AMERICAN NATIONAL STANDARD
ANSI/SA-18.2-2016
Management of Alarm Systems
for the Process Industries
Approved 17 March 2016ANSI/ISA-18,2-2016
Management of Alarm Systems for the Process Industries
ISBN: 978-1-941546-86-4
Copyright © 2016 by the International Society of Automation. Alll rights reserved. Printed in the
United States of America. No part of this publication may be reproduced, stored in a retrieval
system, ar transmitted in any farm or hy any means (electronic, mechanical, photaconying,
recording, or otherwise), without the prior written permission of the publisher.
ISA
67 Alexander Drive
P.O. Box 12277
Research Triangle Park, North Carolina 27709,
E-mail:
[email protected]ANSI/ISA-18.2-2016
Preface
This preface as well as all footnotes, annexes, and draft technical reports associated with this
standard are included for information purposes only and are not part of ANSI/ISA-18.2-2016
This standard has been prepared as part of the service of ISA, the International Society of
Automation, toward a goal of uniformity in the field of instrumentation. To be of real value, this
document should not be static but should be subject to periodic review. Toward this end. the
Society welcomes all comments and criticisms and asks that they be addressed to the Secretary,
Standards and Practices Board, ISA, 67 Alexander Drive; P.O. Box 12277; Research Triangle
Park, NC 277099; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail:
[email protected]
This ISA Standards and Practices Department is aware of the growing need for attention to the
metric system of units in general, and the International System of Units (SI) in particular, in the
preparation of instrumentation standards, recommended practices, and technical reports. The
Department is further aware of the benefits of USA users of ISA standards of incorporating
Suitable references to the SI (and the metric system) in their business and professional dealings
with other countries. Toward this end, the Department will endeavor to introduce SI and
acceptable metric units in all new and revised standards to the greatest extent possible. The
Metric Practice Guide, which has been published by the Institute of Electrical and Electronics
Engineers (IEEE) as ANSI/IEEE Std, 268-1992, and future revisions, will be the reference guide
for definitions, symbols, abbreviations, and conversion factors.
It is the policy of ISA to encourage and welcome the participation of all concerned individuals
and interests in the development of ISA standards. Participation in the |SA standards-making
process by an individual in no way constitutes endorsement by the employer of that individual, of
ISA, or of any of the standards, recommended practices, and technical reports that ISA
develops.
This standard is structured to follow the IEC guidelines. Therefore, the first three sections
discuss the Scope of the standard, Normative References and Definitions, in that order
CAUTION — ISA ADHERES TO THE POLICY OF THE AMERICAN NATIONAL STANDARDS
INSTITUTE WITH REGARD TO PATENTS. IF ISA IS INFORMED OF AN EXISTING PATENT
THAT IS REQUIRED FOR USE OF THE STANDARD, IT WILL REQUIRE THE OWNER OF THE
PATENT TO EITHER GRANT A ROYALTY-FREE LICENSE FOR USE OF THE PATENT BY
USERS COMPLYING WITH THE STANDARD OR A LICENSE ON REASONABLE TERMS AND
CONDITIONS THAT ARE FREE FROM UNFAIR DISCRIMINATION.
EVEN IF ISA IS UNAWARE OF ANY PATENT COVERING THIS STANDARD, THE USER IS
CAUTIONED THAT IMPLEMENTATION OF THE STANDARD MAY REQUIRE USE OF
TECHNIQUES, PROCESSES, OR MATERIALS COVERED BY PATENT RIGHTS. ISA TAKES
NO POSITION ON THE EXISTENCE OR VALIDITY OF ANY PATENT RIGHTS THAT MAY BE
INVOLVED IN IMPLEMENTING THE STANDARD. ISA IS NOT RESPONSIBLE FOR
IDENTIFYING ALL PATENTS THAT MAY REQUIRE A LICENSE BEFORE IMPLEMENTATION
OF THE STANDARD OR FOR INVESTIGATING THE VALIDITY OR SCOPE OF ANY PATENTS
BROUGHT TO ITS ATTENTION. THE USER SHOULD CAREFULLY INVESTIGATE RELEVANT
PATENTS BEFORE USING THE STANDARD FOR THE USER'S INTENDED APPLICATION.
HOWEVER, ISA ASKS THAT ANYONE REVIEWING THIS STANDARD WHO IS AWARE OF
ANY PATENTS THAT MAY IMPACT IMPLEMENTATION OF THE STANDARD NOTIFY THE
ISA STANDARDS AND PRACTICES DEPARTMENT OF THE PATENT AND ITS OWNER.
ADDITIONALLY, THE USE OF THIS STANDARD MAY INVOLVE HAZARDOUS MATERIALS,
OPERATIONS OR EQUIPMENT. THE STANDARD CANNOT ANTICIPATE ALL POSSIBLE
APPLICATIONS OR ADDRESS ALL POSSIBLE SAFETY ISSUES ASSOCIATED WITH USE IN
HAZARDOUS CONDITIONS. THE USER OF THIS STANDARD MUST EXERCISE SOUND
PROFESSIONAL JUDGMENT CONCERNING ITS USE AND APPLICABILITY UNDER THE
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018
USER'S PARTICULAR CIRCUMSTANCES. THE USER MUST ALSO CONSIDER THE
APPLICABILITY OF ANY GOVERNMENTAL REGULATORY LIMITATIONS AND
ESTABLISHED SAFETY AND HEALTH PRACTICES BEFORE IMPLEMENTING THIS
STANDARD.
THE USER OF THIS DOCUMENT SHOULD BE AWARE THAT THIS DOCUMENT MAY BE
IMPACTED BY ELECTRONIC SECURITY ISSUES. THE COMMITTEE HAS NOT YET
ADDRESSED THE POTENTIAL ISSUES IN THIS VERSION.
The following people served as voting members of ISA18 and approved this standard on 7
December 2015:
NAME COMPANY
D. Dunn, Co-Chair Consultant
N. Sands, Co-Chair DuPont
B. Fitzpatrick, Managing Director Wood Group Mustang
J. Alford, Consultant
'S. Apple ‘Schneider Electric
J. Bogdan J Bogdan Consulting LLC
K. Brown Enbridge Inc
M. Brown Matrikon Inc
A. Bryant Oxy Ine.
J. Campbell Consultant
M. Carter SIS-TECH Solutions
L. Dubois UReason
B. Holifield PAS
S. Kandasamy ‘Chevron Energy Technology Company
D. Logerot Prosys Inc.
©. Lunty Suncor
M. Marvan Shell Canada
D. Metzger DPM Consulting
L Myers Consultant
G. Nasby City of Guelph Water Services
G. Plowman Rockwell Automation
D. Rothenberg D Roth Inc.
T. Stauffer Exida Co.
D. Strobhar Beville Engineering Inc.
B. Vail URS PS / AECOM
K Van Camp Emerson Process Management
D. Visnich Burns & McDonnell
R. Weibel Tips inc,
This published standard was approved for publication by the ISA Standards and Practices Board
on 7 March 2016.
NAME COMPANY
N. Sands, Vice President DuPont
D. Bartu ExxonMobil Research & Engineering
P. Brett Honeywell Inc.
E. Cosman OIT Concepts, LLC
D. Dunn Consultant
J. Federiein Federlein & Assoc. LLC
B. Fitzpatrick Wood Group Mustang
J. Gilsinn Kenexis Consulting
J-P. Hauet KB Intelligence
J. Jamison Encana Corp,
Copyright © 2016 ISA. All rights reserved.ANSUISA-18.2-2016
D. Lee ucps
K-P. Lindner Endress+Hauser Process Solutions AG
T. McAvinew: Consultant
V. Mezzano Fluor Corp,
C, Monchinski ‘Automated Control Concepts Inc.
O. Reed Rockwell Automation
H. Sasajima Azbil Corp.
T. Schnaare Rosemount Inc.
J. Tatera Tatera & Associates Inc.
K. Unger Consultant
1. Vernappen Industrial Automation Networks
D. Visnich Burns & McDonnell
W. Weidman Consultant
J. Weiss Applied Control Solutions LLC
M. Wilkins Yokogawa
D. Zetterberg Chevron Energy
Copyright © 2016 ISA. All rights reserved.This page intentionally left blank.
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2016
CONTENTS
Introduction "1
1 Scope 13
1.1 General applicability 13
1.2 Exclusions and inclusions........ teehee 14
Normative references 7 7 Teledadeledel AB.
Terms, definitions, and acronyms 15
3.1 Terms and definitions 415
3.2. Abbreviations 7 eeceseseeeeee 25
4 Conformance to this standard 25
4.1. Conformance guidance 25
4.2. Existing systems 25
4.3. Use of required functionalities 26
4.4 Responsibility. 26
5 Alarm system models 26
5.1. Alarm systems 26
5.2 Alarm management lifecycle 26
5.3. Alarm states 4
5.4 Alarm response timeline 35
5.5 Feedback model of operator ~ process interaction 37
6 Alarm philosophy. ae
6.1 Purpose 38
6.2. Alarm philosophy contents 38
6.3. Alarm philosophy development and maintenance 44
7 Alarm system requirements specification 45
7.1 Purpose 45
7.2 Recommendations 45
7.3. Development 45
7.4 Systems evaluation 46
7.5 Packaged systems Iolcaadedaaaated ceceseeeeee AB
7.8 Customization 46
7.7 Alarm system requirements testing 46
8 Identification 46
8.1 Purpose 46
8.2 Alarm identification methods. 46
8.3 Identification training 47
8.4 Identification documentation aT
9 Rationalization 47
9.1 Purpose 47
9.2 Rationalization documentation a7
9.3. Alarm justification 48
9.4 Alarm setpoint determination 49
9.5 Prioritization 49
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018
10
"
12
13
14
9.6 Classification
9.7 Review
9.8 Removal of rejected alarms
9.9 Documentation
Detailed design: basic alarm design
10.1 Purpose
10.2 Basie alarm design capabilities
10.3 Usage of alarm states
10.4 Alarm types.
10.5 Alarm attributes
10.6 Programmatic changes to alarm attributes
10.7 Review basic alarm design
Detailed design: human-machine interface design for alarm systems.
"1
4
4
4
1
"1
4
4
4
"1
"1
1 Purpose
HMI functions
Alarm states indications
Alarm priority indications
‘Alarm message indications
Alarm displays.
Alarm shelving
Out-of-service alarms
9 Alarms suppressed by design
10 Alarm annuneiator integration
14 Safety alarm HMI
Detailed design: enhanced and advanced alarm methods.
12.1 Purpose
12
2. Basis of enhanced and advanced alarming
12.3. Information linking
12.4 Logic-based alarming
12.5 Model-based alarming
12.6 Additional alarming considerations
12.7 Training, testing, and auditing systems
12
8 Alarm attribute enforcement
Implementation
13.1 Purpose
13.2. Implementation planning
13.3 Implementation training
13.4 Implementation testing and validation
13.5 Implementation documentation
Operation...
14.1 Purpose
14.2. Alarm response procedures
14.3 Alarm shelving
14.4. Refresher training for operators
Copyright © 2016 ISA. All rights reserved.
49
50
50
50
50
50
50
60
54
51
53
53
53
53
53
54
56
67
57.
60
61
62
63
64
64
64
64
65
65
65
66
67
67
67
67
67
67
68
69
70
70
70
70
n15
16
7
18
19
Maintenance
15.1 Purpose
15.2. Periodic alarm testing
15.3 Out-ot-service alarms
15.4 Equipment repair.
15.5 Equipment replacement.
15.6 Refresher training for maintenance
Monitoring and assessment
16.1 Purpose
16.2. Performance monitoring
16.3 Monitoring and assessment
16.4 Alarm system performance metrics
16.5 Unauthorized alarm suppression
16.6 Alarm attribute monitoring
16.7. Reporting of alarm system analyses
16.8 Alarm performance metric summary
Management of change
17.1. Purpose
17.2 Changes subject to management of change
17.3 Change documentation requirements.
17.4 Alarm removal recommendations
17.8 Alarm attribute modification recommendations
Audit
18.1 Purpose
18.2. Benchmark
18.3. Audit interviews
18.4 Audit recommendations
18.8 Action plans
Bibliography
Copyright © 2016 ISA. All rights reserved.
ANSI/ISA-18.2-2016
nm
n
72
72
73
73
73
74
74
74
74
74
7
TT
7
78
78
78
78
79
79
79
79
79
79
80
80
80
80ANSI/ISA-18.2-2018 =10-
Figures
Figure 1 — Alarm system dataflow
Figure 2 - Alarm management lifecycle
Figure 3 - Alarm state transition diagram,
Figure 4 - Alarm response timeline
Figure 5 - Feedback model of operator process interaction
Tables
Table 1 - Alarm management lifecycle stage inputs and outputs
Table 2 - Alarm states
Table 3 - Required and recommended alarm philosophy content
Table 4 - Recommended alarm state indications
Table 5 - Average alarm rates.
Table 6 — Example annunciated alarm priority distribution
Table 7 — Recommended alarm performance metrics summary
Copyright © 2016 ISA. All rights reserved.
13
27
32.
36
37
au
33
39
56
75
7
78ae ANSI/ISA-18.2-2016
Introduction
Purpose
This standard addresses the development, design, installation, and management of alarm
systems in the process industries. Alarm management includes multiple work processes
throughout the alarm management lifecycle. This standard defines the terminology and models to
develop an alarm system, and it defines the work processes recommended to effectively
maintain the alarm system throughout the lifecycle.
