Guide to the Iosh Video Library

Total Page:16

File Type:pdf, Size:1020Kb

Guide to the Iosh Video Library IOSH VIDEO LENDING LIBRARY CATALOG Small Pieces LARGE PUZZLE TABLE OF CONTENTS GUIDE TO THE IOSH VIDEO LIBRARY ............................................................................................. 3 IIOSHOSH VVIDEOIDEO LLIBRARYIBRARY AAGREEMENTGREEMENT ......................................................................................... 9 - A -..................................................................................................................................... 11 AACCIDENT(S)CCIDENT(S) AAND/ORND/OR IINVESTIGATIONSNVESTIGATIONS .................................................................................... 11 ASBESTOS AWARENESS ............................................................................................................. 11 BACK SAFETY............................................................................................................................ 11 BBUS,US, TTRUCKINGRUCKING & FFLEETLEET MMAINTENANCEAINTENANCE....................................................................................... 13 CCHEMICALSHEMICALS .............................................................................................................................. 14 CCOMPRESSEDOMPRESSED GGASAS..................................................................................................................... 14 CONFINED SPACE ...................................................................................................................... 14 CCONSTRUCTIONONSTRUCTION SSAFETYAFETY............................................................................................................. 15 DDRIVINGRIVING SSAFETYAFETY ....................................................................................................................... 18 EELECTRICALLECTRICAL SSAFETYAFETY .................................................................................................................. 18 EEMERGENCYMERGENCY PPREPAREDNESSREPAREDNESS OORR EEMERGENCYMERGENCY AACTIONCTION PPLANSLANS ((EAP’s)EAP’s) ............................................... 19 EERGONOMICSRGONOMICS ........................................................................................................................... 20 FFALLALL PPROTECTIONROTECTION ..................................................................................................................... 20 FFIREIRE SSAFETYAFETY & PPREVENTIONREVENTION ....................................................................................................... 21 FFIRSTIRST AAID,ID, HHEALTHEALTH & HHEATEAT SSTRESSTRESS ............................................................................................ 21 FFOODOOD SSAFETYAFETY & HHOSPITALITYOSPITALITY SSERVICESERVICES ...................................................................................... 22 FFORKLIFTORKLIFT SSAFETYAFETY ...................................................................................................................... 22 GGENERALENERAL IINDUSTRYNDUSTRY .................................................................................................................. 24 HHAZCOMAZCOM & RRTKTK ((Right-To-Know)Right-To-Know) ................................................................................................. 24 HHEALTHCAREEALTHCARE ............................................................................................................................ 26 HHOTELOTEL AANDND HHOUSEKEEPINGOUSEKEEPING ....................................................................................................... 26 IINDOORNDOOR AAIRIR QQUALITYUALITY ................................................................................................................ 26 IINDUSTRIALNDUSTRIAL & SSHOPHOP SSAFETYAFETY ...................................................................................................... 27 LLABAB SSAFETYAFETY .............................................................................................................................. 27 LLEADEAD SSAFETYAFETY ......................................................................................................................... 28 LLO/TOO/TO ((LOCKOUT/TAGOUT)LOCKOUT/TAGOUT) .................................................................................................. 28 MMAINTENANCE,AINTENANCE, CCUSTODIALUSTODIAL & GGROUNDSROUNDS KKEEPINGEEPING......................................................................... 30 OOFFICEFFICE SSAFETYAFETY ......................................................................................................................... 30 OOSHASHA....................................................................................................................................... 31 PPPEPE ((PERSONALPERSONAL PPROTECTIONROTECTION EEQUIPMENT)QUIPMENT) ................................................................................... 31 RRECORDKEEPINGECORDKEEPING....................................................................................................................... 34 SSAFETYAFETY OORIENTATION,RIENTATION, MMOTIVATIONALOTIVATIONAL & AAWARENESSWARENESS TTRAININGRAINING .................................................... 34 SSOILOIL TTESTINGESTING & CCOMPETENTOMPETENT PPERSONERSON RRESPONSILITIESESPONSILITIES ................................................................. 36 SSUPERVISORUPERVISOR SSAFETYAFETY & RRESPONSIBILITIESESPONSIBILITIES................................................................................... 36 TTOOLSOOLS ..................................................................................................................................... 36 UUTILITIES,TILITIES, PPUBLICUBLIC WWORKSORKS & SSOLIDOLID WWASTEASTE MMANAGEMENTANAGEMENT ............................................................. 37 WWAREHOUSEAREHOUSE SSAFETYAFETY ................................................................................................................. 37 WWELDINGELDING ................................................................................................................................. 37 WWINTERINTER DDRIVINGRIVING ...................................................................................................................... 38 WWORKPLACEORKPLACE VVIOLENCEIOLENCE .............................................................................................................. 38 2 GUIDE TO THE IOSH VIDEO LIBRARY What is the IOSH Video Library? 2. Borrowers may check out three videos at a time. The IOSH Video Library is a collection of safety- training materials available for loan to employers and We may make special arrangements to loan more workers in the State of Iowa. It is a service provided than three videos; for example, in the event of a by the tax-payers of Iowa, Federal OSHA, and the special occasion such as a safety fair. Contact the Division of Labor Services. library for further information. Our video library has more than 300 titles in VHS There are no restrictions on the number of videos format; several are DVD. The videos cover a wide that you may schedule at any one time, nor on variety of subjects reflecting occupations that are how far in advance you may schedule them. In abundant in Iowa. For the quickest and most fact, advance scheduling is strongly encouraged! comprehensive view of the videos and IOSH Consultation and Education services available to you, 3. The usual loan period is two weeks from please go to our website at: time of arrival, which is usually two wwww.iowaworkforce.org/laborww.iowaworkforce.org/labor. The videos can be business days. found under IOSH Consultation. For example: a video checked out to you on DDISCLAIMER:ISCLAIMER: January 2 would be mailed back to the Library on IOSH CONSULTATION AND EDUCATION DOES NOT January 19. Requests for reasonable extended ENDORSE, APPROVE OR GUARANTEE THE borrowing terms are granted whenever possible, QUALITY AND CONTENT OF THE VIDEOS. THE but we must receive your request for an extension VIDEOS ARE FOR EDUCATIONAL PURPOSES AND before the original due date. DDOO NNOTOT REPLACE THE OSHA STANDARDS FOR GENERAL INDUSTRY OR CONSTRUCTION. Please note that we’re unable to offer standing arrangements for loan periods longer than two IF YOU HAVE ANY QUESTIONS REGARDING THE weeks. All requests for extensions are considered GENERAL INDUSTRY OR CONSTRUCTION on a case-by-case basis. STANDARDS, PLEASE CONSULT THE ABOVE STANDARDS OR CONTACT IOSH CONSULTATION 4. Borrowers agree to pay for return AND EDUCATION AT 515-281-7629 OR 515-281- shipping. 0202. Prices for return shipping vary according to carrier, but the typical cost is minimal. Multiple videos will How does the Video Library work? be heavier, and of course, will cost more. Like using any other cooperative effort, there are a few 5. Library materials must be returned in rules that require the attention to the rights and person, oorr by traceable carrier aandnd insured privileges of others as well as to your own needs: for $175 per title. 1. Borrowers agree not to duplicate “Traceable carrier” includes UPS, FedEx, Priority copyrighted titles. See Page 6. Mail, Airborne Express, etc. wwith ith deeliverylivery cconfirmationonfirmation. Please note that neither “Book Rate” The producers with whom we work are nor “Media Mail” meet the requirements for demonstrating a sincere commitment to public traceability or insurance. These methods are service in allowing their products to be made prohibited for the return
Recommended publications
  • Job Hazard Analysis
    Identifying and Evaluating Hazards in Research Laboratories Guidelines developed by the Hazards Identification and Evaluation Task Force of the American Chemical Society’s Committee on Chemical Safety Copyright 2013 American Chemical Society Table of Contents FOREWORD ................................................................................................................................................... 3 ACKNOWLEDGEMENTS ................................................................................................................................. 5 Task Force Members ..................................................................................................................................... 6 1. SCOPE AND APPLICATION ..................................................................................................................... 7 2. DEFINITIONS .......................................................................................................................................... 7 3. HAZARDS IDENTIFICATION AND EVALUATION ................................................................................... 10 4. ESTABLISHING ROLES AND RESPONSIBILITIES .................................................................................... 14 5. CHOOSING AND USING A TECHNIQUE FROM THIS GUIDE ................................................................. 17 6. CHANGE CONTROL .............................................................................................................................. 19 7. ASSESSING
    [Show full text]
  • Full Document
    R&D Centre for Mobile Applications (RDC) FEE, Dept of Telecommunications Engineering Czech Technical University in Prague RDC Technical Report TR-13-4 Internship report Evaluation of Compressibility of the Output of the Information-Concealing Algorithm Julien Mamelli, [email protected] 2nd year student at the Ecole´ des Mines d'Al`es (N^ımes,France) Internship supervisor: Luk´aˇsKencl, [email protected] August 2013 Abstract Compression is a key element to exchange files over the Internet. By generating re- dundancies, the concealing algorithm proposed by Kencl and Loebl [?], appears at first glance to be particularly designed to be combined with a compression scheme [?]. Is the output of the concealing algorithm actually compressible? We have tried 16 compression techniques on 1 120 files, and the result is that we have not found a solution which could advantageously use repetitions of the concealing method. Acknowledgments I would like to express my gratitude to my supervisor, Dr Luk´aˇsKencl, for his guidance and expertise throughout the course of this work. I would like to thank Prof. Robert Beˇst´akand Mr Pierre Runtz, for giving me the opportunity to carry out my internship at the Czech Technical University in Prague. I would also like to thank all the members of the Research and Development Center for Mobile Applications as well as my colleagues for the assistance they have given me during this period. 1 Contents 1 Introduction 3 2 Related Work 4 2.1 Information concealing method . 4 2.2 Archive formats . 5 2.3 Compression algorithms . 5 2.3.1 Lempel-Ziv algorithm .
    [Show full text]
  • Guidelines for Human Exposure Assessment Risk Assessment Forum
    EPA/100/B-19/001 October 2019 www.epa.gov/risk Guidelines for Human Exposure Assessment Risk Assessment Forum EPA/100/B-19/001 October 2019 Guidelines for Human Exposure Assessment Risk Assessment Forum U.S. Environmental Protection Agency DISCLAIMER This document has been reviewed in accordance with U.S. Environmental Protection Agency (EPA) policy. Mention of trade names or commercial products does not constitute endorsement or recommendation for use. Preferred citation: U.S. EPA (U.S. Environmental Protection Agency). (2019). Guidelines for Human Exposure Assessment. (EPA/100/B-19/001). Washington, D.C.: Risk Assessment Forum, U.S. EPA. Page | ii TABLE OF CONTENTS DISCLAIMER ..................................................................................................................................... ii LIST OF TABLES.............................................................................................................................. vii LIST OF FIGURES ........................................................................................................................... viii LIST OF BOXES ................................................................................................................................ ix ABBREVIATIONS AND ACRONYMS .............................................................................................. x PREFACE ........................................................................................................................................... xi AUTHORS, CONTRIBUTORS AND
    [Show full text]
  • ARC File Revision 3.0 Proposal
    ARC file Revision 3.0 Proposal Steen Christensen, Det Kongelige Bibliotek <ssc at kb dot dk> Michael Stack, Internet Archive <stack at archive dot org> Edited by Michael Stack Revision History Revision 1 09/09/2004 Initial conversion of wiki working doc. [http://crawler.archive.org/cgi-bin/wiki.pl?ArcRevisionProposal] to docbook. Added suggested edits suggested by Gordon Mohr (Others made are still up for consideration). This revision is what is being submitted to the IIPC Framework Group for review at their London, 09/20/2004 meeting. Table of Contents 1. Introduction ............................................................................................................................2 1.1. IIPC Archival Data Format Requirements .......................................................................... 2 1.2. Input ...........................................................................................................................2 1.3. Scope ..........................................................................................................................3 1.4. Acronyms, Abbreviations and Definitions .......................................................................... 3 2. ARC Record Addressing ........................................................................................................... 4 2.1. Reference ....................................................................................................................4 2.2. The ari Scheme ............................................................................................................
