skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Worker Safety and Security Teams Team Member Handbook

Abstract

Worker Safety and Security Teams (WSSTs) are an effective way to promote safe workplaces. While WSSTs have a variety of structures and roles, they have one thing in common - employees and management collaborate to find ways to prevent accidents, injuries, and illnesses on the job. The benefits for all concerned are obvious in that employees have a safe place to work, employers save money on lost work time and workers compensation costs, and everyone returns home safe and healthy each day. A successful WSST will have the support and wholehearted participation of management and employees. LANL has a WSST at the institutional level (IWSST) and at all directorates and many divisions. The WSSTs are part of LANL's Voluntary Protection Program (VPP). The WSSTs meet at least monthly and follow an agenda covering topics such as safety shares, behavior based safety (BBS) observations, upcoming events or activities, issues, etc. A WSST can effectively influence safety programs and provide recommendations to managers, who have the resources and authority to implement changes in the workplace. WSSTs are effective because they combine the knowledge, expertise, perspective, enthusiasm, and effort of a variety of employees with diverse backgrounds. Those with experience in a specificmore » job or work area know what the hazards or potential hazards are, and generally have ideas how to go about controlling them. Those who are less familiar with a job or area play a vital role too, by seeing what others may have overlooked or taken for granted. This booklet will cover the structure and operations of WSSTs, what needs to be done in order to be effective and successful, and how you can help, whether you're a WSST member or not.« less

Authors:
 [1]
  1. Los Alamos National Laboratory
Publication Date:
Research Org.:
Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
Sponsoring Org.:
DOE/LANL
OSTI Identifier:
1043505
Report Number(s):
LA-UR-12-22070
TRN: US201214%%136
DOE Contract Number:
AC52-06NA25396
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; ACCIDENTS; INJURIES; LANL; MANAGEMENT; MANUALS; PERSONNEL; RECOMMENDATIONS; SAFETY; SECURITY

Citation Formats

Sievers, Cindy S. Worker Safety and Security Teams Team Member Handbook. United States: N. p., 2012. Web. doi:10.2172/1043505.
Sievers, Cindy S. Worker Safety and Security Teams Team Member Handbook. United States. doi:10.2172/1043505.
Sievers, Cindy S. Mon . "Worker Safety and Security Teams Team Member Handbook". United States. doi:10.2172/1043505. https://www.osti.gov/servlets/purl/1043505.
@article{osti_1043505,
title = {Worker Safety and Security Teams Team Member Handbook},
author = {Sievers, Cindy S.},
abstractNote = {Worker Safety and Security Teams (WSSTs) are an effective way to promote safe workplaces. While WSSTs have a variety of structures and roles, they have one thing in common - employees and management collaborate to find ways to prevent accidents, injuries, and illnesses on the job. The benefits for all concerned are obvious in that employees have a safe place to work, employers save money on lost work time and workers compensation costs, and everyone returns home safe and healthy each day. A successful WSST will have the support and wholehearted participation of management and employees. LANL has a WSST at the institutional level (IWSST) and at all directorates and many divisions. The WSSTs are part of LANL's Voluntary Protection Program (VPP). The WSSTs meet at least monthly and follow an agenda covering topics such as safety shares, behavior based safety (BBS) observations, upcoming events or activities, issues, etc. A WSST can effectively influence safety programs and provide recommendations to managers, who have the resources and authority to implement changes in the workplace. WSSTs are effective because they combine the knowledge, expertise, perspective, enthusiasm, and effort of a variety of employees with diverse backgrounds. Those with experience in a specific job or work area know what the hazards or potential hazards are, and generally have ideas how to go about controlling them. Those who are less familiar with a job or area play a vital role too, by seeing what others may have overlooked or taken for granted. This booklet will cover the structure and operations of WSSTs, what needs to be done in order to be effective and successful, and how you can help, whether you're a WSST member or not.},
doi = {10.2172/1043505},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Mon Jun 11 00:00:00 EDT 2012},
month = {Mon Jun 11 00:00:00 EDT 2012}
}

Technical Report:

Save / Share:
  • The Worker Safety and Security Team (WSST) at Los Alamos National Laboratory holds an annual festival, WSST-fest, to engage workers and inform them about safety- and securityrelated matters. As part of the 2015 WSST-fest, workers were given the opportunity to participate in a survey assessing their engagement in their organizations and work environments. A total of 789 workers participated in the 23-question survey where they were also invited, optionally, to identify themselves, their organization, and to give open-ended feedback. The survey consisted of 23 positive statements (i.e. “My organization is a good place to work.”) with which the respondent couldmore » express a level of agreement. The text of these statements are provided in Table 1. The level of agreement corresponds to a 5-level Likert scale ranging from “Strongly Disagree” to “Strongly Agree.” In addition to assessing the overall positivity or negativity of the scores, the results were partitioned into several cohorts based on the response meta-data (self-identification, comments, etc.) to explore trends. Survey respondents were presented with the options to identify themselves, their organizations and to provide comments. These options suggested the following questions about the data set.« less
  • The primary purpose of this handbook is to provide guidance to the ISMS verification Team Leader and the verification team in conducting ISMS verifications. The handbook describes methods and approaches for the review of the ISMS documentation (Phase I) and ISMS implementation (Phase II) and provides information useful to the Team Leader in preparing the review plan, selecting and training the team, coordinating the conduct of the verification, and documenting the results. The process and techniques described are based on the results of several pilot ISMS verifications that have been conducted across the DOE complex. A secondary purpose of thismore » handbook is to provide information useful in developing DOE personnel to conduct these reviews. Specifically, this handbook describes methods and approaches to: (1) Develop the scope of the Phase 1 and Phase 2 review processes to be consistent with the history, hazards, and complexity of the site, facility, or activity; (2) Develop procedures for the conduct of the Phase 1 review, validating that the ISMS documentation satisfies the DEAR clause as amplified in DOE Policies 450.4, 450.5, 450.6 and associated guidance and that DOE can effectively execute responsibilities as described in the Functions, Responsibilities, and Authorities Manual (FRAM); (3) Develop procedures for the conduct of the Phase 2 review, validating that the description approved by the Approval Authority, following or concurrent with the Phase 1 review, has been implemented; and (4) Describe a methodology by which the DOE ISMS verification teams will be advised, trained, and/or mentored to conduct subsequent ISMS verifications. The handbook provides proven methods and approaches for verifying that commitments related to the DEAR, the FRAM, and associated amplifying guidance are in place and implemented in nuclear and high risk facilities. This handbook also contains useful guidance to line managers when preparing for a review of ISMS for radiological facilities, non-nuclear, or non-Defense Programs facilities. DOE line managers are encouraged to tailor the procedures described in this handbook for ISMS verifications for low risk facilities.« less
  • The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.
  • The existing regulatory environment for nuclear reactors impacts both the facility design and the cost of operations once the facility is built. Delaying the consideration of regulatory requirements until late in the facility design - or worse, until after construction has begun - can result in costly retrofitting as well as increased operational costs to fulfill safety, security, safeguards, and emergency readiness requirements. Considering the scale and scope, as well as the latest design trends in the next generation of nuclear facilities, there is an opportunity to evaluate the regulatory requirements and optimize the design process for Small Modular Reactorsmore » (SMRs), as compared to current Light Water Reactors (LWRs). To this end, Sandia has embarked on an initiative to evaluate the interactions of regulations and operations as an approach to optimizing the design of SMR facilities, supporting operational efficiencies, as well as regulatory requirements. The early stages of this initiative consider two focus areas. The first focus area, reported by LaChance, et al. (2007), identifies the regulatory requirements established for the current fleet of LWR facilities regarding Safety, Security, Operations, Safeguards, and Emergency Planning, and evaluates the technical bases for these requirements. The second focus area, developed in this report, documents the foundations for an innovative approach that supports a design framework for SMR facilities that incorporates the regulatory environment, as well as the continued operation of the facility, into the early design stages, eliminating the need for costly retrofitting and additional operating personnel to fulfill regulatory requirements. The work considers a technique known as Integrated Safety, Operations, Security and Safeguards (ISOSS) (Darby, et al., 2007). In coordination with the best practices of industrial operations, the goal of this effort is to develop a design framework that outlines how ISOSS requirements can be incorporated into the pre-conceptual through early facility design stages, seeking a cost-effective design that meets both operational efficiencies and the regulatory environment. The larger scope of the project, i.e., in future stages, includes the identification of potentially conflicting requirements identified by the ISOSS framework, including an analysis of how regulatory requirements may be changed to account for the intrinsic features of SMRs.« less
  • Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less