Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Employee Risk Assessment
1. Administrative Information: Document control information including date of assessment, revision number, and responsible persons
2. Workplace Description: Overview of the workplace, departments, and work areas covered by the assessment
3. Assessment Methodology: Description of the methods and tools used to conduct the risk assessment
4. Physical Hazard Identification: Assessment of physical workplace hazards including machinery, noise, vibration, lighting, and temperature
5. Ergonomic Risk Factors: Analysis of workstation setup, manual handling, repetitive movements, and posture-related risks
6. Chemical and Biological Hazards: Evaluation of exposure to hazardous substances, chemicals, and biological agents
7. Psychosocial Work Environment: Assessment of stress factors, workload, workplace relationships, and organizational factors
8. Risk Evaluation Matrix: Systematic evaluation of identified risks including likelihood and severity ratings
9. Control Measures: Existing and proposed measures to control identified risks
10. Action Plan: Detailed plan for implementing additional control measures, including responsibilities and timelines
11. Review and Monitoring: Schedule and procedures for reviewing and updating the risk assessment
1. Special Risk Groups: Assessment of risks for pregnant workers, young workers, or workers with specific needs - include when these worker groups are present
2. Remote Work Assessment: Evaluation of risks associated with remote working arrangements - include when remote work is permitted
3. Night Work Assessment: Specific assessment of risks related to night work - include when night shifts are performed
4. Seasonal Work Considerations: Assessment of risks specific to seasonal variations - include for outdoor work or seasonal operations
5. Emergency Response Procedures: Specific emergency procedures based on risk assessment - include for high-risk workplaces
6. Contractor Management: Assessment of risks related to contractor activities - include when contractors are regularly present
1. Risk Assessment Forms: Blank and completed risk assessment forms used in the evaluation
2. Hazard Identification Checklists: Detailed checklists used for identifying workplace hazards
3. Workplace Inspection Records: Documentation of physical workplace inspections
4. Employee Consultation Records: Records of employee input and consultation during the assessment process
5. Technical Measurements: Results of any technical measurements (noise levels, air quality, etc.)
6. Risk Matrix Guidelines: Detailed guidelines for using the risk evaluation matrix
7. Control Measure Documentation: Detailed specifications for control measures
8. Training Requirements: Specific training needs identified through the risk assessment
9. Medical Surveillance Requirements: Requirements for health monitoring based on identified risks
10. Review Schedule: Detailed schedule for periodic review and updates of the assessment
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.