This standard was written as an extension of existing ISA standards with due consideration of
other guidance documents that nave been developed throughout Industry. Ineffective alarm
systems have often been cited as contributing factors in the investigation reports following major
process incidents. This standard is intended to provide a methodology that will result in the
Improved safety, quality, and operation in the process industries
This standard is not the first effort to define terminology and practices for effective alarm
systems. In 1955 ISA formed a survey committee titled Instrument Alarms and Interlocks. The
committee evolved to Standard & Practices Committee 18. In 1965 the committee completed
ISA-RP18.1, Specifications and Guides for the Use of General Purpose Annunciators. In 1979
ISA released, as a product of the ISA18 and ISAG7 committees, ISA-18.1-1979 (R2004),
Annunciator Sequences and Specifications. In 1994 Amoco, Applied Training Resources, BP,
Exxon, Gensym, Honeywell, Mobil, Novacor, Texaco, Shell, and others formed the Abnormal
Situation Management Consortium (ASM) to develop a vision for better response to process
incidents, with additional support in 1994 from the U.S. National Institute of Standards and
Technology (NIST). In 1999 the Engineering Equipment and Materials Users’ Association
(EEMUA) issued Publication 191, Alarm Systems: A Guide to Design, Management and
Procurement, which was updated in 2007, and again in 2013. In 2003 the User Association of
Process Control Technology in Chemical and Pharmaceutical Industries (NAMUR) issued
recommendation NA 102, Alarm Management. This ISA standard was originally issued in 2009,
and International Electrotechnical Commission (IEC) developed IEC 62682 from that version and
issued it in 2014
During the development and maintenance of this standard every effort was made to keep
terminology and practices consistent with the previous work of these respected organizations
and committees,
This document provides requirements for alarm management and alarm systems. It is intended
for those individuals and organizations that
a) manufacture or implement embedded alarm systems,
b) manufacture or implement third-party alarm system software
¢) design or implement alarm systems,
4) operate and maintain alarm systems, and
) audit or assess alarm system performance.
Organization
This standard is organized in two parts. The first part is introductory in nature, (Clauses 1 to 5)
The main body of the standard follows (Clauses 6 to 18), which presents mandatory
requirements and non-mandatory recommendations as noted.
Copyright © 2016 ISA. All rights reserved.This page intentionally left blank.
Copyright © 2016 ISA. All rights reserved.=13- ANSI/ISA-18.2-2016
1 Scope
1.4 General applicability
This standard specifies general principles and processes for the lifecycle management of alarm
systems based on programmable electronic controller and computer-based human-machine interface
(HIM1) technology for facilities in the process industries. It covers all alarms presented to the operator
through the control system, which includes alarms from basic process control systems, annunciator
panels, packaged systems (e.g., fire and gas systems, and emergency response systems), and
safely instrumented systems.
The practices in this standard are applicable to continuous, batch, and discrete processes. There can
be differences in implementation to meet the specific needs based on process type
In jurisdictions where the governing authorities (e.g., national, federal, state, province, county, city)
have established process safety design, process safety management, or other requirements, in
addition to the requirements of this standard, these should be taken into consideration,
The primary function within the alarm system is to notify operators of abnormal process conditions or
‘equipment malfunctions and support the response. The alarm systems can include both the basic
process control system (BPCS) and the safety instrumented system (SIS), each of which uses
measurements of process conditions and logic to generate alarms. Figure 1 illustrates the concepts
of alarm and response dataflow through the alarm system. The alarm system also includes a
mechanism for communicating the alarm information to the operator via an HMI, usually a computer
screen or an annunciator panel. Additional functions of the alarm system are an alarm and event log,
an alarm historian, and the generation of performance metrics for the alarm system. There are
external systems that can use the data from the alarm system,
j Alarm System
| ‘Alarm |
‘Advanced
| historian |" [—+} alarm i
i applications i
bra — ‘Alarm H External
Sensors || —s
t log 1 L_ systems
| v0 |
T Bes |, |
| Final |
| controt t Ly HM i
elements
| Packaged |
vo systems [*—
t |
| |
i Panel i
i i
Process | Control & safety systems Interface
NOTE Other packaged systems (Le., fre and gas systems) can be included in the control system.
Figure 1 - Alarm system dataflow
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 -14-
1.2 Exclu:
1.24 Operators
‘The functions of the operator receiving and responding to alarms are included in the scope of
this standard. Management of operators is excluded from the scope of this standard
ns and inclusions
1.2.2 Process sensors and fi
The alarms from sensors and final control elements are included in the scope of this standard
Process sensors and final control elements are shown in Figure 1 to indicate alarms can be
implemented in these devices. The design and management of process sensors and final control
elements are excluded from the scope of this standard
‘al control elements
1.2.3 Annunciator panels
The integration of independent alarm annunciator panels into an alarm system is included in the
scope of this standard. The specification and design of annunciator panels is excluded from the
scope of this standard. ISA-18.1-1979 (R2004), Annunciator Sequences and Specifications
provides information on alarm annunciator functions.
1.2.4 Human machine interface
‘The appearance of alarms in the HMI and functions of alarm related displays are included in the
scope of this standard. The design and maintenance of the HMI are excluded from this standard
ANSI/ISA-101.01-2015, Human Machine Interfaces for Process Automation Systems, provides
information on HMI
1.2.5. Safety instrumented systems
The alarms from safety instrumented systems aro included in the scope of this standard. The
safety instrumented system (SIS) is shown in Figure 1 to indicate alarms can be implemented in
these devices. The design and management of safety instrumented systems are excluded from
this standard. 1SA-84.00.01, Functional Safety: Safety instrumented Systems for the Process
Industry Sector ~ Part 1: Framework, Definitions, System, Hardware and Software Requirements
Provides information on safety instrumented systems.
1.2.6 Fire detection and protective systems and security systems
The alarms and diagnostics from fire detection and protective systems or security systems that
are presented to the operator through the control system are included in the scope of this
standard. The design and management of fire detection and protective systems and security
systems are excluded from the scope of this standard
1.2.7 Event data
The indication and processing of analog, discrete, and event data other than alarm indications
are excluded from the scope of this standard, The analysis techniques using both alarm and
‘event data are oxcluded from the ecope of thie ctandard,
12.
Required methods of alarm identification are not specified in this standard, Examples of alarm
identification methods are listed.
Alarm identification methods
1.2.9 Management of change
A specific management of change (MOC) procedure is not included in this standard. Some
requirements and recommendations for a MOC procedure are included
Copyright © 2016 ISA. All rights reserved.= 15- ANSI/ISA-18.2-2016
1.2.40 Purchase specification
This standard is not intended to be used as an alarm system purchase specification. It does not
eliminate the need for sound engineering judgment. No particular technology is mandated.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and
are indispensable for its application, For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments)
applies.
ISA-84,00.01-2004 (IEC 61511 Mod) Part 1, Functional Safety: Safety Instrumented Systems for
the Process Industry Sector ~ Part 1: Framework, Definitions, System, Hardware and Software
Requirements
ANSI/ISA-101.01-2018, Human Machine Interfaces for Process Automation Systems
3. Terms, definitions, and acronyms
For the purposes of this document, the following definitions apply
3.4 Terms and definitions
344
absolute alarm
alarm generated when the alarm setpoint is exceeded (e.g., high-high, high, low, low-low)
34.2
acknowledge
‘operator action that confirms recognition of an alarm
3.4.3
active
an alarm ina state in which the alarm condition is true
Note 1 to entry: Functions such as deadband, on or off delays and latching can allow the alarm to be active when the
alarm condition is false of the alarm to not be active when the alarm condition is true
344
adaptive alarm
alarm for which the setpoint is changed by an algorithm (e.g., calculated based on production
rate)
345
adjustable alarm
operator-set alarm
alarm for which the setpoint can be changed manually by the operator
3.1.6
advanced alarming
collection of techniques that can help manage annunciations during specific situations
EXAMPLE: state-based alarming
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 = 16-
347
alarm
audible and/or visible means of indicating to the operator an equipment malfunction, process
deviation, or abnormal condition requiring a timely response
3.4.8
(alarm) annunciation
function of the alarm system to call the attention of the operator to an alarm
3.4.9
alarm attribute
setting for an alarm within the process control system
EXAMPLE: alarm priority
3.4.10
alarm class
group of alarms with common set of alarm management requirements (e.g., testing, training,
monitoring, and audit requirements)
EXAMPLE: safety related alarm class
3414
alarm deadband
change in signal from the alarm setpoint necessary for the alarm to return to normal
3.4.12
(alarm) filtering
function which selects alarm records to be displayed according to a given element or elements of
the alarm record
3.4.13
alarm flood
condition during which the alarm rate is greater than the operator can effectively manage (2.g.,
more than 10 alarms per 10 minutes)
3.4.14
alarm group
set of alarins will common association (e.g., process unil, process area, equipment sel, or
service)
3.4.15
alarm historian
long term repository for alarm records
3.1.16
alarm log
short term repository for alarm records
Copyright © 2016 ISA. All rights reserved.-17- ANSI/ISA-18.2-2016
34.47
alarm management
alarm system management
collection of processes and practices for determining, documenting, designing, operating,
monitoring, and maintaining alarm systems
3.4.18
alarm message
text string displayed with the alarm indication that provides additional information to the operator
(e.9., operator action)
3.4.19
alarm off-delay
debounce
time an alarm remains active after the process measurement has returned within the alarm
setpoint
3.1.20
alarm on-delay
time before an alarm becomes active after the process measurement has exceeded the alarm
setpoint
34.24
alarm philosophy
document that establishes the basic definitions, principles, and processes to design, implement,
and maintain an alarm system
3.4.22
alarm priority
relative importance assigned to an alarm within the alarm system to indicate the urgency of
response (e.9., Seriousness of consequences and allowable response time)
3.1.23
alarm rate
number of annunciated alarms, per operator, in a specific time interval
3.1.24
(alarm) record
set of information which documents an alarm state change
3.4.25
alarm response procedure
guidance for response to an alarm (e.g., operator action, probable cause)
Note 1 to entry: The guidance can be in many forms and not only in the form of a procedure document.
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 = 18-
3.1.26
alarm setpoint
alarm limit
point
threshold value of a process variable or discrete state that is used to determine if the alarm is
active
alarm t
3.4.27
{alarm) sorting
function which orders alarm records to be displayed according to a given element of alarm record
3.4.28
alarm summary
alarm list
display that lists annunciated alarms with selected information (e.9., date, time, priority, and
alarm type),
Note 1 to entiy: Return to normal indications can also appear on the alarm summary.
3.1.29
alarm system
collection of hardware and software that detects an alarm state, communicates the indication of
that state to the operator, and records changes in the alarm state
Note 1 to entry: the operator is included in the alarm system. See Figure 1
3.1.30
alarm system requirements specification
document which describes the functionality of the alarm system
3.1.31
alarm type
alarm attribute which gives a distinction of the alarm condition
EXAMPLE: low process variable alarm, high process variable alarm, or discrepancy alarm
3.4.32
alert
audible and/or visible means of indicating to the operator an equipment or process condition that
requires awareness and which does not meet the criteria for an alarm
3.1.33
allowable response time
maximum time between the annunciation of the alarm and when the operator must take
corrective action to avoid the consequence
3.1.34
annunciator
device or group of devices that call attention to changes in process conditions
Copyright © 2016 ISA. All rights reserved.=19- ANSI/ISA-18.2-2016
3.1.35
assessment
‘comparison of information from monitoring and additional qualitative (subjective) measurements,
against stated goals and defined performance metrics
3.4.36
audit
comprehensive assessment that includes the evaluation of alarm system performance and of the
work practicoe used to adminictor tho alarm eyetam
3.4.37
bad-measurement alarm
alarm generated when the signal for a process measurement is outside the expected range (e.g.,
3.8mA for a 4 to 20mA signal)
3.1.38
benchmark
an initial audit of an alarm system designed to specifically identify problem areas for the purpose
of formulating improvement plans
3.1.39
bit-pattern alarm
alarm that is enerated when a pattern of digital signals matches a predetermined pattern
3.1.40
calculated alarm
alarm generated from a calculated value instead of a direct process measurement
3.4.44
call-out alarm
alarm that notifies and informs an operator by means other than, or in addition to, a console
display (e.9., pager or telephone)
3.1.42
chattering alarm
alarm that repeatedly transitions between active state and not active state in a short period of
time
3.1.43
classification
process of separating alarms into alarm classes based on common requirements (e.g., testing,
training, monitoring, and auditing requirements)
3.1.44
control system
system that responds to input signals from the equipment under control and/or from an operator
and generates output signals that cause the equipment under control to operate in the desired
manner
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 =20-
Note 1 to entty: The control eystem can include one or more basic process control eysteme (BPCS), safety
instrumented systems (SIS), or packaged systems.
3.4.45
controller-output alarm
alarm generated from the output signal of a control algorithm (e.g., PID controller) instead of a
direct process measurement
3.1.46
decommission
process to remove an alarm from the alarm system
3.4.47
deviation alarm
alarm generated when the difference between two values exceeds an alarm setpoint (e.9.,
deviation between primary and redundant instruments or a deviation between process variable
and controller setpoint)
3.1.48
discrepancy alarm
mismatch alarm
alarm generated by the difference between the expected plant or device state to its actual state
(e.g., when a motor fails to start after it is commanded to the on state)
3.1.49
display
visual representation of information used by the operator for monitoring and control
3.1.60
dynamic alarming
automatic modification of alarm attributes based on process state or conditions
3.4.54
‘enforcement
enhanced alarming technique that can verify and restore alarm attributes in the control system to
the values in the master alarm database
3.1.62
event
representation of a solicited or unsolicited fact indicating a state change
Note 1 to entry: For example, mode changes or device state changes.
[SOURCE IEC 62264-2:2013, modified ~ a note has been added.]
