The Final Puzzle

1234567891011121314
Across
  1. 2. When an employee gets hurt, this is considered a
  2. 5. Impromptu office safety program for submitting lower risk activity
  3. 8. An ergonomics tool that tracks user clicks and helps users take adequate breaks
  4. 10. Tool used to carefully study and list the safety critical portions of a job or task to determine hazard-mitigating actions
  5. 11. malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
  6. 12. A two-day, face-to-face leadership training for supervisors and managers; one of five classes in Central SH&E's Safety
  7. 14. attempt to obtain sensitive information such as usernames, passwords, etc. often for malicious reasons, by disguising as a trustworthy entity in an electronic communication
Down
  1. 1. An example would be a puddle of water or an electrical wire sticking out that could potentially injure an employee
  2. 3. malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
  3. 4. How we measure safety performance
  4. 6. The new safety tool that we use to input Near Miss observations
  5. 7. One of EMIT's highest risk areas
  6. 9. Safety Performance Self Assessments
  7. 13. Observations that help recognize hazards and at risk behavior before they lead into an actual event