accessible when and where it is needed.
Assets, Vulnerabilities, Threats
In order keep our network secure. We must know these 3 key elements
• Assets - Anything of value to an organization that must be protected
including servers, infrastructure devices, end devices, and the greatest
asset, data.
• Vulnerabilities - A weakness in a system or its design that could be
exploited by a threat actor.
• Threats - Any potential danger to an asset.

Elaborate the difference of use


Cross-Over Cable vs. Straight-through Cable
Straight-through Cable - Use to connect different devices e.g. End
Devices <-> Intermediary devices

Cross-Over Cable Use to connect same devices e.g. End Devices <-> End
Devices

5G Network The latest network in the cellular wireless technology. Provides


faster download and upload speeds, lower latency. Besides smartphone,
5G is also being utilized by internet enabled machines and tools.
• 1G – Voice Calls
• 2G – Short Messaging System (SMS), Multimedia Messaging System
(MMS)
• 3G – Mobile Network
• 4G – Faster mobile network than 3G to access to heavy multimedia
contents online

Identify Assets
The assets constitute the attack surface that threat actors could target.
These assets must be inventoried and assessed for the level of protection
needed to thwart potential attacks.
Asset management consists of inventorying all assets, and then
developing and implementing policies and procedures to protect

Communication Protocols: Method, Language, Confirmation


Protocols are required for computers to properly communicate across the
network. In both a wired and wireless environment, a local network is
defined as an area where all hosts must "speak the same language", which,
in computer terms means they must "share a common protocol".
Networking protocols define many aspects of communication over the local
network:

Protocol Description
Characteristics

Message When message is sent, it must use a specific


Format format or structure. Message format depends on
the type of message and the channel.

Message Size The rule that govern the size of the piece
communicated across the network is very strict.
When a long message is sent, it may be necessary
to break the message in smaller pieces for
reliability purpose.

Timing Timing determines the speed at which the bits are them.
transmitted across the network. Examples:
A retail business may store customer credit card information. • Insider attack on the system - A bank employee finds a flaw in the
An engineering firm will store competition-sensitive designs and software. system from which to mount an attack.
A bank will store customer data, account information, and other sensitive • Data input errors - A user inputs incorrect data or makes incorrect
financial information. transaction requests.
Steps in Asset Classification • Data center destruction - A cataclysmic event severely damages or
1. Categorize your assets destroys the data center.
2. List, Identify the owner and custody of the asset.
3. Determine the Criteria for classification

4. Adopt a consistent way of identifying information to ensure uniform


protection and easier monitoring.

Asset Standardization
Threat Detection and Prevention
• Asset standards identify specific hardware and software products used by
an organization.
• When a failure occurs, prompt action helps to maintain both access and
security. If an organization does not standardize its hardware selection,
personnel may need to scramble to find a replacement component.
• Non-standard environments require more expertise to manage, and they
increase the cost of maintenance contracts and inventory.
Asset Lifecycle Stages

Endpoint Detection and Response


Endpoint Protection +
Not just the usual Anti-Malware software.
Dynamic Detection
Performs pattern and behavioral detection to flag suspicious activity and
indicators of compromised
Network Monitoring
Can also monitor unusual and anomalous network traffic
Procurement Intrusion Prevention System (IPS)
The organization purchases the assets based on the needs identified from Traffic-Based
data gathered to justify the purchase and be added to inventory. Blocks malicious traffic coming from external network.
Deployment VS IDS
The asset is assembled and inspected to check for defects or other Intrusion Detection Systems (IDS) functions the same but does not block its
problems. Staff perform tests and install tags or barcodes for tracking detected malicious traffic
purposes. Then, it will be moved from inventory to in-use Signature Updates
Utilization Same as AV, IPS also needs to update for new signatures
The asset’s performance is continuously checked. Upgrades, patch fixes,
new license purchases and compliance audits are all part of the utilization
stage
Maintenance Security Patches and Updates
Maintenance helps to extend an asset’s productive life. Staff may modify or DEFENSE-IN-DEPTH
upgrade the asset
Disposal
At the end of the asset’s productive life, it must be disposed of. All data
must be wiped from the asset. Any parts that can cause an environmental
hazard must be disposed of according to local guidelines.
ASSESSMENT 1: Asset Life Cycle Stages
1. Checking in a new delivery of laptops = PROCUREMENT
2. Adding barcodes to new equipment = DEPLOYMENT
3. Rolling out software patches = UTILIZATION
4. Updating outdated assets = MAINTENANCE
5. Taking broken equipment out of commission = DISPOSAL
Vulnerabilities
Threat identification provides an organization with a list of likely threats for
a particular environment.
Typical questions can be:
• What are the possible vulnerabilities of a system? DEFENSE-IN-DEPTH: Onion Analogy
• Who may want to exploit those vulnerabilities to access specific A common analogy used to describe a defense-in-depth approach is called
information assets? “the security onion.”
• What are the consequences if system vulnerabilities are exploited, and A threat actor would have to peel away at a network’s defenses layer by
assets are lost layer in a manner similar to peeling an onion. Only after penetrating each
Threat Identification layer would the threat actor reach the target data or system.
• Internal system compromise - The attacker uses the exposed e-banking
servers to break into an internal bank system.
• Stolen customer data - An attacker steals the personal and financial data
of bank customers from the customer database.
• Phony transactions from an external server - An attacker alters the
code of the e-banking application and makes transactions by impersonating
a legitimate user.
• Phony transactions using a stolen customer PIN or smart card - An
attacker steals the identity of a customer and completes malicious
transactions from the compromised account.
=firewall
With the evolution of borderless networks, which vegetable is now used to
describe a defense-in-depth approach?
=artichoke
What is the benefit of a defense-in-depth approach?
=The effectiveness of the other security measures is not impacted
when a security mechanism fails.

System and Network Defense (pt1)


