Security Sales & Integration May 2021 - 24

SMARTS & PARTS

Fireside Chat by Shane Clary

Risk Analysis in
Mass Notification
Risk
identification
should be
done at the
beginning
of a project,
but also
throughout a
project and in
the case of an
MNS, for the
duration of the
system.

Shane Clary, Ph.D., has
more than 45 years of
security and fire alarm
industry experience. He
serves on a number of
NFPA technical committees,
and is Vice President of
Codes and Standards
Compliance for Concord,
Calif.-headquartered Bay
Alarm Co.

24

▶ MY DISCUSSION THIS MONTH will be
on one of the key components that need to be
considered when designing any mass notification system (MNS), and that is the risk analysis. Before any design is laid out, shop drawings
produced, equipment ordered or a system is installed, a risk analysis needs to be executed. The
size and complexity of the occupancy will in the
end dictate the size of the risk analysis.
By definition, risk analysis is identifying and
analyzing future events that may have a negative
impact on individuals, property, assets and the
environment. Within NFPA 72, it is described
as " a process to characterize the likelihood, vulnerability, and magnitude of incidents associated
with natural, technological, and manmade disasters and other emergencies that address scenarios
of concern, their probability and their potential
consequences. " It is the " probability " that at an
extreme level mathematics comes into play, but
not at the level found within NFPA 72.
Risk analysis involves a number of basic steps,
and this should not vary between the design
of an MNS or the siting of strategic warheads.
What is the risk, what is the potential impact of
the risk, how can the risk be handled and how is
the risk to be monitored? The user of the occupancy must be part of this process. A risk analysis for an MNS can simply not be done without
the input of those that will be operating within
the premises that is to have an MNS system installed within.
In identifying risks, some may be more apparent than others. Risk identification should
be done at the beginning of a project, but also
throughout a project and in the case of an MNS,
for the duration of the system. Occupancies
change over time, both in use and hazards that
may be present both internally and externally.
Once an MNS is installed, that should not be
the end of identification of risks.
Once the risks have been identified, what is
the potential impact of each risk? One method is
to look at the impact as being high, medium or
low. A high impact would be an event that may

Security Sales & Integration MAY 2021

SS2105 pp24-25 Fireside Chat-IT Intel.indd 24

smclary@bayalarm.com

be catastrophic to the business or occupancy. A
medium impact would be critical and a low risk
would be marginal. In looking at the impact that
a particular identified risk may have, the probability should also be looked at. A highrisk impact
with a high probability would have more weight
than that of a low-risk impact with a low probability. There are of course a variety of combinations to this, and they are best to be placed
into a matrix such as high impact and then high,
medium or low probabilities.
The next step is how is the risk to be handled?
For an MNS, this would be the means of notification and who should be notified. Is this to be
for an event that may occur within a portion of
the premises, the entire premises, or outside of
the premises? If outside, is the event on the property of the premises or outside of the property? Is
the notification to go to those inside, outside or
both? Is notification to be provided to those that
are not on the property?
If this is determined to be required, is this in
the general vicinity, community, city, county?
How shall this notification be made, and is this
to be in stages as a situation develops or all at
once? During the formation of the risk analysis,
these questions and resolutions should be placed
within a matrix. Within the matrix would be
each risk, such as fire, hazardous substance release, active shooter and so forth.
The final part is how is the risk to be monitored? By this I mean before an event occurs. This
returns to the point that I mentioned above that
a risk analysis does not end with the MNS system being installed. Over time, there needs to be
a reassessment of the risks. Some may no longer
be as high as before, while others that were not
even present at the time of the original risk analysis may now be present and at a critical state.
New risk that may be identified will need to be
planned for. Risk reviews should be planned for
and clearly stated within the original risk analysis.
The specific requirements for a risk analysis
within the 2019 edition of NFPA 72 is found
in Section 24.3.12. A tool to use when preparing a risk analysis for an MNS is found in Table
A.7.3.6, Risk Analysis Checklist.
In closing, the risk analysis for an MNS does
not need to be overly complex but does need to
take into consideration identification of the risks,
impact of the risks, handling of the risks and ongoing monitoring of risks.
securitysales.com

4/16/21 11:31 AM


http://www.securitysales.com

Security Sales & Integration May 2021

Table of Contents for the Digital Edition of Security Sales & Integration May 2021