    [Show full text]
  • Cem-Seal-SDS Sheet
    Cem-Seal ICP Building Solutions Group/Pli-Dek Version No: 1.2 Issue Date: 10/26/2020 Safety Data Sheet according to OSHA HazCom Standard (2012) requirements Print Date: 10/26/2020 S.GHS.USA.EN SECTION 1 Identification Product Identifier Product name Cem-Seal Synonyms Not Available Other means of identification Not Available Recommended use of the chemical and restrictions on use Relevant identified uses Specialty floor coating Name, address, and telephone number of the chemical manufacturer, importer, or other responsible party Registered company name ICP Building Solutions Group/Pli-Dek Address 4565 W. Watkins Street Phoenix AZ Not applicable Telephone 623-435-2277 Fax Not Available Website www.ICPGROUP.com Email Not Available Emergency phone number Association / Organisation ChemTel Emergency telephone 1-800-255-3924 numbers Other emergency telephone 1-813-248-0585 numbers SECTION 2 Hazard(s) identification Classification of the substance or mixture NFPA 704 diamond Note: The hazard category numbers found in GHS classification in section 2 of this SDSs are NOT to be used to fill in the NFPA 704 diamond. Blue = Health Red = Fire Yellow = Reactivity White = Special (Oxidizer or water reactive substances) Classification Acute Aquatic Hazard Category 3 Label elements Hazard pictogram(s) Not Applicable Signal word Not Applicable Hazard statement(s) H402 Harmful to aquatic life. Hazard(s) not otherwise classified Not Applicable Precautionary statement(s) General P101 If medical advice is needed, have product container or label at hand. P102 Keep out of reach of children. Page 1 continued... Version No: 1.2 Page 2 of 8 Issue Date: 10/26/2020 Cem-Seal Print Date: 10/26/2020 Precautionary statement(s) Prevention P273 Avoid release to the environment.
    [Show full text]
  • Steganography and Vulnerabilities in Popular Archives Formats.| Nyxengine Nyx.Reversinglabs.Com
    Hiding in the Familiar: Steganography and Vulnerabilities in Popular Archives Formats.| NyxEngine nyx.reversinglabs.com Contents Introduction to NyxEngine ............................................................................................................................ 3 Introduction to ZIP file format ...................................................................................................................... 4 Introduction to steganography in ZIP archives ............................................................................................. 5 Steganography and file malformation security impacts ............................................................................... 8 References and tools .................................................................................................................................... 9 2 Introduction to NyxEngine Steganography1 is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. When it comes to digital steganography no stone should be left unturned in the search for viable hidden data. Although digital steganography is commonly used to hide data inside multimedia files, a similar approach can be used to hide data in archives as well. Steganography imposes the following data hiding rule: Data must be hidden in such a fashion that the user has no clue about the hidden message or file's existence. This can be achieved by
    [Show full text]
  • Safety Manual
    Eastern Elevator Safety and Health Manual January 2017 Page 1 of 125 SAFETY AND HEALTH MANUAL Index by Section Number Safety Policy ................................................................................................................. …4 Section 1: General Health and Safety Policies ............................................................. …5 Section 2: Hazard Communication ................................................................................ ..13 Section 3: Personal Protective Equipment (PPE) ......................................................... ..18 Section 4: Emergency Action Plan ................................................................................ ..31 Section 5: Fall Protection .............................................................................................. ..34 Section 6: Ladder Safety ............................................................................................... ..38 Section 7: Bloodborne Pathogens ................................................................................ ..42 Section 8: Motor Vehicle / Fleet Safety ......................................................................... ..47 Section 9: Hearing Conservation .................................................................................. ..50 Section 10: Lockout / Tagout ........................................................................................ ..53 Section 11: Fire Prevention ..........................................................................................