Physical Security
Fencing and Physical Barriers
They are the outermost layer of defense and the most visible. All physical
DEFENSE-IN-DEPTH: Artichoke Analogy barriers should meet specific design requirements and material
The changing landscape of networking, such as the evolution of borderless specifications.
networks, has changed this analogy to the “security artichoke”, which Physical Barrier typical components:
benefits the threat actor. • Perimeter fence system
Threat actors no longer have to peel away each layer. They only need to • Security gate system
remove certain “artichoke leaves.” The bonus is that each “leaf” of the • Bollards
network may reveal sensitive data that is not well secured. • Vehicle entry barriers
• Guard shelter
• Fencing
Fence is barrier that encloses secure areas and designated boundaries.
Height guidelines are below
• 1-2 meters to deter casual trespassers
• 2.5 meters offers limited delay to an intruder
Vehicles should never be parked near a security fence, as this could assist
the intruder
Physical Security
Biometrics
physiological or behavioral characteristics of an individual, and there are
security practices based on identifying and granting access using
biometrics.
It can include measurements of the face, fingerprinthand geometry, iris,
retina, signature and voice.
DEFENSE-IN-DEPTH STRATEGIES The following factors must also be considered:
1. Layering - setting up different layers of protection, creating a barrier of •Accuracy
multiple defenses that work together to prevent attacks. •Speed or throughput rate
2. Limiting - access to data and information reduces the possibility of a •Acceptability to users
security threat. An organization should restrict access so that each user •Uniqueness of the biometric organ and action
only has the level of access required to do their job. •Resistance to counterfeiting
3. Diversity - The layers must be different so that if one layer is penetrated, •Reliability
the same technique will not work on all the others which would compromise •Data storage requirements
the whole system. •Enrollment time
4. Obscurity – Organization should not reveal any information that •Intrusiveness of the scan
cybercriminals can use to identify critical information e.g. Operating System The most important factors is accuracy, which is expressed in error types
(OS), type or make of equipment or software it uses. and rates.
5. Complexity – implementation of complex systems that are hard to Type I (False Rejection) error rejects a person that registers and is an
understand and troubleshoot, this may backfire. authorized user. It means that someone who should gain access is not
LOG FILES granted access.
A log records all events as they occur. Log entries make up a log file, with Type II (False acceptance ) errors allow entry to people who should not
each log entry containing all the information related to a specific even t have entry, meaning a cybercriminal can potentially gain access.
. The acceptance rate (%) is the rate at which a system accepts unenrolled
Security of the Network individuals or imposters as authentic users
The following network protocols transmit information in clear text and is It is the rate of Type II errors per total instances of granting permission.
subject to network sniffing. Network sniffing could also reveal credentials Badges and Access Logs
and content of documents and other files if they are sent via insecure Allows an individual to gain access to an area with automated entry points
protocols. Surveillance
Many physical access controls, including deterrent and detection systems,
Security of the Network: Wireshark ultimately rely on people to intervene and stop the actual attack or intrusion.
Video and electronic surveillance should be placed at all entrances, exits,
loading bays, stairwells and refuse collection areas.
Security of the Network The benefit of RFID asset tags is that they can track any asset that
Username:Z3VycGFydGFwQHBhdHJpb3RzLmlu physically leaves a secure area.
Password: cHVuamFiQDEyMw== Security guards are a great solution for access control requiring an
Access: https://www.base64decode.org/ instantaneous and appropriate response.
Governance Elements Security guards are a great solution for access control requiring an
Regulations and associated fines and penalties can be imposed by instantaneous and appropriate response.
governments at the national, regional or local level. ASSESSMENT
Standards cover a broad range of issues and ideas and may provide A message has been intercepted which suggests some cybercriminals are
assurance that an organization is operating with policies and procedures planning to access the server room while the surveillance cameras are
that support regulations and are widely accepted best practice down. They are already on the premises and are going to try to obtain
Policy is informed by applicable law(s) and specifies which standards and confidential information about @Apollo’s Clients.
guidelines the organization will follow: Which of the following physical security measures would be effective at
• Policy is broad, but not detailed; preventing this attack?
• Policies are often written at many levels across the organization. =A FINGERPRINT READER ON THE SERVER ROOM DOOR
• High-level governance policies are used by senior executives to shape =SECURITY GUARD
and control decision-making processes. =SWIPE CAR ACCESS TO THE SERVER ROOM
Procedures define the explicit, repeatable activities necessary to Application Security
accomplish a specific task or set of tasks. Stages of Application Development
They provide supporting data, decision criteria or explicit knowledge needed Developing and testing Software is developed and updated in a
to perform each task development environment, where it can be developed, tested and debugged
before being deployed.
Staging environments and Production By testing in a staging
environment, developers can verify that the software runs under the
ASSESSMENT required security settings before deploying to production
In a defense-in-depth approach, which three options must be identified to Provisioning and Deprovisioning Provisioning is the creation or updating
effectively defend a network against attacks? of software. Deprovisioning is its removal.
=asset that news protection
=threats to assets
=vulnerabilities Other Secure Practices
Which device in a layers defense-in-depth approach denies connections Code Signing helps prove that a piece of software is authentic.
initiated from untrusted networks to internal networks, but allows internal Executables designed to install and run on a device are digitally signed to
users within an organization to connect to untrusted networks? validate the author
Secure Cookies When your client interacts with a server, it sends an •Network risks
HTTP/S response that instructs a browser create 1 cookie which can be use •Jailbreaking and root
for future request Using secure cookies with HTTPS instead of HTTP to to •Sideloading
ensure encryption which protects the information stored on it. Safeguards to Mobile Devices
Application Security •Screen locks
– Managing Threats •Biometric authentication
Unauthorized access to data centers, computer room nd wiring closets •Context-aware authentication
• Implement policies, standards and procedures for staff and visitors to •Remote wiping
ensure the facilities are secure. •Full device encryption
Server and system downtime •GPS Tracking
• Develop a business continuity plan for critical applications to maintain Cybersecurity Resilience – High Availability
availability of operations describes systems designed to avoid downtime as much as possible.
• Develop a disaster recovery plan for critical applications and data. 3 Principles of High Availability
Network operating system software vulnerability Eliminating Single Points of Failure
• Develop a policy to address application software and operating system This principle defines that high availability systems starts with identifying all
updates system devices and components whose failure would result in system-wide
• Install patches and updates regularly failure.
Unauthorized access to systems Methods to eliminate single points of failure include:
• Use multi-factor authentication • replacing or removing hot stand-by devices,
• Monitor log files • redundant components and multiple connections or pathways.
Data loss Providing for Reliable Crossover
• Implement data classification standards Redundant power supplies, backup power systems and backup
• Implement backup procedures communications systems all provide for reliable crossover
Software development vulnerabilities Detecting Failures as They Occur
• Conduct software testing prior to launch The third principle is active device and system monitoring to detect many
Network Hardening: Service and Protocols types of events including system and device failures. Monitoring systems
• Secure Shell (SSH) is a protocol that provides a secure (encrypted) may even trigger the backup system in the case of failure
remote connection to a device. It is more secure due to strong encryption
rather than Telnet.
• Secure copy (SCP) securely transfers files between two remote systems.
SCP uses SSH for data transfer and authentication, ensuring the
authenticity and confidentiality of the data in transit.
ASSESSMENT
Can you identify which protocol is being used to govern communication
between devices in @Apollo’s network in the following examples?
The Finance team lead is transferring a customer payment file to a colleagu
who works from home
= Secure Copy (SCP)
A secretary in the new @Apollo office is sending an instant message about
travel arrangements to the office manager
= Transport Layer Security (TLS)
A learner is accessing an @Apollo remote Linux lab environment from a
tablet device
=Secure Shell (SSH)
Network Hardening: Segmentation
VLAN
provide a way to group devices within a local area network (LAN) and on
individual switches. VLANs are not the same as LANs: virtual LANs are
based on logical connections, while LANs are based on physical
connections. Individual ports on a switch can be assigned to a specific
VLAN.
Other ports can be used to physically interconnect switches and allow
multiple VLAN traffic between switches. These ports are called trunks
ZeroTrust
is an evolving design approach which recognizes that even the most robust
access control systems have their weaknesses.
• It adds defenses at the user, asset and data level, rather than relying on
perimeter defense.
• In the extreme, it insists that every process or action a user attempts to
take must be authenticated and authorized; the window of trust becomes
vanishingly small.

DEMILITARIZED ZONE (DMZ)


