Why BOW-TIE & HAZID monitor?

Slides:



Advertisements
Similar presentations
The Way to Success … Sta rt Sta rt Ak Technologies Mo | Visit.
Advertisements

Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Secure Electronic Data Communications and Transactions.
Microsoft Excel Integration Project Linking an Excel Worksheet to a Word Document and Web Discussions.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Refworks Presented by Margaret Clark, Reference Librarian FSU College of Law Library September 20, 2005.
Step 1: Create Login Page –  Copy an existing page and create a page that will house the login form.  Save and go back to Page Management.  Do not export.
X2VOL.com Student Registration November Enter your Frisco High School address Your password is your Student ID Then LOGIN. You will be prompted.
*********** Enter your Enter your password Click here to Sign In.
SOML Large Optics Daily Reporting Guide to using the new ETSEDMS server for Large Optics Daily Reporting.
HTML, Third Edition--Illustrated Brief 1 HTML, Third Edition Illustrated Brief Unit A Creating an HTML Document.
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
How to create a SharePoint site MICROSOFT OFFICE SHAREPOINT DESIGNER.
Here is the log in for your control panel. Enter your user name, password and click Login.
Adviser Panel. Go to All DD Track Advisers: Click “Advisor Login”
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
FINANCIAL BID OPENING. BID OPENER 1 LOGS IN Bid opener 1 Logs in 1. Enter the Login id and Password 2. Click login.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
How to Backup your Encrypted Files A comprehensive guide on how to encrypt your most private files and upload them to a back-up server.
Microsoft FrontPage 2003 Illustrated Complete Creating a Web Site.
Not Tested and Void Codes. Topics Introduction/Purpose User Roles When to Use Not Tested Codes How to Use Not Tested Codes When to Use Void Codes Multiple.
Installing RMS 3.0 Contractor Mode
(Required for DTCs, Recommended for STCs)
Make-Up Testing/Undo Student Test Submissions
Presenter: Chris Blake, Associate Director
Creating an Online Test Session
Account Management Demonstration.
Customer Online Ordering
GUIDE TO USINg REDCAP for the elf study
Endnote Cite While You Write plugin November Attila Skultéti
Unit 12 Using the Internet & Browsing the Web
HR Portal Team Dr. Ashraf Armoush Supervisor Ala’eddeen Awwad
Materials Engineering Product Data Management (ePDM)
Global Management System
Lesson 9 Sharing Documents
Students Welcome to “Students” training module..
Why HAZOP-SIL monitor? Knowing what should be done for: HAZOP-SIL
NERC Alerts Training Responding to Alerts
CSDR Submit-Review Website Submitter Guide
Why HSEMS monitor? Knowing what should be done for:
Why PTW (SIMOP) monitor?
Why JHA monitor? Knowing what should be done for: Job Hazard Analysis
Why HSE Plan monitor? Knowing what should be done for: HSE Plan
User Guide Subversion client TortoiseSVN
E-permits Tutorial for first-time users
This presentation has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational purposes.
Why SCE monitor? Knowing what should be done for:
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Developing a Code Sharing and Modifying Tool for CSCI 577 team project
Why Interface monitor? Knowing what should be done for:
HP ALM Defects Module To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third.
Lesson 14 Sharing Documents
Corporate Lodging Hotel Program Insituform Technologies
“All About Me” Staff Development Day
ONLINE SECURE DATA SERVICE
Updating/creating four year plans
Awareness Training… V 1.1.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Why Sub-System monitor?
Why QRA monitor? Knowing what should be done for:
Why HAZOP-HSE monitor? Knowing what should be done for HAZOP-HSE issues (i.e. communication of responsibilities) HAZOP-HSE register HAZOP-HSE Actions Follow-Up.
Why SIMOP monitor? Knowing what should be done for SIMOP
Design Collaboration.
WSP-ATR Submission Process 2019.
WSP-ATR Submission Process 2018.
Performance & Development Review USER GUIDE > MANAGER
Planning for Institutional Effectiveness Manager PIE Planning & Resources 2019 User Guide.
FINANCIAL BID OPENING.
Presentation transcript:

Why BOW-TIE & HAZID monitor? Knowing what should be done for: BOW-TIE & HAZID (i.e. communication of responsibilities) BOW-TIE & HAZID recommendations BOW-TIE & HAZID actions Follow-Up Comments long for actions Action Status report Company Contractors Consultants Third party 22 September 2018 http://adepp.webexone.com 1

What is BOW-TIE & HAZID monitor? Location A BOW-TIEmonitor is a secure online monitoring system which: UTILISES: BOW-TIE & HAZID actions register by Company, consultant, Contractors, and Third party to: Generate BOW-TIE& HAZID actions Provide expert support Generate BOW-TIE & HAZID activities Generate BOW-TIE& HAZID tasks Help the Follow-UP Print the updated BOW-TIE & HAZID action status report at any time BOW-TIE & HAZID monitor uses the friendly interfaces with expert support for traceability and audit purpose by Company, Contractors, Contractors and Verification Party BOW-TIE & HAZID data and documents can be exported easily to Company, consultant or Contractor’s document control system. Location C Location B Location D 22 September 2018 http://adepp.webexone.com 2

ADEPP monitor ( Login) Login Name: demo Password: adepp2009 22 September 2018 http://adepp.webexone.com 3

BOW-TIE & HAZID monitor Click on New Enter BOW-TIE Save Click on view BOW-TIE monitor or HAZID Note: All BOW-TIE actions can be imported if project has already perform BOW-TIE or HAZID by other softwares 22 September 2018 http://adepp.webexone.com 4

BOW-TIE & HAZID monitor Enter BOW-TIE recommendations Save 22 September 2018 http://adepp.webexone.com 5

BOW-TIE & HAZID monitor Click on Search Icon 22 September 2018 http://adepp.webexone.com 6

BOW-TIE & HAZID monitor Click on COPY Insert your comments Click on Guidelines (2) HAZID worksheet & Guide 22 September 2018 http://adepp.webexone.com 7

BOW-TIE & HAZID monitor Insert your comments 22 September 2018 http://adepp.webexone.com 8

BOW-TIE & HAZID monitor Click on Activity-Task Icon 22 September 2018 http://adepp.webexone.com 9

BOW-TIE & HAZID monitor Define, Activity and Tasks Save 22 September 2018 http://adepp.webexone.com 10

BOW-TIE & HAZID monitor Click on Comment log 22 September 2018 http://adepp.webexone.com 11

BOW-TIE & HAZID monitor Click on Print 22 September 2018 http://adepp.webexone.com 12

BOW-TIE & HAZID monitor Enter Tasks Save 22 September 2018 http://adepp.webexone.com 13

BOW-TIE & HAZID monitor Click on Follow-UP Click on export Convert to Excel file 22 September 2018 http://adepp.webexone.com 14

Terms of Us of ADEPP monitor. ADEPP monitor will be built based on requirement of project. HSE Manger or his representative can Edit the HSE actions register Others have access to Read & Add ( Project to advise) Projects can use ADEPP monitors if they sign the Terms of Us of ADEPP monitor. All SIMOP register can be exported to company intranet at any time. ( It is recommended to transfer data weekly to company intranet) ADEPP monitor uses the secure web server to allow project team members to view, add, modify and delete only the specific information they need. Secure Sockets Layer (SSL), is an extra level of security for ADEPP monitor. It requires the project team remember to log on through a secure server, which prevents hackers from accessing their information. SSL uses technology known as encryption. This is software that scrambles the data with secret code. Company, Contractors, Sub-contractors, Vendors are required to log in to the site with SSL encryption enabled, so the project can share very sensitive, confidential data through ADEPP monitor site. 22 September 2018 http://adepp.webexone.com 15

Thank your for your kind attention! Fabienne. F. SALIMI Director ADEPP Ltd. ( UK) www.adepp.webexone.com 22 September 2018 http://adepp.webexone.com 16