Copyright © 2016 ISA. All rights reserved.=e ANSI/ISA-18.2-2016
rm
first-up alarm
alarm determined (i.e., by first-out logic) to be the first, in a multiple-alarm scenario
3.4.54
fleeting alarm
alarm that transitions between an active alarm state and a not active alarm state in a short
poriod of timo without rapidly ropeating
3.1.55
highly managed alarm (HMA)
alarm belonging to a class with additional requirements (e.g., regulatory requirements) above
general alarms
EXAMPLE: safety alarm
3.1.56
human machine interface (HMI)
collection of hardware and software used by the operator to monitor and interact with the control
system and with the process via the control system,
3.4.57
implementation
transition stage between design and operation during which the alarm is put into service
Note 1 to entry: Implementation includes activities such as commissioning and training
3.1.58
instrument diagnostic alarm
alarm to indicate a field device or signal fault
EXAMPLE: out-of-range alarm
3.1.69
interim alarm
alarm used on a temporary basis to replace an out-of-service alarm
3.1.60
latehing alarm
alarm that remains in alarm state after the process condition has returned to normal and requires
an operator reset before the alarm returns to normal
3.1.61
master alarm database
authorized list of rationalized alarms and associated attributes
Note 1 to entry: The lst ean be in many forms and not enly in the form of a database,
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 =22-
the measurement and reporting of quantitative (objective) aspects of alarm system performance
3.1.63
nuisance alarm
alarm that annunciates excessively, unnecessarily, or does not return to normal after the
operator action is taken
EXAMPLE: chattering alarm, fleeting alarm, or stale alarm
3.1.64
operator
controller
person who monitors and makes changes to the process
3.1.65
(operator) console
interface for an operator to monitor and/or control the process, which may include multiple
displays or annunciators, and defines the boundaries of the operator's span of control
3.1.66
operator station
human-machine interface within the operator console
Note 1 to entty: Operator station can include multiple screens.
3.1.67
out-of-service
state of an alarm during which the alarm indication is indefinitely suppressed, typically manually,
for reasons such as maintenance
3.1.68
packaged system
self-contained combination of hardware and software that can provide alarm, HMI, and control
functionality for a specific process function that is part of a facility
3.1.69
plant state
plant mode
defined set of operational conditions for a process plant
EXAMPLE: shutdown, normal operation
3.4.70
prioritization
process of assigning a level of operational importance to an alarm
Copyright © 2016 ISA. All rights reserved.=23- ANSI/ISA-18.2-2016
34.71
process area
physical, geographical or logical grouping of resources determined by the site
[SOURCE: IEC 62264-1:2013, 3.1]
3.4.72
rate-of-change alarm
alarm ganeratad whan the change in procass variable par unit time (dPVidt) axcaads a dafined
setpoint
3.4.73
rationalization
process to review potential alarms using the principles of the alarm philosophy, to select alarms
for design, and to document the rationale for each alarm
3.4.74
Fe-alarming alarm
re-triggering alarm
alarm that is automatically re-annunciated to the operator under certain conditions
3.4.75
recipe-driven alarm
alarm with setpoints that depend on the recipe that is currently being executed
3.1.76
remote alarm
alarm from a remotely operated facility or directed to a remote interface
3.4.77
reset
operator action that unlatches a latched alarm
3.4.78
return to normal
clear
alarm transition from an active alarm state to a not active alarm state
3.4.79
safety alarm
safety related alarm
an alarm that is classified as critical to process safety for the protection of human life or the
environment
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 -24-
3.1.80
safety instrumented system (SIS)
instrumented system used to implement one or more safety instrumented functions. A SIS is
composed of any combination of sensor(s), logic solver(s), and final elements(s)
[SOURCE: IEC 61511]
Note 1 to entry: This can include either safety instrumented control functions or safety instrumented protection
functions or both
3.1.81
shelve
temporarily suppress an alarm, initiated by the operator, with engineering controls (e.9., time-
limited) that unsuppress the alarm
3.1.82
silence
‘operator action that terminates the audible alarm indication
3.1.83
stale alarm
alarm that remains annunciated for an extended period of time (e.9., 24 hours)
3.1.84
state-based alarm
mode-based alarms
alarm that has attributes modified or is suppressed based on operating states or process
conditions
alarm generated based on statistical processing of a process variable or variables.
3.1.86
‘suppress
prevent the annunciation of the alarm to the operator when the alarm is active
EXAMPLE: shelve, suppress by design, remove from service
34.87
suppressed by design
alarm annunciation to the operator prevented based on plant state or other conditions
3.1.88
system diagno:
alarm generated by the control system to indicate a fault within the system hardware, software or
‘components
EXAMPLE: communication error
Copyright © 2016 ISA. All rights reserved.=25- ANSI/ISA-18.2-2016
3.1.89
tag
point
unique identifier assigned to a process measurement, calculation, or device within the control
system
3.1.90
unacknowledged
alarm state in which the operator has not yet confirmed recognition of an alarm indication
3.2. Abbreviations
ACKED ‘Acknowledged
“ASRS ‘Alarm system requirements specification
apcs Basie process control system
eoMP {current good manufacturing practice
DSUPR Designed suppression
ERP Enterprise resource planning
FMEA Failure mode and effects analysis
HAZOP Hazard and operability study
HMA Highly managed alarms
Ho Human machine interface
vO Input / output
LOPA Layer of protection analysis
MES: “Manufacturing execution system
Moe Management of change
NORM Normal
(OosRV Out of service
Pai Piping (or Process) and instrumentation diagram
PHA Process hazards analysis
RTNUN Return to normal unacknowledged
‘SHLVD Shelved
sis Safety instrumented system
UNACK Unacknowledged
4 Conformance to this standard
4.4. Conformance guidance
To conform to this standard, it shall be shown that each of the mandatory requirements has been
satisfied.
4.2. Existing systems
For existing alarm systems designed and constructed in accordance with codes, standards, or
Practices prior to the issue of this standard, the owner/operator shall determine that the
equipment is designed, maintained, inspected, tested, and operated in a safe manner. The
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 =26-
practices and procedures of this standard shall be applied to existing systems in a reasonable
time as determined by the owner/operator
4.3. Use of required functionalities
This standard requires certain control system functionalities (e.g., shelving) to support the alarm
system. A functionality is not required where the alarm philosophy states the functionality is not
used.
4.4 Responsi
Conformance to thie etandard ie the responsibility of the ownorloporator.
5 Alarm system models
5.1 Alarm systems
Alarm systems are used to communicate indications of abnormal process conditions or
equipment malfunctions to the operators, the personne! monitoring and operating the process,
and support the response. Effective alarm systems are well designed, implemented, operated,
and maintained. Alarm management is the set of practices and processes that ensures an
effective alarm system.
