Basics of Hazard and Vulnerability Analysis – Health System Example

Download free paperFile format: .doc, available for editing

"Basics of Hazard and Vulnerability Analysis" is an amazing example of a paper on the health system. The following basics are in relation to the Healthcare Coalition; (a) probable hazards that could be faced by the Coalition are identified and prioritized, (b) from the list of hazards identified, general and specific vulnerabilities for the Coalition and member organizations are identified, (c) the risks (the products of the probable hazards and associated vulnerabilities) are sorted out and prioritized, (d) measures are taken to reduce or prevent the risks, or the consequences of post-impact (preparedness) are addressed, for example, backup notification systems may be developed, and (e) the process of hazard vulnerability analysis is iterative and therefore, it is supposed to be reviewed after a major incident or on a yearly basis (Barbera and Macintyre, 2009).       How the Incidence Command System Operates To Control and Manage Various Disasters and Emergencies Incidence Command System (ICS) utilizes common terminology that is expressive and decisive; the terminologies are not difficult to understand and they are used to control communications, resources, and personnel at the site of a critical incident.

In a nutshell, ICS is a well-prepared team approach for the management of critical conditions. It utilizes common terminology and it consists of a modular organization, a practicable span of control, and it uses clear documentation and reporting procedures. There are 5 key management activities that make up the ICS structure: Command – objectives, and priorities are set and it is responsible for the overall incident command. Operations – it is responsible for all tactical operations that are required to execute the plan. Planning – it is liable for the dissemination, evaluation, and collection of information about the incident development and the condition of all the available resources. Logistics – it is liable for the provision of the necessary support (such as services, materials, and facilities) in order to meet the needs of the incident. Finance – it is responsible for the monitoring and documentation of all the costs.

It also offers the necessary financial support that is related to the incident (Vendrell, 2001). How A Hazard and Vulnerability Analysis Is Used In the Planning Process for Emergencies Hazard and planning analysis is used in the planning process for emergencies in a number of ways.

It assesses the type of hazards, their instigating events, their effects, and their probabilities of occurrence. The process starts with the substance inventory which identifies dangerous processes or substances. The quantities of substance and the threat locations are also determined. A substance inventory is used in the assessment of the threats posed to the workers and the whole facility. It is also utilized in the assessment of the threats posed to the environment and neighbors of the facility. It is imperative to determine locations of special facilities that possess the limited capability to take protective action or receive warnings.

Nursing homes, recreation facilities, hospitals, jails, and schools are examples of such facilities. In most of the cases, these facilities have their own emergency plans with which the public or private sector emergency planners can work (Lindell and Perry, 2006).


Barbera, J. A. & Macintyre, A. G. (2009). MSCC: The Healthcare Coalition in emergency response and recovery. Washington, D.C.: U.S. Department of Health and Human Services.

Lindell, M. K. & Perry, R. W. (2006). Wiley pathways emergency planning. Hoboken, NJ: John Wiley & Sons.

Vendrell, E. G. (2001, June). The Incident Command System: A proven tool for the management of emergency operations. International Foundation for Protection Officers. Retrieved from

Download free paperFile format: .doc, available for editing
Contact Us