This new initiative demonstrates a process and tools for managing the security vulnerability of sites that produce and handle chemicals, petroleum products, pharmaceuticals, and related materials such as fertilizers and water treatment chemicals. Includes: enterprise screening; site screening; protection analysis; security vulnerability assessment; action planning and tracking.
This new initiative demonstrates a process and tools for managing the security vulnerability of sites that produce and handle chemicals, petroleum products, pharmaceuticals, and related materials such as fertilizers and water treatment chemicals. Includes: enterprise screening; site screening; protection analysis; security vulnerability assessment; action planning and tracking.
Since the publication of the second edition several United States jurisdictions have mandated consideration of inherently safer design for certain facilities. Notable examples are the inherently safer technology (IST) review requirement in the New Jersey Toxic Chemical Prevention Act (TCPA), and the Inherently Safer Systems Analysis (ISSA) required by the Contra Costa County (California) Industrial Safety Ordinance. More recently, similar requirements have been proposed at the U.S. Federal level in the pending EPA Risk Management Plan (RMP) revisions. Since the concept of inherently safer design applies globally, with its origins in the United Kingdom, the book will apply globally. The new edition builds on the same philosophy as the first two editions, but further clarifies the concept with recent research, practitioner observations, added examples and industry methods, and discussions of security and regulatory issues. Inherently Safer Chemical Processes presents a holistic approach to making the development, manufacture, and use of chemicals safer. The main goal of this book is to help guide the future state of chemical process evolution by illustrating and emphasizing the merits of integrating inherently safer design process-related research, development, and design into a comprehensive process that balances safety, capital, and environmental concerns throughout the life cycle of the process. It discusses strategies of how to: substitute more benign chemicals at the development stage, minimize risk in the transportation of chemicals, use safer processing methods at the manufacturing stage, and decommission a manufacturing plant so that what is left behind does not endanger the public or environment.
This CCPS Guideline book outlines current transportation risk analysis software programs and demonstrates several available risk assessment programs for land transport by rail, truck, and pipeline for consequences that may affect the public or the environment. Provides introductory transport risk considerations for process engineers Gives guidance on route selection, equipment factors and materials Describes transportation security risk issues and industry practices to mitigate them Includes loading and unloading checklists for several transport modes Develops specific operating procedures and checklists to reduce human error Discusses considerations for transportation security, including threat and vulnerability assessments and potential countermeasures Summarizes key transportation security regulations, guidelines and industry initiatives. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
There is much industry guidance on implementing engineering projects and a similar amount of guidance on Process Safety Management (PSM). However, there is a gap in transferring the key deliverables from the engineering group to the operations group, where PSM is implemented. This book provides the engineering and process safety deliverables for each project phase along with the impacts to the project budget, timeline and the safety and operability of the delivered equipment.
This book deals with the state-of-the-art of physical security knowledge and research in the chemical and process industries. Legislation differences between Europe and the USA are investigated, followed by an overview of the how, what and why of contemporary security risk assessment in this particular industrial sector. Innovative solutions such as attractiveness calculations and the use of game theory, advancing the present science of adversarial risk analysis, are discussed. The book further stands up for developing and employing dynamic security risk assessments, for instance based on Bayesian networks, and using OR methods to truly move security forward in the chemical and process industries.
This practical text serves as a guide to elaborating and determining the principles, assumptions, strengths, limitations and areas of application for multiple-plant chemical safety and security management. It offers guidelines, procedures, frameworks and technology for actually setting up a safety and security culture in a cluster of chemical companies, thus allowing forward planning. The presentation is conceptually rather than mathematically oriented so as to maximize its utilization within the chemical industry.
This book has been written to address many of the developments since the 1st Edition which have improved how companies survey and select new sites, evaluate acquisitions, or expand their existing facilities. This book updates the appendices containing both the recommended separation distances and the checklists to help the teams obtain the information they need when locating the facility within a community, when arranging the processes within the facility, and when arranging the equipment within the process units.
This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical infrastructures show that adversaries are intelligent and strategic. Game theoretic models have been extensively used in some domains to model these strategic adversaries. However, there is a lack of such advanced models to be employed by chemical security managers. In this book, game theoretic models for protecting chemical plants as well as clusters are proposed. Different equilibrium concepts are explored, with user-friendly explanation of how to reflect them to realistic cases. Based on efficient analysis of the properties of security issues in chemical plants/clusters, models in this book are capable to support resources allocations, cost-effectiveness analysis, cooperation incentives and alike.