IT in Manufacturing


Reduce risk through integrated isolation management

July 2012 IT in Manufacturing

Mining by its very nature is hazardous. Demanding mining processes pose significant, daily risks to employees, contractors and visitors. Stakeholders require that accountability for safety on a mine is assigned to management in line with good governance and legislation, and demand that safety processes and records are opened to scrutiny.

Apart from the regrettable injuries and fatalities, safety-related stoppages in mining companies also result in lost production, lost profits, significant remedial costs and loss of reputation. It is therefore not surprising that efforts are being made by mining companies to improve their safe work procedures and reduce the risk of an accident.

Accidents occur when a person is exposed to a source of uncontained energy. During plant work there are many sources that could cause harm, such as pressure, heights, mechanical and electrical. Properly designed plant and equipment have inherent safeguards such as physical guards, heat insulation, safety interlocks and pressure release valves. Under normal operation the plant functions safely by virtue of the inherent equipment and process design. However, there are many situations when non-routine work such as maintenance requires that these normal safeguards are removed or altered in such a way that a person could be exposed to a hazardous source of energy.

In order to determine the nature of the hazards and the risks involved with non-routine work, a job risk assessment is performed during the planning of the work. The purpose of this risk assessment is to identify the hazards associated with a task or activity and assess the probability and the consequences of something going wrong.

The risk assessment should also consider the controls in place (for example, personal protective equipment or isolations) and determine the residual risk and alert the people involved. Once the risks are understood and have been mitigated and the residual risk understood, then work can take place in a safe manner.

An important objective of the risk assessment process is to identify low-risk or routine activities as distinct from high-risk or non-routine activities. In the case of routine activities, people are usually trained and while the activity might be inherently hazardous, the processes are governed by standard procedures and check lists. High-risk activities, on the other hand, rely on competent people doing the work, as well as a set of temporary controls such as isolations, personnel protective equipment and standby personnel.

There are several systems that companies use to manage work in hazardous areas. These normally include a risk assessment system, a permit to work system and an isolation management system. Sometimes these systems are a well designed integrated process, but in some companies the individual elements are often not understood and too much onus is placed on experience and human judgement.

Isolations are critical when people perform non-routine work in hazardous environments. Isolations are typically physical barriers put in place to prevent exposure to sources of harmful energy. Examples would include a slip plate between two flanges, a valve locked open or closed, or an electrical circuit isolated by racking out the switchgear. Isolations are temporary in nature as they relate to non-routine work. Isolation management can be a complex process and there are many best practices users can adopt in mining situations. For example, isolations can be managed with a simple tagging system whereby ‘do not operate’ tags are printed and used on isolation points.

An even more reliable system is to use a combination of personal locks and supervisor locks. Higher levels of integrity can be achieved whereby isolations in the field are verified by using mobile devices that scan bar-coded tags and validate the corresponding isolation point by reading RFID tags. Lock boxes or key safes can also be used to provide additional management and prevent locks from being accidentally removed before work is complete.

Management of isolations can become quite complex, particularly when multiple isolations are required for a job, or multiple overlapping jobs are taking place simultaneously in the same area. The system of managing isolations needs to be both simple and robust. Computer based systems can play an important role in managing the complexity and improving the integrity of the process. Integrated computer systems that cater for risk assessments, permits to work and isolation management in a common safety system can dramatically reduce the inherent risk in hazardous situations. Mining companies around the world are increasingly implementing these systems and reaching levels of safety integrity on par with or better than any other industry.

For more information contact Nikki Beech, ApplyIT, +27 (0)31 514 7300, [email protected], www.applyit.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.

Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.

Read more...
Siemens elevates automotive and aerospace simulation
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software has announced the latest update to its Simcenter portfolio, delivering advancements in aerostructure analysis, electric motor design, gear optimisation and smart virtual sensing. These enhancements are designed to streamline workflows, accelerate certification and provide deeper insights into system performance.

Read more...
Automation in 2025: Navigating manufacturing innovation without the risk
IT in Manufacturing
During 2025, a wave of innovative technologies is expected to disrupt and change the way IT is applied to automation systems. The challenge lies in balancing the reliability of proven techniques with the potential of new technologies, all while minimising and controlling risk. This article explores ways to approach the latest information technologies effectively in a manufacturing context.

Read more...
South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...