    [Show full text]
  • A PRACTICAL GUIDE for USE of REAL TIME DETECTION SYSTEMS for WORKER PROTECTION and COMPLIANCE with OCCUPATIONAL EXPOSURE LIMITS May 2019
    A PRACTICAL GUIDE FOR USE OF REAL TIME DETECTION SYSTEMS FOR WORKER PROTECTION AND COMPLIANCE WITH OCCUPATIONAL EXPOSURE LIMITS May 2019 WHITE PAPER May 2019 A PRACTICAL GUIDE FOR USE OF REAL TIME DETECTION SYSTEMS FOR WORKER PROTECTION AND COMPLIANCE WITH OCCUPATIONAL EXPOSURE LIMITS Prepared by: Energy Facility Contractor’s Group (EFCOG) Industrial Hygiene and Safety Task Group and Members of the American Industrial Hygiene Association (AIHA) Exposure Assessment Strategies Group Dina Siegel1, David Abrams 2, John Hill3, Steven Jahn2, Phil Smith2, Kayla Thomas4 1 Los Alamos National Laboratory 2 AIHA Exposure Assessment Strategies Committee 3 Savannah River Site 4 Kansas City National Security Campus A PRACTICAL GUIDE FOR USE OF REAL TIME DETECTION SYSTEMS FOR WORKER PROTECTION AND COMPLIANCE WITH OCCUPATIONAL EXPOSURE LIMITS May 2019 Table of Contents 1.0 Executive Summary 2.0 Introduction 3.0 Discussion 3.1 Occupational Exposure Assessment 3.2 Regulatory Compliance 3.3 Occupational Exposure Limits 3.4 Traditional Use of Real Time Detection Systems 3.5 Use and Limitations of Real Time Detection Systems 3.6 Use of Real Time Detection Systems for Compliance 3.7 Documentation/Reporting of Real Time Detection Systems Results 3.8 Peak Exposures Data Interpretations 3.9 Conclusions 4.0 Matrices 5.0 References 6.0 Attachments Page | 2 A PRACTICAL GUIDE FOR USE OF REAL TIME DETECTION SYSTEMS FOR WORKER PROTECTION AND COMPLIANCE WITH OCCUPATIONAL EXPOSURE LIMITS May 2019 1.0 Executive Summary This white paper presents practical guidance for field industrial hygiene personnel in the use and application of real time detection systems (RTDS) for exposure monitoring.
    [Show full text]
  • Supplementary File 2: Assessment of Quality and Bias
    Supplementary File 2: Assessment of quality and bias In preparing the tool, it was not possible to identify a dominant factor for which studies should be controlled for, instead recognising several key variables. Comparability was therefore scored against a single criterion of ‘effectively controlling for relevant factors’, meaning a maximum of eight points, rather than nine, were available. Where a nested cohort or matched case group was identified within an interventional study, it was agreed that the quality of the study as applied to impact of ETS would be appraised, and not the main interventional study outcomes. This acknowledged that high quality trials not relevant to the impact of ETS exposure could contain poor quality cohorts that were appropriate for inclusion, or vice versa. A point was awarded for satisfactory response on each question, indicated by a tick in the relevant table. Cohort Outcome Measures Domain and outcomes Point Representativeness of the exposed cohort A Truly representative of the paediatric population undergoing surgery B Somewhat representative of the paediatric population undergoing surgery C Selected subgroup of the population undergoing surgery D No description of the cohort selection process Selection of the non-exposed cohort A Drawn from the same community as the exposed cohort B Drawn from a different source C No description of the derivation of the non-exposed cohort Ascertainment of exposure A Secure record (e.g. surgical record, biological test) B Structured interview C Written self-report of self-completed questionnaire D No description Demonstration that outcome of interest was not present at start of the study A Yes B No Comparability of cohorts on the basis of the design or analysis A Study controls for reasonable factors (e.g.
