SlideShare uma empresa Scribd logo
1 de 13
Executive Overview
1
Introduction
 SafetyLynx is a health and safety management
software program that provides unique
interactive tools to build, implement and
maintain an effective health and safety system.
 This program will reduce losses due to
accidents, provide legislative due diligence
and free up more time to manage business.
Private and Confidential SafetyLynx Inc. © All Rights Reserved
2
Business Challenges
 Most small to medium size businesses do
not have the resources or expertise
necessary to adequately manage health and
safety losses
 Other software programs are priced out of
reach for small to medium size businesses
Private and Confidential SafetyLynx Inc. © All Rights Reserved
3
SafetyLynx Solutions
 Health and safety Expertise Not Required,
 Provides documents and guidance to
achieve International standards
 Cloud Based, accessible on any internet
device
 AFFORDABLE!!
Private and Confidential SafetyLynx Inc. © All Rights Reserved
4
Unique Features – Risk Management
 SafetyLynx is designed on the fundamentals
of health and safety management,
1. Hazard identification
2. Risk assessment
3. Control selection
SafetyLynx guides and assists the user step-
by-step through this process
Private and Confidential SafetyLynx Inc. © All Rights Reserved
5
Unique Features – Company Structure
 SafetyLynx allows the user to set up four
structural levels to manage each individually
including.
1. Company
2. Client
3. Project
4. Location
These names can be edited to meet the
needs of the company.
Private and Confidential SafetyLynx Inc. © All Rights Reserved
6
Unique Features – Accident Investigation
 SafetyLynx provides a detailed data and
evidence form to ensure investigations are
thorough and consistent.
 The program actually identifies gaps and/or
failures of the H&S programs and procedures
 Gaps and failures trigger Corrective Action
Reports that are distributed to specified
personnel and listed on the SafetyLynx
dashboard until completed.
Private and Confidential SafetyLynx Inc. © All Rights Reserved
7
Unique Features – Document Library
 SafetyLynx includes a library of over 120 H&S
Documents pertinent to construction such as,
• Programs
• Procedures
• Forms
• Records
 All documents have passed a meticulous
government external audit.
 These can be downloaded, edited if needed,
and used as the client sees fit.
Private and Confidential SafetyLynx Inc. © All Rights Reserved
8
Unique Features – Document Library
The Library can be used to store H&S documents
by client and project such as,
 Pre-mobilization meeting minutes
 Project H&S plans
 Hazard identifications
 Risk assessments
 Controls
 Toolbox meeting minutes
 Inspections
 Government reports, etc.
Private and Confidential SafetyLynx Inc. © All Rights Reserved
9
Unique Features – Unexpected Events
Occasionally unexpected events occur such as
• Accidents / Near misses
• Serious damage on site
• Government inspections
• Conflict with the public
• Workers refuse to work or walk out.
 SafetyLynx provides response guidelines and
forms as necessary at their finger tips
Private and Confidential SafetyLynx Inc. © All Rights Reserved
10
Support and Partners
Private and Confidential SafetyLynx Inc. © All Rights Reserved
11
SafetyLynx has received significant financial
support from several government agencies
Private and Confidential SafetyLynx Inc. © All Rights Reserved
12
Summary
 No health and safety expertise
required
 Unique interactive tools
 Reduces accidents/illnesses
 Reduces financial losses
 Comprehensive
 Cloud Based
 Unlimited users
 Priced well below competition
Private and Confidential SafetyLynx Inc. © All Rights Reserved
1313
Robert Ryckman, President/CEO
SafetyLynx Inc.
1520 Queen Street East. Suite CC2017
Sault Ste. Marie, Ontario, P6A 2G4
Email bob.ryckman@safetylynx.ca
Tel. 705-257-0612
Website www.safetylynx.ca

Mais conteúdo relacionado

Mais procurados

How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical NetworkMedigate
 
Vulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksVulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksMedigate
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentVidSys, Inc.
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139evaleng2
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...adeel hamid
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin, Inc.
 
The Compliancy Group : The Guard, a HIPAA Compliance Solution
The Compliancy Group : The Guard, a HIPAA Compliance SolutionThe Compliancy Group : The Guard, a HIPAA Compliance Solution
The Compliancy Group : The Guard, a HIPAA Compliance SolutionCompliancy Group
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
21 Reasons Why We Dislike Legacy Incident Management Systems
21 Reasons Why We Dislike Legacy Incident Management Systems21 Reasons Why We Dislike Legacy Incident Management Systems
21 Reasons Why We Dislike Legacy Incident Management Systems24/7 Software
 
Five cloud security tips
Five cloud security tipsFive cloud security tips
Five cloud security tipsServiceMesh
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014Ricardo Resnik
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials Qonex
 

Mais procurados (20)

How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical Network
 
Vulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksVulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise Networks
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
 
Cybersecurity in Medical Devices
Cybersecurity in Medical DevicesCybersecurity in Medical Devices
Cybersecurity in Medical Devices
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
 
The Compliancy Group : The Guard, a HIPAA Compliance Solution
The Compliancy Group : The Guard, a HIPAA Compliance SolutionThe Compliancy Group : The Guard, a HIPAA Compliance Solution
The Compliancy Group : The Guard, a HIPAA Compliance Solution
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
21 Reasons Why We Dislike Legacy Incident Management Systems
21 Reasons Why We Dislike Legacy Incident Management Systems21 Reasons Why We Dislike Legacy Incident Management Systems
21 Reasons Why We Dislike Legacy Incident Management Systems
 
