Why is Management Of Change (MOC) so poorly executed

, 3/17/2026 Be the first to comment

Tags: Asset Performance Management Consequence Corrosion CUI Damage Mechanisms Data Analysis Data Management Data Validation HSE Human Factors Mechanical Integrity Process Safety Management Regulation Risk Risk Analysis Risk Management System Implementation Work Process


Management of Change (MOC) under OSHA PSM is often poorly executed not due to lack of knowledge, but because it conflicts with operational realities. Production pressure, unclear definitions of change, weak field ownership, and procedural focus reduce effectiveness. Temporary and digital changes bypass controls, cumulative risk goes untracked, and approvals lack rigor. Without aligned incentives, clear boundaries, and post-implementation verification, MOC becomes a formality rather than a true risk control.
Header

Why is Management Of Change (MOC) so poorly executed?

Management of Change (MOC) under OSHA Process Safety Management standard is rarely weak because people don’t know the rule, it’s weak because it conflicts with how work actually gets done in operating environments. The failure is structural, not procedural. Here’s why it consistently breaks down:

1) It competes directly with production pressure

MOC introduces friction such as reviews, approvals, hazard analysis, documentation. In reality:

  • Operations are incentivized to restore service quickly
  • Maintenance is incentivized to close work orders
  • Engineering is incentivized to deliver projects on schedule

MOC, by design, slows all of that down.

Result:

People subconsciously (or explicitly) look for ways to classify changes as:

  • “replacement in kind”
  • “temporary”
  • “minor”

Not because they’re careless, but because the system rewards speed over deliberation.

2) “What is a change?” is far more ambiguous than it sounds

The regulation defines change broadly, but field conditions don’t. Therefore, gray areas are left open to interpretation such as:

  • Material substitutions (same spec, different performance)
  • Control logic tweaks in DCS/PLC systems
  • Operating envelope drift (pressure, temperature, rates)
  • Maintenance-driven modifications

Without sharp boundaries, MOC becomes judgment-based, and judgment varies widely.

Result:

Two equally experienced engineers can make opposite calls and both think they’re compliant.

3) Temporary changes are structurally mismanaged

Temporary changes are one of the biggest hidden risks. A common pattern develops with these type of changes:

  1. Install a temporary bypass, jumper, or workaround
  2. Document it (sometimes)
  3. Extend it, extend it again, etc.
  4. It becomes permanent without ever going through full MOC

Result:

The facility drifts away from its design basis without a formal review.

4) MOC is treated as a form, not a risk evaluation

Many systems reduce MOC to workflow software or paper forms:

  • Fill out fields
  • Route for approval
  • Close the action

But the core intent, hazard evaluation, gets compressed or skipped. This creates weak points:

  • Superficial hazard reviews instead of real scenario analysis
  • Safeguards listed but not validated
  • No challenge of assumptions from prior HAZOP or design

Result:

The MOC information is complete, but the risk hasn’t actually been evaluated.

5) Field-level ownership is weak

MOC responsibility often lives with engineering or safety groups, but changes originate in the field. This creates disconnects:

  • Operators and supervisors don’t feel ownership of MOC decisions
  • Crafts implement changes without understanding hazard implications
  • Contractors may not even recognize when MOC applies

Result:

The people closest to the change are the least integrated into the control process.

6) Digital and control system changes fly under the radar

Modern facilities make constant changes in:

  • PLC/DCS logic
  • Alarm setpoints
  • Interlocks and permissives

These are often:

  • Fast
  • Easily reversible
  • Poorly tracked

Result:
You get configuration drift in critical safeguards, often outside formal MOC.

7) Cumulative risk is invisible

Each individual change may seem low risk. But MOC systems rarely:

  • Track aggregate impact of multiple small changes
  • Reconcile changes back to the original design basis
  • Revalidate assumptions used in Layer of Protection Analysis or PHAs

Result:

The cumulative risk of the sum of the individual risks increases gradually without triggering any single alarm. Unfortunately, there is no single, prescriptive recommended practice that tells you exactly how to track cumulative MOC impacts. There are widely accepted KPIs that can help:

  • Number of overdue MOCs
  • Temporary MOCs exceeding time limits
  • MOCs impacting safety systems

8) Approval authority is misaligned

Approvers often:

  • Lack deep process knowledge
  • Are too removed from field conditions
  • Are overloaded with volume

So approvals become:

  • Rubber stamps
  • Schedule-driven decisions

Result:

The system appears controlled, but decisions aren’t technically rigorous.

