I.CHEM.E. SYMPOSIUM SERIES NO. 110

Size: px
Start display at page:

Download "I.CHEM.E. SYMPOSIUM SERIES NO. 110"

Transcription

1 RELIABILITY ASSESSMENT OF COMPUTER SYSTEMS USED IN THE CONTROL OF CHEMICAL PLANT E Johnson* The use of process control computers frequently leads to improvements in the operation and safety of chemical plant. However, there is a need to recognise, and identify, the potential hazards that could be imposed through failure of a computer system which is providing total control of a chemical plant or process. This paper describes the approaches to assessment used by ICI and will refer to other assessment methodologies. The assessment techniques described, both quantitative and qualitative, will consider the total computer system, the installation, hardware, software and modifications. INTRODUCTION Over a quarter of a century ago, (1962), ICI installed its first digital computer for the direct control of a chemical plant. The computer, a Ferranti ARGUS 200, installed on the Fleetwood Ammonia Soda Plant took in some 256 process measurements of flow, temperature, pressure level and ph, and controlled 120 valves. It proved that a chemical plant could be controlled from one digital computer and a new era in centralised control had begun. Improved process operation followed from computer control even though the process technology of ammonia soda had been established for nearly 100 years. Over the last two decades many process control computers have been installed throughout the company, with improvements in process operation, safety and profitability. This has largely resulted from the 'technology explosion' in integrated micro circuits which enables present day computer systems to provide, in a cost effective way:- complex control functions and logic operations. process optimisation. data recording for management information and incident investigation. sophisticated presentation of plant information with the use of colour VDU's. early warning diagnostics of process malfunctions. * ICI pic Engineering Department (N.W.). 209

2 However, with such sophisticated and complex equipment providing total control of a chemical plant or process, there are accompanying disadvantages with the computer system:- unpredictable failure modes limited failure data greater susceptibility to common mode failure software unreliability: with accompanying difficulties in total validation and verification ease of modification and hence ease of corruption. There is, therefore, the need to recognise these problems, identify and assess the potential hazards that could arise through failure (in total or in part) of a computer system which is providing total control of a chemical plant or process. The approaches to assessment used by ICI cover the following topics:- Control System Requirements - Potential hazards - Control philosophy - Functional specification Computer System Installation - Environmental aspects - Power supplies and cables - Fire detection and protection - Electrical interference Computer System Hardware Computer System Software - Critical inputs and outputs - Distribution and redundancy - Fault tree analysis - Application software - Approaches to reliability - Operating system software - Modifications Each of the above topics will be described in some detail and a further section will refer to other assessment techniques- CONTROL SYSTEM REQUIREMENTS Before any reliability assessment of the computer system can take place, the areas of the plant where the potential hazards exist need to be identified. These potential hazards of fire, explosion, release of toxic material, pollution of the environment, and their consequences, are identified and quantified during the hazard and operability studies of the process plant. Within I.C.I., any new plant (or modification to an existing one) is subjected to a sequence of studies from the design phase through to commissioning, using the techniques developed and refined since the early 1970's. Within these hazard studies, the critical measurements and control parameters will be highlighted, together with the necessary protection systems. Where there are significant risks to people and the environment it is ICI's current philosophy to install protective systems which are usually hardwired and which are independent of the control systems - whether the control system is computerised or not. 210

3 In addition to demands from the plant, some failures of the computer system may also place demands on the plant protection system, and these need to be identified at an early stage in the design. However, it is recognised that with a computer controlled plant, the in-built diagnostic and logical capabilities of the computer can be used as the 'first line of defence 1 for the protective system. Using a computer in this way, the demand rate on the protective system may be reduced and may lead to the simplification of the protection system itself. Once the critical measurements, control functions, alarm requirements, and any special software requirements for the plant have been Identified, the functional specification and the control philosophy for the computer system can be compiled. It is at this point that the effects of hardware and software failures, data errors and operator Interface failures are considered, and their affect on the sensitive areas of the process plant- Considerations relevant to the safety and reliability of the computer system should Include:- a) Operator/Plant Interface - VDU display(s), Keyboard(s), and printer(s) How many are required? Are they dedicated to a particular plant section? Are all facilities for the whole plant Included on each one? What degree of control is each plant operator given? b) Although the alarm function will be included can the loss of the plant alarm function be tolerated when the computer system falls? Are independent and hardwired alarms required? c) In the case of computer failure, will the operator be presented with enough information to appreciate the state of the plant? Will the operator have sufficient facilities to make the plant safe? Will he be presented with too much (and conflicting) information? d) Will the computer system include both the control function and part of the protection system? There are cost benefits In combining the two functions, but a computer system failure leading to a control fault could at the same time prevent the initiation of the protection system. e) For sequence control:- If the plant operates in a batchwise rather than a continuous manner, will the system provide 'full control 1, stepping through each sequence automatically, or will it just control the timing of each stage, carryout the necessary checks and then indicate to the operator that this stage has finished, thus allowing him to initiate the next stage of the process? From this initial assessment of the computer system, two main factors will emerge, firstly, the reliability requirements to which the computer system must conform, and secondly, the control philosophy and operating strategy necessary to accommodate both normal plant operation and equipment failure or malfunction. 211