With a DMZ, host systems that are accessible through the firewall are
physically separated from the internal network by means of secured
switches or by using an additional firewall to control traffic between the web
server and the internal network.
Application DMZs (or semi-trusted networks) are frequently used today to
limit access to application servers to those networks or systems that have a
legitimate need to connect.
Hardening Wireless Devices and Phones
Mobile Device Management
A mobile device issued by an organization can contain both personal and
organizational data — it can be either:
• corporate-owned
• or corporate-owned personally enabled (COPE).
• An organization may also have a bringyour-own-device (BYOD) option.
Security and data protection policies need to be applied when there is
sensitive corporate information on a user’s device.
Content management An organization needs to consider the security risks
involved in using applications that share data — for example, Dropbox, Box,
Google Drive and iCloud. An identity-management security system can be
used to control what data a user can access.
Application management Whitelisting allows you to digitally sign
applications so that you can authorize which applications users can install.
This helps to ensure that installed applications come from a trusted source
Threats to Mobile Devices
Threats to mobile devices:
•Theft
•Loss
•Unauthorized access
•Operating system risks
•Application risks
Occupation Safety & Health(OSH) Starter Safety 40-hour OSH training course None
OSH in the Philippines REPUBLIC ACT No. 11058 “An Act Officer 2 applicable to the industry
Strengthening Compliance with Occupational Safety and Health (SO2)
Standards and Providing Penalties for Violations Thereof”
Safety 40-hour OSH training course At least 2 years
• The State shall ensure a safe and healthful workplace for all working
Officer 3 applicable to the industry and experience in OSH
people by affording them full protection against all hazards in their work
(SO3) additional 48 hours of advanced/
environment.
specialized OSH training course
• It shall ensure that the provisions of the Labor Code of the Philippines, all
domestic laws, and internationally-recognized standards on occupational Safety 40-hour OSH training course plus Aggregate of 320
safety and health are being fully enforced and complied with by the Officer 4 80 hours of advanced/ specialized hours of OSH related
employers, and it shall provide penalties for any violation thereof. (SO4) Occupational Safety training cours3 training or
• This Act shall apply to all establishments, projects, sites, including experience
Philippine Economic Zone Authority (PEZA) establishments, and all other Safety Officers
places where work is being undertaken in all other places where work is
being undertaken in all branches of economic activity, except in public
sector.
In context, everyone is entitled to have a a safe and healthy workplace.
OSH goal is to prevent injuries and disease on workplaces.
Definition of Terms
• Imminent Danger - situation caused by a condition or practice in any
place of employment that could reasonably be expected to lead to death or
serious physical harm.
• Workplace refers to any site or location where workers need to be or to go
to by reason of their work, and which are under the direct or indirect control
of the employer.
• Certified first-aider refers to any person trained and duly certified to
administer first aid by the Philippine Red Cross or any organization
authorized by the Secretary of Labor and Employment
• Safety and health committee refers to a body created within the
workplace tasked with the authority to monitor, inspect and investigate all OCCUPATIONAL HEALTH PERSONNEL AND FACILITIES
aspects of the work pertaining to the safety and health of workers. Covered workplaces shall have qualified occupational health personnel
High-Risk Establishments such as certified first-aiders, nurses, dentists, and physicians duly
workplaces wherein the presence of hazard or potential hazard within the complemented with the required medical supplies, equipment and facilities.
company may affect the safety and/or health of workers. PT – Part Time FT – Full Time
1. Chemical works and chemical production plants;
2. Construction;
3. Deep sea fishing;
4. Explosives and pyrotechnics factories;
5. Firefighting;
6. Healthcare facilities;
7. Installation of communication accessories, towers and cables;
8. LPG filling, refilling, storage and distribution;
9. Mining;
10. Petrochemical works and refineries;
11. Power generation, transmission and distribution in the energy sector;
12. Storage and distribution center for toxic or hazardous chemicals;
13. Storage of fertilizers in high volume;
14. Transportation;
15. Water supply, sewerage, waste management, remediation activities;
16. Works in which chlorine is used in bulk;
Medium-Risk Establishments
A workplace where there is moderate exposure to safety and health
hazards and with probability of an accident, injury or illness.
Low-Risk Establishments
a workplace where there is low level of danger or exposure to safety and
health hazards and not likely or with low probability to result in accident,
harm or illness.
OSH Program
Occupational Safety Health (OSH) Program. - a set of rules issued by
DOLE which mandates the adoption and use of appropriate practices,
means, methods, operations or processes, and working conditions to
ensure safe and healthful Employment. The program should contain.
a) Statement of commitment to comply with OSH requirements;
b) General safety and health, including a drug-free workplace;
c) Human Immunodeficiency Virus (HIV) and Acquired Immune Deficiency Every employer covered by this Rules shall provide his/her workers medical
Syndrome (AIDS)/tuberculosis/hepatitis prevention control; services and facilities and shall not be an excuse by employer from
d) Company or project details; maintaining in his/her workplace a first aid treatment room or clinic for
e) Composition and duties of the safety and health committee; workers which shall be as follows:
f) Occupational Safety and health personnel and facilities; The employer may not establish clinic or hospital in the workplace are
g) Safety and health promotion, training and education (8 hours located not more than five (5) kilometers away and accessible in not more
mandatory); than twentyfive (25) minutes travel time together readily available for
h) Conduct of toolbox meetings; transporting workers to the hospital or dental clinic in cases of emergency.
i) Accident/incident/illness investigation, recording and reporting;
j) Provision and use of PPE;
k) Provision of safety signage;
l) Dust control and management, and regulations on activities such as
building of temporary structures, and lifting and operation of electrical,
mechanical, communications systems and other equipment;
m) Provision of workers' welfare facilities;
n) Emergency preparedness and response plan;
o) Waste management system; and p) Prohibited acts and penalties for
violations
Safety Officer
• Any employee or officer of the company trained by DOLE or DOLE-
Accredited Training Organization and tasked by the employer to implement
an OSH program.
• Monitors and inspect any health or safety aspect of the workplace
Safety Officers (Tier) Duty of the Employers
Position Training Required Experience • Equip a place of employment for workers free from hazardous conditions
that are causing or are likely to cause death, illness, or physical harm
Safety Completed the mandatory 8-hour None
• Provide complete job safety instructions to all the workers, including, but
Officer 1 OSH orientation and 2-hour trainer’s
not limited to, those relating to familiarization with their work environment
(SO1) trainings
• Ensure that the chemical, physical and biological substances and agents, refer any physical or chemical property of a material, machine or the
and ergonomic and psychosocial stresses under control are without risk to environment that may result to injury of a person, damage or destruction to
health property and loses which could have been guarded or prevented
• Use only approved specific industry set of standards of devices and Unsafe Conditions
equipment for the workplace 1. Defective Tools/equipment
• Comply with OSHS including training, medical examination, and where 2. Congested Exits
necessary, provisions on protective and safety devices 3. Inadequate warning systems
• Make arrangement for workers and their representatives to have the time 4. Slippery Floors
and resource to participate in the processes and action for improvement of 5. Hazardous atmospheric conditions
the OSH management system Unhealthy Conditions
• Provide, where necessary, for measures identifying trainings and drills, 1. Excessive Noise
evacuation plans, etc. to deal with emergencies, fires and accidents 2. Inadequate illumination/ventilation
including first-aid arrangements 3. Extreme Temperature
• Comply with all reportorial requirements of the OSH standards
Duty of Workers
• Participate in capacity building activities on safety and health and other
OSH related topics and programs; What are the Five S's (5S) of Lean
• Proper use of all safeguards and safety devices furnished for workers’
protection and that of others
• Comply with instructions to prevent accidents or imminent danger Japanese Translated English Definition
situations in the workplace
• Observe prescribed steps to be taken in cases of emergency Seiri oganize sort Eliminate whatever is not
• Report to their immediate supervisor any work hazard that may be needed by separating
discovered in the workplace. needed tools, parts, and
Right to refuse to Unsafe Work instructions from unneeded
• The worker has the right of refusal to work without threat or reprisal from materials.
the employer if, as determined by DOLE, an imminent danger situation
exists.
Seiton orderliness Set in order Organize whatever remains
• The safety officer shall, following his/her own determination, without fear of
by neatly arranging and
reprisal to implement a work stoppage or suspend operations in cases of
identifying parts and tools
imminent danger.
for ease of use.
• The employer or safety officer cannot require the workers to return to work
where there is a continuing imminent danger
• A worker may also refuse to work until the lifting of the Work Stoppage Seiso cleanliness shine Clean the work area by
Order (WSO) after implementing the appropriate corrective measures conducting a cleanup
• Workers affected by the existence of an imminent danger situation may be campaign.
temporarily assigned to other areas within the workplace provided there is
no impending issue with safety and health Seiketsu standardize standardize Schedule regular cleaning
Accident and maintenance by
An unforeseen and unwanted event that can lead into damage/lost, injury conducting seiri, seiton, and
and event death seiso daily

Accident Causation Shitsuke discipline sustain Make 5S a way of life by


primary reason for accidents to happen. forming the habit of always
Herbert W. Heinrich Domino Model of Accident Causation following the first four S’s
Fire
Is a rapid oxidation with the evolution of light and heat.
The Fire Triangle:
• Fuel - any combustible material
• Heat – Energy necessary to raise the temperature of the fuel and oxygen
until the point of their reaction.
• Oxygen – with proper quantity, combustion occurs with combination of
fuel

Types of fire extinguisher and their uses

Herbert W. Heinrich study also implies that:


98% of accidents are preventable
• 88% Unsafe/Unhealthy Acts
• 10% Unsafe/Unhealthy Conditions
2% - Non-Preventable
Unsafe/Unhealthy Acts
refer to any behavior, action, or decision by individuals that deviate from
accepted safety protocols, standards, or procedures, thereby increasing the
risk of accidents, injuries, or harm in a particular environment.
Unsafe Acts
1. Not Using Personal Protective
2. Equipment (PPE):
3. Operating Machinery Without Proper Training
4. Bypassing Safety Protocols or Devices
5. Using Damaged Tools or Equipment
6. Not Reporting Hazards or Near Misses
7. Horseplay or Distracting Others
8. Improper Lifting Techniques Importance of Fire Safety
9. Overworking or Not Taking Breaks Life Safety
Unhealthy Acts • Primary goal is to protects occupants from injury and loss of life.
1. Smoking Cigarettes/e-Cigarettes Property Protection
2. Inhaling solvents • Secondary goal is to protect property from damage
3. Drinking alcohol during office hours Protection of Operation
4. Taking illegal drugs • Fire prevention limits damage and assurance of continuity in work
Unsafe/Unhealthy Conditions operation
REPORTERS -used to control access to hazardous machinery protected by guarding or
What is occupational safety? safety doors.
-a multidisciplinary field concerned with the safety and welfare of people at 2. Emergency stop push buttons (e-stops)
work. -are fail-safe devices that enable the quick shut-off of machinery in the case
-It is a statutory obligation for employees to provide a safe and sound of an emergency.
working environment in many parts of the world, and it requires that 3. Safety light barriers (safety light curtains)
employers offer both treatments as well as focus on the prevention of health -are designed to detect items within specific regions and shut down
problems. potentially dangerous machinery in an emergency when they do.
-It involves identifying, assessing, and mitigating risks and hazards in the 4. Machine Safety Sign
workplace to prevent accidents, injuries, illnesses, and fatalities -It helps to prevent the risk of accidents and alerts employees and visitors to
BASIC SAFETY PROCEDURES IN HIGH-RISK ACTIVITIES AND specific mechanical hazards, preventing them from taking unnecessary
INDUSTRIES risks.
-The hazard analysis process is a systematic, comprehensive method to Machine safety in the workplace.
identify, evaluate, and control hazards in a system. -Always read the operating manual first when new to the machine and make
-The purpose of the hazard analysis is to identify hazards to the system, sure to follow the instruction given.
evaluate the hazards by determining their impact severity and the -Undergo proper training for the employees on how to operate machineries.
probability of occurrence; rank those risks in a prioritized order, and then -Always wear personal protective equipment (PPE) before operating
implement controls to those hazard risks machineries.
STEP 1: DEFINE THE SYSTEM -Only operate the machinery that you are fully trained.
-Define analysis criteria -Ensure that the proper shielding is securely installed in place to protect
-Define physical and functional characteristics. operators and Provide a safety easy-to-understand warning signs in visible
-Define facilities, technologies, and equipment. locations.
-Understand and evaluate people, processes, and procedures -Visually inspect the machinery for any potential problems before using.
STEP 2: IDENTIFY THE HAZARDS -If an emergency stop button (e-stop button) is present, make sure that you
-Identify hazards and undesired events know its location and it can easily be access when it is immediately
-Determine root causes of hazardsPersonal plans.thank you needed.
STEP 3: EVALUATE THE HAZARDS -Always tie back loose clothing and hair and remove jewelry to prevent any
-Determine hazard severity risk causing entanglement
-Determine hazard probability Protective Equipment
-Determine hazard risk What is personal protective equipment?
-Rank risk based on priority -Personal Protective Equipment (PPE) - is clothing that reduces exposure to
STEP 4: RESOLVE THE HAZARDS chemicals, biological, and physical hazards by shielding the worker’s and
-Assume the hazard risk visitor’s eyes, head, ears, hands, respiratory system, body, and feet.
-Implement corrective action PPE safety requirements:
-Validate control is adequate OSHA's rule 29 CFR 1910.132 sets the industry standard for personal
-Verify if control is in place protective equipment (PPE) and outlines its appropriate use.
STEP 5: FOLLOW-UP THE ACTIVITIES 1. Safe design
-Monitor for effectiveness -PPE should have no protruding parts that could cause injury and must fit
-Monitor for unexpected hazards securely without movement or slippage.
HOUSEKEEPING 2. Appropriate size
What is housekeeping? -PPE must fit the wearer correctly, allowing for comfortable use without
-A workplace that practices good housekeeping not only increases worker restricting movement.
morale but prevents injuries and illnesses. 3. Safe Materials
-Good housekeeping is an important element of a safety program for -PPE must be tested for safety and durability to withstand regular use.
reducing hazards in the workplace. 4. Easy to Clean
-It also keeps the work area clean and free from clutter that can contribute -PPE should be easy to clean and disinfect to prevent contamination and
to workplace incidents. ensure safety.
Benefits of good housekeeping in the workplace: 5. Distinctive Markings
-Eliminates and/or reduces slips, trips and falls -PPE should be clearly marked with the manufacturer's name or symbol for
-Decreases fire hazards by reducing waste, debris and flammable materials easy identification
-Improves worker health by reducing exposure to harmful substances and The four levels of PPE are categorized based on the level of protection they
airborne particles offer:
-Fewer worker injuries because equipment is maintained, materials are well- LEVEL A: Provides the highest level of protection against airborne diseases
organized and warning signs are posted or skin infections.
-Reduced work-related stress on the worker -Full face-piece self-contained breathing apparatus
To maintain Good Housekeeping practices, employers should: -Chemical-resistant gloves and boots
-allocate time for workers to clean and clear all waste from the workplace -Disposable boots and gloves
-regularly inspect and repair tools and equipment in the workplace -Vapor-protective suit
-ensure spills are immediately cleaned and warning signs are visible LEVEL B: Offers respiratory protection similar to Level A, but with less skin
-keep aisles and walkways clear from obstructions protection.
-provide directions, labels and signs for items in the workplace -Full-face self-contained breathing apparatus
-maintain clean lighting fixtures that are free from dust -Bodysuits Face shields
-ensure garbage is segregated and regularly collected -Gloves Hooded chemical-resistant clothing
Materials handling and storage -Chemical-resistant boots
-Housekeeping refers to maintaining a clean and organized work LEVEL C: Used when there are specific airborne substances present,
environment, while material handling involves the movement and requiring air-purifying respirators.
transportation of materials within the workplace. Storage involves proper -Chemical-resistant gloves
storing methods and ensuring that materials are stored in a way that is safe -Hard hats
and easy to access. Material handling and storage systems ensure that -Full-face air-purifying respirators
materials are properly and efficiently moved from one location to another, -Boots.
and are kept safe while in storage. LEVEL D: Basic protection used in workplaces as standard daily wear or for
-Material handling and storage refer to the process of moving, storing, and low-risk contamination situations.
controlling materials during manufacturing, distribution, consumption, and -Safety shoes
disposal. It includes the transportation, handling, and placement of materials -Full bodysuits
throughout the supply chain, from raw materials to finished products. -Facemasks
-Effective material handling and storage practices are essential for Four basic types of PPE:
businesses to improve their productivity, reduce waste, and increase 1. Face and Eye Protection
profitability. -This includes safety goggles and face shields that can help to protect the
Materials handling and storage best practices: eyes from any damage.
1. Use of Appropriate Equipment 2. Respiratory Protection
2. Training and Certification -This helps us against breathing in dangerous gases, chemicals, large-
3. Safe Lifting Practices particle droplets, sprays, and splashes that could damage our bodies.
4. Pathway Clearance Examples of these include full-face respirators, self-contained breathing
5. Proper Shelving and Stacking apparatus, gas masks, N95 respirators, and surgical masks.
6. Labeling and Signage 3. Skin and Body Protection
7. Regular Inspection and Maintenance -Personal Protective Equipment (PPE) used to protect the skin and body
8. Segregation of Hazardous Materials from various hazards, including chemical exposure, cuts, and burns. This
9. Space Utilization includes:
10. Fire Safety - Head Protection
11. Emergency Preparedness This is used to protect the head from impact, penetration, electrical hazards,
Machine Safety and other potential injuries.
Some machine safety products includes: - Body Protection
1. Safety-rated door switches (Interlock switches)
This protects the body and other parts of the body from various hazards - Install barriers to prevent entry of liquids or solids into the confined space.
including toxic chemical exposure, extreme temperatures, sparks, and - Ensure entry and exit openings are large enough for personnel wearing
burns. Insect bites, and radiation. protective equipment.
- Hands Protection - Prevent external work that could compromise safety or air quality within
This category of PPE is essential for ensuring the safety of our hands from the confined space
chemical exposure, cuts, burns, amputation, and other hazards. Basic electrical safety.
- Foot Protection what kind of injuries result from electrical currents
This helps to protect the feet from hazards such as slips, falls, punctures, There are four main types of injuries:
and exposure to hazardous materials. -electrocution (fatal),
- Fall Protection -electric shock,
This category of PPE is essential for preventing falls from heights and -burns, and
protecting workers who perform tasks at elevated levels. -falls.
4. Hearing Protection These injuries can happen in various ways:
This ensures the safety against excessive noise levels that can cause -Direct contact
hearing damage or impairment -When the electricity arcs (jumps, or "arcs") from an exposed
Procedures in hazard analysis in the workplace. energized conductor or circuit part
What is Job Safety analysis? What is a ground fault circuit interrupter (GFCI)?
A job safety analysis (JSA) assesses work tasks to identify hazards and A Class A Ground Fault Circuit Interrupter (GFCI) detects electrical current
recommend safety measures. It breaks down each step to ensure the safest loss (e.g., trips at 6mA) to prevent severe injuries or electrocution. While it
approach. cuts off electricity, a brief shock may occur, so it's crucial to view GFCIs as
It's also called job hazard analysis (JHA) or job hazard breakdown additional protection, not a substitute for safe practices
What are the basic steps? Fall protection
The basic steps in conducting a job safety analysis are: Fall protection is a type of safety equipment used to make working at
-Select the job to be analyzed heights safer. Generally, it refers to any planned system to prevent or
-Break the job down into a sequence of steps minimize falls from heights. Specifically, it includes all measures and