A foundational part of alarm management is the definition of an alarm; an audible and/or visible
means of indicating to the operator an equipment malfunction, process deviation, or abnormal
condition requiring a timely response. An essential element of this definition is the response to
the alarm. This definition is reinforced in the alarm management processes described in this
standard,
5.2 Alarm management lifecycle
5.2.1 Alarm management lifecycle model
Figure 2 illustrates the relationship between the stages of the alarm management lifecycle
described in this standard. The alarm management lifecycle covers alarm system specification,
design, implementation, operation, monitoring, maintenance, and management of change
activities from initial conception through decommissioning,
The lifecycle model is useful in organizing the requirements and responsibilities for implementing
an alarm management system. The lifecycle is applicable for the installation of new alarm
systems or managing an existing system
Copyright © 2016 ISA. All rights reserved.-27- ANSI/ISA-18.2-2016
Audit and philosophy loop
Philosophy
Monitoring and management of change loop
y
Identification
‘Management
of change
Implementation
f t
Monitoring and maintenance loop
Operation
Monitoring &
assessment
‘Maintenance
NOTE 1 The box used for stage B represents a process defined outside of this standard per 5.22
NOTE 2 The independent stage J represents a process that connects to all ather stages per 52.2.1
NOTE 3 The rounded shapes of stages A, H, and J represent entry points to the Ifesyele per 5.2.3
NOTE 4 The dotted lines represent the loops in the lifecycle per 5.2.5
Figure 2- Alarm management lifecycle
5.2.2 Alarm management lifecycle stages
5.2.2.4 General
The alarm management lifecycle stages shown in Figure 2 are briefly described in the following
sub-clauses. The letter label is an identifier used in the text. The requirements and
recommendations for each stage are described in Clauses 6-18 of this standard.
5.2.2.2 Alarm philosophy (A)
Basic planning is necessary prior to designing a new alarm system or modifying an existing
system. Generally, the first step is the development of an alarm philosophy that documents the
objectives of the alarm system and the processes to meet those objectives. The alarm
philosophy reflects the operations and maintenance work processes, and can reference those
processes in other documents. For new systems the alarm philosophy serves as the basis for the
alarm system requirements specification (ASRS) document.
The philosophy starts with the basic definitions and extends them to operational definitions. The
criteria for alarm prioritization and the definition of alarm classes, performance metrics,
performance limits and reporting requirements are based on the objectives and principles for
alarm systems, The schemes for presentation of alarm indications in the HMI, including use of
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 = 28-
priorities, are also set in the alarm philosophy, which should be consistent with the overall HMI
design. The philosophy specifies the processes used for each of the alarm management lifecycle
stages, such as the threshold for the MOC process and the specific requirements for change
The philosophy is maintained to ensure consistent alarm management throughout the lifecycle of
the alarm system.
The development of the ASRS is included in the philosophy stage of the lifecycle. The
specification can be plant specific, providing details on restrictions or options, and can be the
basis for selecting new or modifying existing control systems. The specification typically goes
into more detail than the alarm philosophy and can provide specific guidance for system design.
5.2.2.3. Identification (B)
The identification stage is a collection point for potential alarms proposed by one of the methods
for determining it an alarm might be necessary. These methods are defined outside of this
standard so the identification stage is represented as a predefined process in the lifecycle. The
methods can be formal such as process hazards analysis, safety requirements specifications,
recommendations from an incident investigation, good manufacturing practice, environmental
permits, P&ID development or operating procedure reviews. Information from identification (e.g.,
alarm setpoint, consequence) should be captured for rationalization. Process modifications and
operating tests can also generate the need for alarms or modifications. Some alarm changes will
be identified from the routine monitoring of alarm system performance. At this stage the need for
a new alarm or modifications to an existing alarm has been identified and the alarm is ready to
be rationalized
5.2.2.4 Rationalization (C)
The rationalization stage reconciles the identified need for an alarm or alarm system change with
the principles and definitions in the alarm philosophy. The steps can be completed in one
process or sequentially. The output of rationalization is documentation of the alarm, including
any advanced alarm techniques, which can be used to complete the design.
Rationalization is the process of applying the requirements for an alarm and generating the
supporting documentation such as the alarm setpoint, the consequence, and corrective action
that can be taken by the operator.
Rationalization includes the prioritization of an alarm based on the method defined in the alarm
philosophy. Often priority is based on the consequences of the alarm and the allowable response
time,
Rationalization also includes the activity of classification during which an alarm is assigned to
one or more classes to designate requirements (e.g., design, testing, training, or reporting
requirements). The type of consequences of a rationalized alarm, or other criteria, can be used
to separate the alarms into classes as defined in the alarm philosophy.
The rationalization results are documented, typically in the master alarm database (1.e., an
approved document or file), which is maintained for the life of the alarm system.
5.2.2.5 Detailed design (D)
In the design stage, additional alarm attributes are specified and designed based on the
requirements determined by rationalization. There are three areas of design: basic alarm design,
HMI design, and design of advanced alarming techniques.
The basic design for each alarm follows guidance based on the type of alarm and the specific
control system.
The HMI design includes display and annunciation for the alarms, including the indications of
alarm state and alarm priority.
Copyright © 2016 ISA. All rights reserved.=29- ANSI/ISA-18.2-2016
Advanced alarming techniques are additional functions that improve the effectiveness of the
alarm system beyond the basic alarm and HMI design (e.9., state-based alarming).
5.2.2.6 Implementation (E)
In the implementation stage, the activities necessary to install an alarm or alarm system and
bring it to operational status are completed. Implementation of a new alarm or a new alarm
system includes the physical and logical installation and functional verification of the system
Since operators are an essential part of the alarm system, operator training is an important
activity during implementation. Testing of new alarms is often an implementation requirement.
The documentation for training, testing, and commissioning can vary with classification as
defined in the alarm philosophy
5.2.2.7 Operation (F)
In the operation stage, the alarm or alarm system is in service and it performs its intended
function. Refresher training on both the alarm philosophy and the purpose of each alarm is
included in this stage.
5.2.2.8 Maintenance (G)
In the maintenance stage, the alarm or alarm system is not operational but is being tested or
repaired. Periodie maintenance (e.g., testing of instruments) is necessary to ensure the alarm
system functions as designed.
5.2.2.9 Monitoring and assessment (H)
In the monitoring and assessment stage, the overall performance of the alarm system and
individual alarms are continuously monitored against the performance goals stated in the alarm
philosophy. Monitoring and assessment of the data from the operation stage may trigger
maintenance work or identify the need for changes to the alarm system or operating procedures.
Without monitoring, the performance of an alarm system is likely to degrade over time.
§.2.2.40 Management of change (I)
In the management of change stage, modifications to the alarm system are proposed and
approved. The change process should follow each of the alarm management lifecycle stages
from identification to implementation.
5.2.2.11 Audit (J)
In the audit stage, periodic reviews are conducted to evaluate the effectiveness of the alarm
management process and maintain the integrity of the alarm system. Audits of system
performance can reveal gaps not apparent from routine monitoring. Execution against the alarm
Philosophy is audited to identify system improvements, such as modifications to the alarm
philosophy. Audits can also identify the need to increase the discipline of the organization to
follow tho alarm philocophy.
5.2.3 Alarm lifecycle entry points
5.2.3.1 General
Depending on the selected approach, there are three points of entry to the alarm management
lifecycle
a) alarm philosophy,
b) monitoring and assessment, and
©) audit.
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 =30-
These entry points are represented by rounded boxes in Figure 2. As entry points these lifecycle
stages are only the initial step in managing an alarm system. All stages of the lifecycle are
necessary for a complete alarm management system.
5.2.3.2. Start with alarm philosophy (A)
The first possible starting point is the development of an alarm philosophy which establishes the
objectives of the alarm system and may be used as the basis for the alarm system requirements
specification. This is the lifecycle entry point for new systems
5.2.3.3. Start with monitoring and assessment (H)
The second possible starting point is to begin monitoring an existing alarm system and
benchmark the performance. Problem alarms can be identified and addressed through
maintenance or management of change. The monitoring data can be used in a benchmark
assessment prior to the development of the alarm philosophy.
5.2.3.4 Start with audit (J)
The third possible starting point is an initial audit, or benchmark, of all aspects of alarm
management against a set of documented practices, such as those listed in this standard. The
results of the initial audit can be used in the development of a philosophy.
5.2.4 Simultaneous and encompassing stages
The lifecycle diagram (Figure 2) is drawn to represent sequential stages. There are several
simultaneous stages which are represented in the lifecycle. Some stages encompass the
activities of other stages.
The monitoring and assessment stage (H) is simultaneous to the operation and maintenance
stages.
The management of change stage (I) represents the initiation of the change process through
which all appropriate stages of the lifecycle are authorized and completed.
The audit stage (J) is an overarching activity that can occur at any point in the lifecycle and
includes a review of the activities of the other stages.
5.2.5 Alarm management lifecycle loops
5.2.5.1 General
In addition to the alarm management lifecycle stages, there are three loops in the lifecycle. Each
loop performs a function during the cycle.
5.2.5.2 Monitoring and maintenance loop
The monitoring and maintenance loop is the routine monitoring that identifies problem alarms for
maintenance. Repaired alarms are returned to operation.
5.2.5.3 Monitoring and management of change loop
‘The monitoring and management of change loop is triggered when routine monitoring indicates
the design of an alarm is not compatible with the alarm philosophy. The design might need to be
modified or an advanced alarm technique might need to be applied. The alarm could remain in
operation while the MOC process is initiated and the stages of the lifecycle are repeated.
5.2.5.4 Audit and philosophy loop
The audit-philosophy loop is the lifecycle itself and the process of continuous improvement of the
alarm system. Audit identifies processes in the lifecycle to strengthen.
Copyright © 2016 ISA. All rights reserved.-31-
5.2.6 Alarm management lifecycle stage inputs and outputs
The alarm management lifecycle stages are connected as the outputs of one stage are often the
inputs to another stage. The connections are not fully represented in the lifecycle diagram
(Figure 2). Table 1 provides more information on the relationships between the inputs and
outputs of the lifecycle stages,
ANSI/ISA-18.2-2016
Table 1 - Alarm management lifecycle stage inputs and outputs
‘Alarm management ‘Activities clause Inputs ‘Outputs
number
A Philosophy Document the a7 ‘Objectives and Alarm philosophy and
objectives, guidelines standards, auait ASRS,
and work processes for recommendations
flarm management,
ang ASRS.
8 Identification Determine potential | & PHA report, P8IDs, | List of potential
alarms ‘operating procedures, | alarms.
te,
© Rationalization | Rationalization, ° ‘Alarm philosophy, | Master alarm
classification ‘and list of potential | database and alarm
prioritization, ane ‘alarms design requirements,
documentation,
D Detailed design | Basie alarm design 10,11,12 | Master alarm Completed alarm
HMI design, and database and alarm | design
‘advanced alarming design requirements,
esign
E Implementat Install alarms, 3 Completed alarm Operational alarms
Implementation testing jesign and master | and alarm response
{and implementation ‘alarm database, procedures
training. ASRS,
F Operation Operator responds to | 14 ‘Operational ‘Alarm data,
alarms. and refresher ‘and alarm response
training procedures
@ Maintenance Maintenance repair and | 15 ‘Alarm monitoring Alarm data
Feplacement, anc reports and alarm
periodic testing, philosophy.
4 Monitoring & Monitoring alarm data | 16 ‘Alarm data and alarm | Alarm monitoring
assessment and report philosophy, reports and proposed
performance. changes.
Management of | Process to authorize | 17 ‘Alarm philosophy and | Authorized alarm
change additions, proposed changes. | changes.
modifications, and
Gelations of siarms,
7 Ault Periodic audit of alarm | 18 Standards, alarm Recommendations for
management
processes.
Philosophy, and aucit
pratocal
improvement
5.3 Alarm states
5.3.1 Alarm state transition diagram
The alarm state transition diagram shown in Figure 3 represents the states and transitions for
typical alarms, While there are exceptions, this diagram describes the majority of alarms and
serves as a useful reference for the development of alarm system principles and HMI functions.
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 = 32-
B
a Abnormal
Normal Condition [Unacknowledged alarm|
Process: Normal Process: Abnormal
Alarm: Not Active ‘Alarm: Active
‘Ack: Acknowledged Abnormat ack: Unacknowledged
condition
c
Rum o ‘Acknowledged alarm | “iewesse
Process: oral
condition ‘Nam: Aewve
‘ok: Acknowledges
Acknowedge
etefato
‘normal
‘contin
D
RTN unacknowledged)
Process: Normal
AlarmINot Active
suppression Taint pane
tomsenice service
|—\\ ote comet. | 3
E Unshelve
‘Suppressed
Shelved by design Out OF service
Process: NIA een Process: NIA
‘Alarm: NIA ee ‘Alam NA
‘Ack NA rit ‘Ack NA,
NOTE 1 States E, F, and G can connect to any alarm state in the diagram,
NOTE 2 The dotted ine indicates an infrequently implemented option
NOTE 3 N/A Ingicates not applicable or thatthe coneition Is not relevant inthe alarm state
Figure 3 - Alarm state transition diagram
5.3.2 Alarm states
6.3.24 Ceneral
The circles in the Figure 3 represent the states of an alarm. The letter label is an identifier. The
second line is a state name, often abbreviated. The third line describes process conditions, the
fourth and fifth lines list the alarm status and its acknowledgement status, respectively. The
possible states of alarm suppression are shown on the lower part of the diagram
5.3.2.2 Normal state (A)
The normal (NORM) alarm state is defined as the state in which the process is operating within
normal specifications, the alarm is not active and previous alarm occurrences have been
acknowledged,
Copyright © 2016 ISA. All rights reserved.=33- ANSI/ISA-18.2-2016
5.3.2.3 Unacknowledged state (B)
The unacknowledged alarm (UNACK) state is the initial state of an alarm becoming active due to
abnormal conditions. In this state the alarm is unacknowledged, Previously acknowledged alarms
can be designed to re-alarm, causing a return to this state.