Security Sales & Integration May 2021 - Bellyband 1
Security Sales & Integration May 2021 - Bellyband 2
Security Sales & Integration May 2021 - C1
Security Sales & Integration May 2021 - C2
Security Sales & Integration May 2021 - 1
Security Sales & Integration May 2021 - 2
Security Sales & Integration May 2021 - 3
Security Sales & Integration May 2021 - 4
Security Sales & Integration May 2021 - 5
Security Sales & Integration May 2021 - 6
Security Sales & Integration May 2021 - 7
Security Sales & Integration May 2021 - 8
Security Sales & Integration May 2021 - 9
Security Sales & Integration May 2021 - 10
Security Sales & Integration May 2021 - 11
Security Sales & Integration May 2021 - 12
Security Sales & Integration May 2021 - 13
Security Sales & Integration May 2021 - 14
Security Sales & Integration May 2021 - 15
Security Sales & Integration May 2021 - 16
Security Sales & Integration May 2021 - 17
Security Sales & Integration May 2021 - 18
Security Sales & Integration May 2021 - 19
Security Sales & Integration May 2021 - 20
Security Sales & Integration May 2021 - 21
Security Sales & Integration May 2021 - 22
Security Sales & Integration May 2021 - 23
Security Sales & Integration May 2021 - 24
Security Sales & Integration May 2021 - 25
Security Sales & Integration May 2021 - 26
Security Sales & Integration May 2021 - 27
Security Sales & Integration May 2021 - 28
Security Sales & Integration May 2021 - 29
Security Sales & Integration May 2021 - 30
Security Sales & Integration May 2021 - 31
Security Sales & Integration May 2021 - 32
Security Sales & Integration May 2021 - 33
Security Sales & Integration May 2021 - 34
Security Sales & Integration May 2021 - 35
Security Sales & Integration May 2021 - 36
Security Sales & Integration May 2021 - 37
Security Sales & Integration May 2021 - 38
Security Sales & Integration May 2021 - 39
Security Sales & Integration May 2021 - 40
Security Sales & Integration May 2021 - 41
Security Sales & Integration May 2021 - 42
Security Sales & Integration May 2021 - 43
Security Sales & Integration May 2021 - 44
Security Sales & Integration May 2021 - 45
Security Sales & Integration May 2021 - 46
Security Sales & Integration May 2021 - 47
Security Sales & Integration May 2021 - 48
Security Sales & Integration May 2021 - 49
Security Sales & Integration May 2021 - 50
Security Sales & Integration May 2021 - 51
Security Sales & Integration May 2021 - 52
Security Sales & Integration May 2021 - 53
Security Sales & Integration May 2021 - 54
Security Sales & Integration May 2021 - 55
Security Sales & Integration May 2021 - 56
Security Sales & Integration May 2021 - 57
Security Sales & Integration May 2021 - 58
Security Sales & Integration May 2021 - 59
Security Sales & Integration May 2021 - 60
Security Sales & Integration May 2021 - 61
Security Sales & Integration May 2021 - 62
Security Sales & Integration May 2021 - 63
Security Sales & Integration May 2021 - 64
Security Sales & Integration May 2021 - C3
Security Sales & Integration May 2021 - C4
https://www.nxtbook.com/emerald/securitysales/august_2023
https://www.nxtbook.com/emerald/securitysales/july_2023
https://www.nxtbook.com/emerald/securitysales/june_2023
https://www.nxtbook.com/emerald/securitysales/may_2023
https://www.nxtbook.com/emerald/securitysales/april_2023
https://www.nxtbook.com/emerald/securitysales/march_2023
https://www.nxtbook.com/emerald/securitysales/february_2023
https://www.nxtbook.com/emerald/securitysales/january_2023
https://www.nxtbook.com/emerald/securitysales/december_2022
https://www.nxtbook.com/emerald/securitysales/november_2022
https://www.nxtbook.com/emerald/securitysales/october_2022
https://www.nxtbook.com/emerald/securitysales/september_2022
https://www.nxtbook.com/emerald/securitysales/august_2022
https://www.nxtbook.com/emerald/securitysales/july_2022
https://www.nxtbook.com/emerald/securitysales/june_2022
https://www.nxtbook.com/emerald/securitysales/may_2022
https://www.nxtbook.com/emerald/securitysales/april_2022
https://www.nxtbook.com/emerald/securitysales/march_2022
https://www.nxtbook.com/emerald/securitysales/february_2022
https://www.nxtbook.com/emerald/securitysales/january_2022
https://www.nxtbook.com/emerald/securitysales/december_2021
https://www.nxtbook.com/emerald/securitysales/november_2021
https://www.nxtbook.com/emerald/securitysales/october_2021
https://www.nxtbook.com/emerald/securitysales/september_2021
https://www.nxtbook.com/emerald/securitysales/august_2021
https://www.nxtbook.com/emerald/securitysales/july_2021
https://www.nxtbook.com/emerald/securitysales/june_2021
https://www.nxtbook.com/emerald/securitysales/may_2021
https://www.nxtbook.com/emerald/securitysales/apr_2021
https://www.nxtbookmedia.com