4 From the former, the design team will be able to provide the manufacturer or supplier with a deeper understanding of the computer application, stressing the importance of the equipment meeting the functional specification. From the latter, the commissioning/operating management, who, like the design team, will have been present in the plant hazard study, will now start planning the plant operational requirements, operator training needs and maintenance needs, and writing operating instructions and maintenance procedures for the computer system. HOW TO ASSESS THE SYSTEM For any reliability assessment there are three basic needs; some form of standard or guidelines to which the assessment should conform, a systematic method, and reliability data. Methodologies, techniques and tools abound for assessing the reliability of hardware, with even more for the validation and verification of system specification, software and testing. (Refs 1,2,3,4). Although reliability data for 'system hardware 1 is limited for computer system assessment, it is highly unlikely that any assessment for a chemical plant would need to go 'below circuit board level 1. Most manufacturers provide reliability figures for the major hardware components of their system, figures which may have been compiled from field data on installed systems. However for new equipment, with little field data, reliability figures may have been compiled from component data (eg Military Handbook Data, MIL.HDBK.217D). There is also a need for some form of Standard or Guideline to which the assessment should conform, especially if the equipment being used forms part of a safety related system. The manufacturer, in producing the equipment has BS 5760 and MIL.HDBK.217D to guide him but for the 'system' assessor there are no comprehensive national or international standards. This has been recognised by the H-S.E. who published their Guidelines on Programmable Electronic Systems in June 1987 (Ref 6). The Commission of the European Communities, in particular DG XIII, has also recognised the deficiency and part funded the European Workshop on Industrial Computer Systems Technical Committee 7 (EWICS TC7), who have recently produced four guidelines (Ref 7-13). Meanwhile companies, including ICI are building new plants and controlling them with computer systems- ICI have acknowledged the lack of guidelines and have adapted Hazard and Operability techniques to assess computer systems, relating the results back to the criteria applied to the total plant. COMPUTER SYSTEM INSTALLATION The reliability of the computer system not only depends on the hardware and software but also on its installation and the environment in which it is housed. With the high reliability which may be obtained from the computer hardware, these factors can become very important. 212

5 The Installation should be subjected to a stringent and structured hazard analysis similar to that for the plant, in which for example, the following topics are examined:- 1. Air Conditioning Some form of air conditioning equipment is usually required in order to satisfy the manufacturer's specification for relative humidity and temperature. For computer systems on chemical plant, the possibility of ingress of noxious fumes into an air conditioning system should be considered with either a chemical type filter (ie activated carbon) or air input dampers which close automatically on detection of toxic gas. The air conditioning system should at least be fitted with an alarm to indicate its failure especially if the computer equipment is in an unmanned area. 2. Fire Detection/Protection The risk of a computer system fire in normal operation is very low. However, since it is likely that a large proportion of the equipment would be in an unmanned area, a combination of heat and ionisation detectors strategically placed around the installation, should be installed. The likely causes of fire would be from some form of electrical failure or from overheating (hence the need for air conditioning equipment) Therefore, consideration should be given to switching off the air conditioning system and isolating the power source on detection of fire. Since any fire would generally be localised, and switching off the power would remove the cause, local hand held extinguishers would probably suffice. However, for larger systems, manual or automatically triggered flood systems of Halon or COo maybe considered, although there is considerable debate on their effectiveness and ensuing damage if triggered spuriously. 3. Power Supplies and Cables The integrity of the incoming supply to the system should be assessed (failure, voltage spikes, frequency variations) and the question of an alternative supply or Uninterrupted Power Supply (U.P.S.) system considered. The consequences of power failure and power return should be examined, especially with respect to restart procedures for the software. This is particularly important on batch processes and sequence control systems. 213

6 Cables to and from the computer system should be segregated wherever possible from power cables, particularly from those supplying power to large electric motors- They should also be protected along their routes from mechanical damage, and duplicated signals from sensitive areas should follow separate routes. 4. Earthing The basic requirements for the earthing system are to avoid the risk of electric shock (a.c earth); to provide a signal reference potential (d.c earth) and to avoid the build up of a static charge which may cause damage or maloperation of the equipment- In addition, the earthing of the computer system should be implemented in such a way that the invasion of fault currents from other circuits (eg electric motor circuits) is avoided. This has been recognised by my company and guidance is available for the design team. 5 Electrical Interference The earthing system, plus choice of cable routes, would usually avoid electro-magnetic interference problems from large electrical drives, but the problem should not be ignored. Electrostatic build up on computer cabinets can sometimes be a problem and the earthing system should take this into account. Facilities for earth bonding operating/maintenance personnel should also be considered. The use of radio transceivers is widespread on chemical plant, particularly by the instrument maintenance personnel, when calibrating/checking field instruments back to the computer. Note should be made of the susceptibility of computer equipment to Radio Frequency Interference, (R.F.I.)- COMPUTER SYSTEM HARDWARE In the first stage of the assessment, the philosophy of plant control was established and the critical measurements and control loops were identified. Failures that could lead to a potential hazard are governed by the reliability of the hardware relating to these critical parameters. In order to enhance the reliability, a number of actions can be taken. For example, distributing the critical inputs and outputs on the respective interface cards ensures that a single card failure would not lead to the loss of a number of critical measurements. Again if a parameter is used for control plus a critical alarm, its measurement should preferably have two separate measuring devices fed in via separate channels. It follows, therefore, that the emphasis regarding hardware reliability is focussed on its configuration. 214

7 System failure modes can generally be classified according to their effects on plant safety and whether they are revealed or unrevealed- They can either be 'FAIL SAFE' or 'FAIL TO DANGER' or have negligible effect. A 'FAIL SAFE' mode exists when, as a result of some failure, the plant moves towards a safe state, eg a controlled plant shutdown. 'FAIL TO DANGER' modes exist when, as a result of the failure, the plant moves towards a potentially hazardous situation. It is the latter that have to be quantitatively assessed against the safety criteria for the plant. The method of analysis most frequently used within the hazard studies is Fault Tree Analysis, F.T.A. This method, 'top down approach', identifies the system failure mode of interest (top event) and then identifies the failures of the sub-system levels that can cause that failure, until the lowest desired level of component is reached. Applied to computer systems on chemical plant, the lowest level would be input/output boards or a processor board, - not the components within that board. Complementary to FTA, a form of Failure Mode and Effect Analysis, (F.M.E.A-) would have been applied at the first stage of the assessment in order to determine the required level of redundancy for the computer system. Referring back to revealed failures, all on-line computer systems have some form of in-built software diagnostics, or'watch-dog', which to a greater or lesser degree will detect failures when they occur and provide some form of signal. This signal, in its simplest form, would merely notify the operator of the failure- On more complex systems, it would cause switch over to the back-up systems, or initiate plant shut-down. The degree, of on-line diagnostics will determine the percentage of failures detected - one manufacturer of a distributed system claims 98% of failures detected- Following this analysis, a quantified assessment of the hardware reliability can be carried out, using the available failure data and including the mean time to repair of any equipment Installed to provide redundancy. COMPUTER SYSTEM SOFTWARE "No techniques are available which allow the frequency of software failures to be predicted In advance of use" (ref lpl80). "It was recognised that hardware falls In a random manner but software which has specification and design error induced failures does not" (ref 1.197). "Although programmable system failures can be Identified using F.T.A., for specific hazards only the hardware element can be quantified" (ref lpl80). Although Hazard and Operabillty techniques for assessing chemical plant have been developed and refined by ICI since the early 1970's, computer systems were at first only subjected to detailed study and checking by the design discipline. Formalised hazard studies by a multi-disciplined team were not carried out on computer systems, especially the software. 215

8 However, procedures for software modifications, (Ref 14) based on established HAZOP techniques, were initiated in the early 1980's. A process control computing guideline was compiled about the same time. On 6 December '85, an incident occurred on a Nylon Polymer Plant at Wilton Site, when, due to a computer failure, the plant was shutdown In an uncontrolled manner. Control valves were wrongly set, and 3 tonnes of molten polymer at 300 C under a nitrogen pressure of 27 barg, followed by raw materials for the next batch, came out of the extrusion valve onto the floor. Following this incident and the subsequent Hazard Study of the computer system, especially the software (ref lppl89-206), improved and more comprehensive design and checking procedures for ensuring software reliability were established. The procedures are constructed on the basis of pre-requisltes followed by checklists. This procedure now enables software to be subjected to a formalised review at each phase of its development by a multi discipline team. It also ensures that comprehensive documentation is provided. Structured programming techniques are used; tried and tested routines are used wherever possible and separate modules are written for logically separate functions. Examples of the pre-requisites are given in Appendix 1 and the checklists in Appendix II. This approach, however, only applies to the application or user software. Each system will be accompanied by a suite of software provided by the manufacturer - the operating system or system software. The user will have no say in the creation of this system software nor will he know what quality checks have been Imposed. It will therefore be the responsibility of the user to establish with the manufacturer this aspect of quality and reliability. During these discussions it will be most important to establish the program change control procedures followed by the manufacturer. This has been recognised by the H.S.E. in the P.E.S. Guidelines Part 2, checklist No 14A. OTHER TECHNIQUES I have briefly described ICI's approach to the reliability assessment of computer systems, namely, the application of well established Hazard and Operability techniques to the installation and the system hardware, plus quality assurance procedures for the software using pre-requtsites and checklists throughout the software life-cycle. It has been widely recognised that,whilst the reliability of a computer system's hardware can be relatively easily assessed both quantitatively and qualitatively, software reliability assessment is difficult, complex, and well nigh impossible. 216

9 Software failures are considered to be 'systematic' and cover the whole life cycle from specification to testing. In order to reduce these errors, formal methods for specification have been deslgned eg MASCOT (Ref 15), which is a design method supported by a programming system. It defines a systematic method of expressing the structure of a real-time system in a way that is independent of the target hardware or implementation language. Software checking programmes are in abundance, one in particular MALPAS (MALvern Program Analysis Suite) was developed by R.S.R-E. over many years for the static analysis of critical software. Programme testing is the last step before system test and commissioning, and test methods and test data are as critical as the program itself. In his paper at the Safety and Reliability Society Symposium, 1987, SARSS 87, (ref 1 ppl00-117) P G Bishop outlined the STEM project (Software Test and Evaluation Methodologies), the objective of which was to evaluate a number of fault detection, fault prediction and failure methods. This was done by applying these methods to the documented computer programs on diverse software. These programs were produced against a common specification for a safety trip system on an experimental nuclear reactor at Halden, Norway and known to contain faults. From the various methods used within the project, testing diverse software programs back to back with random data proved to be the most effective testing method, finding over 90% of known faults. These are just a small sample of the methodologies that are being used to improve software reliability which is recognised as the problem area in achieving safety and reliability for computer systems- CONCLUSIONS ICI has been one of the forerunners in designing and developing Hazard and Operability study techniques for ensuring chemical plant safety since the early 1970's. Computer technology and application has improved and increased enormously over the same period, and can make a positive contribution to plant safety. At the same time, it has been recognised that failures within a computer system controlling a hazardous plant can have serious consequences. There is, therefore, the need to carry out reliability and safety assessment on computer systems in safety related applications and ICI has adapted its well proven HAZOP techniques for this purpose. It is not considered that entirely new methods of analysis are required but, due to the rapidly evolving technology and functional complexity, some development of existing analytical techniques is necessary. The need for guidelines and standards in this area has also been recognised, particularly with the advent of new statutory regulations- The HSE have published guidelines (ref 6) on programmable electronic systems in safety related applications. The European Workshop on Industrial Computer Systems Technical Committee 7 (EWICS TC7) has also produced a number of position papers and four guidelines on safety related computer systems under part sponsorship for the CEC (refs 7 to 13). 217

10 Material from the EW1CS TC7 documents is being used by the international standards organisations, International Electrotechnical Commission (IEC) and International Standards Organisation (ISO), in their current work- Even with standards, guidelines and methodologies it will still be necessary to allow a committed, well disciplined team, time within the projects to produce reliable systems and prevent major chemical and process related accidents. ACKNOWLEDGEMENTS The author would like to thank ICI Pic for permission to publish this paper. 218