    [Show full text]
  • Exposure Assessment Concepts
    This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this site. Copyright 2006, The Johns Hopkins University, Patrick Breysse, and Peter S. J. Lees. All rights reserved. Use of these materials permitted only in accordance with license rights granted. Materials provided “AS IS”; no representations or warranties provided. User assumes all responsibility for use, and all liability related thereto, and must independently review all materials for accuracy and efficacy. May contain materials owned by others. User is responsible for obtaining permissions for use from third parties as needed. Exposure Assessment Concepts Patrick N. Breysse, PhD, CIH Peter S.J. Lees, PhD, CIH Johns Hopkins University Section A Introduction Origin of Hygiene Hygeia was the Greek goddess of health Rene Dubos wrote: “For the worshippers of Hygeia, health is … a positive attribute to which men are entitled if they govern their lives wisely” Prevention is key 4 Exposure—Definition Contact between the outer boundary of the human body (skin, nose, lungs, GI tract) and a contaminant Requires the simultaneous presence of a contaminant and the contact between the person and that medium Quantified by concentration of contaminant and time and frequency of contact 5 Route of Exposure Inhalation Ingestion Dermal Direct injection Inhalation is most common in workplace—but not in general environment Moving towards concept of total exposure 6 Exposure Assessment Magnitude – Concentration in media (ppm, f/cc) Duration – Minutes, hours, days, working life, lifetime Frequency – Daily, weekly, seasonally 7 Types of Air Sampling: Time Source: U.S.
    [Show full text]
  • Community Exposure Assessment (Excluding Health
    (excluding health Community Exposure Assessment care providers) Physical distance >2 Duration of interaction1 Ventilation3 Source control and PPE Risk assessment metres maintained2 Case and contact are both wearing masks (cloth or medical); OR Case is wearing both a mask (cloth or Low risk medical) and a face shield4 regardless of PPE worn by (self-monitor)5 <15 minutes (except No Regardless of contact; OR Contact is wearing both a mask and eye for very brief ventilation protection regardless of PPE worn by case interactions such as High risk passing by someone) Either case or contact is not wearing a mask (self-isolate)6 Regardless of Low risk Yes Regardless of PPE worn by either case or contact ventilation (self-monitor) Case and contact are both wearing masks (cloth or medical); OR Case is wearing both a mask (cloth or Low risk medical) and a face shield regardless of PPE worn (self-monitor) Well by contact; OR Contact is wearing both a mask and ventilated eye protection regardless of PPE worn by case No High risk Either case or contact is not wearing a mask (self-isolate) Poorly High risk Regardless of PPE worn by either case or contact ventilated (self-isolate) 15 minutes – 1 hour Well Low risk Regardless of PPE worn by either case or contact ventilated (self-monitor) Case and contact are both wearing masks (cloth or medical); OR Case is wearing both a mask (cloth or Low risk Yes medical) and a face shield regardless of PPE worn (self-monitor) Poorly by contact; OR Contact is wearing both a mask and ventilated eye protection regardless of PPE worn by case High risk Either case or contact is not wearing a mask (self-isolate) COVID-19 Info-Line 905-688-8248 press 7 Toll-free: 1-888-505-6074 niagararegion.ca/COVID19 Created December 2020.
    [Show full text]
  • Controlling Chemical Exposure Industrial Hygiene Fact Sheets
    Controlling Chemical Exposure Industrial Hygiene Fact Sheets Concise guidance on 16 components of industrial hygiene controls New Jersey Department of Health and Senior Services Division of Epidemiology, Environmental and Occupational Health Occupational Health Service PO Box 360 Trenton, NJ 08625-0360 609-984-1863 October 2000 James E. McGreevey Clifton R. Lacy, M.D. Governor Commissioner Written by: Eileen Senn, MS, CIH Occupational Health Surveillance Program James S. Blumenstock Senior Assistant Commissioner Public Health Protection and Prevention Programs Eddy Bresnitz, MD, MS State Epidemiologist/Assistant Commissioner Division of Epidemiology, Environmental and Occupational Health Kathleen O’Leary, MS Director Occupational Health Service David Valiante, MS, CIH Acting Program Manager Occupational Health Surveillance Program Funding: This project was supported in part by a cooperative agreement from the U.S. Department of Health and Human Services, National Institute for Occupational Safety and Health (NIOSH). Reproduction: The NJDHSS encourages the copying and distribution of all or parts of this booklet. All materials are in the public domain and may be reproduced or copied without permission. Cita- tion as to the source is appreciated. This document is available on the Internet at: www.state.nj.us/health/eoh/survweb/ihfs.pdf Citation: Senn, E., Controlling Chemical Exposure; Industrial Hygiene Fact Sheets, Trenton, NJ: New Jersey Department of Health and Senior Services, October 2000. Table of Contents Methods for Controlling
    [Show full text]