Skip to main content
TAGS

Critical Risk Verification: How to Confirm Controls Are in Place Before Work Starts

Critical risk verification is the process of confirming — before work begins — that the required safety controls for a high-risk activity are actually in place. Not planned. Not assumed. Verified.

It's the difference between having a safety plan on a shelf and having a worker stand in front of the job, check each control, sign off, and start work knowing the protections are real.

Why critical risk verification matters

Most serious workplace incidents don't happen because nobody identified the risk. They happen because the controls that were supposed to be in place weren't. The harness was in the truck but not worn. The gas test was due but not done. The exclusion zone was marked on the plan but not on the ground.

Critical risk verification closes that gap. It puts the check at the point of work, at the moment it matters — before the job starts.

Under the HSWA Amendment Bill, the Act is proposed to be refocused around critical risks. Businesses would be required to identify, manage, and prioritise the risks most likely to cause death or serious harm. Critical risk verification is one way to demonstrate that you're doing this in practice — not just on paper, but on the job, every day.

How it works

Critical risk verification follows a simple process:

1. Select the activity. The worker identifies the high-risk activity they're about to undertake — for example, working at height, confined space entry, or working near energised electrical installations.

2. Review the controls. The verification form presents controls for that activity. These are informed by legislation and best practice, and can be supplemented with your own controls specific to your operation.

3. Verify each control. For every control, the worker confirms whether it is in place, not in place, or not applicable. If a control is not in place, the expectation is that work does not proceed until it is addressed.

4. Sign and submit. The worker signs the verification, which is timestamped and GPS-tagged. It becomes a record that controls were confirmed before work started.

What gets verified

The controls presented during verification are specific to each critical risk category. Examples:

Working at height: Edge protection installed. Fall arrest system inspected and worn. Rescue plan in place. Workers trained and competent. Weather conditions assessed.

Confined space entry: Atmospheric testing completed. Entry permit issued. Standby person in place. Emergency rescue equipment available. Ventilation adequate.

Excavation: Underground services located and marked. Shoring or battering in place. Exclusion zones established. Egress points available. Competent person has inspected.

Hazardous substances: Safety Data Sheets available. PPE appropriate and worn. Ventilation adequate. Emergency equipment accessible. Workers trained in handling.

These are examples of default controls provided as a starting point. You should review these and add your own controls to reflect the specific requirements of your operation.

The difference between a checklist and verification

A site inspection checklist asks: "Is the site safe?" That's a general assessment done periodically.

Critical risk verification asks: "Are the specific controls for this specific high-risk activity confirmed as being in place right now, before this work starts?" That's a pre-work gate.

Both have their place. But when the HSWA Amendment Bill proposes that businesses prioritise critical risks, verification is how you demonstrate you're doing that at the point of work.

Who does the verification?

The worker or supervisor doing or overseeing the high-risk work. It happens at the point of work — on the scaffolding platform, at the confined space entry, beside the excavation. Not in the office. Not the day before. Right there, right then.

What happens to the record?

Every verification is stored digitally with a timestamp, GPS coordinates, the name of the verifier, and a digital signature. It's immediately available to supervisors and managers through the dashboard. If an incident occurs, or if a regulator asks how you manage your critical risks, the verification record is part of your evidence.

How ThinkSafe does critical risk verification

ThinkSafe offers dedicated critical risk verification — built into the app and ready to use.

The ThinkSafe app presents 20 critical risk categories that reflect the types of hazards expected to be covered by Schedule 1A of the HSWA Amendment Bill, plus a catch-all category for any other hazard that could cause serious harm. For each category, the app presents a set of default controls as a starting point. You can supplement these with additional controls specific to your business or site.

Workers verify each control as in place, not in place, or N/A. The verification is signed, timestamped, and GPS-tagged. It works offline — so remote sites, underground, and areas with no cell coverage are fully supported. Data syncs automatically when the device reconnects.

Supervisors and managers see verification records on the dashboard and can export PDF reports for pre-qualification assessments, client reporting, or regulatory evidence.

Start your free trial →



 

This product has been added to your cart

CHECKOUT