University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities
|
|
|
- Carol Hudson
- 9 years ago
- Views:
Transcription
1 II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when any safety-related system are no longer available for use. Standard V Development Process equirement analysis Specification equirements documents coarse design specification design spec. certification system test service verified system certified system Includes: Concept Development process Decommissioning system model, construction detailed design design Implementation modules modul test integration test tested modules integrated system system, quality management II-25 II-26 IEC 1508 Life Cycle 1 5 Concept System requirements allocation 2 4 Overall scope definition Overall system requirements IEC 1508 Safety Life Cycle Concept Overall system requirements Safety requirements allocation 2 3 Overall scope definition Hazard and analysis 6 Overall operation & maintenance Overall 7 Overall 8 Overall installation & validation commissioning ealization with electrical /electronic /programmable Overall installation & commissioning Overall validation 10 ealization with other technology 11 External facilities 6 Overall operation & maintenance Overall 7 Overall 8 Overall installation & validation commissioning ealization with electrical /electronic /programmable Overall installation & commissioning Overall safety validation 10 ealization with other technology 11 External reduction facilities Back to appropriate overall safety lifecycle phase 16 Decommissioning 14 Overall operation & maintenance 15 Overall modification & retrofit 16 Decommissioning 14 Overall operation & maintenance 15 Overall modification & retrofit II-27 II-28 Mapping of Phases to Activities (1/2) 1+2:Concept & Overall scope definition 3: Hazard and analysis Hazard Analysis and isk Analysis 4: Overall system requirements equirement Specification 5: Safety requirements allocation mapping to technology 9, 10 or 11 6: Overall operation & maintenance Maintenance 7: Overall validation Verification, Validation and Test 8: Overall installation & commissioning Mapping of Phases to Activities (2/2) 9: ealization with programmable components Design and Implementation 10: ealization with other technologies 11: External reduction facilities 12: Overall installation & commissioning 13: Overall safety validation Verification, Validation and Test and Certification 14: Overall operation & maintenance 15: Overall modification & retrofit Maintenance 16: Decommissioning II-29 II-30
2 Conceptual Development (Phase 1-5) Development of a system safety program plan Establish the safety information and documentation files Establish the safety log eview lessons learned (other projects) and applicable documents (standards, ) Establish certification and training for the personal involved Participate on system concept formation Establish working groups and other special structures Conceptual Development (Phase 1-5) Basic software system safety tasks: Trace identified hazards to the software -hardware interfaces and code Translate hazards into requirements and constraints Consistency between safety constraints and requirement specification Completeness of the requirements Identify parts of the system that control safety-critical operations Ensure traceability of safety requirements II-31 II-32 Conceptual Development (Phase 1-5) Delineate the scope of the safety analysis Planning of the hazard analysis process Objective of the analysis Basis for the analysis Hazard and cause types to be considered in the analysis equired standards of detail and certainty Criteria for acceptability Identify hazards and safety requirements Identify design, analysis and verification requirements, possible safety-interface problems, including the humanmachine interface, and operating support requirements Design (Phase 6-11) Update safety analysis Participate in system trade-off studies Ensure that safety requirements are incorporated into system and subsystem specifications, including human-machine interface requirements Ensure that identified hazards are being eliminated or controlled in the evolving design Identify safety-critical components II-33 II-34 Design (Phase 6-11) Trace system hazards into components. Identify there safety requirements and constraints. Identify part of the software that control safety-critical operations. eview test and evaluation procedures eview training and operation plans Evaluate Design changes for safety impact. Document all safety decisions and maintain safety information Full-scale Development (6-11) eview and update hazard analysis Perform interface analysis (also with subsystems) Ensure that safety requirements and constraints are incorporated into the subsystem safety requirements, constraints and documentation (software and engineering) Ensure that software developers and code developers understand software-related system safety requirements and constraints II-35 II-36
