0% found this document useful (0 votes)
335 views1 page

Health Surveillance Cycle

The health surveillance cycle involves risk assessment and implementing controls by the employer. The employer then identifies who needs health surveillance based on risks and designs appropriate programs. Health surveillance is performed and results are managed by interpreting and acting on them to protect employee health.

Uploaded by

Emdad Yusuf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
335 views1 page

Health Surveillance Cycle

The health surveillance cycle involves risk assessment and implementing controls by the employer. The employer then identifies who needs health surveillance based on risks and designs appropriate programs. Health surveillance is performed and results are managed by interpreting and acting on them to protect employee health.

Uploaded by

Emdad Yusuf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Health and Safety

Executive

The health surveillance cycle


The diagram below provides an overview of the health surveillance cycle. The employer has a central role in
every aspect with involvement from employees to ensure effective implementation.
Risk assessment
and controls

Manage performance,
interpret the results and
act on the results

Implement health
surveillance for those
who need it

Do I need health surveillance?

Employer

Identify who will


do the health surveillance

What sort of health


surveillance do I need?

Set up and design health


surveillance according to need.
Seek help in doing so, if required

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy