1 / 16

Company

Why BOW-TIE & HAZID monitor?. Knowing what should be done for: BOW-TIE & HAZID (i.e. communication of responsibilities). BOW-TIE & HAZID recommendations BOW-TIE & HAZID actions Follow-Up Comments long for actions Action Status report. Company. Contractors Consultants Third party.

Download Presentation

Company

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Why BOW-TIE & HAZID monitor? Knowing what should be done for: BOW-TIE & HAZID (i.e. communication of responsibilities) • BOW-TIE & HAZID recommendations • BOW-TIE & HAZID actions Follow-Up • Comments long for actions • Action Status report Company Contractors Consultants Third party http://adepp.webexone.com

  2. What is BOW-TIE & HAZID monitor? Location A • BOW-TIEmonitor is a secure online monitoring system which: • UTILISES: • BOW-TIE & HAZID actions register by Company, consultant, Contractors, and Third party to: • Generate BOW-TIE& HAZID actions • Provide expert support • Generate BOW-TIE & HAZID activities • Generate BOW-TIE& HAZID tasks • Help the Follow-UP • Print the updated BOW-TIE & HAZID action status report at any time • BOW-TIE & HAZID monitor uses the friendly interfaces with expert support for traceability and audit purpose by Company, Contractors, Contractors and Verification Party • BOW-TIE & HAZID data and documents can be exported easily to Company, consultant or Contractor’s document control system. Location C Location B Location D http://adepp.webexone.com

  3. ADEPP monitor ( Login) Login Name: demo Password: adepp2009 http://adepp.webexone.com

  4. BOW-TIE & HAZID monitor Click on New Enter BOW-TIE Save Click on view BOW-TIE monitor or HAZID Note: All BOW-TIE actions can be imported if project has already perform BOW-TIE or HAZID by other softwares http://adepp.webexone.com

  5. BOW-TIE & HAZID monitor Enter BOW-TIE recommendations Save http://adepp.webexone.com

  6. BOW-TIE & HAZID monitor Click on Search Icon http://adepp.webexone.com

  7. BOW-TIE & HAZID monitor Click on COPY Insert your comments Click on Guidelines (2) HAZID worksheet & Guide http://adepp.webexone.com

  8. BOW-TIE & HAZID monitor Insert your comments http://adepp.webexone.com

  9. BOW-TIE & HAZID monitor Click on Activity-Task Icon http://adepp.webexone.com

  10. BOW-TIE & HAZID monitor Define, Activity and Tasks Save http://adepp.webexone.com

  11. BOW-TIE & HAZID monitor Click on Comment log http://adepp.webexone.com

  12. BOW-TIE & HAZID monitor Click on Print http://adepp.webexone.com

  13. BOW-TIE & HAZID monitor Enter Tasks Save http://adepp.webexone.com

  14. BOW-TIE & HAZID monitor Click on Follow-UP Click on export Convert to Excel file http://adepp.webexone.com

  15. Terms of Us of ADEPP monitor. • ADEPP monitor will be built based on requirement of project. • HSE Manger or his representative can Edit the HSE actions register • Others have access to Read & Add ( Project to advise) • Projects can use ADEPP monitors if they sign the Terms of Us of ADEPP monitor. • All SIMOP register can beexported to company intranet at any time. ( It is recommended to transfer data weekly to company intranet) • ADEPP monitor uses the secure web server to allow project team members to view, add, modify and delete only the specific information they need. • Secure Sockets Layer (SSL), is an extra level of security for ADEPP monitor. It requires the project team remember to log on through a secure server, which prevents hackers from accessing their information. SSL uses technology known as encryption. This is software that scrambles the data with secret code. • Company, Contractors, Sub-contractors, Vendors are required to log in to the site with SSL encryption enabled, so the project can share very sensitive, confidential data through ADEPP monitor site. http://adepp.webexone.com

  16. Thank your for your kind attention! Fabienne. F. SALIMI Director ADEPP Ltd. ( UK) www.adepp.webexone.com http://adepp.webexone.com

More Related