The management of prevention plans is similar to that of security protocols. Only the content of the form is different.
At the register of prevention plans, click on the " button "Add a prevention plan".
1/ Tab 'Description'
Chapter 'General information': Allows you to define the user company, the nature of the work, the start and end dates, the duration.
Chapter 'Common inspection': Allows to define the actions carried out during the joint preliminary inspection and the dates of completion of them. The data in this list are generated by default but are subject to change on the form.
Chapter 'Foreign companies': Allows foreign companies concerned by the prevention plan, the nature of their work and the dates of intervention.
2/ Tab 'Risks & Security'
Chapter 'Risks related to EU and EA facilities and activities': Allows risk families and indicate to which family(s) staff will be exposed during the work. The data in this list are generated by default but are subject to change on the form.
Chapter 'Provisions related to isolated work': Allows to define whether or not there will be a presence of 'isolated work' during the work. If yes, a table will be generated to indicate the work phase(s) involved and specific instructions to be put in place.
Chapter 'Instructions and procedures for external companies': Allows documents sent to foreign companies (instructions, procedures) as the dates of their communication. The data in this list are generated by default but may be
modified on the form.
3/ Tab 'Mathematics'
- Chapters 'Premises for use by employees of external companies' and 'Equipment(s) for the use of EA': Specifies premises and/or equipment made available to foreign companies.
After validation of this form, as with security protocols, it is possible to download the PDF of the prevention plan for signature by interested parties.
Returning to the form, the tab 'Follow-up' appears and allows you to set a possible email alert before the record expires and an attached part button to keep the validated record.
Record states and functions (archive, duplication) are also the same as for security protocols.