Five Steps Take the “Risk” Out of Risk Assessment and Management


Whether you are the CEO, an administrative assistant or a plant manager, you are constantly engaging in risk assessment and management. Sometimes the consequences of being wrong are trivial. However, being wrong can sometimes be devastating, with money lost and safety compromised.

That's the situation confronting those involved in the design, implementation or assurance of machine safety. Assessing risk—and doing something about it—can seem daunting. Bruce Main, president of the risk assessment firm Design Safety Engineering Inc., is aware of how most feel about the task. He has some reassuring words.

When to Get Help
Various organizations offer resources for and training in risk assessment and management. One is from the Packaging Machinery Manufacturers Institute , which has recently released a standard and offers training. Similar standards-based efforts are being developed for other industrial areas.

Consultants and outside firms, like Bruce Main's Design Safety Engineering Inc ., are also available. The decision about whether or not to use one is often a question of time. If the assessment has to be done quickly, it might be better to get help. If there's more time, then an in-house effort might be best.

If an outside firm is brought it in, the information gained from an initial risk assessment could prove useful later. Main notes that it's rare to do a risk assessment on a brand new machine, and typically 85% to 90% of hazards have already been identified. Because of this, one risk assessment can often serve as a guide for the next, he says.

"People tend to think it's more complex than it really is. There are really just five steps that need to be completed," he says. Main lists these as:
1. Identifying the hazard,
2. Assessing the risk,
3. Reducing it to an acceptable level,
4. Documenting what was done, and
5. Following up.

These steps assess risk and mitigate it. They also capture information and expertise before either evaporates.

While simple in concept, conducting risk assessment and management does have some pitfalls. There are actions to avoid, as well as others to emphasize. A look at each of the steps shows what should—and should not—be done.

There are scores of different ways to identify hazards. Two of the most familiar and widely used are task-based and hazard-based methods. The first arose out of work by automobile manufacturers, says Main. He notes that a tasked-based risk identification method is often the most effective, but both are necessary. To explain why, he describes his experience with talking to university students in design classes. These students will be designing machinery and systems with pumps and motors within a few months. Main will often ask how many have ever changed a pump or motor on anything.

"Typically 10% of the students raise their hands. So maybe in a class of 120, you get a show of 12 hands. So, 90% of them have never done the task." Consequently, he says, they don't know all of the sub-tasks involved, and they have no way to identify the accompanying hazards.

Thus, a task-based approach can reveal dangers that wouldn't otherwise be considered, Main says. A task-based method can also uncover other risks, such as cases where safety guards are circumvented because the guarding makes performing the task effectively impossible.

A task-based assessment doesn't provide a complete picture, however. Consider a motorized rotating shaft. No task is involved, but there is still a hazard: The shaft can break, for example. Besides component failure, examples of other non-task-based dangers include seismic activity or snow loads on a roof. For such vulnerabilities, hazard-based identification is best. What's more, doing both task- and hazard-based evaluations often yields better results than using either alone.

As for assessing risk once a hazard is known, that is typically done with a scoring system. There are dozens of different methods to choose from. All have a common underlying goal, notes Main. "Fundamentally, it's how you work this hazard into three buckets: high, medium, and low risk."

Risk scoring attracts considerable attention. It's typically the subject of industry consensus standards.

Putting risk on a diet
Main says that identifying and reducing risk are the most important steps out of the five. Engineers in particular are comfortable with and often successful at risk reduction. They are successful, in part, because there's a flow, a recipe, to follow: the hazard or safety control hierarchy.

The risk reduction process goes through a series of stages. The first asks if the problem can be acceptably eliminated by design. If the answer is yes, then a design change is made.

If the answer is no, then engineering controls are deployed. Switches, interlocking barriers, guarding barriers, adjustable enclosures, and other techniques could be used, with the choice dependent on the situation.

If controls aren't sufficient, then warnings might be posted, and additional operator training may be performed to further minimize risk. The final stage involves personal protective equipment (PPE) designed to minimize whatever hazard remains.

Typically, after risk reduction plans are in place, another round of risk assessment is done to determine if what remains is tolerable. Judging that, Main admits, gets somewhat tricky.

"There is no clear definitive guideline about what is acceptable," he observes. Often that assessment is made implicitly, without a formal declaration: When product starts shipping out the door, the decision has been made that the risk is acceptable.

Document and follow-up
Like the question of acceptably low risk, documentation is a murky area. On one hand, putting everything down in writing can present legal hazards. Risk assessment and management involves subjective evaluations, so everything is open to reinterpretation later by third parties. On the other hand, good documentation is a quality standard.

The question about how much to document may well vary. However, a benefit of documentation is that it ensures expertise and knowledge are captured before people move on to other projects, or leave the company.

The final step, follow up, isn't complex but it is necessary. In this step, after all assessment and mitigation steps have been taken, the reality of the situation is compared to what was supposed to have been done. Several reasons point to the need for this last step, says Main.

For one thing, a lack of follow up can be the smoking gun in the case of litigation. For another, the final step helps make sure that the overall goal of the process is achieved. "You just want to keep people from getting hurt—and that's ensured with the follow up," sums up Main.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
Industrial wireless cyber security: More complex than black and white; IIoT at the I/O level; Process modeling; Cyber security research
Robotic advances: Software, form factors; System-based ROI; Embedded control; MES and information integration; SCADA and cyber security; Position sensor; Controller, I/O module
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security
Cyber security attack: The threat is real; Hacking O&G control systems: Understanding the cyber risk; The active cyber defense cycle