3 Full-scale Development (6-11) Trace software safety requirements and constraints through to the code. Identify critical components and variables to the code developers Update testing and verification requirements eview both system and subsystem test results. Trace them back to system hazards Evaluate changes for their impact on safety Design and evaluate training and operational procedures Perform final evaluation of product design Production and Deployment (Phase 6-11) Update hazard analysis Perform safety evaluation and verification at the system and subsystem level Perform safety inspections Ensure that safety-related information is incorporated into user and maintenance documents eview change proposals for safety impact Perform a final evaluation of the produced and developed system II-37 II-38 Operation (Phase 14-16) Update procedures Maintain an information feedback system. eview and analyse accidents and incidents Conduct safety audits (look for minor changes in the system, operations or environment on a periodic basis) eview changes and maintenance procedures II.3 Process Activities and Safety Hazard Analysis isk Analysis equirement Specification Design and Implementation Verification, Validation and Test Certification Operation and Maintenance II-39 II-40 II.3.1 Hazard Analysis Available techniques: Failure modes and effects analysis (FMEA) Failure modes, effects and critically analysis (FMECA) Hazard and Operability analysis (HAZOP) Event tree analysis (ETA) Fault tree analysis (FTA) Example: Chemical eaction Qualitative: Identification of hazards Quantitative: Probabilistic hazard analysis Hazard analysis continues throughout the development process In a container two chemicals react with each other over a period of 10 hours at a temperature of 125 C. If the temperature exceeds 175 C toxic gas is emitted. The temperature is controlled by a computer system. II-41 II-42
4 Fault Tree Analysis (FTA) FTA: A graphical representation of logical combinations of causes that may lead to a hazard (top-event). Can be used as a quantitative method. identification of hazards (top-events) analysis to find credible combinations which can lead to the top-event graphical tree model of parallel and sequential faults uses a standardized set of symbols for Boolean logic expresses top-event as a consequence of AND/O combination of basic events minimal cut set is used for quantitative analysis Symbols used within Fault Trees II-43 II-44 Identification of the Top-Event Identification of Lower-Level Events (1/2) Emission of poisonous gas is the top event Subtree for temperature measurement failure II-45 II-46 Identification of Lower-Level Events (2/2) Subtree for heating cut off failure Hazard Analysis & Process (1/2) All projects: Preliminary hazard identification (PHI) should be done for every embedded system recorded in the preliminary hazard list All safety-critical projects: Preliminary hazard analysis (PHA) preliminary hazard analysis report add preliminary hazard analysis report to safety log classify severity of hazards assign integrity levels to major functions Safety review develop safety plan II-47 II-48
5 Hazard Analysis & Process (2/2) All highly critical projects: System hazard analysis develop system hazard report add system hazard analysis report to safety log System isk assessment improve system hazard report Update system hazard analysis report in safety log Projects of highest level of criticality: Independent safety audit independent safety audit report independence: (1) person (2) department (3) organization Hazard Analysis & Process Preliminary hazard identification (PHI) Preliminary hazard analysis (PHA) Safety review Safety hazard analysis Safety assessment Independent safety audit Preliminary hazard list Preliminary hazard analysis report Safety plan Safety hazard analysis report Independent safety audit report safety log All projects All safetycritical projects All highly critical projects Projects of highest level of criticality II-49 II-50 II.3.2 isk Analysis Guideline: [IEC 1508] 1.) Classify hazards severity (its consequences) 2.) Classify hazards frequency (its probability) 3.) Combine to related 4.) Determine system safety integrity level 5.) Determine hardware, systematic and software safety integrity level 6.) Chose appropriate development techniques and process (Other standards (avionics, military) propose similar procedure) Severity: Consequences of Malfunctions Category Catastrophic Critical Marginal Negligible Definition Multiple deaths A single death, and/or multiple severe injuries or severe occupational illnesses A single severe injury or occupational illnesses, and/or multiple minor injuries or minor occupational illnesses At most a single minor injury or minor occupational illnesses Duration is considered here! II-51 II-52 Frequency: Probability of Malfunction Accident Frequency Frequent Probable Occasional emote Improbable Occurrence during operational life considering all instances of the system Likely to be continually experienced Likely to occur often Likely to occur several times Likely to occur some time Unlikely, but may exceptionally occur isk Classification (1/3) If only qualitative and no quantitative measures/values are available both are combined by means of tables Severity of hazardous event Frequency of hazardous event isk Incredible Extremely unlikely that the event will occur at all II-53 II-54
6 isk Classification (2/3) Consequences Frequency Catastrophic Critical Frequent I I Probable I I Occasional I II emote II III Improbable III III Incredible IV IV Marginal Negligible I II II III III III III IV IV IV IV IV isk Classification (3/3) isk class I II III IV Interpretation Intolerable Undesirable, and tolerable only if reduction is impracticable or if the costs are grossly disproportionate to the improvement gained Tolerable if the cost of reduction would exceed the improvement gained Negligible Only a generic interpretation Often more specific domain/sector dependent exist II-55 II-56 Acceptability of isk Process of isk eduction Negligible As low as reasonable practicable (ALAP) region or tolerable unacceptable region isk of the system without safety features Expected proportionally efforts for reduction equired reduction Assure that remains at this level Tolerable only when further reduction is impracticable or if its costs is grossly disproportionate to the improvement gained isk cannot be justified except in extraordinary circumstances Expected proportionally efforts for reduction Actual reduction Achieved Tolerable II-57 II-58 Safety Integrity Safety integrity is the likelihood of a safetyrelated system satisfactorily performing the required safety functions under all the stated conditions within a period of time. (Can be expressed quantitative, however, usually safety integrity levels numbers are used) Assignment of Integrity Levels Severity of hazardous event Frequency of hazardous event isk Integrity Hardware integrity is that part of system integrity relating to dangerous random hardware failures. Systematic integrity is that part of system integrity relating to dangerous systematic failures. Hardware Integrity Systematic Integrity Software Integrity Software integrity is that part of system integrity relating to dangerous software failures. II-59 II-60
7 Safety Integrity Levels (SILs) These are expressed in terms of Target Failure Measures, which in turn are expressed as probabilities of failure. Demand Mode of Operation indicates the probability of failure when the demands made on the system are counted. Continuous/High Demand Mode of Operation assumes a continuous mode of operation and then the failure is expressed as the probability of failure per year of operation. SILs - Target Failure Measures SAFETY INTEGITY LEVEL Demand Mode POB OF FAILUE/ DEMAND >=10-5 to < 10-4 >=10-4 to < 10-3 >=10-3 to < 10-2 >=10-2 to < 10-1 TAGET FAILUE MEASUES FO A SAFETY- ELATED SYSTEM Continuous/High Demand Mode POB OF FAILUE/ YEA >=10-5 to < 10-4 >=10-4 to < 10-3 >=10-3 to < 10-2 >=10-2 to < 10-1 Measures here mean preventative measures put in place to avoid hazardous situations, not quantitative measurements. II-61 II-62 SIL Implications The safety integrity level for the safety-related system determines the measures that need to be taken against both systematic and random hardware failures in the design. These recommendations link the safety integrity levels required of the system with techniques or measures to be adopted. The safety integrity level reflects the criticality of the system in terms of required failure rates. The safety integrity level selected for the development of the software will depend on that required for the entire system. ecommended Techniques Clause 7.7 : Software Safety Validation TECHNIQUE/MEASUE ef SIL1 SIL2 SIL3 1. Probabilistic Testing B Simulation/Modelling 1. Functional and Black- Box Testing D.6 D.3 SIL4 ( = Highly ecommended, = ecommended, - = No ecommendation, N = Not ecommended) One or more of these techniques shall be selected to satisfy the safety integrity level being used. II-63 II-64 Modelling Techniques D.6 : Modelling eferenced by Clauses 7.6 TECHNIQUE/MEASUE ef SIL1 SIL2 SIL3 1. Data Flow Diagrams B Finite State Machines 1. Formal Methods 1. Performance Modelling 1. Time Petri Nets 1. Prototyping/Animation 1. Structure Diagrams B.29 B.30 B.45 B.64 B.49 B One or more of the above techniques should be used. SIL4 II.3.3 equirement Specification The vast majority of accidents in which software was involved can be traced to requirement flaws and, more specifically, to incompleteness in the specified and implemented software behavior that is, incomplete or wrong assumptions about the operation of the controlled system or required operation of the computer and unhandled controlled-system states and environment conditions. [Leveson1995] Safety-related systems: Hazards Analysis additional (software) requirements II-65 II-66
8 equirements Specifications equirements specifications contains: (1) a basic function or objective (2) Constraints on the operating conditions (3) Prioritised quality goals to help make trade-off decisions Safety can be involved in both functional requirements and constraints Functional goals and constraints often conflict Process & Software equirements Software Hazard Analysis: 1.) Trace identified system hazards to the softwarehardware interface. Translate the identified software-related hazards into requirements and constraints on software behaviour. 2.) Show the consistency of the software safety constraints with the software requirements specification. Demonstrate the completeness of the software requirements, including the humancomputer interface requirements, with respect to system safety properties. II-67 II-68 equired equirements Non-ambiguous specification: The function must have been specified in sufficient detail to distinguish it form undesired behavior Complete specification: The provided information must be sufficient to exclude any unsafe realization Consistent specification: The provided information should contain the identified system specific requirements and constraints Ambiguity and Natural Language Shut off the pumps if the water level remains above 100 m for more than 4 seconds. 1.) Shut off the pumps if the mean water level over the past 4 seconds was above 100 m. 2.) Shut off the pumps if the median water level over the past 4 seconds was above 100 m. MAX [ ] [ ] ( τ 4, τ ) WL( t) + MIN ( τ 4, τ ) WL( t) / 2 > 3.) Shut off the pumps if the minimum water level over the past 4 seconds was above 100 m. More formal? τ τ WL ( t) dt / 4 > { } 100 MIN [Parnas+1991] [ WL( t) ] 100 ( τ 4, τ ) > II-69 II-70 equirement Model & EUC Input Equipment under control (EUC) Sensors Controller Actuators Internal model of EUC Disturbances Output Observation: If the internal model does not accurately reflect the EUC, an accident might result equirement model: State machine In/output Completeness (1/4) Human-computer interface: Will the system deliver appropriate information to the operator? State completeness: Are all system (classes of) states covered? Input/Output completeness: Are specified input/output channels are used? II-71 II-72
