A Deceleration device.
A rope, wire rope, or strap with connectors at each end for connecting the 5 point body harness to a lifeline, or anchorage.
Look under OSHA Flashcards on Quizlet and..
OSHA: Fall Protection in Construction, Subpart M and just past that area in the document.
This is from that document on page 13 and 14:
Fall Restraint Systems: While fall restraint systems are not
mentioned in Subpart M, OSHA
recognizes a fall restraint system as
a means of prevention. The system,
if properly used, tethers a worker
in a manner that will not allow a
fall of any distance. This system is
comprised of a body belt or body
harness, an anchorage, connectors,
and other necessary equipment.
Other components typically include
Photo: Skip Pennington
OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION
1 4
a lanyard, a lifeline, and other devices. For a restraint system
to work, the anchorage must be strong enough to prevent the
worker from moving past the point where the system is fully
extended, including an appropriate safety factor.
*In a November 2, 1995 interpretation letter to Mr. Dennis
Gilmore, OSHA suggested that, at a minimum, a fall restraint
system must have the capacity to withstand at least 3,000
pounds or twice the maximum expected force that is needed
to restrain the person from exposure to the fall hazard. In
determining this force, consideration should be given to
site-specific factors such as the force generated by a person
(including his/her tools, equipment, and materials) walking,
slipping, tripping, leaning, or sliding along the work surface.
Answer:
Explanation:
1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?
Answer:
Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken
2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?
Answer:
Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.
3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?
Answer:
Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting
Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.
Answer:
Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.
Answer:
B
Explanation:
Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]