This website uses cookies to ensure you have the best experience. Learn more

Mgn Note And Ism Code Essay

803 words - 4 pages

The MGN 20 was issued on 1997 by the UK Maritime Safety Agency in order to promote and establish a safe working environment, safeguard the health of the employees involved in the shipping industry and protect the environment before the compulsory implementation of the ISM code on 1998.

The MGN 20 note as mentioned in the reflective exercise brief can be said to be as a broad guideline for the adoption of safe working practices in the shipping industry. The mentioned note is strongly related to the ISM code which came into mandatory on 1998 since same principles applies although the risk assessment and risk management process was adopted in 2010 by amending the ISM code.

However this ...view middle of the document...

It may be determined that the MGN note is practical and it is adopted by the shipping industry, nevertheless the health surveillance procedure may be impractical taking into consideration the modern working environment of seafarers onboard merchant vessels. It can be said that some of its elements are driven by common sense. Speaking from a personal experience while serving onboard ships as a cadet and 2nd Officer it is common sense that if you develop a skin rash or a minor injury then that particular task causing the symptom will be arrested and re-assessed, of course actions will be taken to eliminate such ailment and safe guard the overall health and well being of the seaman involved.

The health surveillance general scope and purpose may be incorporated in the risk identification and risk management procedure without the necessity of having separate procedures in controlling a health related risk. Health risks may be incorporated in a risk management process. For example within the organization that I am involved for certain routine tasks we had developed a risk assessment technical library describing a model through risks assessment completed examples for several routine maintenance tasks related not solely to safety and the protection of the environment but also to occupational health such as high level noises, manual handling (back pain protection), minor injuries (cuttings, skin irritation) etc.

Company's management decided to have the above briefly described risk...

Find Another Essay On MGN Note and ISM code

Duties and Responsibilities from the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers

1967 words - 8 pages STCW Convention you must also consider the requirements of the international safety management code (ISM) and the provisions within the ILO maritime labour convention 2006 (MLC). Whilst the STCW applies to watch-keepers and crew with environmental and security duties the MLC and ISM apply to the master, chief engineer, officers, ratings and any other crew member on board ships of any tonnage, from a coaster to a very large tanker. The hours of

Many Industries Use Radio Frequency Identification

1753 words - 8 pages standards $0.15 (passive tags) 2450-5800 MHz (microwave) ISM band 1–2 m High 802.11 WLAN, Bluetooth standards $25 (active tags) 3.1–10 GHz (microwave) Ultra wide band to 200 M High requires semi-active or active tags $5 projected Figure 1 THE TECHNOLOGY’S APPLICATION WHERE The RFID tag can be afixed to an object and uses to tack and manage inventory, asset and people. For example it can be afixed to computer equiptmnent, books and mobile

The Management and Marketing Strategies of COSCO

3378 words - 14 pages subsidiary companies are certified by DNV, CSS and the Auditing & Certification Center of China Academy of Safety Science & Technology for OHSAS 18001.2.8 International Safety Management (ISM) CodeThe ISM Code is the International Standard for Safe Management and Operation of Ships and Pollution Prevention. Its purpose is:•to ensure Safety at Sea•to prevent human injury or loss of life•to avoid damage to the environment and

Applications and Capabilities of Low Energy Bluetooth

1220 words - 5 pages protection. This is because Secure Simple Pairing uses Elliptic Curve Differ -Hellman and Low energy Bluetooth technology does not. The use of each association model is based on the I/O capabilities of the devices in a similar manner as Secure Simple Pairing. 2) Key Generation - Key generation in Low energy Bluetooth technology is performed by the Host on each device independent of any other Low energy Bluetooth technology device. Note: Key

Why Southwest can succeed in the airline industry

2089 words - 8 pages SOUTHWEST AIRLINESCASE STUDYMay, 2002 (note we want to consider whats going on now, Feb 2003)Wow! An excited Colleen Barrett, new president of Southwest shouted in the meeting with her management team. We have bucked the money-losing trend that other U.S carriers are in and have reported a profit of $21.4 million in the first quarter of 2002. Now the management team is reflecting on second quarter 2002 results.At the same time that Southwest

