No spam. Just the latest market insights by Seguro in your inbox each week.
We have a number of enquiries on a daily basis asking us for bespoke risk assessment & method statements.
Our solution is use a template
Many customers ask us for a template for a job they are working on. We provide a wide range of bespoke risk assessment & method statements in template format on our website that need to be amended by the client to match their specific needs. These range from £6 to £12 per RAMS, or are provided free as part of our Safety Advisory service or Competent person service.
These Templates do need involvement from the client as there will be a comprehensive sequence of work that could apply. As the client you would be responsible for ensuring that this sequence was relevant to yourself and if not amended to reflect your process.
Bespoke risk assessment and method statements
These are when the client has a very specific request that does not fall into any template we have available. These are tailored to include the process you carry out as well as ensuring that all risks are appropriate to the job and site you working on. These require the input from one of consultants so will charge a fee. Whatever your requirements we will have the solution to help.
Use the form on this page to tell us about your requirement and will give you an economical fee to write it up for you, using one of our templates.
The Importance Of Safe Manual Handling In Your Business
Insight by
Bob Evans
Published on
29 June 2022
Health and safety blog
Sign up for future insights
No spam. Just the latest market insights by Seguro in your inbox each week.
The Importance Of Safe Manual Handling In Your Business
All manual work involves lifting and handling to some extent. Although mechanical equipment should be used whenever practicable, much of the work will inevitably continue to be done manually. The risk of injury can be greatly reduced by a knowledge and application of correct lifting and handling techniques and by taking a few elementary precautions.
Manual handling relates to transporting or supporting of a load (including lifting, putting down, pushing, pulling, carrying or moving thereof) by hand or by bodily force” It is the most common recognised reason for injury at work.
In any case, it’s not simply ‘pulling something’ because of the heaviness of an item, injuries can be brought on in different causes, for example:
Reaching and lifting over your head
Long carrying distances
Twisting
Bending
Any poor stance positions
Lifting or carrying objects with awkward or odd shapes
Over 20% of all accidents occurring in the UK Construction Industry each year involve injuries sustained whilst manually lifting and handling materials or equipment. This incorporates Musculoskeletal Disorders (MSDs), e.g. injuries or pain in the body’s joints, ligaments, muscles, nerves, tendons, and structures that support limbs, neck and back. Manual handling injuries can happen anyplace inside of the working environment; However, manual labour, existing injuries and unbalanced stance positions can increase the risks.
Manual handling can have consequential implications for the employer and for the individual who has been injured. The employer may bring about some significant expenses, for example, sickness payment, lost production, retraining of a brief labourer, over time to cover the absence and, possibly, compensation. The injured individual may find that their capacity to carry out their occupation has been influenced and their way of life may need to change.
In this manner, it is basic that you must consider the risks and where there are risks, regulations apply.
The Regulations establish a clear hierarchy of measures:
AVOID handling operations involving risk of injury
ASSESS operations involving risk of injury that cannot be avoided
REDUCE the risk of injury e.g. using handling aids and provide information on the load
REVIEW the assessment
Employers Duties
Carry out a Manual Handling Assessment
Reduce risk of injury
Replace Manual tasks where possible
Introduce mechanical aids
Employees likewise have responsibilities:
Make proper use of equipment & follow safe working systems
Co-operate with their employer
Ensure others are not put at risk
Avoid tasks likely to cause injury
Co-operate with the employer to reduce the risk of injury to themselves and others
No spam. Just the latest market insights by Seguro in your inbox each week.
What is a risk assessment
A risk assessment is to enable you to identify sensible control and measures for risks within your workplace.
Risk Assessments are not meant to create huge amounts of work for anyone in the company but should be there to ensure the safety of you and your workforce. You are likely to already have a process in place to identify risks and how they should be dealt with. A risk assessment is just a document to have all the information in one place.
How to assess the risks in your place of work:
Identify the hazards
Decide who might be harmed and how
Evaluate the risks and decide on precautions
Record your significant findings
Review your assessment and update if necessary
Many companies who are confident they understand the process and the risks involved can complete these themselves. You don’t have to be a H&S expert.
