Safety and Security Review for the Process Industries
eBook - ePub

Safety and Security Review for the Process Industries

Application of HAZOP, PHA, What-IF and SVA Reviews

  1. 192 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Safety and Security Review for the Process Industries

Application of HAZOP, PHA, What-IF and SVA Reviews

About this book

Dennis Nolan, drawing on decades of experience as a well-known safety author and senior loss prevention specialist at Saudi Aramco, provides the essential procedures and checklists in Safety and Security Review for the Process Industries. In addition to guiding the reader through the selection and execution of efficient and complete hazard analysis and safety reviews (such as HAZOP, PHA, What-If, SVA, LOPA, Bowtie), Nolan shares his personal experience and illustrates procedures with real-world examples.Updated throughout to reflect changing practices, the fourth edition expands its scope to include maintenance, exploratory drilling, and governmental regulation updates. It adds best practice guidelines on CHAZOP reviews, expands on threats in the security vulnerability analysis, and includes more information on chemical process facilities and hydrocarbon/chemical plant safeguards.Up-to-date form templates and "what-if checklists are also available for purchasers of the book to download, making this a complete safety review toolkit.- Helps you to achieve compliance and avoid disasters: provides the checklists and best-practice guidance needed to negotiate the labyrinth of hazard analysis and safety review procedures- Keeps your knowledge up-to-date: coverage of the latest forms of hazard analysis and safety review, including LOPA and Bowtie- Saves time and money: demonstrates how each of the typically required reviews is related, so that information and conclusions used on one may be transferred or adapted for another

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Safety and Security Review for the Process Industries by Dennis P. Nolan in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Chemical & Biochemical Engineering. We have over one million books available in our catalogue for you to explore.
Chapter 1

Purpose

This chapter summarizes the US regulations that require Process Hazards Analysis (PHA) and Security Vulnerability Analyses (SVAs). It highlights the most common types of reviews undertaken and the depth of the subject reviews, discussing both qualitative (e.g., PHAs, What-Ifs, and HAZOPs) and quantitative methods (Event Trees, Fault Trees, Failure Mode and Analysis, etc.). It also discusses the need to undertake such reviews for periodic revalidation and facility changes. The benefits of such reviews can be used to demonstrate that the required PHAs or SVAs have been undertaken to interested parties.

Keywords

American Institute of Chemical Engineers (AIChE); American Petroleum Institute (API); Chemical Facility Anti-Terrorism Standard (CFATS); Chemical Safety Hazard Investigation Board (CSB); Department of Homeland Security (DHS); Environmental Protection Agency (EPA); executive order; hazard identification; hazardous substances; methodology; Occupational Safety and Health Administration (OSHA); procedures; Process Safety Management (PSM); regulations; security requirements
This publication is intended to provide guidance to qualitative hazard analyses conducted for industrial and commercial process, specifically for PHA (Preliminary Hazard Analysis), What-If, and HAZOP (Hazard and Operability) review teams. It also highlights how the methodology and procedures used for these reviews can be adopted and applied for Security Vulnerability Analysis (SVA). This book describes the nature, responsibilities, methods, and documentation required in the performance of such reviews. This ensures that these reviews are conducted in a timely, effective, objective, and consistent manner as may be prescribed by a company’s Process Safety Management (PSM) policy and security requirements. This book relies heavily on the common practices in the petroleum, chemical, and petrochemical industries because most of the major hazardous processes are located in these industries and these facilities are increasingly becoming a potential target for security incidents.
The safety and security of process facilities are an important part of a company’s operations. Worldwide petrochemical safety regulations, international security threats, and a company’s own PSM policies require that a hazard identification, process safety, and security analysis review of its existing and proposed operations be accomplished.
The worldwide petroleum and chemical insurance market estimates for the period 1993–2013 that there have been about 1,100 major insurance claims (i.e., major incidents), amounting to approximately $32 billion (for property damage and business interruption). Their analysis estimates that the worldwide risk has been constant over this period, that is, the average frequency and cost impact has been a constant trend, neither decreasing nor increasing. This equates on average to 110 losses totaling $2–3 billion per year. Additionally, these losses would fit a traditional loss incident ratio triangle (see Figure 1.1) with an ever-increasing number of losses as the magnitudes of the losses decrease (i.e., as the steps in the triangle widen).
image