Five cloud security tips
Five cloud security tipsFive cloud security tips
Five cloud security tips
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
HIPAA security risk assessments
HIPAA security risk assessmentsHIPAA security risk assessments
HIPAA security risk assessments
 

Semelhante a Executive Overview

4-SYTE Asset Management Overview
4-SYTE Asset Management Overview4-SYTE Asset Management Overview
4-SYTE Asset Management OverviewPamela Hamblin
 
Online WHS Brochure
Online WHS BrochureOnline WHS Brochure
Online WHS BrochurePhil Bamford
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Kevin Fealey
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalogMarc St-Pierre
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Security information-and-event-management.ppt
Security information-and-event-management.pptSecurity information-and-event-management.ppt
Security information-and-event-management.pptbharti singhal
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools SolarWinds
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItTerra Verde
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture PrinciplesRichard Dempers
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 

Semelhante a Executive Overview (20)

DDHI Board Report.ppsx
DDHI Board Report.ppsxDDHI Board Report.ppsx
DDHI Board Report.ppsx
 
4-SYTE Asset Management Overview
4-SYTE Asset Management Overview4-SYTE Asset Management Overview
4-SYTE Asset Management Overview
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Online WHS Brochure
Online WHS BrochureOnline WHS Brochure
Online WHS Brochure
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalog
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
AGSL brochure
AGSL brochureAGSL brochure
AGSL brochure
 
Security information-and-event-management.ppt
Security information-and-event-management.pptSecurity information-and-event-management.ppt
Security information-and-event-management.ppt
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs It
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Inteum overview
Inteum overviewInteum overview
Inteum overview
 
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture Principles
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 

Executive Overview

  • 2. Introduction  SafetyLynx is a health and safety management software program that provides unique interactive tools to build, implement and maintain an effective health and safety system.  This program will reduce losses due to accidents, provide legislative due diligence and free up more time to manage business. Private and Confidential SafetyLynx Inc. © All Rights Reserved 2
  • 3. Business Challenges  Most small to medium size businesses do not have the resources or expertise necessary to adequately manage health and safety losses  Other software programs are priced out of reach for small to medium size businesses Private and Confidential SafetyLynx Inc. © All Rights Reserved 3
  • 4. SafetyLynx Solutions  Health and safety Expertise Not Required,  Provides documents and guidance to achieve International standards  Cloud Based, accessible on any internet device  AFFORDABLE!! Private and Confidential SafetyLynx Inc. © All Rights Reserved 4
  • 5. Unique Features – Risk Management  SafetyLynx is designed on the fundamentals of health and safety management, 1. Hazard identification 2. Risk assessment 3. Control selection SafetyLynx guides and assists the user step- by-step through this process Private and Confidential SafetyLynx Inc. © All Rights Reserved 5
  • 6. Unique Features – Company Structure  SafetyLynx allows the user to set up four structural levels to manage each individually including. 1. Company 2. Client 3. Project 4. Location These names can be edited to meet the needs of the company. Private and Confidential SafetyLynx Inc. © All Rights Reserved 6
  • 7. Unique Features – Accident Investigation  SafetyLynx provides a detailed data and evidence form to ensure investigations are thorough and consistent.  The program actually identifies gaps and/or failures of the H&S programs and procedures  Gaps and failures trigger Corrective Action Reports that are distributed to specified personnel and listed on the SafetyLynx dashboard until completed. Private and Confidential SafetyLynx Inc. © All Rights Reserved 7
  • 8. Unique Features – Document Library  SafetyLynx includes a library of over 120 H&S Documents pertinent to construction such as, • Programs • Procedures • Forms • Records  All documents have passed a meticulous government external audit.  These can be downloaded, edited if needed, and used as the client sees fit. Private and Confidential SafetyLynx Inc. © All Rights Reserved 8
  • 9. Unique Features – Document Library The Library can be used to store H&S documents by client and project such as,  Pre-mobilization meeting minutes  Project H&S plans  Hazard identifications  Risk assessments  Controls  Toolbox meeting minutes  Inspections  Government reports, etc. Private and Confidential SafetyLynx Inc. © All Rights Reserved 9
  • 10. Unique Features – Unexpected Events Occasionally unexpected events occur such as • Accidents / Near misses • Serious damage on site • Government inspections • Conflict with the public • Workers refuse to work or walk out.  SafetyLynx provides response guidelines and forms as necessary at their finger tips Private and Confidential SafetyLynx Inc. © All Rights Reserved 10
  • 11. Support and Partners Private and Confidential SafetyLynx Inc. © All Rights Reserved 11 SafetyLynx has received significant financial support from several government agencies
  • 12. Private and Confidential SafetyLynx Inc. © All Rights Reserved 12 Summary  No health and safety expertise required  Unique interactive tools  Reduces accidents/illnesses  Reduces financial losses  Comprehensive  Cloud Based  Unlimited users  Priced well below competition
  • 13. Private and Confidential SafetyLynx Inc. © All Rights Reserved 1313 Robert Ryckman, President/CEO SafetyLynx Inc. 1520 Queen Street East. Suite CC2017 Sault Ste. Marie, Ontario, P6A 2G4 Email bob.ryckman@safetylynx.ca Tel. 705-257-0612 Website www.safetylynx.ca