-identify the potential hazard. devices used to stop falls from happening
-Determine preventive measures to control these hazards Types of fall protection
-Communicate the results to the people in the workplace 1. Fall Arrest - Fall arrest is a safety measure needed for those working
Control of hazardous energies. near a fall risk at least 6 feet above ground. It's designed to stop a worker
What is hazardous energy? from hitting the ground if they fall. This system slows down the fall, lowering
Hazardous energy encompasses various forms, as defined by "Control of the chance of injury from the fall itself.
Hazardous Energy - Lockout and Other Methods" : "any electrical, 2. Fall Restraint – Just like fall arrest, uses similar equipment but works to
mechanical, hydraulic, pneumatic, chemical, nuclear, thermal, gravitational, prevent falls. The lanyard connecting the anchor and body support is short,
or other energy capable of causing harm to individuals. " keeping the worker away from the edge and eliminating the risk of falling.
What are the types of energy? Fall restraint systems also include fixed anchors, alongside portable ones
-Electrical energy is the most common form of energy used in workplaces. It Fall protection checklist
can be available live through power lines or it can also be stored. Before working at a height or near a fall hazard, check to ensure you have
-Hydraulic potential energy is the energy stored within a pressurized liquid. the necessary equipment on a fall protection checklist.
-Pneumatic potential energy is stored in compressed air and powers 1. Personal Protective Equipment
equipment like spraying devices and riveters. -All employees working at height must wear personal protective equipment
-Chemical energy is released in reactions, often causing fire or explosions. (PPE), Although PPE requirements differ, certain types are essential for
-Thermal energy comes from explosions, flames, or heat sources, causing these workers. PPE to used such as Helmet, safety goggles, protective
burns and dehydration. Common injuries include burns, scales, dehydration, gloves, and proper footwear.
frostbite, etc. 2. Connectors
-Radiation energy includes ionizing radiation, leading to burns and genetic -Connectors link the body support to the anchorage connector.
changes. -Lanyard, Self-retracting lifelines (SRLs), Carabiners, & Rope grabs
-Gravitational potential energy depends on an object's mass and height 3. Body Support
from the ground. Body support includes gear worn directly by workers for support in case of a
-Mechanical energy is stored in tension items like springs, releasing fall, with harnesses being the most common.
movement and potentially causing injury. Harness & Work seat
Confined space entry. 4. Anchorage Connector
What is a confined space? Anchorage connector is usually a webbing or steel cable wrapped around a
A confined space is typically an enclosed area not meant for continuous strong support like a steel beam or concrete surface. A D-ring connects to
human presence, with restricted entry and exit. It poses risks to health and this, securing it for attaching connectors. It stops someone from hitting the
safety due to factors like its design, materials present, work activities, or ground if they fall
mechanical hazards. Barricade and scaffolds
Confined spaces are common in various workplaces, both above and below A barricade is a temporary and movable object used to block and control
ground, and they are not necessarily small passage
Importance of barricades iin a workplace.
1. Hazard Identification:
Barricades visually highlight potential dangers within construction sites,
alerting workers and visitors to exercise caution.
2. Preventing Unauthorized Access:
Barricades act as physical barriers, stopping unauthorized entry and
ensuring only authorized personnel access work areas, reducing accidents
and fatalities.
3. Worker Safety:
Barricades create safe working zones, keeping pedestrians, vehicles, and
What are the hazards in a confined space? equipment away from hazards, allowing workers to focus on tasks without
Hazards within confined spaces can encompass: unnecessary risks.
1. Poor air quality, leading to: 4. Liability Reduction:
-Insufficient oxygen levels, Presence of toxic gases causing illness or Implementing barricades in safety protocols demonstrates a commitment to
unconsciousness, Simple asphyxiants displacing oxygen, potentially leading safety, reducing liability by proactively minimizing risks and protecting
to rapid symptoms and even death. workers and the public.
2.Chemical exposures through inhalation, skin contact, or ingestion. What is scaffolding
3. Fire hazard due to explosive or flammable atmospheres from liquids, Scaffolding is a temporary structure made of wood, pipes, or poles,
gases, or combustible dusts. providing support and a safe platform for construction workers to operate at
4. Process-related risks such as residual chemicals or supply line releases. heights. Typically found at construction sites, it's built with timber and steel.
5. Physical hazards including noise, temperature extremes, radiation, and Well-built scaffolding is sturdy and stable, capable of supporting both
electrical dangers. workers and material
6. Safety risks from moving equipment parts, structural issues, or falls. Types of scaffolds
7. Potential dangers from vehicular and pedestrian traffic. 1. Single scaffolding: Used for brick masonry, consists of vertical supports
8. Engulfment by shifting bulk materials or barrier failures. (standards), horizontal supports (ledgers), and putlogs for anchoring.
9. Reduced visibility due to smoke particles or other obstructions. 2. Double scaffolding: Ideal for stone masonry, features two rows of
10. Biological threats like viruses, bacteria, fungi, or molds, are typically scaffolding for added strength, supported by rakers and cross braces.
found in fecal matter or sludge. 3. Cantilever scaffolding: Used when the ground is strong enough to support
What are the safety precautions? standards, employs needles for support and is used for upper-level
Ensure thorough identification and control of all hazards and risks in construction.
confined spaces. 4. Suspended scaffolding: Platform suspended from a structure's roof,
Examples include: adjustable platform height, commonly used by painters and window
- Air quality testing cleaners.
- Remove liquids or free-flowing solids to prevent drowning or suffocation. 5. Trestle scaffolding: Platform on top of a ladder with wheels, versatile for
- Use two blocking valves with an open vent between them to isolate indoor and outdoor use, used by maintenance workers and painters. 6.
pipelines and prevent entry of hazardous materials.
Steel scaffolding: Durable and fire-resistant, constructed with steel supports When using an extinguisher,
and couplers, easy to assemble and dismantle. use the PASS system - Pull, Aim, Squeeze, Sweep
7. Patented scaffolding: Features height-adjustable brackets and special ·Pull the pin on the extinguisher.
couplings for support, constructed with steel. ·Aim the extinguisher
8. Wooden and bamboo scaffolding: Flexible and eco-friendly, commonly ·Squeeze the trigger or top handle.
used in Asia, technicians and designers navigate through layers and stories ·Sweep the fire area with the extinguisher's spray until the fire is completely
while working. out
9. Tube and clip scaffolding: Steel-based, easy to assemble, adaptable to What can be included in typical fire safety plans for all in?
irregular structures, and allows for movement of ledgers. Precise instructions for building occupants or employees during a fire.
10. Kwikstage scaffolding: Adaptable to commercial and residential projects, Example instructions for discovering a fire:
features non-slip platform and double guard railing, constructed with -Immediate evacuation.
galvanized steel for durability and customization -Activating the fire alarm.
The different types of scaffolding tags are. -Assisting individuals in immediate danger.
1. Red Scaffolding Tags: -Closing doors to confine the fire.
These tags signify that a scaffolding structure is unsafe or incomplete. -Using exit stairwells for evacuation.
Workers should not use the structure until it has been reviewed and Instructions upon hearing a fire alarm:
reinspected. -Shutting down processes/equipment (if applicable).
2. Yellow Scaffolding Tags: -Immediate evacuation.
Less common, yellow tags indicate caution should be exercised around the -Closing doors to confine the fire.
scaffolding. They also indicate that the structure has been modified for a -Using exit stairwells for evacuation.
specific purpose, requiring special safety measures. Responsibilities for employees designated with fire emergency duties.
3. Green Scaffolding Tags: Guidelines for actions during a fire:
These tags signal that a scaffolding structure is safe and ready for use. -Avoiding elevator use.
While normal safety precautions should still be followed, the structure has -Not re-entering the building until declared safe by authorities.
been approved for typical work activities. Industrial hygiene
Fire safety and fire code Industrial hygiene, or occupational hygiene, is focused on safeguarding
Fire safety plan. workers' health and safety by pinpointing, assessing, and managing
-Comprehensive document detailing: workplace hazards. Its aim is to avert occupational illnesses and injuries by
- Procedures for building evacuation - Measures to prevent fires regulating exposure to physical, chemical, biological, and ergonomic risks.
through maintenance and housekeeping Industrial hygienists employ scientific methods to anticipate, identify,
- Strategies for minimizing fire damage evaluate, and control these hazards effectively.
-Mandated by local fire codes. When an industrial hygienist is needed?
-Applicable to specific types of buildings and occupancy levels. Employers need to have the knowledge and courage to realize when they
-Advisory to consult jurisdiction or local fire department for specific need to call an IH for help. IHs have very special and specific training
requirements. related to workplace environmental evaluations and assessments as well as
-Possibility of standardized templates for businesses to facilitate emergency the ability to make recommendations on controlling workplace hazards.
response Purpose of industrial hygiene
What is the tetrahedron? 1. Protecting Worker Health: Industrial hygiene seeks to protect workers
To understand how to prevent fires, it is important to know how a fire can from exposure to harmful substances, conditions, and stressors that can
occur. Four elements must be preset the same time for a fire to take place: cause occupational illnesses and diseases
·Fuel or combustible material - something to burn, such as paper or wood. 2. Preventing Injuries: Industrial hygiene aims to prevent workplace
·Heat - to raise the material to its ignition (burning) temperature. accidents and injuries by identifying and mitigating hazards such as slips,
·Oxygen - to sustain combustion (the fire). trips, falls, machinery hazards, and ergonomic risks.
·Chemical reaction - the process of burning 3. Improving Workplace Conditions: By identifying and addressing hazards
What are the different classes of fires? in the workplace, industrial hygiene helps improve overall working
conditions.
4. Complying with Regulations: Industrial hygiene ensures compliance with
occupational health and safety regulations and standards set by
government agencies such as the Occupational Safety and Health
Administration (OSHA) in the United States.
5. Promoting Environmental Health: Industrial hygiene not only focuses on
protecting workers' health but also considers the impact of workplace
activities on the surrounding environment.
6. Risk Management: Industrial hygiene involves assessing and managing
risks associated with workplace hazards