9) Post-implementation verification is almost nonexistent

Most companies focus on approving the change, not verifying that it worked as intended. These steps are rarely done well:

  • Field validation that installation matches design
  • Confirmation that procedures and training were updated
  • Functional testing of safeguards

Result:

Even “good” MOCs can introduce unintended hazards.

10) Culture: MOC is seen as bureaucracy, not protection

If MOC is viewed as:

  • Slowing work
  • Adding paperwork
  • Owned by “safety” or “engineering” instead of operations

It will always be bypassed under pressure.

In strong organizations, MOC is framed differently:

  • A design integrity control, not an administrative one
  • The last line preventing unknown risk introduction

The core issue

MOC fails because it tries to impose deliberate, analytical thinking into environments optimized for speed and execution. Unless the organization:

  • Aligns incentives with risk control
  • Defines “change” unambiguously
  • Verifies effectiveness after implementation

The MOC procedure exists, but the control does not. Below is a flow chart of how we at AOC sees this work process:

https://assetoptimization.sharepoint.com/:i:/s/SharedData/IQCbdph-YfZzSJjPIJlLDuuKAQyFvHQ7W7X8gbhs8F2mDQk?e=0TMF5A


Be the first to comment

Comments

There are no comments for this article.

Add your comment

Related Services

Development of Mechanical Integrity (MI) Procedures and Processes

A maintenance system designed in which elements work together as a quality system for maximum returns

Damage Mechanism Review / Corrosion Study

One of the most important steps in an RBI project is the corrosion study or damage mechanism review.

Corrosion Control Planning

Achieving zero corrosion-related loss of primary containment in the refining industry.

Related Tools

Mechanical Integrity (MI) Compliance Checklist

Is your plant's MI program compliant? Use our checklist to assess your current program against industry standards and receive expert recommendations for improvement.

RBI Potential Savings Calculator

Create mechanical integrity (MI) program value rather than it being seen as a necessary cost to minimize.

API 580 Work Process Quiz

How well do you know RBI? Take this short quiz to test your knowledge of the API 580 risk-based inspection (RBI) work process.

Related Training

RBI/MI Overview

A high level overview introducing Mechanical Integrity and Risk Based Inspection

API 580 RBI Overview

What impact does Risk Based Inspection (RBI) have on my organization?

API 580 Training

Is your Risk Based Inspection (RBI) program aligned with the API 580 Recommended Practice? Are you ready for certification?

API 581 Overview

What's actually going on inside all of that fancy software? An introduction to the API 581 methodology.

API 581 Training

A deep dive into quantitative Risk Based Inspection (RBI) as outlined in API 581.

Related Knowledge

How to practically implement RBI for oil and gas production.

Practical guide for implementing a Mechanical Integrity and RBI program for U.S. oil and gas wellfield, gathering, and midstream facilities. Aligns lifecycle asset management, inspection, and risk control with API standards, PHMSA pipeline rules, and OSHA PSM requirements.

Can you improve reliability focusing on 3 priorities?

Safety-first organizations consistently outperform on reliability when priorities are truly enforced, not just stated.

Is Your RBI 3rd Party Qualified?

Don’t let your RBI program become a "paperwork exercise." Learn how to distinguish between a qualified technical partner and a software-only contractor to ensure true operational safety.

How can I judge equivalent inspection techniques?

Organizations that follow the spirit of risk-based inspection rather than its minimum requirements use a definable, structured, auditable process to confirm that an alternate inspection technique provides equal or better risk reduction than a baseline method.

What Good Refining Corporate Cultures Look Like

What does a strong refining culture actually look like in practice? Explore seven key attributes, from technical authority to management presence, that transform culture into a powerful risk-control system.

How to Incorporate the New PHMSA Underground Gas Storage Requirements

This is a practical approach to incorporating the new PHMSA gas well rules into your integrity program with the rest of your surface and subsurface assets.

Plant Management 101: Common Work Processes

A dysfunctionality found in many refineries, chemical plants, and other production facilities, is a lack of common asset management work processes.

The Top Three RBI Risks That Cannot Wait for a Budget Rebound

Budget tight? Some Risk-Based Inspection (RBI) risks are too critical to delay. Learn the top 3 RBI risks that can't wait for a budget rebound.

NII vs. IVI: Replacing Internal Visual Inspection in Refineries

Can Non-Intrusive Inspection (NII) finally replace vessel entries? Explore the roadblocks to RBI, validated POD data for UT and RT, and a new framework for technical equivalency in modern refinery maintenance.

Why is Mechanical Integrity So Important to Process Safety Management?

Discover why equipment failure is the root cause of most catastrophic incidents. Mechanical Integrity (MI) is the non-negotiable foundation that prevents loss of containment and protects your entire PSM system. Learn the 8 reasons MI is essential.