Top Banner
Dropped Object Prevention August 2015
8

Dropped Object Prevention August 2015. Zero Harm Share.

Jan 19, 2018

Download

Documents

Sybil Singleton

Why are we looking at dropped object prevention? Supporting Video
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Dropped Object Prevention August 2015. Zero Harm Share.

Dropped Object Prevention

August 2015

Page 2: Dropped Object Prevention August 2015. Zero Harm Share.

• Zero Harm Share

Page 3: Dropped Object Prevention August 2015. Zero Harm Share.

Why are we looking at dropped object prevention?

Supporting Video

http://www.pilbarairon.com/CLB%20Dropped%20Objects%20Demonstration/Default.html

Page 4: Dropped Object Prevention August 2015. Zero Harm Share.

What is the goal of work on Dropped Objects?1. Risk recognition by the workforce

2. Eliminate dropped object incidents and hazards

3. Help support the work around Critical Risk Management (Falling Objects)

4. Develop sustaining practices that continue to build on our Zero Harm Culture

Page 5: Dropped Object Prevention August 2015. Zero Harm Share.

How does this work support Critical Risk Management?

Implement protection methods

Improve access methods

Identify items for 2016 Capital Plan

Tethering tools

Secondary containment

Barricading standard

Page 6: Dropped Object Prevention August 2015. Zero Harm Share.

6

Page 7: Dropped Object Prevention August 2015. Zero Harm Share.

Secondary Prevention SystemsWhy secondary prevention?

7

Page 8: Dropped Object Prevention August 2015. Zero Harm Share.

What are we asking of you?

• Identify hotspots or jobs where dropped objects are at the highest potential (areas/tasks)

• What can be done to prevent dropped object incidents at these locations and during these jobs? Plan in advance.

• Barricading/segregation• Tools to minimize the potential for an object to be dropped? (tethering,

etc…)

• What barriers would prevent us from implementing these controls and how can these be overcome?