Control measures
Hierarchy of hazard control measures
1.Eliminate the hazard
2.Substitute the hazard with a lesser risk
3. Use engineering controls
4. Use administrative controls
5. Use personal protective equipment (PPE)
Hazard communication and chemical safety
Hazard Communication and Chemical Safety aim to protect workers from
the potential hazards associated with exposure to hazardous chemicals in
A summary of common extinguishers the workplace
Elements and important aspects of hazard communication and
chemical safety
-Chemical Inventory
-Safety Data Sheets (SDS)
-Chemical Labeling
-Communication and Feedback
-Training and Education
-Risk Assessment
-Control Measures
-Emergency Preparedness
WHAT IS OCCUPATIONAL HEALTH?
According to the World Health Organization,
Occupational Health is an area of work in public health to promote and
maintain the highest degree of physical, mental, and social well-being of
workers in all occupations.
OCCUPATIONAL SAFETY VS OCCUPATIONAL HEALTH
Occupational Safety covers the risk factor in your workplace, and potential
safety hazards that could possibly cause injury.
Occupational Health, on the other hand, looks at potential health concerns
and wellbeing. Think of Safety as an employee’s physical well-being, and
Health as everything else, including mental health
OCCUPATIONAL ENVIRONMENT VS WORKPLACE
Workplace
refers to the setting or space in which a person performs their job duties. It
is the combination of three vital elements – Physical Environment, Working
Conditions, and Company culture
Occupational environment
repeated motions in an awkward position can result in
tends to focus more on the job-specific aspects and safety issues related to
accidents or illnesses in the occupational environment.
different occupations. It often emphasizes the health and safety aspects of
the workplace, particularly as they relate to occupational roles and the Biological Include insects, molds, fungi, viruses, vermin (birds, rats,
potential hazards associated with specific types of work. Hazards mice, etc.), and bacterial contaminants (sanitation and
WORKPLACE HEALTH housekeeping items such as potable water, removal of
The Centers for Disease Control and Prevention (CDC) industrial waste and sewage, food handling, and
defines workplace health as a coordinated and comprehensive set of health personal cleanliness can contribute to the effects from
promotion and protection strategies implemented at the worksite that biological hazards). Biological and chemical hazards can
includes programs, policies, benefits, environmental supports, and links to overlap.
the surrounding community designed to encourage the health and safety of
all employees Workplace Anything that impacts the health of workers and is part of
OCCUPATIONAL ILLNESSES Stress the overall work environment, and it is considered by
Exposure most professionals to be ergonomically related and to
the condition of being subjected to something (such as environmental put the worker at risk of accidents and stress-related
conditions or substances) that can have an effect on health, usually over a health problems
period of time
HOW TO FIND AND INVESTIGATE HEALTH HAZARDS?
Acute Exposure
Finding health hazards is an investigative process entailing a systematic
symptoms appear immediately and are often intense, requiring immediate
approach that requires that many facets and information need to be
attention
reviewed, such as the following:
Chronic Exposure
-Prepare a list of known health hazards in the workplace based upon
prolonged contact to harmful substances, often leading to health effects that
records and events.
develop slowly and last long
-Review the total facility, floor plans, and work process diagrams to identify
Latency Period
health hazard sources and location
describe the delay before the onset of effects resulting from exposure
-Interview workers, supervisors, and managers to identify known and
Sick Building Syndrome (SBS)
suspected health hazards not already on the list.
situation where people in a building suffer from symptoms of illness or feel
-Make use of the five senses, and use an industrial hygienist if validation of
unwell for no apparent reason
your observations is needed. The industrial hygienist can perform accurate
HEALTH HAZARDS
sampling as well as give expert advice
Health hazards are caused by any chemical or biological exposure that
QUICK HEALTH HAZARD IDENTIFICATION CHECKLIST
interacts adversely with organs within our body, causing illnesses or
-What chemical substances are produced, used, handled, stored, or
injuries.
shipped in the workplace?
-The degree of the hazard depends on the length of exposure time and the
-Are any vapors, gases, dusts, mists, or fumes present (including chemical
amount or quantity of the chemical agent. This is considered to be the dose
byproducts of work processes)?
of a substance, collectively known as dose of substance.
-Are biological substances (such as bacteria, viruses, parasites, dusts,
-A chemical is labeled as a poison if it causes significant harmful effects or
molds, and fungi) present in the workplace, the ventilation systems, and
disrupts bodily functions.
other components of the physical plant?
-A health hazard may produce serious and immediate (acute) effects and
-Are physical agents (energy sources strong enough to harm the body, such
symptoms. It may cause long-term (chronic) problems or may have a long
as electric currents, heat, light, vibration, noise, and radiation) present?
period between exposure and the occurrence of the disease or illness
-Are temperature extremes present?
(latency period).
-Do ergonomic hazards exist—such as work requiring lifting, awkward
Dose is the combined effect of multiple chemicals interacting to significantly
posture, repetitive motions, excessive muscular force, or computer use?
increase the risk of harm to the body, known as a synergistic effect.
-Could any work processes, tools, or equipment cause health hazards (such
Dose is also the most important factor determining whether or not someone
as back injuries, soft tissue injuries, whole-body vibration, hearing loss,
will have an adverse effect from a chemical exposure. Two components that
infections, and so forth)?
make up dose are as follows:
-Could departures from safe work practices cause illnesses? Can any
1. The length of exposure, or how long someone is exposed—1-hour, 1 day,
potential health hazards be detected with the senses (smell, taste, touch,
1 year, 10 years, etc.
hearing, and sight)?
2. The quantity of substance in the air (concentration), how much someone
-Is there a presence of harmful stress in the workplace?
gets on the skin or breathes into the lungs, and/or the amount eaten or
-Are there any complaints from workers about workplace-related health
ingested
problems?
HEALTH HAZARD PREVENTION
VALUE BASED SAFETY & OFF-THE-JOB SAFETY
Occupational illnesses have some unique features that can be attributed to
state of being free from harm or danger in the workplace
the underreporting of them. The following is some information about
SAFETY
occupational illnesses:
Safety refers to the state of being free from harm or danger in the
-They are more difficult to recognize or diagnose.
workplace. It encompasses the protection of employees from risks, hazards,
-There is often a latency period between exposure and the occurrence of
and potential accidents that may arise during the course of their work
symptoms.
activities.
-There is not always a clear cause-and-effect relationship.
SAFETY AS A VALUE
-Root or basic causes are not clearly apparent.
an ethic that governs how an individual perceives safety and safety-related
-It is difficult to determine a sequence of events.
conduct, whether at work, in public, or at home. In the workplace, this
As with any problem, goals must set forth in order to address long-term
implies that safety is not just recognized as a high priority alongside
prevention. In the arena of prevention, the objectives for Healthy People
productivity; rather, it is an ethic that dictates everything people do—safety
2020 are as follows:
is never compromised
-Reduce the rate of injury and illness cases involving days away from work
SAFETY AS A CHOICE OR COMPLIANCE
due to overexertion or repetitive motion.
Safety as a CHOICE
-Reduce pneumoconiosis.
It highlights the individual's obligation to prioritize safety in their actions and
-Reduce the proportion of workers with elevated blood lead concentration
decisions. It understands that safety is more than simply a collection of rules
from occupational exposure.
or processes to follow; it is also a mentality and behavior that individuals
-Reduce occupation skin diseases or disorders among full-time workers.
choose to embrace.
-Reduce new cases of work-related noise-induced hearing loss.
-it is in your heart and mind
-Increase the proportion of employees who have access to workplace
-you set the standard higher
programs that prevent or reduce employee stress
-you do it because it is the right thing to do
IDENTIFYING HEALTH HAZARDS
Safety as a COMPLIANCE
It refers to following the rules, regulations, standards, and policies that have
been developed to safeguard people's safety and health at work.
Five types of Health Hazards
Compliance with security regulations is viewed as a legal requirement and a
way to avoid penalties or liabilities.
Chemical Arise from excessive airborne concentrations of mists, -is on paper
Hazard vapors, gases, or solids that are in the form of dusts or -someone else sets the standard
fumes. In addition to the hazard of inhalation, many of -generally delegated to the "safety person”
these materials may act as skin irritants or may be toxic RESULTS OBTAINED BY FOLLOWING THE SAFETY AS A CHOICE OR
by absorption through the skin. Chemicals can also be COMPLIANCE
ingested, although this is not usually the principal route - No accidents, injury or property damage
of entry into the body. Example: battery acid and - Insurance costs can be reduced
solvents. - Reduced business interruptions
- Employee’s moral is improved
Physical Include excessive levels of nonionizing and ionizing - Employees are more efficient and productive
Hazard radiations, noise, vibration, and extremes of temperature OFF-THE-JOB SAFETY
and pressure. It refers to the promotion of safety practices and behaviors outside of the
workplace, with an emphasis on reducing injuries and accidents during
Ergonomic Include improperly designed tools or work areas. employees' personal time.
Hazard Improper lifting or reaching, poor visual conditions, or IMPORTANCE OF OFF-THE-JOB SAFETY
1. Reduced risk of injury and sickness: Less injury or illness can increase Health practice refer to those actions by which individuals can prevent
workers' capacity to execute their jobs successfully and efficiently. diseases and promote self-care, cope with challenges, and develop
2. Improved health and well-being: By avoiding chronic illnesses, increasing selfreliance, solve problems and make a choices that enhance health
physical fitness, and boosting the immune system. Principle
3. Increased productivity and morale: By lowering absenteeism, boosting A comprehensive health-care waste management policy should focus on
focus, and encouraging cooperation and collaboration. the safety and well-being of workers involved in handling, treating, storing,
4. Improved work-life balance: Allowing people to enjoy their spare time, and disposing of medical waste. The key elements to ensure effective
hobbies, and family activities without worrying about work-related dangers implementation include:
Stress and anxiety are reduced by increasing their mental health, emotional - Continuous Monitoring
stability, and coping abilities - Proper Training
COMMON OFF THE JOB INJURY TYPES & PREVENTIVE MEASURES - Personal Protective Equipment (PPE)
Car Accidents - Occupational Health Program
one of the top causes of off-the-job injuries, resulting in fractures, Worker's Protection
concussions, whiplash, and internal injuries. Handling health-care waste involves potentially hazardous materials across
Preventive Measures: various stages, including production, segregation, transportation, treatment,
- Practice defensive driving practices such as remaining attentive, following and disposal. To protect workers from personal injury, a comprehensive risk
traffic regulations, and avoiding distractions like texting or using a phone assessment is crucial. This assessment identifies necessary safety
while driving. measures to prevent or minimize exposure to hazardous materials or other