Figure 1.1 Loss triangle, number versus magnitude.
Today, new projects are in the region of $50+ billion, which equates to the Deepwater Horizon incident loss (April 20, 2010), and the potential for even larger losses from a single incident is still a possibility. The industry must do more to prevent these incidents and improve safety so that this trend decreases.
Most incidents occur during periods of nontypical operations, such as maintenance activities, startup or shutdown, and drilling activities. This is when more attention, knowledge, and experience are required from personnel to safely manage the facility. Therefore, special attention needs to be applied to circumstances that are out of the normal operating mode of processes.
The limits of hazardous substances cited by both the US Occupational Safety and Health Administration (OSHA) and the Environmental Protection Agency (EPA) regulations dictate the application of PSM elements at almost all of a company’s facilities. These reviews are intended to reduce the probability and consequences of a major incident that would have a detrimental impact on employees, the public’s well-being, onsite or offsite properties, the environment, and most importantly to the company itself, its continued business operation and survival. It should also be noted that there may be a general adverse public reaction and therefore a company’s reputation may suffer. Hazard identification and process analysis reviews are not intended to identify the minor “slips, trips, or falls”; these are the responsibility of the company’s general safety requirements and can be analyzed with other tools (for example, Job Safety Analysis (JSA)).
image

In March 2003, the United States implemented Operation Liberty Shield to increase readiness and security in the United States, primarily due to international threats from nongovernment affiliated, self-motivated political and religious groups. One objective of this operation was to implement comprehensive process security management programs into existing OSHA, EPA, and FDA laws to address deliberate acts of threats of terrorism, sabotage, and vandalism. In April 2007, the Department of Homeland Security (DHS) issued the Chemical Facility Anti-Terrorism Standard (CFATS). DHS uses this document to help identify, evaluate, and ensure effective security at high-risk chemical facilities. Included in this responsibility is the requirement for chemical facilities handling chemicals above a threshold amount to submit an SVA for DHS review and approval along with a Site Security Plan (SSP). A potential fine of $25,000 per day, an inspection and audit by DHS, or an order to cease operations is stated for noncompliance. The type and amount of chemicals handled that require submission of screening review and SVA submittals are listed on the DHS website. Additionally, internal company security procedures, although confidential, would also require that an adequate security review be undertaken to identify and assess such risks. Because the methodology of conducting process security reviews are similar to existing process hazard analysis reviews, they can be adapted to fit within the parameters of existing procedures established for these analyses. Both API and AIChE have also issued their own guidelines to assist companies undertaking process security reviews. A major process safety consultant recently stated that statistics show that the use of outside security experts for protective services consultations has increased by 200% in the last 5 years. This is due to escalating concerns over workplace and domestic violence, privacy and security practices, and terrorist threats. Process security reviews are not intended to identify minor thefts or mishaps; these are the responsibility of the company’s general security requirements and can be examined with other financial auditing tools.
Recent cybersecurity attacks worldwide have emphasized the importance of software security for financial and operational applications within process entities. The National Institute of Standards and Technology (NIST) has recently released a document entitled “Framework for Improving Critical Infrastructure Cybersecurity.” This framework provides a structure that organizations can use to develop and improve cybersecurity programs. NIST was charged with putting the framework together under US Presidential Executive Order 13636 (February 2013), which calls for the development of a voluntary, risk-based cybersecurity framework.
The framework document is described as a living document that will need to be updated to keep pace with changes in technology, threats, and other factors, and to incorporate lessons learned from its use. The document describes three main elements: framework core, tiers, and profiles. The framework core presents five functions: identify, protect, detect, respond, and recover. Together, they allow an organization to understand and shape its cybersecurity program. Tiers describe the degree to which an organization’s cybersecurity program meets goals identified in the framework. Profiles help organizations improve their current cybersecurity programs.
The purpose of the safety and security evaluations described in this book is to identify the major risks facing the industry that have the potential for severe impacts. It identifies simple processes and procedures to apply these reviews in an easy, practical manner.
PHA, What-If, and HAZOP reviews are the most common industry qualitative methods used to conduct process hazard analyses, while SVAs are typically applied for process security analyses. It is qualitatively estimated that up to 80% of a company’s hazard identification and process safety analyses may consist of PHA, What-If, and HAZOP reviews, with the remaining 20% from Checklist, Fault Tree Analysis, Event Tree, Failure Mode and Effects Analysis, and so on. Chapter 5 highlights other reviews that are periodically utilized by the process industries.
An experienced review team can use the analyses described to generate possible deviations from design, construction, modification, and operating intent or from deliberate actions that define potential consequences. These consequences can then be prevented or mitigated by the application of the appropriate safeguards.
The reader is reminded that a PHA, What-If, HAZOP, or an SVA report is a living document for a facility. As changes are made to a facility or its procedures, the applicable review is to be updated to represent the current facility. PHA reviews are also required to be updated and revalidated every 5 years as a minimum according to US regulations (OSHA and EPA). Also, because terrorist threats still exist, threat assessment/vulnerability analysis needs to be continually reevaluated.
A completed review can be used to demonstrate to interested parties that a prudent analysis has been accomplished and all possible actions have been examined and implemented to eliminate major hazards or minimize the threat. The Chemical Safety and Hazard Investigation Board (CSB) routinely examines and reviews hazard analyses that have been performed on processes to ensure that they were performed adequately.
This document can also be referred to by review team members. It will serve as a reminder of their duties and responsibilities in the performance of the required reviews and report development.
Chapter 2