Bluetooth Technology

2509 words - 10 pages Executive SummaryThe recent steps along the wireless technological frontier and a host of technological innovations have revolutionised wireless broadband Internet access and provided many new and exciting opportunities. However, much is left to be desired in the "last mile" or rather "last few feet". For instance, with the advent of GPRS(General Packet Radio Service) and CDMA(Code Division Multiple Access) and a number of other revolutionary

Revolutions of 1848

922 words - 4 pages The ideas of Europe have changed. The Congress of Vienna, the French Revolution and the Napoleonic Code were all ideological precursors to the revolutionary epidemic that expanded throughout Europe. These conversion of ideas infected the population. Nationalism, Socialism, Liberalism, and Democracy were influencing the people's perception. Revolutions erupted in 1848; which were called the “Springtime of the Peoples.” Rebellions

Am I Uninsurable?

1119 words - 4 pages statement says that they have "codes". They have codes for bad driving records, codes for heart attacks, codes for everything! Morse code, a short here a long there, the code is simple, if you have the answer sheet. I could write this entire paper in Morse code, and If you had the sheet you could decipher the paper. The codes are just a way to say they are protecting your information without actually doing so. The (IAI) the insurance activity index

Is it Possible to Eliminate Poverty?

2517 words - 11 pages disorganized and destitute communities(Wolf 44). Poverty may exists in these poorer neighborhoods solely because people lose a sense of hope while looking at their environment. They examine their surroundings and note that most of the community is living in poverty so why should I be any different? Now that we have examined some of the reasons why poverty exists, we can look at why poverty will never be completely eliminated. There is huge


1745 words - 7 pages formulate and implement gender sensitive policies in an Organization? (30 marks)MGSE-009: Gender Issues in Work, Employment and ProductivityTutor Marked Assignment (TMA -01)Programme code: MAGDCourse Code: MGSE-009Assignment code: MGSE-009/AST-01/TMA/2013-14Date of Submission:July 2013 session: November 30, 2013January 2014 session: May15,2014Maximum Marks: 100Weightage: 30%PART- AWrite a short note on the following in 200 words each.Gender Audit of

Malicious Code

935 words - 4 pages that malicious code can take are:* Java Applets* ActiveX Controls* Scripting languages* Browser plug-ins* Pushed contentImmediately after the code has entered a computer or network it can enter hard drives and begin working. Malicious code actually has the potential to physically destroy hard-ware by overloading the devices. Even easier is the ability to format drives and erase entire banks of information. The worst result, however, is the

Similar Essays

Ism Code Implementation Essay

1448 words - 6 pages In a study produced by Dr. Bhattacharya (2009) regarding the ISM code on the management of occupational health and safety in the maritime industry four (4) key findings have been raised questioning its effectiveness. The first issue that has been identified is the fact that both players (managers and seafarers) involved in the implementation of the ISM code have different perception on the subject. The managers of the shipping companies utilize

The Sinking Of M/T Erika: Erika Casulaty

1601 words - 6 pages requirements of the ISM code (2010, p.10), ship-owning and ship-managing companies are entitled to produce and follow documented procedures including the maintenance of their ships and ensure overall safe operation. 2. What were the significant risk management issues in this incident for the following stakeholders? • Vessel Owner As mentioned in the report (CEPM, n.d) the ship-owner was mainly occupied with the administrative, financial

Media Law On Privacy Essay

2151 words - 9 pages subsequent cases like B v H Bauer Publishing Ltd, A v B Plc and Blair v Associated Newspapers. However, until recently, it turned out that some cases go out of place.It appeared in Theakston v MGN that the judgments of degree on information remains confidential on condition that it is known only to ‘limited numbers of people’, whereas it does not when it is known to ‘substantial numbers’. Such an approach lacks of a clear legal clarity

Discuss Whether Trial By Jury Should Be Abolished In The English Legal System? Critically Analyse The Advantages And Disadvantages Of The System

2010 words - 8 pages , look better than if we have a dictatorship what dictator can afford to be complacent? People think that as long as the jury survives, all is rosy in the justice system. Many advantages and disadvantages have been shown, showing trial by jury should be abolished completely.Bibliography:CasesWard v. James [1966] 1 QB 273R v Ponting [1984]R v Randle and Pottle (1991)Elton John v. MGN [1999Ward v. James [1966] 1 QB 273R v Gregory [1993]Baldwin &amp