Web-based software boosts HazMat security

Krantz, Boris
September 2004
Gases & Welding Distributor;Sep/Oct2004, Vol. 48 Issue 5, p49
Trade Publication
This article focuses on a Web-based software that boosts HazMat security. or decades, many gas distributors and manufacturers producing specialty and medical gases produced, stored, and distributed potentially dangerous gases including acetylene, propane, hydrogen, and other toxic or flammable HazMat gases. Before drivers can operate a commercial vehicle, they must pass pre-employment tests. Additional regulations mandate post-accident, random, reasonable-suspicion, return- to-duty, and follow-up tests. Maintaining secure personnel data is a legal requirement and presents additional considerations when selecting among security options. Difficulties arise in guaranteeing worker privacy when managing any amount of private data from a remote corporate office.


Related Articles

  • Safety.  // Network Dictionary;2007, p423 

    A definition of the term "Safety" in computer security is presented. The term refers to the need to ensure that the people involved with a company, including employees, customers and visitors are protected from harm.

  • Think Beyond the Laptop 'Box'. Tuvell, George // Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74 

    The article suggests that laptop computers should be furnished with security measures. Laptops serves as an extension of office computers and this requires an actual standard of data protection should be observed to prevent any unauthorized access to the database system and other important...

  • Breaches. Lindenmayer, Isabelle // American Banker;9/16/2005, Vol. 170 Issue 179, p5 

    Reports that the U.S. Army experienced a database security breach when computers, containing the personal records of a number of soldiers, were stolen from Fort Carson near Colorado Springs. Breach experienced by the Air Force only a month earlier in Aug., 2005; Use of unverifiable Social...

  • Motor vehicles are the leading cause of occupa-...  // Contractor Magazine;Aug97, Vol. 44 Issue 8, p5 

    Reports that according to the Occupational Safety and Health Administration (OSHA), motor vehicles were the leading cause of occupational fatalities in the United States in 1995. Number of workers killed in occupational accidents in 1995.

  • Freeze Out Security Violation Panic With This Advice.  // Assisted Housing Alert;Jun2010, Vol. 6 Issue 6, p45 

    The article discusses the importance of using the acronym ICE in handling potential security breaches in the U.S. It outlines the corresponding meanings of the acronym (ICE) to help staff members stay calm during security crisis. It notes that staff members will be able to spot any data...

  • THE POLL.  // SC Magazine: For IT Security Professionals (UK Edition);Dec2006, p11 

    The article reports on the results of a survey related to information security. Sixty five percent of workers in Great Britain admit they have considered taking data, such as sales leads and business contacts, when they leave the company and nearly two thirds admitted stealing data. £22.5...

  • The do's and don'ts of data breaches. Garretson, Cara // Network World;6/18/2007, Vol. 24 Issue 24, p6 

    The article discusses the importance of avoiding and counteracting data breaches. As the idea that data breach generally targets every organization that electronically stores personal or financial information about customers, partners or employees, or intellectual property, the author said that...

  • Enemies within. Bailey, Richard // Utility Week;4/22/2011, Vol. 34 Issue 15/16, p17 

    The article focuses on the security threat posed by disgruntled or covert employee acting dishonestly to British businesses. According to a 2010 Symantec survey, several office workers have admitted that they took sensitive data off site. A 2011 Deloitte survey found that there has been a sharp...

  • Defense in depth: It's more than just the technology. Urso, Jason // InTech;Mar/Apr2011, Vol. 58 Issue 2, p42 

    The article focuses on a defense-in-depth program that can guard against and prevent cybersecurity incidents. The need to regularly update and periodically review a cybersecurity program is emphasized together with the three keys: people, process and technology, to a successful one. Steps to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics