How Critter
works

Critter is simple to set up, structured to follow best practice, and powerful enough to give leaders real confidence.

Here’s how it works.

//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

1. Set up your foundations

A nominated admin from your business sets up Critter to reflect how you operate. This creates a practical structure for managing critical risk controls in the real world – not just on paper.

Your admin can:

Create and maintain lists of worksites, buildings, vehicles, plant, and equipment.
Store reference information that links to existing systems, like other safety tools.
Organise verification activities by location, plant, or equipment – so context is always clear.

2. Set and assign the right roles for your team

Critter gives you clarity around who does what.

You control user access and responsibilities:

Administrator: Defines critical risks, controls, verifications, and schedules
Verifier: Conducts critical control verifications
Expert advisor: Independently signs off verifications if required, adding credibility and objectivity
Viewer: Accesses dashboards and performance metrics

Decide who in your team assigns and revokes roles, so you can maintain governance and operational oversight without complexity.

3. Customise critical risks and controls

Configure critical risks and controls to suit your context, using Critter’s built-in, expert-created library as a starting point or fully customising for a perfect fit.

Using Critter’s built-in library, you can:

Select the critical risks relevant to your business
Bring in recognised critical controls for each risk
Adapt them to your operational context

4. Define and schedule verifications

Set up verifications for your business, across as many sites, activities, risks, and controls as needed.

For each critical control, you can:

Create one or more verification activities, across multiple critical risk manifestations
Assign them to the relevant context, like site, plant, and equipment
Set verification schedules

Critter then notifies the right people on your team when verifications are due.

5. Conduct mobile verifications

Use the Critter mobile app to verify critical controls, with video, photo, voice note, and text note capability to document evidence.

Using the mobile app, your team can:

Have staff be notified when verifications are due
Equip all staff members with a verification device in their pocket
Understand the full context of the required verification

Verification data then syncs with the main Critter platform to keep information up to date.

5. See it all in the Critter Effectiveness Score

All verification activity feeds into one clear indicator: the Critter Effectiveness Score. 

This is a customisable at-a-glance view of how effective your critical risk controls are across your entire organisation and supply chain.

Leaders can:

Instantly see overall effectiveness of critical risk controls
Drill down by site, activity, risk, or control

Corrective action is then directed to the right place, at the right time, for the right people.

No trawling through reports, no waiting for someone to summarise the data, no relying on assumptions – just live visibility of what matters most.

//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////