9 Completeness (2/4) Trigger Event Completeness Every possible input (even none) should be covered (obustness) The behavior of the state machine should be deterministic Check all incoming values (value assumptions) The reaction to all inputs should be bound in time (timing assumptions) Minimal/maximal load assumptions and minimum arrival times must be specified Violations of load assumptions must be detected and the system must react accordingly Completeness (3/4) Output Specification Completeness Check for legal values Ensure that environment capacity is not overloaded The used input data should be limited and delayed output must expire after a while Output to Trigger Event elationship A basic feedback loop should ensure that the software can detect effect on all outputs of the EUC to detect internal or external failures For each input expected in response to an output both the regular behavior as well as handling an timeout must be specified II-73 II-74 Completeness (4/4) Specification of Transitions between States All specified states must be reachable form the initial state (reachability) Desired recurrent behavior must be part of at least one cycle Output commands should be usually be reversible Path obustness: For all hazards reducing outputs we have to ensure that no single sensor failure can inhibit them. Multiple path should be provided that enhance or maintain safety Multiple inputs or triggers should be required for path from safe to hazardous states Consistency (1/2) Transitions must satisfy software system safety requirements and constraints A function is never executed Performing an unintended function Performing functions at the wrong time Failing to recognize a hazardous condition requiring corrective action Producing the wrong response to a hazardous condition II-75 II-76 Consistency (2/2) eachable hazardous states should be eliminated or, if that is not possible, their frequency and duration reduced Checking general safety policy (cf. security policy) There must be no path to unplanned hazardous states Every hazardous must have a path to a safe state If a safe state can not be reached from a hazardous state, all path from that state must lead to a minimum state. At least one such path must exist. II-77
Controlling Risks Safety Lifecycle
Controlling Risks Safety Lifecycle Objective Introduce the concept of a safety lifecycle and the applicability and context in safety systems. Lifecycle Management A risk based management plan for a system
3.0 Risk Assessment and Analysis Techniques and Tools
3.0 Risk Assessment and Analysis Techniques and Tools Risks are determined in terms of the likelihood that an uncontrolled event will occur and the consequences of that event occurring. Risk = Likelihood
IEC 61508 Overview Report
IEC 61508 Overview Report A Summary of the IEC 61508 Standard for Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems exida Sellersville, PA 18960, USA +1-215-453-1720
Software Safety Hazard Analysis
UCRL-ID-122514 Software Safety Hazard Analysis Version 2.0 Prepared by J. Dennis Lawrence Prepared for U.S. Nuclear Regulatory Commission Disclaimer This document was prepared as an account of work sponsored
Controlling Risks Risk Assessment
Controlling Risks Risk Assessment Hazard/Risk Assessment Having identified the hazards, one must assess the risks by considering the severity and likelihood of bad outcomes. If the risks are not sufficiently
Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004)
Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Dale Perry Worldwide Pressure Marketing Manager Emerson Process Management Rosemount Division Chanhassen, MN 55317 USA
Basic Fundamentals Of Safety Instrumented Systems
September 2005 DVC6000 SIS Training Course 1 Basic Fundamentals Of Safety Instrumented Systems Overview Definitions of basic terms Basics of safety and layers of protection Basics of Safety Instrumented
ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY
ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY Dr. Qi Van Eikema Hommes SAE 2012 Government/Industry Meeting January 25, 2012 1 Outline ISO 26262 Overview Scope of the Assessment
A System-safety process for by-wire automotive systems
A System-safety process for by-wire automotive systems Steer-by-wire and other by-wire systems (as defined in this article) offer many passive and active safety advantages. To help ensure these advantages
Developing software which should never compromise the overall safety of a system
Safety-critical software Developing software which should never compromise the overall safety of a system Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 21 Slide 1 Objectives To introduce
Safety Requirements Specification Guideline
Safety Requirements Specification Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:[email protected] -1- Summary Safety Requirement
SIL manual. Structure. Structure
With regard to the supply of products, the current issue of the following document is applicable: The General Terms of Delivery for Products and Services of the Electrical Industry, published by the Central
LSST Hazard Analysis Plan
LSST Hazard Analysis Plan Large Synoptic Survey Telescope 950 N. Cherry Avenue Tucson, AZ 85719 www.lsst.org 1. REVISION SUMMARY: Contents 1 Introduction... 5 2 Definition of Terms... 5 2.1 System... 5
Safety Driven Design with UML and STPA M. Rejzek, S. Krauss, Ch. Hilbes. Fourth STAMP Workshop, March 23-26, 2015, MIT Boston
Safety Driven Design with UML and STPA M. Rejzek, S. Krauss, Ch. Hilbes System and Safety Engineering A typical situation: Safety Engineer System Engineer / Developer Safety Case Product 2 System and Safety
Hardware safety integrity Guideline
Hardware safety integrity Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:[email protected] Quoting of this report is allowed
Functional Safety Hazard & Risk Analysis
Embedded - IC & Automation Fortronic Functional Safety Hazard & Risk Analysis MILANO - April, 23 rd 2013 CEFRIEL 2013; FOR DISCUSSION PURPOSES ONLY: ANY OTHER USE OF THIS PRESENTATION - INCLUDING REPRODUCTION
A Risk Management Standard
A Risk Management Standard Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK, including the Institute of Risk management
Software-based medical devices from defibrillators
C O V E R F E A T U R E Coping with Defective Software in Medical Devices Steven R. Rakitin Software Quality Consulting Inc. Embedding defective software in medical devices increases safety risks. Given
A System-Safety Process For By-Wire Automotive Systems
SAE TECHNICAL PAPER SERIES 2000-01-1056 A System-Safety Process For By-Wire Automotive Systems Sanket Amberkar, Joseph G. D Ambrosio and Brian T. Murray Delphi Automotive Systems Joseph Wysocki HRL Laboratories
SAFETY LIFE-CYCLE HOW TO IMPLEMENT A
AS SEEN IN THE SUMMER 2007 ISSUE OF... HOW TO IMPLEMENT A SAFETY LIFE-CYCLE A SAFER PLANT, DECREASED ENGINEERING, OPERATION AND MAINTENANCE COSTS, AND INCREASED PROCESS UP-TIME ARE ALL ACHIEVABLE WITH
Software in safety critical systems
Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions
Clinical Risk Management: Agile Development Implementation Guidance
Document filename: Directorate / Programme Document Reference NPFIT-FNT-TO-TOCLNSA-1306.02 CRM Agile Development Implementation Guidance v1.0 Solution Design Standards and Assurance Project Clinical Risk
Testing of safety-critical software some principles
1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6
2005-01-0785. Effective Application of Software Safety Techniques for Automotive Embedded Control Systems SAE TECHNICAL PAPER SERIES
2005-01-0785 SAE TECHNICAL PAPER SERIES Effective Application of Software Safety Techniques for Automotive Embedded Control Systems Barbara J. Czerny, Joseph G. D Ambrosio, Brian T. Murray and Padma Sundaram
SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR
SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR The information and any recommendations that may be provided herein are not intended
3.4.4 Description of risk management plan Unofficial Translation Only the Thai version of the text is legally binding.
- 1 - Regulation of Department of Industrial Works Re: Criteria for hazard identification, risk assessment, and establishment of risk management plan B.E. 2543 (2000) ---------------------------- Pursuant
Edwin Lindsay Principal Consultant. Compliance Solutions (Life Sciences) Ltd, Tel: + 44 (0) 7917134922 E-Mail: [email protected].
Edwin Lindsay Principal Consultant, Tel: + 44 (0) 7917134922 E-Mail: [email protected] There were no guidelines/ regulations There was no training No Procedures No Inspectors Inform All staff of
Safety Integrated. SIMATIC Safety Matrix. The Management Tool for all Phases of the Safety Lifecycle. Brochure September 2010. Answers for industry.
SIMATIC Safety Matrix The Management Tool for all Phases of the Safety Lifecycle Brochure September 2010 Safety Integrated Answers for industry. Functional safety and Safety Lifecycle Management Hazard
Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity
Value Paper Author: Edgar C. Ramirez Diverse redundancy used in SIS technology to achieve higher safety integrity Diverse redundancy used in SIS technology to achieve higher safety integrity Abstract SIS
Version: 1.0 Latest Edition: 2006-08-24. Guideline
Management of Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:[email protected] Quoting of this report is allowed but please
Designing an Effective Risk Matrix
Designing an Effective Risk Matrix HENRY OZOG INTRODUCTION Risk assessment is an effective means of identifying process safety risks and determining the most cost-effective means to reduce risk. Many organizations
Hydraulic/pneumatic drive Cylinder (machine actuator) Optoelectronics Light curtain (sensor) Electronics Control system Danger! Hydraulics/pneumatics Valves (actuators) Safety control SRP/CS subsystem
Risk Management in IEC 60601-1 3 rd Edition. Presented by Alberto Paduanelli Medical Devices Lead Auditor, MHS-UK, TÜV SÜD Product Service
Risk Management in IEC 60601-1 3 rd Edition Presented by Alberto Paduanelli Medical Devices Lead Auditor, MHS-UK, TÜV SÜD Product Service General Information Time of presentation: 50-60 min. Questions
RISK ASSESMENT: FAULT TREE ANALYSIS
RISK ASSESMENT: FAULT TREE ANALYSIS Afzal Ahmed +, Saghir Mehdi Rizvi*Zeshan Anwer Rana* Faheem Abbas* + COMSAT Institute of Information and Technology, Sahiwal, Pakistan *Navy Engineering College National
Safety Integrity Levels
Séminaire de Sûreté de Fonctionnement de l X Safety Integrity Levels Antoine Rauzy École Polytechnique Agenda Safety Integrity Levels and related measures as introduced by the Standards How to interpreted
Title: Basic Principles of Risk Management for Medical Device Design
Title: Basic Principles of Risk Management for Medical Device Design WHITE PAPER Author: Ganeshkumar Palanichamy Abstract Medical devices developed for human application are used for diagnostic or treatment
ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL
61508-3 ª IEC: 1997 1 Version 12.0 05/12/97 COMMISSION CEI ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL COMMISSION Functional safety of electrical/electronic/ programmable
Is your current safety system compliant to today's safety standard?
Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before
Accident Investigation
Accident Investigation ACCIDENT INVESTIGATION/adentcvr.cdr/1-95 ThisdiscussionistakenfromtheU.S.Department oflabor,minesafetyandhealthadministration Safety Manual No. 10, Accident Investigation, Revised
Design of automatic testing tool for railway signalling systems software safety assessment
Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research
Failure Analysis Methods What, Why and How. MEEG 466 Special Topics in Design Jim Glancey Spring, 2006
Failure Analysis Methods What, Why and How MEEG 466 Special Topics in Design Jim Glancey Spring, 2006 Failure Analysis Methods Every product or process has modes of failure. An analysis of potential failures
Safety Analysis: FMEA Risk analysis. Lecture 8
Safety Analysis: FMEA Risk analysis Lecture 8 Failure modes and effect analysis (FMEA) Why: to identify contribution of components failures to system failure How: progressively select the individual components
Understanding Safety Integrity Levels (SIL) and its Effects for Field Instruments
Understanding Safety Integrity Levels (SIL) and its Effects for Field Instruments Introduction The Industrial process industry is experiencing a dynamic growth in Functional Process Safety applications.
Managing Design Changes using Safety-Guided Design for a Safety Critical Automotive System
Managing Design Changes using Safety-Guided Design for a Safety Critical Automotive System by John Sgueglia B.S. Electrical Engineering Rochester Institute of Technology, 2000 SUBMITTED TO THE SYSTEM DESIGN
Risk Assessment for Medical Devices. Linda Braddon, Ph.D. Bring your medical device to market faster 1
Risk Assessment for Medical Devices Linda Braddon, Ph.D. Bring your medical device to market faster 1 My Perspective Work with start up medical device companies Goal: Making great ideas into profitable
Integrating System Safety and Software Assurance
Integrating System Safety and Software Assurance Systems Certification and Integrity Directorate of Aviation Engineering Directorate General Technical Airworthiness 1 Overview Integration of software assurance
Risk Assessment and Management. Allen L. Burgenson Manager, Regulatory Affairs Lonza Walkersville Inc.
Risk Assessment and Management Allen L. Burgenson Manager, Regulatory Affairs Lonza Walkersville Inc. Standard Disclaimer Standard Disclaimer: This presentation is the opinion of the presenter, and does
ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview
ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview Barbara J. Czerny, Joseph D Ambrosio, Rami Debouk, General Motors Research and Development Kelly
On-Site Risk Management Audit Checklist for Program Level 3 Process
On-Site Risk Management Audit Checklist for Program Level 3 Process Auditor name: Date: I. Facility Information: Facility name: Facility location: County: Contact name: RMP Facility I.D. Phone Number:
OSW TN002 - TMT GUIDELINES FOR SOFTWARE SAFETY TMT.SFT.TEC.11.022.REL07
OSW TN002 - TMT GUIDELINES FOR SOFTWARE SAFETY TMT.SFT.TEC.11.022.REL07 August 22, 2012 TMT.SFT.TEC.11.022.REL07 PAGE 2 OF 15 TABLE OF CONTENTS 1 INTRODUCTION 3 1.1 Audience... 3 1.2 Scope... 3 1.3 OSW
Frequently Asked Questions
Frequently Asked Questions The exida 61508 Certification Program V1 R8 October 19, 2007 exida Geneva, Switzerland Sellersville, PA 18960, USA, +1-215-453-1720 Munich, Germany, +49 89 4900 0547 1 Exida
Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems
Overview of IEC 61508 - Design of electrical / electronic / programmable electronic safety-related systems Simon Brown The author is with the Health & Safety Executive, Magdalen House, Bootle, Merseyside,
Risk Assessment Tools for Identifying Hazards and Evaluating Risks Associated with IVD Assays
Risk Assessment Tools for Identifying Hazards and Evaluating Risks Associated with IVD Assays Robert C. Menson, PhD AACC Annual Meeting Philadelphia, PA 22 July 2003 What Risks Must Be Managed? Risk to
PABIAC Safety-related Control Systems Workshop
Health and and Safety Executive PABIAC Safety-related Control Systems Workshop KEY STANDARDS FOR ELECTRICAL & FUNCTIONAL SAFETY OF PAPERMAKING MACHINES: APPLICATION & USE Steve Frost HM Principal Electrical
Frequently Asked Questions
Frequently Asked Questions The exida Certification Program Functional Safety (SIL) Cyber-Security V2 R3 June 14, 2012 exida Sellersville, PA 18960, USA, +1-215-453-1720 Munich, Germany, +49 89 4900 0547
Design Verification The Case for Verification, Not Validation
Overview: The FDA requires medical device companies to verify that all the design outputs meet the design inputs. The FDA also requires that the final medical device must be validated to the user needs.