11 REFERENCES 'Achieving Safety and Relability with Computer Systems' Proceedings of the Safety and Reliability Society Symposium November Publisher Elsevier Applied Science. Safety and Reliability of Programmable Electronic Systems Proceedings of P.E.S. Safety Symposium Guernsey, UK May 86. Publisher Elsevier Applied Science. SAFECOMP 83 Achieving Safe Real Time Computer Systems Proceedings of the third IFAC/IFIP Workshop, Cambridge, UK September 1983, Published by Pergammon Press. SAFECOMP 86 Trends in Safe Real Time Computer Systems Proceedings of the fifth 1FAC Workshop, Sarlat, France October Published by Pergammon Press. Symposium on Safety and Reliability of Programmable Electronic Systems. I.E.E. Teesside sub centre Middlesbrough May H.S.E. Guidelines - Programmable Electronic Systems in Safety Related Applications - Part 2 General Technical Guidelines. H.M.S.O. June Draft Guidelines to Design Computer Systems for Safety. Attributes, Criteria and Measures- Draft Guidelines for the Assessment of the Safety and Reliability of High Integrity Industrial Computer Systems- Techniques Directory. Draft Guidelines on Safety Related measures to be used in Software Quality Assurance. Classification of Functions of quality Assurance. Draft Guidelines for the maintenance and modification of safety related computer systems. Refs 7-13 above are EWICS TC7 final deliverable documents under a contract with CEC DG XIII which are intended to be published in book form in Software Maintenance and Change Control - S R Nunns ICI Pic- Engineering Department, NE - Internal working document. MASCOT 3 User Guide MASCOT Users Forum, RSRE Malvern, England 219

12 Designing within Constraints APPENDIX I EXAMPLES OF PRE-REQUISITES (a) Estimate the processor timing load for each task. (b) Estimate peripheral/resource access constraints for each task. (c) Estimate space requirements for each task- (Any problems revealed by (a), (b) and (c) should cause an urgent review of the previous phase). (d) Identify the partitions bearing in mind the physical constraints imposed by the operating system. From this, split the task into individual functions which will identify the modules. Modules should have a minimum of external links and be designed to ensure that probable modifications result in changes to a minimum number of modules. These modules should be functionally complete with well defined interfaces (average size should be 300 lines). Software should be partitioned so that aspects which handle, for example, computer external interfaces, scheduling and store allocation are separated from application procedures with well defined interfaces between them. This produces a clearer system structure and aids verification. Diagrams should be used (see Appendix B) to describe: (1) Modules and data with control flow. (2) Core store map. (3) Backing store map. (4) Task thread diagram. These should be kept up-to-date throughout the life-cycle. Principal decisions should be documented to avoid later ambiguity, and areas of difficulty should be identified at an early stage in the design's procedure. 220

13 APPENDIX II EXAMPLE OF CHECKLIST (1) Are the man/machine and instrument interfaces properly defined? (2) Have means of extending it been defined? (3) Are there various modes, ie for skilled and unskilled users? (4) Has the interface been defined such that Illegal actions do not corrupt the system or lock up the interface? (5) Are there means of monitoring the interface loading and type and frequency of use actions? (6) Has the Interface built-in security? (7) Has the interface response time been defined? (1) (1) Are the files detailed? (2) Have the controls over them been stated? (3) Has the detailed layout been defined? (4) What routines have access to what parts of the files? (5) What security is there on the files from the system point and user (ie passwords, etc). (6) What routine can update these, when and how? (7) What duplications and recovery do they have? (8) Have overflow conditions and actions been defined? (9) Have the lives of the files and records been defined? (10) Has the rate of update been stated? (11) Have the checks on data loss and how to recover the loss been defined? (12) Have the methods and means been defined of how a process checks that the part of the file read or updated is the correct part? (13) Have the block lengths been defined or, if of variable length, have means of determining the length been defined? (14) Have the means of assessing been defined? (15) Have the means of creating the Initial file been defined? (16) Can the frequency of file access be monitored? 221

SOFTWARE-IMPLEMENTED SAFETY LOGIC Angela E. Summers, Ph.D., P.E., President, SIS-TECH Solutions, LP

SOFTWARE-IMPLEMENTED SAFETY LOGIC Angela E. Summers, Ph.D., P.E., President, SIS-TECH Solutions, LP SOFTWARE-IMPLEMENTED SAFETY LOGIC Angela E. Summers, Ph.D., P.E., President, SIS-TECH Solutions, LP Software-Implemented Safety Logic, Loss Prevention Symposium, American Institute of Chemical Engineers,

More information

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Announcement of a new IAEA Co-ordinated Research Programme (CRP) Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)

More information

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when

More information

Safety Requirements Specification Guideline

Safety Requirements Specification Guideline Safety Requirements Specification Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se -1- Summary Safety Requirement

More information

SAFETY, PROCESS CONTROL, SOFTWARE

SAFETY, PROCESS CONTROL, SOFTWARE THE DESIGN AND VALIDATION OF SOFTWARE USED IN CONTROL SYSTEMS - SAFETY IMPLICATIONS J Brazendale* and I Lloyd** This paper gives an overview of software engineering and its role in safety. Strategies for

More information

Basic Fundamentals Of Safety Instrumented Systems

Basic Fundamentals Of Safety Instrumented Systems September 2005 DVC6000 SIS Training Course 1 Basic Fundamentals Of Safety Instrumented Systems Overview Definitions of basic terms Basics of safety and layers of protection Basics of Safety Instrumented

More information

Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004)

Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Dale Perry Worldwide Pressure Marketing Manager Emerson Process Management Rosemount Division Chanhassen, MN 55317 USA

More information

Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems

Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems Simon Brown The author is with the Health & Safety Executive, Magdalen House, Bootle, Merseyside,

More information

Version: 1.0 Latest Edition: 2006-08-24. Guideline

Version: 1.0 Latest Edition: 2006-08-24. Guideline Management of Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se Quoting of this report is allowed but please

More information

Understanding Safety Integrity Levels (SIL) and its Effects for Field Instruments

Understanding Safety Integrity Levels (SIL) and its Effects for Field Instruments Understanding Safety Integrity Levels (SIL) and its Effects for Field Instruments Introduction The Industrial process industry is experiencing a dynamic growth in Functional Process Safety applications.

More information

Vetting Smart Instruments for the Nuclear Industry

Vetting Smart Instruments for the Nuclear Industry TS Lockhart, Director of Engineering Moore Industries-International, Inc. Vetting Smart Instruments for the Nuclear Industry Moore Industries-International, Inc. is a world leader in the design and manufacture

More information

On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment

On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment Legislation, Standards and Technology On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment Assistance for equipment manufacturers in analysis and assessment by Michael

More information

Safety Integrity Level (SIL) Studies Germanischer Lloyd Service/Product Description

Safety Integrity Level (SIL) Studies Germanischer Lloyd Service/Product Description Safety & Risk Management Services Safety Integrity Level (SIL) Studies Germanischer Lloyd Service/Product Description Germanischer Lloyd Service/Product Description Safety Integrity Level (SIL) Studies

More information

SAFETY LIFE-CYCLE HOW TO IMPLEMENT A

SAFETY LIFE-CYCLE HOW TO IMPLEMENT A AS SEEN IN THE SUMMER 2007 ISSUE OF... HOW TO IMPLEMENT A SAFETY LIFE-CYCLE A SAFER PLANT, DECREASED ENGINEERING, OPERATION AND MAINTENANCE COSTS, AND INCREASED PROCESS UP-TIME ARE ALL ACHIEVABLE WITH

More information

PABIAC Safety-related Control Systems Workshop

PABIAC Safety-related Control Systems Workshop Health and and Safety Executive PABIAC Safety-related Control Systems Workshop KEY STANDARDS FOR ELECTRICAL & FUNCTIONAL SAFETY OF PAPERMAKING MACHINES: APPLICATION & USE Steve Frost HM Principal Electrical

More information

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL 61508-3 ª IEC: 1997 1 Version 12.0 05/12/97 COMMISSION CEI ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL COMMISSION Functional safety of electrical/electronic/ programmable

More information

ALARM PERFORMANCE IMPROVEMENT DURING ABNORMAL SITUATIONS

ALARM PERFORMANCE IMPROVEMENT DURING ABNORMAL SITUATIONS ALARM PERFORMANCE IMPROVEMENT DURING ABNORMAL SITUATIONS Peter Andow Honeywell Hi-Spec Solutions, Southampton, UK The process industries are continually facing new challenges to increase throughput, improve

More information

Nuclear Power Plant Electrical Power Supply System Requirements

Nuclear Power Plant Electrical Power Supply System Requirements 1 Nuclear Power Plant Electrical Power Supply System Requirements Željko Jurković, Krško NPP, zeljko.jurkovic@nek.si Abstract Various regulations and standards require from electrical power system of the

More information

Daker DK 1, 2, 3 kva. Manuel d installation Installation manual. Part. LE05334AC-07/13-01 GF

Daker DK 1, 2, 3 kva. Manuel d installation Installation manual. Part. LE05334AC-07/13-01 GF Daker DK 1, 2, 3 kva Manuel d installation Installation manual Part. LE05334AC-07/13-01 GF Daker DK 1, 2, 3 kva Index 1 Introduction 24 2 Conditions of use 24 3 LCD Panel 25 4 Installation 28 5 UPS communicator

More information

Viewpoint on ISA TR84.0.02 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President

Viewpoint on ISA TR84.0.02 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President Viewpoint on ISA TR84.0.0 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President Presented at Interkama, Dusseldorf, Germany, October 1999, Published in ISA Transactions,

More information

Functional Safety Management: As Easy As (SIL) 1, 2, 3

Functional Safety Management: As Easy As (SIL) 1, 2, 3 Functional Safety Management: As Easy As (SIL) 1, 2, 3 Abstract This paper outlines the need for planning in functional safety management. Recent events such as the Montara blowout and the Deepwater Horizon

More information

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT GENERAL DISTRIBUTION OCDE/GD(95)115 OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT THE APPLICATION OF THE PRINCIPLES OF GLP TO COMPUTERISED

More information

Liberty Mutual Insurance RISK ENGINEERING PROCEDURE. REP 07 Incident Planning For external use

Liberty Mutual Insurance RISK ENGINEERING PROCEDURE. REP 07 Incident Planning For external use Liberty Mutual Insurance RISK ENGINEERING PROCEDURE REP 07 Incident Planning For external use Risk Engineering Procedure Incident Planning CONTENTS Page PURPOSE... 3 BACKGROUND... 4 INCIDENT PLANNING PREPARATION...

More information

THE DELTON GROUP MANPOWER TRAINING CONSULTANCY SHORT COURSE PROGRAMME TOPICS LISTING

THE DELTON GROUP MANPOWER TRAINING CONSULTANCY SHORT COURSE PROGRAMME TOPICS LISTING THE DELTON GROUP MANPOWER TRAINING CONSULTANCY SHORT COURSE PROGRAMME TOPICS LISTING Delton Short Course Programmes English Language Technical English Language English Language for the Oil Industry Oil

More information

Safety controls, alarms, and interlocks as IPLs

Safety controls, alarms, and interlocks as IPLs Safety controls, alarms, and interlocks as IPLs Angela E. Summers, Ph.D., P.E. SIS-TECH Solutions 12621 Featherwood Dr. Suite 120, Houston, TX 77034 Keywords: safety controls, alarms, interlocks, SIS,

More information

Version: 1.0 Last Edited: 2005-10-27. Guideline

Version: 1.0 Last Edited: 2005-10-27. Guideline Process hazard and risk Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se -1- Summary This report will try

More information

Interfacing electrification and system reliability. Earthing of AC and DC railways 4,10,13

Interfacing electrification and system reliability. Earthing of AC and DC railways 4,10,13 Interfacing electrification and system reliability Roger White Professional Head of Electrification and Plant Rail Abstract Integration is the term given to ensuring that the different elements of an electrified

More information

A methodology For the achievement of Target SIL

A methodology For the achievement of Target SIL A methodology For the achievement of Target SIL Contents 1.0 Methodology... 3 1.1 SIL Achievement - A Definition... 4 1.2 Responsibilities... 6 1.3 Identification of Hazards and SIL Determination... 8

More information

Is your current safety system compliant to today's safety standard?

