Operational safety

from Wikipedia, the free encyclopedia

Operational safety is safety at work , the occupational safety and environmental protection to that of a safety hazard -free condition of service buildings .

General

Every technique or technology poses a hazard , i.e. a potential danger for protected goods ( people , animals , property or the environment ). Technical systems , work equipment , vehicles , buildings , devices or other means of production come into consideration as endangering economic objects. The technical systems include industrial systems or infrastructure systems . Most hazardous objects require an official operating permit . Before they are issued, there is a review of the risk-free operation of systems and facilities.

The purpose of operational safety is to minimize or eliminate this hazard. To this end, risk management measures are to be used. If these measures cannot or should not completely eliminate the existing operational risk , the limit risk remains . Limit risk is the generally accepted dangers of a technical condition, event or process . Necessary risk management leads to the marginal risk, further risk management to the residual risk . The residual risk is therefore always smaller than the marginal risk. If, on the other hand, the existing risk is greater than the acceptable limit risk, there is a danger.

Legal issues

Regular maintenance , repairs and maintenance contribute to operational safety . Maintenance is the entirety of all measures to maintain the safe condition or return to it ( Section 2 (7 ) BetrSichV ). The operators of systems are responsible for their repair and maintenance (e.g. § 3 No. 3, 5, 7, 10 EnWG ). These measures are intended in particular to prevent operational disruptions that impair operational safety . Special attention is given to systems that require monitoring ( Section 2 No. 30 ProdSG ), which also include measuring , control and regulating devices that ensure the safe operation of these systems that require monitoring.

Operational safety is also used in connection with the safety of workplaces in private or public companies within the meaning of the applicable health and safety regulations . Risks are to be combated at their source ( Section 4 No. 2 ArbSchG ).

Operational Safety Committee

In accordance with Section 21 (1) BetrSichV, the Industrial Safety Committee draws up technical rules for industrial safety (TRBS), which are published by the Federal Ministry of Labor and Social Affairs in the Federal Government's Joint Ministerial Gazette.

Computers and telecommunications

In the context of computer systems, the goal of operational safety is to ensure the safety of operation and of applications . This also includes security against external cyber attacks , such as malware . Operational safety also relates to failures that occur without outside interference , such as hardware or power failures , faulty operating software or operating errors .

The network security is a subtype of operational reliability, all measures for planning, execution and monitoring of security in computer networks includes

Insofar as necessary, according to Section 100 (1) TKG, the service provider of telecommunications services may use the inventory data and traffic data of the subscribers and users as well as the control data of an information technology protocol for data transmission , which are transmitted independently of the content of a communication process or are stored on the servers involved in the communication process and for Ensuring communication between recipient and sender are necessary, collect and use in order to identify, limit or eliminate faults or errors in telecommunications systems .

See also

Individual evidence

  1. Klaus Bichler / Ralf Krohn / Peter Philippi / Frank Schneidereit (eds.), Kompakt-Lexikon Logistik , 2017, p. 32
  2. Norbert Hochheimer, Das kleine QM-Lexikon , 2011, p. 105
  3. Konrad Reif, Automobilelektronik , 2009, p. 260
  4. Heinz Olenik / Karl-Heinz Malzahn, Safety lighting systems , 1998, p. 1
  5. Klaus-Rainer Müller, IT security with a system , 2003, p. 14