
Changes happen every day on high hazard sites. A valve gets swapped. A control setpoint is nudged. A maintenance routine is shortened because the team is stretched. A temporary bypass stays in place “just for this run”. None of these feel dramatic in the moment, right?
But here’s the uncomfortable truth: incidents rarely come from the change itself. They come from the unmanaged side effects of change. The knock-on impacts that quietly weaken your control barriers until one day, a normal upset becomes a serious event.
That is exactly why Management of Change (MoC) is a major element of Process Safety Management (PSM). Done well, it is not red tape. It is a practical system that asks one simple question:
“What else does this change affect, and have we controlled the risk before we implement it?”
Let’s break down what MoC really is, why it matters, what Texas City taught the industry, and how to make MoC risk based and workable in the real world.
If PSM is your overall safety engine, MoC is the clutch. It controls how you shift gears without stripping the gearbox.
Not every change creates new hazards. But many changes alter the conditions that your safety case relies on. That might mean:
MoC exists because people are great at seeing the obvious parts of change and not so great at spotting second order effects. It is human nature. We focus on the task in front of us.
A strong MoC process is a control barrier in its own right. It prevents unmanaged risk from entering the system. The paperwork is not the barrier. The thinking is.
When MoC turns into a box ticking exercise, it stops protecting you. It becomes something people avoid. And that is when the cracks appear.
The Texas City refinery disaster in 2005 is often referenced for a reason. It is a real world reminder that process safety can be undermined by decisions that look unrelated to process operations.
At Texas City, MoC was required for changes except those that were organisational in nature, such as budget cuts.
That is a huge gap. Because organisational changes can directly affect process safety performance. If you cut budgets, you might cut:
In other words, you can weaken multiple barriers without touching a pipe.
One of the most common failure patterns in major incidents is this trio:
It is like driving a car where the dashboard warning lights have been on for months. You stop noticing them. Then something fails.
Barriers need attention, time, and resourcing. If your MoC system does not treat resource and organisational changes as risk relevant, the system can look “compliant” while safety is quietly degrading.
Ask ten people what counts as a change and you can get ten different answers. That is why MoC needs clear triggers.
A key principle is this: anything not like for like must be assessed.
“Like for like” is narrower than people think. It is not “same size and fits the flange”. It is more like:
If any of those differ, it is not like for like. It is a change.
MoC is not only for big capital projects. It should catch everyday change such as:
Temporary changes are notorious. They often start with good intent:
“Just bypass this for a week until the new part arrives.”
Then weeks turn into months. The site gets used to operating with a weakened barrier. The bypass becomes invisible.
A mature MoC process includes temporary change and forces periodic review and reassessment for continuation.
IChemE recommendations can be boiled down into practical habits that separate strong MoC systems from weak ones.
This is the line in the sand. If your MoC process is unclear here, you will miss changes. And missed changes are often the ones that hurt you.
An MoC is not complete when it is raised. It is complete when the actions are closed, verified, and embedded.
If you have overdue actions, the system is telling you something important: either MoC is under resourced, or actions are not owned, or the process is too clunky. Sometimes all three.
If you do not measure MoC performance, you are guessing. And process safety is not a place for guessing.
Leading KPIs tell you where the next failure might come from. Lagging KPIs tell you what has already gone wrong.
Temporary changes need an expiry date, a review cadence, and clear criteria for extension. Otherwise, “temporary” becomes a loophole.
This is not about bureaucracy. It is about forcing the right questions before the change becomes real.
Peer review is especially important when people are under pressure. When the site is busy, people rush. A second set of eyes slows the rush down just enough to catch what matters.
If you want to improve MoC quickly, focus on the patterns that repeatedly show up.
Some sites have MoC procedures that look great but live in binders, not in daily work. People raise MoCs after the change, or not at all, because it feels like admin.
The fix is not more paperwork. It is simpler workflows, clearer triggers, and leadership that rewards early escalation.
