Archives

Comments on BC tailings dams risk reduction audit

These comments on BC tailings dams risk reduction audit are based on the recently published AUDIT OF COMPLIANCE AND ENFORCEMENT OF THE MINING SECTOR. We enjoyed reading in the audit: “1.10 Risk-based approach We recommend that government develop a risk-based approach to compliance verification activities, where frequency of inspections are based on risks, such as industry’s non-compliance record, industry’s financial state, and industry’s activities (e.g., expansion), as well as risks related to seasonal variations.” We couldn’t agree more. It almost…

Read More

Fund allocation from money lender

Fund allocation from money lender The idea is not to perform a full risk assessment or due diligence study. Indeed, it is to deliver an ORE based simplified functional a priori analysis for each company which allows comparisons, bench-marking for Fund allocation from money lender. The ORE based simplified functional analysis is scalable. It  allows a company to opt to get deeper in their risks analysis to further enhance their chances of success. Additionally, one can use the analyses for…

Read More

Comparing water treatment processes lifetime risks using ORE

Comparing water treatment processes lifetime risks using ORE Comparing water treatment processes lifetime risks using ORE (© Riskope) offers unique advantages to owners, regulators and the public. As a matter of fact: ORE is a convergent quantitative risk assessment methodology. Convergent means that ORE looks simultaneously at all hazard sources. Thus it avoids pitfalls common in “silo-ed” approaches . It also covers a wide spectrum of hard and soft consequences (direct, indirect). ORE is scalable, meaning that it can follow a…

Read More

Major Mining Corporation Hacked

Major mining corporation hacked and their confidential information made public The Major Mining Corporation Hacked scenario we had predicted and explained has occurred. Indeed last week Goldcorp’s (TSX:G) payroll, trade secrets, and other intimate information leaked on a torrent free for anyone to download. Last year a cyber attack significantly damaged a German steel mill. Especially with the advent of IoT (Internet of Things) cyber attacks have the ability to generate multi-faceted consequences on interdependent systems. These were physical for…

Read More

Archive

Hosted and powered by WR London.