Establish a permit to access

Establish a permit to access

The management of confined space access permits is similar to that of security protocols. Only the content of the form is different and will be described in this user guide.

At the access permit register, click on the " buttonAdd a permit to access".

Complete the registration permit registration form:

- Chapters 'General information' and 'Foreign companies': Defines the permit assignment site, issuer, executing company and Execution Manager.

Chapter 'Work to be completed': Provides information on the work (date, duration, location, designation of work') and to identify specific risks related to the intervention. The list of risks can be changed directly on the access permit registration form.

Chapter 'Preliminary work procedure': Allows you to define:

o The need to establish an access permit: if so, there is a possibility to integrate the document via the attached part button. This document will be deferred as an appendix to the Access Permit PDF.

o The need to make a deposit: if so, the possibility of defining the type(s) of deposit to be made.

o The means of prevention to be put in place: possibility to modify the contents of the list directly on the form.

After validation of this form, as with security protocols, it is possible to download the PDF of the access permit for signature by interested parties.

Returning to the form, the tab 'Follow-up' appears and allows you to set a possible email alert before the record expires and an attached part button to keep the validated record.

Record states and functions (archive, duplication) are also the same as for security protocols.

    • Related Articles

    • Creating a fire permit

      Fire permit management is similar to that of security protocols. Only the content of the form is different and will be described in this user guide. At the level of the register of fire permits, click on the " buttonAdd a fire permit" Complete the ...
    • Establish a standard prevention plan

      The management of prevention plans is similar to that of security protocols. Only the content of the form is different. At the register of prevention plans, click on the " button "Add a prevention plan". 1/ Tab 'Description' Chapter 'General ...
    • Follow a security protocol

      After validating the security protocol, it is possible to return to the relevant record. A new tab'Follow-up'appears. This tab is used to attach the signed document and establish an end-of-validity alert for the document. The end date of validity, if ...
    • Creating the risk matrix

      In order to perform risk analysis, it is necessary to establish a risk matrix. Symalean software allows up to 5 separate settings: - theGravity* - theLevel of Exposure* - theProbability of occurrence of risk* - theLevel of Risk* - theReturn of ...
    • 3- Specify ESS event

      After the support of a type event'Accident'with'Body injuries', it is possible to access the tab'Declaration'. When the TeleDeclaration tab appears, you must complete its mandatory fields or no registration will be possible. This tab consists of a ...