Across
- 2. When an employee gets hurt, this is considered a
- 5. Impromptu office safety program for submitting lower risk activity
- 8. An ergonomics tool that tracks user clicks and helps users take adequate breaks
- 10. Tool used to carefully study and list the safety critical portions of a job or task to determine hazard-mitigating actions
- 11. malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
- 12. A two-day, face-to-face leadership training for supervisors and managers; one of five classes in Central SH&E's Safety
- 14. attempt to obtain sensitive information such as usernames, passwords, etc. often for malicious reasons, by disguising as a trustworthy entity in an electronic communication
Down
- 1. An example would be a puddle of water or an electrical wire sticking out that could potentially injure an employee
- 3. malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
- 4. How we measure safety performance
- 6. The new safety tool that we use to input Near Miss observations
- 7. One of EMIT's highest risk areas
- 9. Safety Performance Self Assessments
- 13. Observations that help recognize hazards and at risk behavior before they lead into an actual event