Is your current safety system compliant to today's safety standard? Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before

More information

TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification

TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification The TÜV Rheinland Functional Safety Program is a unique opportunity to provide certified evidence of competency in functional

More information

Understanding Emergency Power Off (EPO)

Understanding Emergency Power Off (EPO) Understanding Emergency Power Off (EPO) White Paper #22 Executive Summary Emergency Power Off (EPO) is the capability to power down a piece of electronic equipment or an entire installation from a single

More information

Logic solver application software and operator interface

Logic solver application software and operator interface Logic solver application software and operator interface By RJ Perry, Control Systems Consultant Correctly implemented and structured functional logic, together with operator interface displays, can improve

More information

Systems Assurance Management in Railway through the Project Life Cycle

Systems Assurance Management in Railway through the Project Life Cycle Systems Assurance Management in Railway through the Project Life Cycle Vivian Papen Ronald Harvey Hamid Qaasim Peregrin Spielholz ABSTRACT Systems assurance management is essential for transit agencies

More information

IEC 61508 Overview Report

IEC 61508 Overview Report IEC 61508 Overview Report A Summary of the IEC 61508 Standard for Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems exida Sellersville, PA 18960, USA +1-215-453-1720

More information

Hardware safety integrity Guideline

Hardware safety integrity Guideline Hardware safety integrity Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se Quoting of this report is allowed

More information

www.klmtechgroup.com TABLE OF CONTENT

www.klmtechgroup.com TABLE OF CONTENT Page : 1 of 13 Project Engineering Standard www.klmtechgroup.com KLM Technology #03-12 Block Aronia, Jalan Sri Perkasa 2 Taman Tampoi Utama 81200 Johor Bahru Malaysia TABLE OF CONTENT SCOPE 2 REFERENCES

More information

The Application of Circuit Breakers to Reduce Downtime in Datacentres

The Application of Circuit Breakers to Reduce Downtime in Datacentres The Application of Circuit Breakers to Reduce Downtime in Datacentres Tim Campbell BEng MIET. Marketing Manager, Terasaki Electric (Europe) Ltd. Abstract Circuit breakers fulfil several functions in the

More information

EWICS TC7 an insider s tip for safety and security guidance 1 by Odd Nordland

EWICS TC7 an insider s tip for safety and security guidance 1 by Odd Nordland EWICS TC7 an insider s tip for safety and security guidance 1 by Odd Nordland Introduction The European Workshop on Industrial Computer Systems (EWICS) was founded in 1974 as the European branch of the

More information

ISO 26262 Introduction

ISO 26262 Introduction ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product

More information

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter.

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter. 61508 SIL 3 CAPABLE IEC 61508 Functional Safety Assessment Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter Customer: K-TEK Corporation Prairieville, LA USA Contract No.:

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

3.4.4 Description of risk management plan Unofficial Translation Only the Thai version of the text is legally binding.

3.4.4 Description of risk management plan Unofficial Translation Only the Thai version of the text is legally binding. - 1 - Regulation of Department of Industrial Works Re: Criteria for hazard identification, risk assessment, and establishment of risk management plan B.E. 2543 (2000) ---------------------------- Pursuant

More information

Maximizing return on plant assets

Maximizing return on plant assets Maximizing return on plant assets Manufacturers in nearly every process industry face the need to improve their return on large asset investments. Effectively managing assets, however, requires a wealth

More information

Power Management of Cell Sites

Power Management of Cell Sites International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 9 (September 2013), PP.41-45 Power Management of Cell Sites K.Santhosh Kumar

More information

231 XA9744368 REACTOR ALARM SYSTEM DEVELOPMENT AND APPLICATION ISSUES. J.E. Drexler, G.O. Oicese INVAP S.E. Argentina

231 XA9744368 REACTOR ALARM SYSTEM DEVELOPMENT AND APPLICATION ISSUES. J.E. Drexler, G.O. Oicese INVAP S.E. Argentina 21 XA974468 REACTOR ALARM SYSTEM DEVELOPMENT AND APPLICATION ISSUES J.E. Drexler, G.O. Oicese INVAP S.E. Argentina ASTRACT The new hardware and software technologies, and the need in research reactors

More information

Failure Modes, Effects and Diagnostic Analysis

Failure Modes, Effects and Diagnostic Analysis Failure Modes, Effects and Diagnostic Analysis Project: Plant-STOP 9475 Company: R. STAHL Schaltgeräte GmbH Waldenburg Germany Contract No.: STAHL 13/04-027 Report No.: STAHL 13/04-027 R024 Version V1,

More information

Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12

Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12 Document Details Title: Author: 247Time Backup & Disaster Recovery Plan Document Tracking Page 1 of 12 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 DEFINED REQUIREMENT... 3 2 DISASTER OVERVIEW...

More information

UNIVERSITY INDUSTRY COLLABORATION: SAFETY ENGINEERING EDUCATION AT KU LEUVEN

UNIVERSITY INDUSTRY COLLABORATION: SAFETY ENGINEERING EDUCATION AT KU LEUVEN UNIVERSITY INDUSTRY COLLABORATION: SAFETY ENGINEERING EDUCATION AT KU LEUVEN Jan Degrève 1, Jan Berghmans* 1, Geert Boogaerts 2 1 Katholieke Universiteit Leuven, Department of Chemical Engineering, Belgium

More information

A holistic approach to Automation Safety

A holistic approach to Automation Safety A holistic approach to Automation Safety Mark Eitzman - Manager, Safety Business Development How technology, global standards and open systems help increase productivity and overall equipment effectiveness.

More information

DEDICATED TO EMBEDDED SOLUTIONS

DEDICATED TO EMBEDDED SOLUTIONS DEDICATED TO EMBEDDED SOLUTIONS RELIABILITY IN SUBSEA ELECTRONICS TECHNIQUES TO OBTAIN HIGH RELIABILITY STIG-HELGE LARSEN KARSTEN KLEPPE DATA RESPONS 2012-10-16 AGENDA Introduction Analysis and Design

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery

More information

Energy Design Resources Commissioning Plan Outline Template

Energy Design Resources Commissioning Plan Outline Template IMPORTANT NOTICE: This sample document is provided for instructional purposes only. CCC is not rendering advice concerning any commission project or practices. This document is neither approved nor intended

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

MARULENG LOCAL MUNICIPALITY

MARULENG LOCAL MUNICIPALITY MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details

More information

www.klmtechgroup.com TABLE OF CONTENT

www.klmtechgroup.com TABLE OF CONTENT Page : 1 of 50 Project Engineering Standard www.klmtechgroup.com AUGUST 2011 KLM Technology #03-12 Block Aronia, Jalan Sri Perkasa 2 Taman Tampoi Utama 81200 Johor Bahru Malaysia TABLE OF CONTENT SCOPE

More information

Guidance note. Risk Assessment. Core concepts. N-04300-GN0165 Revision 4 December 2012

Guidance note. Risk Assessment. Core concepts. N-04300-GN0165 Revision 4 December 2012 Guidance note N-04300-GN0165 Revision 4 December 2012 Risk Assessment Core concepts The operator of an offshore facility must conduct a detailed and systematic formal safety assessment, which includes

More information

Using a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems.

Using a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems. Using a Failure Modes, Effects and Diagnostic Analysis (FMEDA) to Measure Diagnostic Coverage in Programmable Electronic Systems. Dr. William M. Goble exida.com, 42 Short Rd., Perkasie, PA 18944 Eindhoven

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions The exida 61508 Certification Program V1 R8 October 19, 2007 exida Geneva, Switzerland Sellersville, PA 18960, USA, +1-215-453-1720 Munich, Germany, +49 89 4900 0547 1 Exida

More information

Degree programme in Automation Engineering

Degree programme in Automation Engineering Degree programme in Automation Engineering Course descriptions of the courses for exchange students, 2014-2015 Autumn 2014 21727630 Application Programming Students know the basis of systems application

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Final Element Architecture Comparison

Final Element Architecture Comparison Final Element Architecture Comparison 2oo2 with diagnostics: Lower False Trip Rate and High Safety Project: Safety Cycling Systems Architecture Review Customer: Safety Cycling Systems, L.L.C. 1018 Laurel

More information

RVH/BCH Data Centres Proposals for Surge Protection and Ventilation

RVH/BCH Data Centres Proposals for Surge Protection and Ventilation REPORT Proposals for Surge Protection and Ventilation BELFAST HEALTH AND SOCIAL CARE TRUST ROYAL GROUP OF HOSPITALS GROSVENOR ROAD BELFAST BT12 6BA Rev. 01 6th September 2013 Table of Contents 1.0 Ventilation

More information

REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY

REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL

More information

Avoiding AC Capacitor Failures in Large UPS Systems

Avoiding AC Capacitor Failures in Large UPS Systems Avoiding AC Capacitor Failures in Large UPS Systems White Paper #60 Revision 0 Executive Summary Most AC power capacitor failures experienced in large UPS systems are avoidable. Capacitor failures can

More information

Alarm Management What, Why, Who and How?

Alarm Management What, Why, Who and How? Alarm Management What, Why, Who and How? Executive Summary The introduction of the DCS has made it possible to create alarms more easily and at a lower cost. Although software alarms are convenient, the

More information

Controlling Risks Risk Assessment

Controlling Risks Risk Assessment Controlling Risks Risk Assessment Hazard/Risk Assessment Having identified the hazards, one must assess the risks by considering the severity and likelihood of bad outcomes. If the risks are not sufficiently

More information

FIRE ALARMS. IN DWELLINGS By John Ware FIRE ALARMS

FIRE ALARMS. IN DWELLINGS By John Ware FIRE ALARMS 1 FIRE ALARMS IN DWELLINGS By John Ware IN THE UK around 80% of all fire deaths and injuries occur in dwellings, a total of 450 to 500 deaths and 14,000 injuries per annum, according to BS 5839-6: 2004.

More information

12 SOLAR PHOTOVOLTAIC POWER SUPPLY SYSTEMS by John Ware. PV modules are current-limiting

12 SOLAR PHOTOVOLTAIC POWER SUPPLY SYSTEMS by John Ware. PV modules are current-limiting 12 SOLAR PHOTOVOLTAIC POWER by John Ware IT IS PLANNED for BS 7671:2008 to include a new Section 712 providing additional requirements for safety applicable to solar photovoltaic (pv) power supply systems.

More information

Alain Nifenecker - General Electric Manager Controls Engineering

Alain Nifenecker - General Electric Manager Controls Engineering GE Energy Benefits of Integrating a Single Plant-Wide Control System Into a Standard Plant Design Philosophy Authors: Luis Cerrada Duque - Empresarios Agrupados Director of I&C Department Charles Weidner

More information

A Risk Management Standard

A Risk Management Standard A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management

More information

SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR

SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR The information and any recommendations that may be provided herein are not intended

More information

IAEA-TECDOC-1328 Solutions for cost effective assessment of software based instrumentation and control systems in nuclear power plants

IAEA-TECDOC-1328 Solutions for cost effective assessment of software based instrumentation and control systems in nuclear power plants IAEA-TECDOC-1328 Solutions for cost effective assessment of software based instrumentation and control systems in nuclear power plants Report prepared within the framework of the Technical Working Group

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

Mitigating safety risk and maintaining operational reliability

Mitigating safety risk and maintaining operational reliability Mitigating safety risk and maintaining operational reliability Date 03/29/2010 Assessment and cost-effective reduction of process risks are critical to protecting the safety of employees and the public,

More information

FIRE ALARM SYSTEM TECHNICAL SPECIFICATIONS Page 1 of 10

FIRE ALARM SYSTEM TECHNICAL SPECIFICATIONS Page 1 of 10 TECHNICAL SPECIFICATIONS Page 1 of 10 FIRE DETECTION AND ALARM SYSTEM Scope Furnish a complete 24V DC conventional, electrically supervised, zone annunciated, fire detection and alarm system as specified

More information

ICT Disaster Recovery Plan

ICT Disaster Recovery Plan 7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

