Skip to the content

One Tool Making Data Mining Simple

Are your compliance documents aligned to easily support daily operations?

While we have all of the data, it is nearly impossible to synchronize one report with the next – much less with our maintenance management system. Without spare bodies to connect the dots, we know we aren’t doing things that we should be to make our facility safer on a daily basis.
-I&C Group Manager

One Continuous Data Model Easy-to-Query

Many different disciplines need to be on the same page in order to capture the essence of functional safety standards. Process safety folks create the foundation, instrument and controls engineers build the safety systems, and operations and maintenance personnel maintain it. All groups are using their own tools and many times, these tools do not effectively transfer the data required for a maintenance technician to understand the risk associated with an individual device.

With a risk rank connected to a tagname in a single data
model as seen in Figure 1, common activities no longer
require the same amount of manpower to maintain.

Figure 1. Data Model Enabling "Loop-backs"

 


Does this look familiar?
Routine Activities Made Simple

SIL calculations are made simple and lifecycle-enabled while ensuring IEC 61511 / ISA 84 compliance by:

• Functional Safety Assessments
• Routine Audits
• Incident Investigations
• Bypass Management Support
• Management of Change
• Bad Actor Identification

How Long Does This Take You Today?

If you allow bypassing during production, you most likely have a process in place similar to the following steps:

1. Safety critical device is to be taken out of service
2. Identify associated protection layer(s)
3. Understand the increase in risk without device
4. Initiate additional forms of mitigation
5. Gather required signatures before bypassing
6. Update all documentation impacted if necessary
7. Push edits through stage-gated process

The following reports reduce hours to minutes by simply entering a single tagname.

Figure 2. Override Risk Analysis Report