IS ACTION TRACKING CAUSING DELAYS AND INEFFICIENCY?
Missed deadlines, Missing data, No audit trail, No central view, Inadequate reporting, Poor access control, No alerts for overdue actions, Poor Stakeholder communication, Unable to handle multiple action types. Whatever industry you're in, action tracking is likely a major issue
BASIC ACTION WORKFLOW
"DORIS use the Pisys system in the UK for the full range of HSEQ related action tracking and reporting. Having a centralised system gives the organisation confidence and visibility that key actions are being managed and closed. "
Emma Bishop - Doris UK
EASY TO USE
Get Full Visibility Of The Action Lifecycle
Audit Trail
Action details are captured in a configurable form and assigned to an individual for completion. After the ‘action owner’ has completed their work, a number of review stages allow comments and ultimately acceptance or rejection of the action. Multiple reviewers can be assigned to an action. An attachment facility allows assets relating to the action to be included, and a built-in audit trail keeps track of the entire action lifecycle.
Login from Multiple Domains
Many systems only allow login from a single domain - ATMS makes it easy for all action participants to access critical EHS data from their own network.
Action Tracker Project Management
The Action Tracker's simple project structure allows projects to be organised into sub-projects, tasks, & actions with a well-defined flow. A digital Project Action Log lets you see when they are completed. Tasks can be easily assigned to team members – once completed, members waiting on the action are notified, & other actions are activated. Project short names can be created and used as part of an action numbering scheme if required.
ACTION TRACKER FEATURES
Inclusive in subscription
Onboarding
Hosting
Microsoft Entra ID Integration
Support & Upgrades
1 day Remote Training
Data Storage
"To say that this is an extremely important system for our company is an understatement, as it encompasses all of our QHSE records which are a critical part of our RIDDOR compliance. It works, and we trust it to work."
Paul Craig - North Star Shipping
Management From Anywhere
The intuitive web interface allows simultaneous access by multiple users from anywhere in the world, so wherever your team members are located they are able to stay in touch with their team & their tasks. Third parties can also access the system with the appropriate permissions. Action Tracker works well on all browser and device types so it is easy to access even when you are on the move.
Control Visibility And Structure
Each team member can be assigned a role within the system, controlling their access to the data they can see. Key personnel can be given ‘approver’ status, allowing them to sign off tasks when they’re satisfied. Users from other companies can be given access limited to their role. The Action Tracker tool also supports single sign-on.
Configurable by you
You'd expect any tracker used in a Process Safety study to include Elements, Nodes, Risks, Causes, Consequences, Deviations, Safeguards etc - but what if you need to record a specific external document reference or e.g. an attachment showing a P&ID. With the Pisys Action Tracker you can quickly add fields to capture just about any type of data you need.
"Our users love the Pisys system because it fits the way they work"
Mike Forrest, Wood PLC
What Our Customers Say
The Action Tracker is core to our incident management process, allowing critical information to be captured on scene, and followed up with managed actions
The Pisys action tracker forms the core of our Query Management System and is a robust and easy to use tool. The system is advantageous as it is fully configurable and being web-based allows users to track and manage queries in real time, from any project region. We have used this system for a few years now and the continued support provided by Pisys has been invaluable.
Our users love the Pisys Action Tracker because it is so easy to use for high-governance actions like HAZOPS etc.
GET IN TOUCH
Tell us what action tracking challenges you're facing
Frequently Asked Questions
The basic features you need are:
|
Frequently Asked Questions
HAZID is early-stage: broad, high-level hazard identification, often at concept or feasibility phase.
HAZOP is detailed: uses structured guidewords to interrogate each node of a system once design details are available.
Software can support Process Safety Studies by:
- Recording nodes/deviations/actions
- Tracking and managing actions
- Providing templates and guidewords
- Storing audit trails
- Supporting collaboration between stakeholders ( e.g. partners, subcontractors)
- Producing consistent, high-quality reports
A HAZOP identifies credible deviations and potential consequences.
A LOPA may follow to quantify risk and evaluate layers of protection
If you are using a 3rd party they should be able to clearly explain the measures they take to protect your data. They should ideally hold ISO27001 accreditation which is a global standard for the security of information systems. In the UK the CyberEssentials+ certification is a useful addition to ISO27001 but if we had to pick one we'd go with IUSO27001!
Related Case Studies
Corporate Action Tracker and Lessons Learned at E.ON
Global energy company E.ON adopted ATMS in their E&P division...Read More→
Risk Management on Pipeline Construction project
Case Study: This customer leads the construction of a new...Read More→
North Star Shipping adopt Pisys ATMS for Incident Management
Founded in 1886, North Star Shipping owns and operates the...Read More→
Action Tracker Blog
How to Improve Safety Culture and Prevent Future Accidents by Investigating Near-Miss Incidents
Near-misses are incidents that could have resulted in injury but...Read More→
Near Misses – The Basics
As a health and safety specialist, understanding the concept of...Read More→
Use of a Digital Action Tracker for Incident Management
Spoiler alert - this is going to be mainly about...Read More→
Understanding Safety Integrity Level (SIL)
Safety Integrity Level (SIL) is a crucial concept in industrial...Read More→
Understanding the Differences Between FMEA and Hazard Analysis
In risk management and safety engineering, Failure Modes and Effects...Read More→
The Difference between HAZOP and HAZID
In the discipline of process safety management, identifying and mitigating...Read More→
Cyber Essentials Plus Certified
Cyber Essentials Plus helps us guard our organisation against cyber attacks. This is important because vulnerability to basic attacks can mark us out as a target for more in-depth unwanted attention from cyber criminals and others. Certification gives us and our customers peace of mind that our defences will protect against the vast majority of common cyber attacks simply because these attacks are exploiting targets which do not have the Cyber Essentials Plus technical controls in place.
ISO 27001 Certified
We strive to ensure the integrity, confidentiality and availability of all systems and data used by Pisys in their delivery of hosted applications to their worldwide client base, protecting these systems and data from all threats, internal and external, deliberate and accidental. To do this, we have deployed an information security management system (‘ISMS’) compliant with the ISO/IEC 27001 information security standard to meet our information security policy. The ISMS will allow compliance with customer contracts, and relevant laws of the UK and any company within which Pisys Ltd operates.