SAFETY MANUAL SIL RELAY MODULE
PROCESS AUTOMATION SAFETY MANUAL SIL RELAY MODULE KFD0-RSH-1.4S.PS2 ISO9001 3 With regard to the supply of products, the current issue of the following document is applicable: The General Terms of Delivery
TÜV FS Engineer Certification Course www.silsupport.com www.tuv.com. Being able to demonstrate competency is now an IEC 61508 requirement:
CC & technical support services TÜV FS Engineer Certification Course www.silsupport.com www.tuv.com Being able to demonstrate competency is now an IEC 61508 requirement: CAPITALISE ON EXPERT KNOWLEDGE
Functional Safety for Programmable Electronics Used in PPE: Best Practice Recommendations (In Nine Parts) Part 5: The Independent Functional Safety
Functional Safety for Programmable Electronics Used in PPE: Best Practice Recommendations (In Nine Parts) Part 5: The Independent Functional Safety Assessment (IFSA) Prepared by Safety Requirements, Inc.
Occupational safety risk management in Australian mining
IN-DEPTH REVIEW Occupational Medicine 2004;54:311 315 doi:10.1093/occmed/kqh074 Occupational safety risk management in Australian mining J. Joy Abstract Key words In the past 15 years, there has been a
TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification
TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification The TÜV Rheinland Functional Safety Program is a unique opportunity to provide certified evidence of competency in functional
Functional Safety Management: As Easy As (SIL) 1, 2, 3
Functional Safety Management: As Easy As (SIL) 1, 2, 3 Abstract This paper outlines the need for planning in functional safety management. Recent events such as the Montara blowout and the Deepwater Horizon
Version: 1.0 Last Edited: 2005-10-27. Guideline
Process hazard and risk Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:[email protected] -1- Summary This report will try
FMEDA and Proven-in-use Assessment. Pepperl+Fuchs GmbH Mannheim Germany
FMEDA and Proven-in-use Assessment Project: Inductive NAMUR sensors Customer: Pepperl+Fuchs GmbH Mannheim Germany Contract No.: P+F 03/11-10 Report No.: P+F 03/11-10 R015 Version V1, Revision R1.1, July
On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment
Legislation, Standards and Technology On the Method of Ignition Hazard Assessment for Explosion Protected Non-Electrical Equipment Assistance for equipment manufacturers in analysis and assessment by Michael
RISK MANAGEMENT FOR INFRASTRUCTURE
RISK MANAGEMENT FOR INFRASTRUCTURE CONTENTS 1.0 PURPOSE & SCOPE 2.0 DEFINITIONS 3.0 FLOWCHART 4.0 PROCEDURAL TEXT 5.0 REFERENCES 6.0 ATTACHMENTS This document is the property of Thiess Infraco and all
A methodology For the achievement of Target SIL
A methodology For the achievement of Target SIL Contents 1.0 Methodology... 3 1.1 SIL Achievement - A Definition... 4 1.2 Responsibilities... 6 1.3 Identification of Hazards and SIL Determination... 8
Program Hazard Analysis
For New, Modified, or Recognized Activities 10/20/2009 Revision and Update This evaluation process is used to systematically identify, assess, and resolve hazards associated with program activities that
Space product assurance
Space product assurance Software dependability and safety ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Handbook is one document of the series of
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
What is CFSE? What is a CFSE Endorsement?
ENDORSEMENT PROGRAM The CFSE endorsement program helps current holders of CFSE and CFSP certification build /demonstrate expertise and knowledge in specific focus areas of functional safety. What is CFSE?
SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND. Queensland 4072 Australia TECHNICAL REPORT
SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND Queensland 4072 Australia TECHNICAL REPORT No. 99-30 A Survey of International Safety Standards Axel
The Concepts of IEC 61508
The Concepts of IEC 61508 An Overview and Analysis Sommersemester 2001 Prof. Peter B. Ladkin PhD [email protected] Motivation: Clear Concepts Concepts must be clear in order to enable easy and
SAFETY MANUAL SIL Switch Amplifier
PROCESS AUTOMATION SAFETY MANUAL SIL Switch Amplifier KCD2-SR-(Ex)*(.LB)(.SP), HiC282* ISO9001 2 With regard to the supply of products, the current issue of the following document is applicable: The General
A PROCESS ENGINEERING VIEW OF SAFE AUTOMATION
A PROCESS ENGINEERING VIEW OF SAFE AUTOMATION Published in Chemical Engineering Progress, December 2008. Angela E. Summers, SIS-TECH Solutions, LP This step-by-step procedure applies instrumented safety
Understanding the Use, Misuse and Abuse of Safety Integrity Levels 1
Understanding the Use, Misuse and Abuse of Safety Integrity Levels 1 Felix Redmill Redmill Consultancy Email: [email protected] Abstract Modern standards on system safety employ the concept of safety
Quality Risk Management Tools Quality Risk Management Tool Selection When to Select FMEA: QRM Tool Selection Matrix
Quality Risk Management Tools Quality Risk Management Tool Selection When to Select FMEA: QRM Tool Selection Matrix 26 Quality Risk Management Tools The ICH Q9 guideline, Quality Risk Management, provides
A Methodology for Safety Case Development. Foreword
A Methodology for Safety Case Development Peter Bishop Adelard, London, UK Robin Bloomfield Adelard, London, UK Adelard Foreword This paper was presented in Industrial Perspectives of Safety-Critical Systems:
Viewpoint on ISA TR84.0.02 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President
Viewpoint on ISA TR84.0.0 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President Presented at Interkama, Dusseldorf, Germany, October 1999, Published in ISA Transactions,
Safety Analysis for Nuclear Power Plants
Regulatory Document Safety Analysis for Nuclear Power Plants February 2008 CNSC REGULATORY DOCUMENTS The Canadian Nuclear Safety Commission (CNSC) develops regulatory documents under the authority of paragraphs
Guidance for Industry: Quality Risk Management
Guidance for Industry: Quality Risk Management Version 1.0 Drug Office Department of Health Contents 1. Introduction... 3 2. Purpose of this document... 3 3. Scope... 3 4. What is risk?... 4 5. Integrating
Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS. April 2008 1
Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS April 2008 1 Contents 1 Introduction 3 2 Management Systems 2.1 Management Systems Introduction 3 2.2 Quality Management System
Mitigating safety risk and maintaining operational reliability
Mitigating safety risk and maintaining operational reliability Date 03/29/2010 Assessment and cost-effective reduction of process risks are critical to protecting the safety of employees and the public,
Best Practice In A Change Management System
Quality & Compliance Associates, LLC Best Practice In A Change Management System President Quality & Compliance Associates, LLC Change Control and Its Role in a Continuous Improvement Environment 3 Benefits
How to Upgrade SPICE-Compliant Processes for Functional Safety
How to Upgrade SPICE-Compliant Processes for Functional Safety Dr. Erwin Petry KUGLER MAAG CIE GmbH Leibnizstraße 11 70806 Kornwestheim Germany Mobile: +49 173 67 87 337 Tel: +49 7154-1796-222 Fax: +49
Reducing Steps to Achieve Safety Certification
Reducing Steps to Achieve Safety Certification WP-01174-1.0 White Paper This white paper describes the successful steps in achieving certification for an FPGA implementation of an application certified
HazLog: Tool support for hazard management
HazLog: Tool support for hazard management Christian Hamoy, David Hemer and Peter Lindsay School of Information Technology and Electrical Engineering The University of Queensland. Brisbane. Queensland
Systems Assurance Management in Railway through the Project Life Cycle
Systems Assurance Management in Railway through the Project Life Cycle Vivian Papen Ronald Harvey Hamid Qaasim Peregrin Spielholz ABSTRACT Systems assurance management is essential for transit agencies
Safety Integrity Level (SIL) Studies Germanischer Lloyd Service/Product Description
Safety & Risk Management Services Safety Integrity Level (SIL) Studies Germanischer Lloyd Service/Product Description Germanischer Lloyd Service/Product Description Safety Integrity Level (SIL) Studies
Obsolescence Management for Industrial Assets. Don Ogwude President Creative Systems International
Obsolescence Management for Industrial Assets Don Ogwude President Creative Systems International Presented by Don Ogwude Mr. Don A. Ogwude is president and CEO of Creative Systems International. He has
IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter.
61508 SIL 3 CAPABLE IEC 61508 Functional Safety Assessment Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter Customer: K-TEK Corporation Prairieville, LA USA Contract No.:
ISO 14971: Overview of the standard
FDA Medical Device Industry Coalition ISO 14971: Overview of the standard Risk Management Through Product Life Cycle: An Educational Forum William A. Hyman Department of Biomedical Engineering Texas A&M
A Quality Requirements Safety Model for Embedded and Real Time Software Product Quality
A Quality Requirements Safety Model for Embedded and Real Time Product Quality KHALID T. AL-SARAYREH Department of Engineering Hashemite University Zarqa 13115, Jordan [email protected] Abstract safety
An introduction to Functional Safety and IEC 61508
An introduction to Functional Safety and IEC 61508 Application Note AN9025 Contents Page 1 INTRODUCTION........................................................... 1 2 FUNCTIONAL SAFETY.......................................................
SUPPLIER QUALITY MANAGEMENT SYSTEM QUESTIONNAIRE
Company Name Street Address City, State, Zip code Phone Number Fax Company Website Email Address ORGANIZATION NAME PHONE NUMBER EMAIL ADDRESS President/CEO General Manager Engineering Manager Production
ISO 26262 Introduction
ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product
Guidance note. Risk Assessment. Core concepts. N-04300-GN0165 Revision 4 December 2012
Guidance note N-04300-GN0165 Revision 4 December 2012 Risk Assessment Core concepts The operator of an offshore facility must conduct a detailed and systematic formal safety assessment, which includes