When thinking about your risk assessment, remember:
A hazard is something that could cause harm, for example electricity, chemicals, working from ladders, an open drawer etc
The risk is the probability, high or low, that somebody could be harmed by these and other hazards, together with an indication of how serious the harm could be
The process of identifying hazards and evaluating the risks can be delivered systematically using well-established templates and the knowledge of people with hands-on experience.
We have several risk assessments available to buy. The cost of one of our risk and method statements is less than half an hour of your writing time.
They have taken us more than a day to write each one; however, we sell many, making them very affordable.
The documents arrive in word format to allow you to adjust them to suit your site and circumstances.
Why not see our layout below to see if it is something you could work with.
Growth of networked electronic controls is a safety issue
Insight by
Bob Evans
Published on
5 July 2015
Health and safety blog
Sign up for future insights
No spam. Just the latest market insights by Seguro in your inbox each week.
Growth of networked electronic controls is a safety issue.
No self regarding health and safety professional would disregard hazard evaluations and systems for Asbestos, work at height or manual handling; yet I’ll wager that the only risk assessment you have for IT is a display screen assessment. In any case, on the off chance that you have equipment in your business that connects with the web and to something important — from a central heating thermostat to a blast furnace — electronic health and safety ought to be on your radar.
Numerous organizations have an IT office and a health and safety division, whose sole contact is the point at which somebody needs another laptop or fails to remember their password. Some have an unclear dependence on Google or the gentleman in PC World for support. As of not long ago that didn’t do much for your possibilities of recuperating an erased email, however it wasn’t going to kill anybody.
When we discuss the web, a great many people think about the human-driven traffic it conveys: email messages, website pages, instant messaging and videos. In truth most activity is not between people, it’s between computers: automated, quiet packets of data containing database questions, records, sensor information and control signals.
At the beginning of ARPAnet, the web’s forerunner, this movement was under the control of the US military. The outcomes of somebody playing about in there were possibly spectacular. In spite of the fact that the thought that you could sign in and launch a nuclear missile was never true, it was worthy of a few film scripts.
Then the worldwide web arrived and the entire system became a means of pouring cat videos and niche adult entertainment into every home. But the undercurrent of the internet carried on regardless.
Next year the internet will carry a zettabyte (one trillion gigabytes) of data. By 2019, two-thirds of all traffic will be from non-PC devices, and there will be three devices connected to the internet for every person on the planet.
Wired world
Networked control systems are nothing new, but in the 1990s, when they consisted of ISDN lines to the company mainframe, they were point to point and secure, though slow and expensive.
Then the internet arrived, and everything changed. People wanting access to their emails and the web installed modems and broadband routers, and all those machines suddenly had access to, in effect, a cost free means of talking to one another; instead of renting a dedicated phone line, just plug it into the net.
Manufacturers stopped putting serial ports on their devices, and started adding ethernet sockets. Later, even those disappeared, replaced by wifi antennas. Volume sales drove research and development and, as the technology became smaller and cheaper it spread from hulking great computers and rack mounted servers into individual switches and sensors.
For the price of a decent lunch you can put a camera the size of a golf ball in your house. It will automatically register with your wifi router, stream the images through a server in China, and you can sit in the restaurant and on your iPhone watch your cat shred your curtains, live and in high definition. Most of the people who buy them have no idea about that Chinese detour by the data. If you missed it too, it’s time to put down your sandwich and say hello to the Internet of Things (IoT).
Chips in everything
The IoT includes every one of the devices that operate the internet to communicate with each other. They can be transmitting information for remote examination by PCs or people (as cameras, indoor regulators, wellness trackers), they can be receiving commands (valves, programmable logic controllers (PLCs), electronic locks) and they could be doing both, as on account of mobiles, smart TVs and remote hard drives. Frequently the end purposes of that information are inside of meters of one another, yet the traffic jumps around the world to get there.
Presently, the internet conveys the control signals for all things from petrol pumps to nuclear power stations. A large portion of the devices are a piece of supervisory control and data acquisition (SCADA) frameworks,a generic term for any network of sensors, controllers and actuators that can be operating numerous different types of hardware and software.
SCADA devices are designed to be simple and reliable inside a factory, but tend to be woefully ill-prepared for connection to the internet, thanks to lax security and poorly written software. It’s often trivially simple to reprogramme a petrol pump to say something rude — it happened in the US in February — or infect the control systems of a nuclear power station — achieved in South Korea in December. All you need is to find the plant on the net and ask nicely.
Spun out
The first contact with this type of cyber attack was Stuxnet (see graphic below), a PC virus identified in 2010 that was said to be created to destroy uranium enrichment centrifuges —and it was somewhat great at it.. The code searched networks for PLCs running a specific piece of software from Siemens, and changed it;in the case of the centrifuges, to spin them into oblivion.
The problem is that, as with any virus — electronic or biological — it was rather good at destroying other things too. The original code was targeted and time limited, but it opened the eyes of hackers, from state sponsored teams to bored kids, to the opportunities for mayhem if you could seek out and take over a logic controller.
Stuxnet was dissected and improved, and its code is still used today to attack networks around the world. The reason it’s so effective is that the manufacturers of these internet connected SCADA devices almost always used trivially simple default passwords or “back door” access codes for factory testing. Many systems run firmware that is impossible to upgrade without a soldering iron, so when a hacker finds the way in they can run riot for years, and are often very hard to detect. If a device has no display screen, how do you know what it’s really doing?
You’d imagine that device designers had taken in their lesson at this point, yet a long way from it. Near enough everything that you connect to the internet, from a broadband router to a baby monitor,will have at least one security gap that hackers about. Since every one of these devices are joined with one another, and the security in local networks is dependably at the edges, it’s exceptionally easy to break in through a weakly protected device then bounce around searching for something else.
If I know you run a manufacturing plant, then first I find the unique IP address of your broadband router, which will be in the header information of every email you send, and every web page you visit. I can try to connect to the router, using the default manufacturer password.
Most of the time I’ll get in; but if access is only possible from inside your local network, I can send you a virus by email or through a malicious piece of code on a website. I could send you a free brochure on DVD or USB drive, with a virus payload attached, and your computer can open the doors for me.
Once inside, my virus sees every device on the network, and all the data flowing between them. It can see which devices are laptops, sensors, cameras and PLCs. It can try sending a few commands for fun — open a valve or two or change a temperature limit. It can reprogramme them so the emergency stop buttons become emergency start buttons.
The German Federal Office for Information Security reported last December that an anonymous steel factory had endured “massive harm to plant” following a cyber-attack demolished parts of the control framework, leaving the engineers unable to close down a blast furnace.
Auto configured
Hackers are exploiting two simple facts: the average user of an IoT device is not a programmer, and it’s cheaper to write a program than to design a chip.
Devices have to be extremely simple to set up, often doing lots of automatic configuration without telling the user what’s happening, and 90% of the time users don’t even know how to change the default password or PIN.
We’re all familiar with automatic updates for Windows and mobile apps, yet updating the operating system on IoT devices can be difficult and is hardly done. This is despite the fact that, instead of custom made chips that can only do one thing, nearly almost every IoT device uses a tiny embedded computer, with an operating system and software.
Your broadband router uses Linux, and many PLC controllers use Windows. Both are capable of running other programs — including a tweaked version of the factory installed application that appears to be doing everything normally — until someone on the other side of the planet clicks a button and unleashes a SCADA worm to disable all your interlock switches.
Thanks to the ubiquity of Bluetooth and wifi, you don’t even need to plug in anything. Your attacker can be walking past with a mobile phone or sitting in a basement on the other side of the world.
As we’ve seen in the news many times, the value of things like credit card numbers and identity theft bundles drove hackers to seek out customer databases in big corporations, but the cost/benefit ratio for IoT hacks is potentially far greater and is receiving more attention.
Hackers get long term access because the devices are hard to patch, don’t run anti-virus software, and users are oblivious to what you’re doing.
The rewards are huge; stealing an out of date customer list is nothing compared with blackmailing someone with a fleet of wind turbines that you can disable at will from anywhere in the world. That’s exploit CVE-2015-0985, in which turbines made by XZERES would obligingly send anyone the admin password for their control systems if they connected on the default web page. It made life easy for the engineers; easier still for the hackers. There were lessons learned on both sides.
Under your nose
Apart from causing physical damage and putting lives in danger, hackers can re-purpose the embedded software to work on their behalves; some of the biggest cyber attacks in recent months were carried out using botnets; hundreds of thousands of compromised systems in homes and offices working together under the control of hackers. These weren’t computers; they were broadband modems and PLCs. Millions of little boxes with flashing lights that are always connected, always vulnerable, and never checked. What’s yours doing now?