5.3.2.4 Acknowledged state (C)
The acknowledged (ACKED) alarm state is the state in which the alarm is active and the operator
has acknowledged the alarm.
6.2.2.5 Return to normal unacknowledged etate (D)
In the returned to normal unacknowledged (RTNUN) alarm state, the process is within normal
limits and the alarm becomes not active before an operator has acknowledged the alarm
condition.
5.3.2.6 Shelved state (E)
In the shelved (SHLVD) alarm state, an alarm is temporarily suppressed using a controlled
methodology, and not annunciated. An alarm in the shelved state is under the control of the
operator. The shelving function can automatically unshelve alarms,
5.3.2.7 Suppressed-by-design state (F)
In the suppressed-by-design (DSUPR) alarm state, an alarm is suppressed based on operating
conditions or plant states, and not annunciated. An alarm in the suppressed-by-design state is
under the control of logic that determines the relevance of the alarm,
5.3.2.8 Out-of-service state (G)
In the out-of-service (OOSRV) alarm state an alarm is manually suppressed (e.g., control system
functionality to remove alarm from service) when it is removed from service and not annunciated,
typically for maintenance. An alarm in the outof-service state is under the control of
maintenance.
NOTE An alarm in the out-of-service state is not the same as out of service for @ unit or piece of equipment
Equipment can be out of service while the associated alarms are not out of service
5.3.2.9 Alarm status by state
The alarm status of different alarm states is summarized in Table 2
Table 2 - Alarm states
Process | Alarm | Annunciate | Acknowledge status
101 || Mnementes ae condition status status
a norm | Newmat arm | Normal Net | Not annuneiated | Acknowledged
3 |unack — | Uaaeknowledsed | abnormal | Active | Annunciatee | Unacknowiedged
© |acKen | Aekrowiessed | aynormar | active | Annunciates | Acknowledged
Returned
© |rtmun formal | Normal Not | annunciates | Unacknowedges
alarm state
Normal or Net
e |suvo | shevedstae | Nomsler | Scive or | suppressed | Not Applicable
abnormal | Sen
F [OSUPR | Guppresseaby. | Normalcr [Not | Suppressed | Not Applicable
Copyright © 2016 ISA. All rights reserved.ANSI/ISA-18.2-2018 = 34
Sebi lesen Tnnunciawe | Acknowledge status
idl tao tai o condition status
Tesian Hate Senora seve 7
wet
otaennee | Normal or
@ foosay | ovtotsenice [Nomalor | AEs or | suporesed | not Avrabie
5.3.3 Alarm state transition paths
5.3.3.1 General
The arrows in Figure 3 represent transitions between states. The diagram does not directly
illustrate effects of alarm deadband and on-delay or off-delay, which are included in the
evaluation of alarm status (i.e., active or not active)
5.3.3.2 Transition from normal to unacknowledged (A->B)
The transition from normal to unacknowledged occurs when the process has gone out of the
normal range beyond the alarm setpoint and has remained in this state long enough to make the
alarm active.
5.3.3.3 Transition from unacknowledged to acknowledged (B->C)
The transition from unacknowledged to acknowledged occurs when an operator acknowledges an
alarm that is active before the process returns to normal and the alarm becomes not active
5.3.3.4 Transition from acknowledged to unacknowledged (C->B)
The transition from acknowledged to unacknowledged is the infrequently used option that
periodically generates repetitive alarm indications for a single alarm while the alarm remains
active.
5.3.3.5 Transition from acknowledged to normal (C->A)
The transition from acknowledged to normal is part of a normal sequence for an alarm. The
alarm moves from the acknowledged state to normal and becomes not active.
5.3.3.6 Transition from unacknowledged to return-to-normal unacknowledged (B->D)
The transition from unacknowledged to return-to-normal unacknowledged occurs when the
process retums to normal and the alarm becomes not active before an operator has
acknowledged the alarm
5.3.3.7 Transition from return-to-normal unacknowledged to normal (D->A)
The transition from return-to-normal unacknowledged to normal occurs when an alarm has
returned to normal and becomes not active. This transition can require operator
acknowledgment, or can be acknowledged automatically.
5.3.3.8 Transition to shelved (any state -> E)
The transition to shelved occurs when an operator shelves an alarm to avoid clutter in the active
alarm displays. Shelving is a manual operation.
5.3.3.9 Transition from shelved to normal or unacknowledged (E -> A or B)
The transition from shelved to normal or unacknowledged occurs when an alarm is un-shelved,
manually or automatically. if the alarm is active, the transition should be to the unacknowledged
slate, If the alarm is not active, the transition should be to the normal state
Copyright © 2016 ISA. All rights reserved.=35- ANSI/ISA-18.2-2016
5.3.3.10 Transition to suppressed-by-design (any state —> F)
The transition to suppressed-by-design occurs when process conditions or states are used to
Suppress alarms by design. Designed suppression is typically an automatic operation
5.3.3.1 Transitions from suppressed-by-design to normal or unacknowledged (F -+ A or B)
The transition from suppressed-by-design to normal or unacknowledged occurs when process
conditions or states are used to un-suppress alarms when appropriate. Designed un-suppression
is typically an automatic operation. If the alarm is active, the transition should be to the
unacknowledged state. If the alarm is not active, the transition should be to the normal state,
5.3.3.12 Transition to out-of-service state (any state > G)
The transition to out-of-service state occurs when an alarm is removed from service for
maintenance or other reasons. Remove from service is typically a manual operation
5.3.3.13 Transition from out-of-service to normal or unacknowledged (G — A or B)
The transition from out-of-service to normal or unacknowledged occurs when an alarm is
returned to service when it is available after maintenance. Return to service is typically a manual
operation. If the alarm is active, the transition should be to the unacknowledged state, If the
alarm is not active, the transition should be to the normal state.
5.4 Alarm response timeline
5.4.1 General
Figure 4 represents a process measurement that increases from a normal condition to an
abnormal condition and the two possible scenarios based on whether the operator takes the
conective action ur nut, IL is possible tu map sume alain states fromm Figure 3 tw the timeline
shown in Figure 4, to clarify the definition of terms related to time
Normal Unacknowledged Acknowledged alarm Return-to
‘) alarm (8) (c) normal (3),
<—
—_—_—_—_——>
21 allowable response time
process response — 7
fra,
consequence
threshold _
without operat
—aetion—-—
process
measurement
process —7
response to
operator action
deadband|
dolay
Process Variable
‘operator
oe action 4 alarm setooint
alarm deadband 4
process resnonse time.
Time
Figure 4 - Alarm response timeline
Copyright © 2016 ISA. All rights reserved.