- Always wear a seatbelt and make sure other passengers do the same. risks, ensuring exposure stays within safe limits. Following the assessment,
-Avoid driving when under the influence of alcohol or drugs. proper training must be provided to all personnel
- Maintain your cars correctly, including regular inspections, tire checks, and Protective Clothing
service. The type of protective clothing depends on the risk associated with health-
Slips, Trips, and Falls care waste. Essential items for all personnel who collect or handle health-
It can happen at home, during leisure activities, or while exercising outside, care waste include:
resulting in fractures, sprains, head injuries, and bruising. Health and Safety Practices: Safety training for health-care personnel and
Preventive Measures: waste workers.
-Use proper safety equipment such as helmets, harnesses, and sturdy Helmets: With or without visors, depending on the operation.
boots. Face Masks: Based on the specific operation.
-Keep pathways, staircases, and outdoor spaces free of clutter and Eye Protectors: Safety goggles, depending on the operation.
impediments. Overalls (Coveralls): Obligatory for full-body protection. Industrial Aprons:
-Clean up spills. Required for additional protection.
-Practice decent housekeeping Leg Protectors/Industrial Boots: Mandatory for foot and leg safety.
Cuts and Lacerations Gloves: Disposable for medical staff, heavy-duty for waste workers
It can occur during domestic jobs, DIY hobbies, or leisure activities, leaving Management Practice
wounds that may require stitches or medical treatment. Effective management practices can reduce risks for personnel handling
Preventive Measures: health-care waste. Key practices include:
- When working with sharp objects or instruments, always use proper safety Waste Segregation: Separate different types of waste into specific
gear, such as gloves and eye protection. containers or bags to clarify the risk associated with each type.
- When using knives, scissors, or power tools, always follow the Appropriate Packaging: Ensures waste does not spill and protects
manufacturer's safety recommendations. workers from contact with hazardous materials.
- Maintain and store tools and equipment appropriately and safely. Waste Identification: Use distinct packaging and labeling for easy
- When cutting or slicing, use caution and prevent distractions that might recognition of waste types and sources.
result in an accident Secure Storage: Restrict access to authorized personnel, prevent
Strains & Sprains infestation by pests, and avoid contamination of surrounding areas.
It can occur during physical activity, sports, or home chores, causing muscle Safe Transportation: Minimizes the risk of workers' exposure to waste
injuries, ligament damage, and joint discomfort. during transit
Preventive Measures: Special Precautions for Clearing up Spillages and Potentially
- Warm up appropriately before beginning physical activities or sports to Hazardous Substances
prepare your muscles and joints. For cleaning up spillages of body fluids or other potentially hazardous
- To avoid strains and back problems, use correct lifting methods such as substances, particularly if there is any risk of splashing, eye protectors and
knee bends and leg lifts. masks should be worn, in addition to gloves and overalls.
- Take pauses and prevent overexertion while performing repetitive work or Cytotoxic Safety
engaging in lengthy physical exercise. Senior pharmacists in health-care establishments should oversee the safe
- Wear suitable footwear with excellent support and traction to lessen the use of cytotoxic drugs. In large oncology hospitals, a full-time Genotoxic
possibility of slipping, tripping, and falling Safety Officer is often appointed to supervise the safe management of
Burns cytotoxic waste
It can occur while cooking, grilling, using hot appliances, or participating in Essential measures for minimizing exposure include:
outdoor activities such as camping or bonfires, resulting in thermal, - Written Procedures: Define safe working methods for each process.
chemical, or electrical burns. - Data Sheets: Provide information on potential hazards, based on supplier
Preventive Measures: specifications.
- When handling hot items, liquids, or surfaces, use caution and always - Emergency Response Procedures: Outline steps to take in case of
wear oven mitts or pot holders. spillage or other occupational accidents.
- Keep children away from hot appliances and cooking areas, and keep - Education and Training: Ensure all personnel involved in handling
them under careful supervision during any activities that involve fire or heat. cytotoxic drugs are properly trained and informed
- When using pyrotechnics, barbecues, or camping stoves, always follow Response to Injury and Exposure
the safety instructions and recommendations provided. A program of response should be established that prescribes the actions to
- Store flammable items, chemicals, and fire-starting equipment in a secure be taken in the event of injury or exposure to a hazardous substance. All
location away from heat sources and open flames staff who handle health-care waste should be trained to deal with injuries
RISK AREAS: RESIDENCES, PUBLIC PLACES, ROADS, AND and exposures.
HIGHWAYS RATIONALE FOR DISASTER PREVENTION AND LOSS CONTROL
Motor vehicle crashes are a leading cause of unintentional injuries and a sudden ecological phenomenon of sufficient magnitude to require external
deaths for people aged 1-33, with nearly 36,000 fatalities and over 3.5 assistance
million injuries each year. To reduce your risk, consider the following: WHAT IS DISASTER? The World Health Organization (WHO) defines a
COMMON CAUSES OF MOTOR VEHICLE CRASHES disaster as “a sudden ecological phenomenon of sufficient magnitude
- Distracted driving to require external assistance”. It is also defined as any event, typically
- Teen driving occurring suddenly, that causes damage, ecological disruption, loss of
- Lack of safety belts human life, or deterioration of health.
- Child passenger safety WHAT IS PREVENTION? Is defined as those activities taken to prevent a
- Safety for children in and around vehicles natural phenomenon or potential hazard from having harmful effects on
- Impaired driving either people or economic assets.
- Aggressive driving Principal Objectives of Prevention
- Risks associated with mature driving -Save lives, Reduce economic disruption, decrease vulnerability/increase
PERSONAL SAFETY IN RESIDENCES AND PUBLIC PLACES capacity
- Stay aware of potential dangers and always have a plan for emergencies. -Decrease chance/level of conflict
- Use good judgment and trust your instincts. TYPES OF DISASTERS
- Be aware of your surroundings, especially in unfamiliar or potentially risky Natural Disaster occurs as the result of the action of the natural forces and
areas tends to be accepted as unfortunate, but inevitable.
- Carry a cell phone for emergencies. Man Made Disaster Stem from human activities like explosions, fires,
- Choose well-lit streets when walking at night and, if possible, walk with a industrial accidents, and conflicts, with the potential for high casualties and
friend widespread damage
SAFETY AS RELATED TO HEALTH PRACTICES ANOTHER CLASSIFICATION OF DISASTERS WILL BE AS FOLLOWS:
1. Sudden-onset disasters include floods, earthquakes, tsunamis, tidal
waves, tropical storms, volcanic eruptions, and landslides
2. Slow-onset disasters: Develop gradually, such as droughts, famine, and MEANS FOR DECLARING EMERGENCY
environmental degradation Emergency Siren
3 Industrial/technological disasters result from a society’s industrial and a crucial tool for alerting communities to potential dangers and guiding them
technological activities that lead to pollution, spillage, explosions, and fires to safety when seconds count. Its loud, distinctive sound serves as a
4. Complex emergencies are usually man-made, with multiple contributing universal signal for people to stay vigilant and take necessary precautions
factors. They often follow wars between states, internal conflict, and, during emergencies.
increasingly, terrorist acts. Public Address System
5. Epidemic diseases are those diseases that normally do not occur in a versatile tool for delivering announcements and messages to large groups
stable communities but have the potential to spread under certain of people, serving both everyday communication needs and emergency
conditions. situations where clear and timely information is crucial for public safety.
PHASES OF DISASTER EMERGENCY PREPAREDNESS CHECKPOINTS
Pre-emergency - Ensure every worker know about alarms/alerts
phase Involves risk assessment and preparedness activities before a - Regularly inspect fire equipment’s like fire extinguishers
disaster strikes. - Emergency number & assembly point locations posts are available at work
Impact and flight phase place.
Occurs when a disaster strikes, triggering displacement and immediate - Evacuation route maps at buildings are posted Inspect spill kits regularl
humanitarian response - Check alternative communication facilities are working
Acute phase - Replace damaged protective equipment
Focuses on establishing critical services and understanding the evolving - Provide floor elevation marks and emergency exit signs.
causes of displacement - Check first aid boxes at workplace
Repatriation phase refer to the predetermined set of actions and protocols designed to be
Involves the return of displaced individuals to their place of origin, either followed in the event of an emergency situation. These procedures are put
voluntarily or with assistance. in place to ensure the safety and well-being of individuals, as well as to
Rehabilitation or reconstruction phase minimize potential damage or harm during emergencies.
Shifts focus towards long-term recovery and development efforts to rebuild Here are some general emergency response procedures that can be
communities and infrastructure applied to various types of disasters:
PLANNING FOR EMERGENCIES Emergency Communication
Emergencies Establish a clear communication system to notify relevant authorities,
unpredictable events that require swift and effective response strategies. emergency services, and the public about the disaster. This may involve
Planning for emergencies using sirens, public address systems, or digital communication channels.
the course of action a company takes in order to minimize the effects of an Evacuation Plan
incident or crisis. The main objective of emergency planning is to reduce Develop and communicate an evacuation plan that includes designated
injuries, protect the community and maintain business continuity. evacuation routes, assembly points, and transportation arrangements for
PURPOSE OF EMERGENCY PLANNING those who require assistance
-Protection of Life and Property Search and Rescue
-Risk Reduction Train and equip personnel for search and rescue operations to locate and
-Preparedness and Readiness extract individuals in distress. This may involve using specialized equipment
-Coordination and Collaboration such as ropes, ladders, and search dogs.
-Minimization of Disruption Medical Assistance
-Community Resilience Coordinate medical assistance by setting up first-aid stations, triage areas,
TYPES OF EMERGENCIES AT WORK PLACE and medical facilities to provide initial treatment to the injured.
1. Specific Emergency – If an accident/incident takes place in any one of Shelter and Supplies
the specified area in the factory. Establish temporary shelters and distribution points for food, water, and
2. On-Site Emergency – If an accident/incident takes place in a factory, its other essential supplies for affected individuals.
effects are confined to the factory premises, involving only the persons Security and Crowd Control
working in the factory. Deploy security personnel to maintain order, prevent looting, and manage
3. Off-Site Emergency – If the accident such that it affects inside the crowds during the emergency
factory are uncontrollable and it may spread out outside the factory Utilities and Infrastructure
premises. Assess and repair damage to critical infrastructure such as power lines,
EMERGENCY PLAN water supply systems, and transportation routes to restore essential
services
Establish Planning Form a dedicated team comprising Recovery and Rehabilitation
Team individuals with relevant expertise to oversee Develop plans for long-term recovery and rehabilitation, including rebuilding
the development and implementation of the infrastructure, providing counseling services, and supporting affected
emergency plan. communities.

Test the Plan by Regularly conduct drills and exercises to


Conducting Drills stimulate emergency situations and evaluate
the effectiveness of the plan, identifying
areas for improvement.

Improve the Plan Continuosly evaluate and refine the


Continuously emergency plan based on lessons learned
from drills,real-life incidents, and feedback,
ensuring adaptability and readiness to
address evolving risks.

Implement the Plan Execute the plan by acquiring necessary


Obtain Equipment equipment, establishing communication
Communicate and channels, and providing training to personnel
Train on emergency response procedures.

Assess the Risk and Conduct a thorough assessment of potential


Company Capabilities hazards and vulnerabilities, as well as the
company’s resources and capabilities to
effectively respond to emergencies.

Develop the Collaborate to draft a comprehensive


Emergency Response emergency response plan outlining
Plan procedures and protocols tailored to various
scenarios
EMERGENCY RESPONSE TEAMS
Fire Department They respond to fires, rescues, and other emergencies
involving hazardous materials
Emergency Medical Services (EMS) It provide pre-hospital medical care,
including ambulance services and responding to medical emergencies
Law Enforcement Police departments handle law enforcement, crowd
control, and emergency situations involving criminal activity.
Search and Rescue (SAR) SAR teams locate and extract individuals lost
or injured in remote or hazardous environments
Disaster Response Teams These team provide assistance during the
natural or man-made disasters.

You might also like