Scope

This chapter highlights the scope of reviews and when and where they should be undertaken. It states the difference between project design reviews and safety or security reviews. It describes how reviews are varied in complexity depending on the type of facility or process under evaluation. It also highlights that high-risk facilities are in most need of such reviews and that the reviews are capable of being quite flexible in application to suit many varied operations or facilities.

Keywords

Audit; chemical plant; Chemical Safety Hazard Investigation Board (CSB); consequence; detailed design; design review; evaluated; facility; final design; flexible; HAZOP; incident; modification; onshore; offshore; PHA; preliminary; probability; procedures; process operations; refinery; risk analysis; SVA; temporary; What-If
These guidelines should be considered for all of a company’s facilities, domestically and internationally. They are intended to be applied at both permanent and temporary facilities, whether located on- or offshore.
The typical review is usually intended to be a formal audit review of an “essentially” complete project design or modification to ensure that the probabilities or consequences of major incidents have been eliminated or reduced to acceptable levels prior to being placed in service. Risk analyses should be continually conducted as part of the project design to avoid the identification of major concerns in later reviews. In fact, documentation from a design risk analysis should supplement the formal HAZOP, PHA, What-If, or SVA review.
image

Process safety and security reviews are not intended to replace or duplicate a project design review. Unusually complex or large projects may require several levels of a safety or security review during their design phase. These may be initiated at the conceptual design stage, preliminary design, detailed design, and at the final design. Such levels are usually encountered in multimillion-dollar offshore facilities, refineries, or chemical processing plant projects where major changes occurring later in the design would be severe in economic and schedule terms. These multilevel reviews start at a broad viewpoint and gradually narrow to specifics as the project design proceeds. Where operating procedures are not available during the design, a supplemental PHA, What-If, HAZOP, or SVA review may be considered for these documents. In fact, an initial review may recommend that subsequent final designs be again evaluated by a PHA, What-If, HAZOP, or SVA as a follow-up. It is essential that these follow-up reviews be completed because incidents investigated by the CSB have identified failure...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Dedication
  5. Copyright
  6. About the Author
  7. Preface
  8. Acknowledgments
  9. List of Acronyms
  10. Notice
  11. Chapter 1. Purpose
  12. Chapter 2. Scope
  13. Chapter 3. Objective and Description of PHA, What-If, and HAZOP Reviews
  14. Chapter 4. Adaptation to Security Vulnerability Analysis
  15. Chapter 5. Specialized Reviews—CHAZOP, EHAZOP, Bow-Tie Analysis, Layers of Protection Analysis, Safety Integrity Level, Fishbone Diagram, and Cyber Security Vulnerability Analysis
  16. Chapter 6. Team Members: Qualifications and Responsibilities
  17. Chapter 7. Management Support and Responsibilities
  18. Chapter 8. Review Applications for Typical Facilities
  19. Chapter 9. Review Procedures
  20. Chapter 10. Review Worksheets
  21. Chapter 11. Report Preparation and Distribution
  22. Chapter 12. Handling and Resolution of Recommendations
  23. Chapter 13. Schedule and Cost Estimates
  24. Appendix A. Typical Company Policy Statement
  25. Appendix B. Quality Assurance Audit Checklist
  26. Appendix C. Probability, Severity, Risk, and Risk Acceptance Tables
  27. Appendix D. PHA and What-If/Checklist Questions
  28. Appendix E. HAZOP Parameters, Deviations, and Possible Causes
  29. Glossary
  30. References
  31. Index