Safety, Security & Compliance
Designed In. Not Added On.
At Energy Compute Campus, safety, physical security, and compliance are not programs applied to a finished design. They are embedded into every phase of development and every element of ongoing operations.
4
Core Safety Disciplines
EHS, PTW/LOTO, PSM, Emergency
2
Security Domains
Physical and OT/IT cybersecurity
Day 1
Program Activation
Before first energization
Auditable
Evidence Standard
Records retained and accessible
Our Safety Philosophy
“Program maturity, not just program existence. Evidence, not just assurance.”
We measure safety performance, investigate incidents, audit compliance, and track corrective actions — not because we are required to, but because it is how credible, high-trust infrastructure operations work.
Safety Programs
Four Core Safety Disciplines
Each program has defined ownership, documented procedures, competency requirements, and evidence standards.
EHS Program
A comprehensive Environmental, Health, and Safety program governs all campus activities — from construction through steady-state operations.
- Site-wide safety policy and accountability structure
- Job Hazard Analysis (JHA) for all non-routine tasks
- Personal protective equipment requirements by zone
- Incident reporting, investigation, and root-cause analysis
- Safety culture monitoring and behavioral safety observation
- Environmental monitoring and reporting obligations
Permit-to-Work and Hazardous Energy Control
Formal PTW and LOTO systems control all work on energized or hazardous equipment. No work proceeds without verified isolation and authorized permit.
- Permit-to-Work (PTW) system covering all hazardous work categories
- Lockout/Tagout (LOTO) program compliant with OSHA 29 CFR 1910.147
- Isolation verification and multi-point energy control
- Permit issuers trained and competency-assessed
- PTW compliance audits and near-miss tracking
- Electronic or paper PTW system with audit trail
Emergency Response and Crisis Readiness
Emergency response plans are developed before they are needed, tested regularly, and integrated with local first-responder agencies.
- Site Emergency Response Plan (SERP) covering all credible scenarios
- Fire, explosion, fuel release, power failure, and security event protocols
- Formal interfaces with local fire, EMS, and law enforcement
- Emergency response drills and tabletop exercises
- Emergency operations center and communications protocols
- Crisis management escalation to executive team
Process Safety and Environmental Compliance
Process safety management (PSM) disciplines apply to the generation facility. Environmental permits are maintained proactively, not reactively.
- Process Hazard Analysis (PHA) for generation systems
- Management of Change (MOC) for process modifications
- Pre-Startup Safety Review (PSSR) for new systems
- Air quality permit compliance and emissions monitoring
- Spill prevention and containment (SPCC) program
- Environmental permit calendar and compliance tracking
Security Programs
Physical Security and Cybersecurity — Integrated
Security is not a perimeter fence and an IT firewall. It is a layered, governed program covering physical access, OT system integrity, and incident response.
Physical Security
Layered physical security from outer site perimeter through each compute building interior, with zone-based access controls and 24/7 monitoring.
- Outer site perimeter fencing and controlled entry points
- Zone-based access credentialing (outer, inner, critical)
- CCTV coverage across all zones with retention
- Intrusion detection and alarm response
- Visitor management — badging, escort, and log
- After-hours security staffing and patrol
OT/IT Cybersecurity Governance
Operational technology (OT) and information technology (IT) security are governed under a unified framework, with explicit OT/IT network segmentation and controls.
- OT/IT network segmentation and DMZ architecture
- Industrial control system (ICS/SCADA) hardening standards
- Access control for OT systems — role-based, least-privilege
- Change management for OT configuration and software
- Cybersecurity incident response plan
- Periodic security assessments and vulnerability management
Security Details Are Controlled
This public page describes program structure and maturity. Detailed security procedures, access control configurations, and system architecture are disclosed only through appropriate confidentiality agreements.
Governance and Evidence
Audits, Records, and Corrective Action
Compliance is not self-declared. It is documented, audited, and demonstrated through evidence that survives diligence reviews.
Internal Audits
Regular internal safety and compliance audits conducted by EHS function, covering PTW compliance, LOTO verification, permit calendar, and procedure adherence.
Third-Party Assessments
Periodic independent assessments of safety programs, physical security posture, and OT cybersecurity configuration against applicable standards.
Corrective Action Tracking
All audit findings, incidents, near-misses, and inspection results generate formal corrective actions with owners, deadlines, and verification sign-off.
Readiness Reviews
Structured operational readiness reviews at key milestones — before first energization, before each load step, before planned outage return to service.
Safety Framework Overview
Policy Level
- Safety policy and leadership commitment
- Accountability structure
- KPI and performance targets
Program Level
- EHS, PTW/LOTO, PSM, Emergency Response
- Physical Security, OT/IT Cybersecurity
- Environmental Compliance
Procedure Level
- Task-specific work procedures
- Emergency response procedures
- Security operating procedures
Evidence Level
- Permits, records, inspection logs
- Audit reports and findings
- Training records and competency assessments
Safety and security readiness you can review and rely on
Request a program overview or discuss how our safety posture supports your operational requirements.