![Safety and Security Review for the Process Industries: Application of HAZOP, PHA, What-IF and SVA Reviews](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.9.4)
Safety and Security Review for the Process Industries: Application of HAZOP, PHA, What-IF and SVA Reviews
192![Safety and Security Review for the Process Industries: Application of HAZOP, PHA, What-IF and SVA Reviews](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.9.4)
Safety and Security Review for the Process Industries: Application of HAZOP, PHA, What-IF and SVA Reviews
192eBook
Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
Related collections and offers
Overview
Dennis Nolan, drawing on decades of experience as a well-known safety author and senior loss prevention specialist at Saudi Aramco, provides the essential procedures and checklists in Safety and Security Review for the Process Industries. In addition to guiding the reader through the selection and execution of efficient and complete hazard analysis and safety reviews (such as HAZOP, PHA, What-If, SVA, LOPA, Bowtie), Nolan shares his personal experience and illustrates procedures with real-world examples.
Updated throughout to reflect changing practices, the fourth edition expands its scope to include maintenance, exploratory drilling, and governmental regulation updates. It adds best practice guidelines on CHAZOP reviews, expands on threats in the security vulnerability analysis, and includes more information on chemical process facilities and hydrocarbon/chemical plant safeguards.
Up-to-date form templates and “what-if checklists are also available for purchasers of the book to download, making this a complete safety review toolkit.
- Helps you to achieve compliance and avoid disasters: provides the checklists and best-practice guidance needed to negotiate the labyrinth of hazard analysis and safety review procedures
- Keeps your knowledge up-to-date: coverage of the latest forms of hazard analysis and safety review, including LOPA and Bowtie
- Saves time and money: demonstrates how each of the typically required reviews is related, so that information and conclusions used on one may be transferred or adapted for another
Product Details
ISBN-13: | 9780323323550 |
---|---|
Publisher: | Elsevier Science |
Publication date: | 09/01/2014 |
Sold by: | Barnes & Noble |
Format: | eBook |
Pages: | 192 |
File size: | 5 MB |
About the Author
Table of Contents
Preface xiii
Acknowledgments xv
About the Author xvii
1 Purpose 1
2 Scope 5
3 Objective and Description of PHA, What-lf, and HAZOP Reviews 7
1 Definition 9
2 Objectives 9
3 Origins of Qualitative Safety Reviews 9
4 Limitations or Disadvantages 10
4.1 Limitations 10
4.1.1 Preliminary Hazard Analysis 10
4.1.2 What-if reviews 10
4.1.3 HAZOP reviews 11
4.2 Advantages 11
4.2.1 Preliminary Hazard Analysis 11
4.2.2 What-lf reviews 11
4.2.3 HAZOP reviews 11
4 Adaptation to Security Vulnerability Analysis 13
1 Comparison to Process Hazard Analysis Reviews 14
2 SVA Overall Procedure 14
3 Major Differences between Security Vulnerability Analyses and Process Hazard Analyses process Hazard Analysis 15
4 Threat Analysis Necessity 15
5 Specialized Reviews Bow-Tie Analysis, Layers of Protection Analysis, and Safety Integrity Levels 17
1 Bow-Tie Analysis 17
1.2 Supplemental members 27
2 Team Member Qualifications 28
2.1 Team leader 28
2.2 Scribe 29
2.3 Project manager (project, process, manufacturing, or facility engineer) 29
2.4 Operations representative 29
2.5 Loss prevention or safety representative 29
2.6 Security officer or representative (for SVAs) 29
2.7 Supplemental team member 29
3 Team Responsibilities 30
3.1 Team leader 30
3.2 Scribe 31
3.3 Project manager (project, process, manufacturing, or facility engineer) 31
3.4 Operations representative 32
3.5 Loss prevention or safety representative 32
3.6 Security officer or representative (for SVAs) 32
3.7 Supplemental team member(s) 33
4 Team Dynamics 33
4.1 Leadership influences 33
4.2 Lines of communication 33
4.3 Efficiency factors 34
4.3.1 The number of nodes or areas in the review 34
4.3.2 The completeness of the design versus level of safety review desired 34
4.3.3 The experience of the review team 34
4.3.4 The effectiveness of the team leader 35
4.3.5 The language background of the review team 35
4.3.6 The number of review team members 35
4.3.7 The number of similar or duplicate process vessels or support equipment 35
5 Use of Consultants 35
5.1 Qualifications 36
5.2 Advantages 36
5.3 Disadvantages 37
3 HAZOP Review Applications 43
4 SVA Review Applications 45
5 Application During Changes at a Facility 46
9 Review Procedures 47
1 Review Preparation and Setup 48
1.1 Location 48
1.2 Administrative support 48
1.3 Facility documentation 49
1.4 PHA consequence and likelihood data resources 52
1.5 SVA Threat Analysis data resources 53
1.6 Computer hardware and software support 53
1.7 Node identification 54
1.8 SVA area identification 55
2 Review Methodology 55
3 Review Procedure 57
3.1 Review steps 57
3.1.1 PHA and What-lf review steps 57
3.1.2 HAZOP review steps 58
3.1.3 SVA review steps 59
3.1.4 Threat Analysis 61
4 Credible Scenarios and Causes 63
5 Possible Causes 65
6 Safeguards 65
7 Likelihood (Probabilities) 66
8 Consequences 66
9 Notetaking 66
10 Helpful Review Suggestions 67
11 Helpful Technical Suggestions 68
11.1 General 68
11.2 HAZOP suggestions 69
11.3 General PHA, What-lf, HAZOP, and SVA review suggestions 70
12 Assumptions for the Review Process 72
13 Providing Recommendations 73
3 HAZOP Worksheet 82
4 SVA Worksheets 86
5 Worksheet Identification 86
11 Report Preparation and Distribution 87
1 Report Stages and Purpose 87
2 Report Preparation and Organization 88
3 Report Distribution 88
3.1 Preliminary reports 89
3.2 Draft reports 90
3.3 Final reports 91
3.4 Addendum reports 91
12 Handling and Resolution of Recommendations 93
1 Ranking and Classifying Recommendations 93
1.1 Recommendation resolution summary 95
2 Objectives of a Safe and Secure Facility Design 95
3 Recommendation Action Plans 96
4 Risk Assessment Studies 96
5 Risk Acceptance Criteria 97
6 Cost-Benefit Analysis 97
13 Schedule and Cost Estimates 99
1 Schedule 99
1.1 Formula to estimate review scheduling 100
1.2 Time bar scheduling and integration with project schedule 101
2 Cost Estimate 102
3 Estimating Formula 102
3.1 Cost of preparation 102
3.2 Cost of review sessions 104
3.3 Cost of report preparations and review 104
3.4 Documentation costs 104
3.5 Hardware, software, and incidental costs 104
4 Example Calculation for Schedule and Cost 105
Glossary 145
Bibliography 151
Index 153
What People are Saying About This
Achieve compliance and avoid disasters, accidents, and financial loss with this step-by-step professional guide to hazard analysis and security review techniques