We've been using Ecology Services for years for disposal. We've used Chase Environmental for decommissioning, rather than disposal.
Robin M. Izzo, M.S.
Environmental Health and Safety
If you always put limits on everything you do, physical or otherwise, it will spread to your work and into your life. There are no limits; there are only plateaus, and you must not stay there, you must go beyond them. ~ Bruce Lee
From: DCHAS-L Discussion List [mailto:dchas-l**At_Symbol_Here**MED.CORNELL.EDU]On Behalf Of Michelle M.
Sent: Wednesday, August 19, 2015 3:33 PM
Subject: Re: [DCHAS-L] More Objective Information
There is some radioactive powder that is currently in a lab storage closet. It has been shielded with lead plates in a metal filing cabinet, and is following regulations. However, we would like to remove the item from the premises. Is there anyone who knows of a special facility to dispose of this item? Thank you for your assistance
On Tue, Aug 18, 2015 at 1:56 PM, Romano, Joe P <JRomano**At_Symbol_Here**beautyavenues.com> wrote:
I would like to start a question.
As we train and do audits, we find issues of hazardous chemicals being handled and stored improperly at many foreign sites. The ‘guidance' is to segregate, keep apart, isolate for the various hazard classes. The factories are asking good questions as to whether we can further define these words: segregate, keep apart, isolate - that is where I am seeking help. I have the ‘definitions' from U.S. DOT, IMDG, NFPA. Somewhat helpful but not definitive for factories. Can anyone offer some guidance? Good reference(s) we can provide to the global supply chain?
Technical Director Chemical Compliance Management
Thought! "Creativity is allowing yourself to make mistakes. Art is knowing which ones to keep."
— Scott Adams
Notice: This communication may contain privileged and/or confidential information. If you are not the intended recipient, please notify the sender by email, and immediately delete the message and any attachments without copying or disclosing them. LB may, for any reason, intercept, access, use, and disclose any information that is communicated by or through, or which is stored on, its networks, applications, services, and devices.
Previous post | Top of Page | Next post