Lockout and tag out processes involve more than putting a lock on a switch. They are comprehensive step-by-step processes that involve communication, coordination, and training. Show
Please note the following definitions from CSA Z460-20:
General steps of a lockout/tag out procedure include: 1. Prepare for Shutdown The authorized person will identify the machine, equipment, or process that requires lockout, which sources of energy are present and must be controlled, and what lockout device will be used. This step involves gathering all required equipment (e.g., lockout devices, tags, etc.). 2. Notify all Affected Personnel The authorized person will communicate the following information to notify affected persons:
This information should also be present on the tag required for the lockout. 3. Equipment Shutdown Follow shutdown procedures (either established by the manufacturer or employer). Equipment shutdown involves ensuring controls are in the off position, and verifying that all moving parts such as flywheels, gears, and spindles have come to a complete stop. 4. Isolation of System (De-energization) Follow the lockout procedure for the identified machine, equipment, or process. Review the following isolation practices for various forms of hazardous energy:
Figure 1: Electrical lockout
Figure 2: Hydraulic and pneumatic lockout
For more types of energy, see Hazardous Energy Control Programs. 5. Dissipation (Removal) of Residual or Stored Energy In general, examples include:
6. Lockout/Tag Out When the system's energy sources are locked out, there are specific guidelines that must be followed to make sure that the lock cannot be removed, and the system cannot be inadvertently operated. These guidelines include:
Figure 3: Example of multiple locks on a lockout tag 7. Verify Isolation Verify that the system is properly locked out before beginning any work. Verification can take place in several ways:
Choose the method that will make sure that the energy to the system has been isolated without creating other hazards during the verification. 8. Perform Maintenance or Service Activity Complete the activity that required the system to be locked out. 9. Remove Lockout/Tag out devices To remove locks and tags from a system that is now ready to be put back into service, the following general procedure can be used:
*Note: It is good practice to make sure any individual who placed a lock on the system should also be present when the system is re-started. This practice helps make sure those employees working on the system are not in a hazardous area when the machine is restarted.
Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time?Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time? A Microsoft Management Console snap-in that can track activity by hardware and software to measure performance.
What Windows utility can be used to find out what processes are launched at startup?Windows Task Scheduler can be set to launch a task or program at a future time, including at startup.
Which of the following is the best approach in making this determination assuming dynamic allocation of RAM is disabled?Which of the following is the best approach in making this determination, assuming dynamic allocation of RAM is disabled? Add up the required RAM for each of the guest VM operating systems you want to run at the same time and add the RAM required by your host OS.
Which method does a technician use to configure and improve a system's memory usage?Which method does a technician use to configure and improve a system's memory usage? Use of virtual memory or a pagefile, where disk space is used to supplement system RAM.
|