Controlling Risks Safety Lifecycle

Controlling Risks Safety Lifecycle Controlling Risks Safety Lifecycle Objective Introduce the concept of a safety lifecycle and the applicability and context in safety systems. Lifecycle Management A risk based management plan for a system

More information

Common Power Problems & Power Protection Solutions

Common Power Problems & Power Protection Solutions W H I T E P A P E R Common Power Problems & Power Protection Solutions Executive Summary All systems, from home theaters and office desktops to enterprise IT equipment in data centers, are prone to downtime,

More information

ALARMLINE ANALOGUE Linear Heat Detection System

ALARMLINE ANALOGUE Linear Heat Detection System ALARMLINE ANALOGUE Alarmline Analogue sensor cable senses temperature variations by continuously monitoring the resistance of specially doped N.T.C. polymeric insulation. A change in temperature produces

More information

THEME Competence Matrix - Electrical Engineering/Electronics with Partial competences/ Learning outcomes

THEME Competence Matrix - Electrical Engineering/Electronics with Partial competences/ Learning outcomes COMPETENCE AREAS STEPS OF COMPETENCE DEVELOPMENT 1. Preparing, planning, mounting and installing electrical for buildings and industrial applications He/She is able to prepare and carry out simple electrical

More information

A PROCESS ENGINEERING VIEW OF SAFE AUTOMATION

A PROCESS ENGINEERING VIEW OF SAFE AUTOMATION A PROCESS ENGINEERING VIEW OF SAFE AUTOMATION Published in Chemical Engineering Progress, December 2008. Angela E. Summers, SIS-TECH Solutions, LP This step-by-step procedure applies instrumented safety

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Testing Automated Manufacturing Processes

Testing Automated Manufacturing Processes Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls

More information

Government Degree on the Safety of Nuclear Power Plants 717/2013

Government Degree on the Safety of Nuclear Power Plants 717/2013 Translation from Finnish. Legally binding only in Finnish and Swedish. Ministry of Employment and the Economy, Finland Government Degree on the Safety of Nuclear Power Plants 717/2013 Chapter 1 Scope and

More information

SureSense Software Suite Overview

SureSense Software Suite Overview SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense

More information

NHS 24 - Business Continuity Strategy

NHS 24 - Business Continuity Strategy NHS 24 - Strategy Version: 0.3 Issue Date: 20/09/2005 Status: Issued for Board Approval Status: draft Page 1 of 13 Table of Contents 1 INTRODUCTION...3 2 PURPOSE...3 3 SCOPE...3 4 ASSUMPTIONS...4 5 BUSINESS

More information

AP1000 European 18. Human Factors Engineering Design Control Document

AP1000 European 18. Human Factors Engineering Design Control Document 18.2 Human Factors Engineering Program Management The purpose of this section is to describe the goals of the AP1000 human factors engineering program, the technical program to accomplish these goals,

More information

Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity

Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity Value Paper Author: Edgar C. Ramirez Diverse redundancy used in SIS technology to achieve higher safety integrity Diverse redundancy used in SIS technology to achieve higher safety integrity Abstract SIS

More information

JUBILEE TECHNICAL TRAINING CENTRE TAKORADI POLYTECHNIC 2015 TRAINING PROGRAMMES

JUBILEE TECHNICAL TRAINING CENTRE TAKORADI POLYTECHNIC 2015 TRAINING PROGRAMMES JUBILEE TECHNICAL TRAINING CENTRE TAKORADI POLYTECHNIC 2015 TRAINING PROGRAMMES Main Courses Duration: 26 weeks 1. NVQ Level 2 Performing Process Operation in Replicating Environment 2. NVQ Level 2 Performing

More information

Problem / Solution. The problem:

Problem / Solution. The problem: Problem / Solution Solar Photovoltaic (PV) technology has shown significant development in recent years and this has led to many UK homeowners investing in Solar PV installations. Solar electricity is

More information

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted

More information

Unified requirements for systems with voltages above 1 kv up to 15 kv

Unified requirements for systems with voltages above 1 kv up to 15 kv (1991) (Rev.1 May 2001) (Rev.2 July 2003) (Rev.3 Feb 2015) Unified requirements for systems with voltages above 1 kv up to 15 kv 1. General 1.1 Field of application The following requirements apply to

More information

Liebert GXT MT+ CX UPS, 1000VA - 3000VA Intelligent, Reliable UPS Protection. AC Power for Business-Critical Continuity

Liebert GXT MT+ CX UPS, 1000VA - 3000VA Intelligent, Reliable UPS Protection. AC Power for Business-Critical Continuity Liebert GXT MT+ CX UPS, 1000VA - 3000VA Intelligent, Reliable UPS Protection AC Power for Business-Critical Continuity Liebert GXT MT+ CX UPS, 1000VA -3000VA Intelligent, Reliable UPS Protection Liebert

More information

Risk management for external beam radiotherapy Recommendations (draft)

Risk management for external beam radiotherapy Recommendations (draft) Patient safety in external beam radiotherapy - Guidelines on risk assessment and analysis of adverse events and near misses. Risk management for external beam radiotherapy Recommendations (draft) Jean-Luc

More information

THE GOVERNMENT OF THE REPUBLIC OF CROATIA

THE GOVERNMENT OF THE REPUBLIC OF CROATIA THE GOVERNMENT OF THE REPUBLIC OF CROATIA 2433 Pursuant to Article 8, paragraph 4 of the Act on the Protection of Personal Data (Official Gazette, No. 103/2003) and subject to the prior opinion of the

More information

Information Security Team

Information Security Team Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface

More information

Cable Discharge Event

Cable Discharge Event Cable Discharge Event 1.0 Introduction The widespread use of electronic equipment in various environments exposes semiconductor devices to potentially destructive Electro Static Discharge (ESD). Semiconductor

More information

3.0 Risk Assessment and Analysis Techniques and Tools

3.0 Risk Assessment and Analysis Techniques and Tools 3.0 Risk Assessment and Analysis Techniques and Tools Risks are determined in terms of the likelihood that an uncontrolled event will occur and the consequences of that event occurring. Risk = Likelihood

More information