Five safety rules

Residential Estate Security Handbook 2017 Editor's Choice, Security Services & Risk Management, Residential Estate (Industry)

Working on electrical installations can be dangerous as those that are not properly connected or maintained pose a serious risk to both people and property, and can lead to injuries or even death. For this reason, DEHN Africa has adopted five safety rules according to the German standard series DIN VDE 0105 to help prevent electrical accidents.

Step 1: Disconnect completely

When working on an electrical installation, it is best to ensure that it is disconnected from live parts on all poles.

Step 2: Secure against reconnection

To prevent an accidental reconnection of an installation where work is in progress, you need to replace the unscrewed fuses in the low-voltage system with lockable lockout devices, or ensure that all breakers on the off position are locked and adequate warnings are placed.

Step 3: Verify that the installation is dead

To verify that the installation is dead, you can use suitable test equipment such as a voltage detector to verify on all poles that the installation is dead. You also need to check the correct function of the voltage detector prior to using it.

Step 4: Use earthing and short-circuiting devices

After verification, connect the cables and the earthing system with short-circuit-proof earthing and short-circuiting devices. It is also important to ensure that the relevant parts must be earthed before they are short-circuited. Only after a successful application of the earthing and short-circuiting devices can the installation be considered dead and safe to work on.

Step 5: Provide protection against adjacent live parts

According to the five safety rules, adjacent parts are located in the vicinity zone. If parts of an electrical installation in the vicinity zone of the work location cannot be disconnected, additional precautions must be taken before work is resumed. In this case, it is essential to use insulating protective shutters or covering material as protection against any accidental contact.

For more information contact DEHN Protection South Africa, +27 (0)11 704 1487, [email protected], www.dehn-africa.com.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...