You may not be in charge of a nuclear reactor, but an outdated PLC or embedded Windows XP system controlling a printer in some far flung site is the perfect place to hide the command and control software that attacks something else. Stuxnet infected computers in Iran mainly, but many businesses in other countries suffered because they happened to have the same model of PLC.
You’ll need the IT department to work in partnership. Auditing firmware isn’t yet part of the NEBOSH exam; but making sure nothing on the network has a default password is simple enough, and educating your staff about the real-world hazards of a cyber-attack should be as important as toolbox talks on manual handling because in many cases they are the chinks in your armour. The German blast furnace was taken out by a free gift USB drive sent to a random employee. Stuxnet was an email attachment.
The IoT isn’t just for industry. People are inseparable from their smartphones, smart watches, portable hard drives and memory sticks, all of which can be re-purposed to inject viruses and scan your internal networks, sniffing for passwords and reporting back to their unseen masters.
Your IT department should be all too aware of the need to scan emails and change wifi passwords regularly, but if the security camera in your car park is accessible from anywhere and answers to “Password123”, you’re one hop away from chaos.
In a few years time the IoT will invade every aspect of our lives, from internet-enabled swimsuits to wireless cat-feeding stations. Some of it will control your production line, filter your drinking water and keep your doors locked. It will be marketed as efficient and easy to use. It will be promoted at individuals who think SCADA is a brand of car. It will be hacked. It will be watching you. You ought to be watching it as well.
£100,000 Punishment For Howarth Timber Over Delicate Rooftop Demise
Insight by
Bob Evans
Published on
1 July 2015
Health and safety blog
Sign up for future insights
No spam. Just the latest market insights by Seguro in your inbox each week.
Howarth Timber, the UK’s biggest privately owned timber organization, has been requested to pay more than £100,000 in fines and expenses after a worker died when he fell through a delicate rooftop at one of the organization’s sites.
The roofer Howarth employed to fix a leak has likewise been fined and gave a suspended jail sentence for his part in the occurrence.
Andrew Ward was working for roofer Paul Hardy, trading as Hardy Construction, at Howarth’s site in Bruce Grove, Tottenham, London on 22 May 2012. He died after falling more than eight meters through a fragile cement roof.
Howarth had hired Hardy to fix the roof but failed to check he was competent and did not conduct his own risk assessment for the job.
Hardy failed to plan the work properly and had no risk assessment or method statement. There was no safe access to the roof. The scaffold tower he provided had been erected incorrectly and he failed to provide a safe working platform.
Paul Hardy, of Grosvenor Road Belvedere, Kent, admitted breaching Section 3(2) of the Health and Safety Work Act. On 18th May at Southwark Crown Court, he was sentenced to four months in prison, suspended for 12 months, fined £3000 and told to pay costs of £11,756.
Howarth Timber Building supplies was fined £93,750 and ordered to pay full costs of £12,580 after it admitted breaching Section 3(1) of the Act.
“The work here should ideally have been undertaken without the need to directly access the roof, for example by using mobile elevated working platform or, if that was not possible , with safety measures to minimise the risk of falling such as netting, crawling boards and fall arrest harnesses,” said HSE Inspector Chris Tilley.
Safety is very important to us so we are offering a FREE Working at Height Risk Assessment for you to download instantly & use in your business today.
No spam. Just the latest market insights by Seguro in your inbox each week.
Health & Safety Myth Busters Panel
Having recently come across a section on the HSE website called Health & Safety Myth Busters it gave us here at Seguro a new insight into how some people blatantly use Heath & Safety as a way to get out of doing something they don’t want to do!
We all know there are Health & Safety implications for almost everything we do but it might be fun to write the risk assessment and method statement for some of these!
45% of deaths (19 of 42) in Britain on Construction Sites last year were as a result of falls from height and 581 workers suffered major injuries (35% of the total).
We are making a conscious effort to make sure all companies big or small are aware of the risks involved in working at heights.
If you need an up to date Risk Assessment and Method Statement we are offering a free download.
The HSE offer comprehensive guidance and information free of charge to download http://www.hse.gov.uk/construction/index.htm so that all companies have the resources available to them to ensure they comply.