If a change is implemented and then “back approved”, your MoC system has become a diary, not a barrier.
This often happens because MoC is too slow. People do not have time to wait. That is a design issue. A good MoC process has fast routes for low risk change and deeper review for higher risk change.
If MoC can reduce inspection frequencies or defer work without process safety review, you are gambling with barrier health.
Mechanical integrity is not a nice to have. It is one of the foundations of major accident prevention.
Suppliers substitute components. Contractors suggest alternatives to meet programme. These changes can be totally reasonable, but only if they are assessed through the MoC lens.
If your MoC process does not capture third party driven changes, you are leaving a big gap.
Not every site needs the same MoC depth. A small batch plant is different from a COMAH top tier facility. That is why MoC should be risk based.
A risk based MoC approach should scale with:
A practical approach is to categorise changes into tiers, for example:
This is where MoC becomes real. Define roles clearly, such as:
No clarity here equals delays and frustration. Clarity makes the system faster.
MoC should feel like a guardrail, not a roadblock.
People should not have to guess whether they need an MoC. Give them a simple decision tree. For example:
If yes to any, raise an MoC.
MoC fails when everyone thinks someone else is responsible for closing actions. Assign owners and dates, and make overdue items visible.
MoC should connect with:
When MoC is integrated, it stops being optional.
When we embed MoC into PSM systems for clients, we include metrics that can be used, not just reported.
Examples of useful leading KPIs include:
Lagging indicators might include:
KPIs are only useful if they drive decisions. If you track overdue MoC actions but do not resource closure, the metric becomes noise.
A good rule is: if a KPI trend worsens, it should trigger a management discussion and a corrective plan.
Procedures do not create safety culture. People do. Leadership is what turns MoC from paperwork into protection.
When leaders ask “have we assessed this change?” and mean it, MoC becomes normal. When leaders bypass MoC to save time, everyone learns that production wins. And that lesson sticks.
Supervisors are the frontline of MoC success. They see small changes first. Training them to recognise change triggers and escalate early is one of the highest value improvements you can make.
At IDEA, we take a risk based approach to MoC that aligns to the scale, scope, and complexity of the process under consideration.
MoC is strongest when it is part of a complete PSM framework that includes:
We help clients develop MoC procedures that people will actually use, including:
We also support:
Changes will keep coming. The real question is: are you confident your site is catching the changes that matter and controlling the risk before implementation?
If you want to improve your MoC process, reduce bypass behaviour, and embed meaningful metrics into your PSM system, IDEA can help.
Contact IDEA to arrange a practical MoC and PSM review, tailored to your site and hazards. We will help you identify gaps, simplify the workflow, and build a system that protects your barriers without slowing your operation.
Management of Change is one of those process safety elements that only gets attention when something goes wrong. But when MoC is done properly, it quietly prevents the wrong things from happening in the first place. It captures change, assesses barrier impacts, drives actions to closure, and builds confidence that your safety case still stands after the dust settles. The lesson from Texas City is clear: even organisational decisions can weaken barriers if they are not managed as risk relevant changes. A risk based MoC approach, backed by practical triggers, peer review, and meaningful KPIs, is one of the most effective ways to protect people, assets, and reputation in high hazard environments.
MoC is the management system that controls how changes are proposed, reviewed, approved, implemented, and verified. Risk assessment is one part of MoC, used to evaluate hazards and barrier impacts for a specific change.
Yes. Temporary changes should be included, tracked, and periodically reviewed. They should have an expiry date and clear rules for extension or removal.
Like for like means the replacement matches the original specification, duty, and performance in a way that does not change the hazard or barrier assumptions. If material, rating, performance, or function differs, it is not like for like.
Common reasons include unclear ownership, lack of resourcing, too many low value MoCs clogging the system, and weak governance. A risk based MoC structure and clear accountability usually reduce backlogs quickly.
Useful leading KPIs include overdue MoC actions, temporary changes past review date, time to approve by change category, and the percentage of MoCs with documented barrier impact review.