Loading...

Please Wait...

Software FAQs

What defaults templates are available in PHAWorks RA Edition?

Default templates are provided to use in creating projects for a variety of study methods. A short description is provided of the study method for each template.

Projects can be created by selecting a study method and clicking the Create New Project button which opens the Project tab allowing data for the project to be entered. You can also create a new project by selecting a default template from File / New Project.

Projects created using default templates use the program’s default settings for the template, such as field and column names, column widths, etc. Settings can be changed and are saved with the project file when it is saved.

Included templates:

  • HAZOP (Parameter-Based, Traditional) - Hazard and Operability (HAZOP) studies are used to identify hazard scenarios with impacts on people and the environment as well as operability scenarios where the concern is the ability of the process to function. The method focuses on investigating deviations from the design intent of the process by applying guide words to process parameters to generate deviations.

  • HAZOP (Deviation-Based) - Hazard and Operability (HAZOP) studies are used to identify hazard scenarios with impacts on people and the environment as well as operability scenarios where the concern is the ability of the process to function. The method focuses on investigating deviations from the design intent of the process.

  • HAZOP (Procedural) - Procedural Hazard and Operability (HAZOP) studies apply the HAZOP method explicitly to procedures to identify ways in which deviations from the procedures may occur.

  • CHAZOP - Control system, or Computer, Hazard and Operability (CHAZOP) studies apply the HAZOP method explicitly to control systems to identify ways in which deviations from their design intent may occur.

  • What-If - What-If studies involve posing questions relating to initiating events to identify hazard scenarios for a process. The PHA team brainstorms the questions.

  • What-If / Checklist - What-If / Checklist studies involve posing questions relating to initiating events to identify hazard scenarios for a process. The PHA team starts with a prepared list of questions, although almost always additional questions are added as a study proceeds.

  • MHA - Major Hazard Analysis (MHA) is used to identify hazard scenarios involving fires, explosions, toxic releases and reactivity excursions. MHA employs a structured brainstorming approach to identify loss of containment scenarios. A checklist provides guidance to the team and helps to assure completeness.

  • FMEA - Failure Modes and Effects Analysis (FMEA) is a hazard evaluation procedure in which failure modes of system components, typically, process equipment items, are considered to determine whether existing safeguards are adequate. A FMEA becomes a FMECA (Failure Modes and Effects and Criticality Analysis) when a criticality or risk ranking is included for each failure mode and effect.

  • PrHA - Preliminary Hazard Analysis (PrHA) is used to identify the hazards of a process and the hazardous situations they may produce. Possible causes, consequences and recommendations for protective measures are addressed. A criticality ranking may be assigned and used to prioritize protective measures. Typically, PrHA is used to evaluate and prioritize hazards early in the life of a process as a precursor to more detailed hazard analysis studies.

  • HAZID - Hazard identification (HAZID) studies are used to identify the hazards present in a process. Usually, possible means of eliminating the hazard or controlling the risk also are identified.

  • ENVID - Environmental issues identification (ENVID) studies are used to identify hazards present in a process that present environmental impacts. They may result from either accidental or intended releases of hazardous materials. Usually, possible means of eliminating the hazard or controlling the risk are identified.

  • Checklist - A checklist used as a hazard evaluation procedure employs lists of questions relating to process safety to identify concerns and help to determine whether existing safeguards are adequate. Checklists are used to identify common hazards and ensure compliance with procedures, codes of practice, regulations, etc. Checklist questions are based on experience and knowledge of safety issues for the process and applicable codes, standards and regulations.

  • Facility Siting Review - A facility (stationary source) siting review is used to identify hazards related to the layout of a facility and the locations of people inside and outside a facility. It addresses issues such as equipment separation, the location of ignition sources, and the proximity of people to hazards. A checklist is used to conduct studies.

  • Human Factors Review - A human factors review is used to identify factors that influence the performance of people in a facility and the errors that may make. A checklist is used to conduct studies.

  • ISO Latent Conditions Review - The ISO Latent Conditions Review addresses the identification of human factors in processes. The checklist used is from Contra Costa Health Services' Industrial Safety Ordinance guidance document.

  • Human Error Analysis - A Human Error Analysis (HEA) study is used to identify possible failures that people may make in operating a process and the human factors that influence them in order to identify means of addressing them.

  • Inherent Safety Review - Inherent safety reviews are used to identify ways in which a process can be changed or designed to avoid the need for safety systems by eliminating the hazard completely or reducing its magnitude sufficiently using means that are permanent and inseparable from the process. A checklist is used to conduct studies.

  • SIMOP - Simultaneous operation (SIMOP) reviews are used to identify hazards that may result from adverse interactions between two or more activities that take place at the same time and place within a facility. SIMOP reviews are an important adjunct to the performance of process hazard analyses that focus on individual activities such as hazard and operability (HAZOP) studies.

  • DMR - A damage mechanism review (DMR) identifies mechanical, chemical, physical or other process that result in equipment or material degradation. Damage mechanisms may cause the failure of process equipment resulting in loss of containment or impaired operability of equipment. A DMR is carried out prior to the performance of a PHA study to identify those damage mechanisms that are believed possible for a process.

  • DHA - Dust hazard analysis (DHA) studies are used to identify combustible dust hazards, such as fires, deflagrations, and explosions, and their possible impacts on people, facilities, and the environment.

  • MOC Safety and Health Review - A Management of Change (MOC) Safety and Health Review is used to identify possible safety and health issues for a proposed change to a process.

  • Standards and Practices Review - A Standards and Practices Review records standards and practices that are employed for a facility and its processes. It is used to document the standards and practices used.

  • Job Safety / Hazard Analysis - Job Safety Analysis (JSA), or Job Hazard Analysis (JHA), is used to help to reduce injuries and illnesses in the workplace. Hazards associated with each task / step involved in performing a job are identified and controls are prescribed for each hazard.

  • Task Analysis - Task analysis is used to identify and analyze the steps involved in performing tasks. The results are used in various applications such as developing procedures and in support of human factors studies.

  • Asset-Based SVA - Asset-based security vulnerability analysis (SVA) is used to identify threat events for assets in processes which are analyzed to determine the need for risk reduction measures.

  • Scenario-Based SVA - Scenario-based security vulnerability analysis (SVA) is used to identify threat scenarios for processes which are analyzed to determine the need for risk reduction measures.

  • Sneak-Path SVA - Sneak-path security vulnerability analysis (SVA) is used to identify paths that may allow attackers to reach targets in a process in order to determine the need for risk reduction measures.

Back to Software FAQs

Related Topics