240-56355466 Eskom Alarm Management System Guideline
240-56355466 Eskom Alarm Management System Guideline
Revision: 2
Total Pages: 34
Supported by SCOT/SC/TC
…………………………………..
K. Sobuwa
PP C&I SC Chairperson
Date: ……………………………
CONTENTS
Page
1. INTRODUCTION ...................................................................................................................................................... 5
2. SUPPORTING CLAUSES ........................................................................................................................................ 5
2.1 SCOPE .............................................................................................................................................................. 5
2.1.1 Exclusions ................................................................................................................................................. 5
2.1.2 Purpose ..................................................................................................................................................... 5
2.2 APPLICABILITY ................................................................................................................................................ 6
2.3 QUALITY AND SAFETY.................................................................................................................................... 6
2.4 NORMATIVE/INFORMATIVE REFERENCES .................................................................................................. 6
2.4.1 Normative .................................................................................................................................................. 6
2.4.2 Informative ................................................................................................................................................. 6
2.5 DEFINITIONS .................................................................................................................................................... 6
2.5.1 Disclosure Classification ........................................................................................................................... 7
2.6 ABBREVIATIONS .............................................................................................................................................. 7
2.7 ROLES AND RESPONSIBILITIES .................................................................................................................... 8
2.7.1 Alarm System Champion ........................................................................................................................... 8
2.7.2 Engineering Manager ................................................................................................................................ 8
2.8 PROCESS FOR MONITORING ........................................................................................................................ 8
2.9 RELATED/SUPPORTING DOCUMENTS ......................................................................................................... 8
2.10 BOUNDARY ANALYSIS.................................................................................................................................. 8
2.10.1 Human interface ...................................................................................................................................... 8
2.10.2 Technical interface .................................................................................................................................. 8
2.10.3 System interface ...................................................................................................................................... 8
2.10.4 Process interface ..................................................................................................................................... 8
3. PRINCIPLES OF ALARM MANAGEMENT ............................................................................................................. 9
3.1 GENERAL APPROACH .................................................................................................................................... 9
3.1.1 Philosophy ............................................................................................................................................... 10
3.1.2 Identification ............................................................................................................................................ 10
3.1.3 Documentation & Rationalization ............................................................................................................ 10
3.1.4 Design ..................................................................................................................................................... 10
3.1.5 Implementation & Training ...................................................................................................................... 10
3.1.6 Operation ................................................................................................................................................. 10
3.1.7 Performance Monitoring .......................................................................................................................... 10
3.1.8 Maintenance ............................................................................................................................................ 11
3.1.9 Assessment ............................................................................................................................................. 11
3.1.10 Management of Change ........................................................................................................................ 11
3.2 PERFORMANCE CRITERIA ........................................................................................................................... 11
4. AUTHORISATION .................................................................................................................................................. 11
5. REVISIONS ............................................................................................................................................................ 12
6. DEVELOPMENT TEAM ......................................................................................................................................... 12
7. ACKNOWLEDGEMENTS ...................................................................................................................................... 12
APPENDIX A: 8 . ALARM PHILOSOPHY DOCUMENT ........................................................................................... 13
8.1 INTRODUCTION ............................................................................................................................................. 13
8.2 PURPOSE OF THIS ALARM PHILOSOPHY .................................................................................................. 13
8.3 DEFINITIONS .................................................................................................................................................. 13
8.4 ROLES AND RESPONSIBILITIES .................................................................................................................. 13
8.4.1 Alarm System Champion ......................................................................................................................... 13
8.5 ALARM CRITERIA .......................................................................................................................................... 14
8.6 ALARM ANNUNCIATION AND RESPONSE .................................................................................................. 14
8.6.1 Annunciated Alarm Priority ...................................................................................................................... 14
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 3 of 34
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 4 of 34
FIGURES
TABLES
Table 1: Alarm Priority Levels ..................................................................................................................................... 14
Table 2: Alarm System Characteristics to support the operator in the alarm response process ............................... 15
Table 3: Alarm System KPIs ....................................................................................................................................... 17
Table 4: Severity of Consequences for Areas of Impact ............................................................................................ 20
Table 5: Maximum Time Available to an Operator to Respond and Correct .............................................................. 21
Table 6: Alarm Priority Determination ......................................................................................................................... 22
Table 7: Recommended Dead-Band Starting Points based on common Signal Types ............................................. 23
Table 8: Recommended Delay Times based on common Signal Types ................................................................... 24
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 5 of 34
1. INTRODUCTION
The introduction of modern digital control systems has brought about that plant operators in various
industries are regularly presented with unmanageable process alarm rates. The result is an ineffective
alarm system that impedes the tasks of the plant operators. This is especially true for Eskom, as
highlighted by recent control system refurbishment and upgrade projects. The main reasons for this are
poor alarm system design, poor control system configuration and the lack of alarm system performance
indicators.
There are simply too many annunciated alarms for the operator to effectively identify, diagnose and take
corrective action in a timeous manner. This has led to an undesirable situation in which the operator
acknowledges alarms without considering the consequences of doing so.
This guideline (and alarm philosophy document contained within) is based on the Alarm Management
Handbook by PAS [1]. In addition, reference is made to EEMUA 191 [2], ISA 18.2 [3], ISA SP18 [4], and
NAMUR 102 [5]. These are international best practice guidelines and standards for an effective alarm
management system.
As alarm systems are critical for the safe and reliable operation of plant and equipment, it is recognized
that best practices and principles, proper design and maintenance strategies must be implemented to
support the plant operators in performing their task.
2. SUPPORTING CLAUSES
2.1 SCOPE
This document specifies the principles, rationale, process and resources required to ensure that effective
alarm management systems are implemented and maintained at all Eskom Power Stations.
2.1.1 Exclusions
2.1.1.2 Events
The indication and analysis of event data and events (that are not alarms) are excluded from the scope
of this document.
2.1.2 Purpose
The purpose of this document is to ensure that effective alarm management systems are implemented
using a consistent technical basis at all Eskom Power Stations.
The objective of this document is to set clear high level criteria required for an alarm system’s functional
performance in order to have Manageable Alarm Rates annunciated to plant operators.
The document thus aims to have effective and auditable Alarm Management Systems implemented on
all plant. This will ensure that all Process Alarms are applicable, timely and effective thus assisting
operating personnel in operating plant effectively, reliably and safely.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 6 of 34
2.2 APPLICABILITY
This document shall apply throughout Eskom Technology Engineering (GTE) and Nuclear Engineering
excluding Peaking.
The solution to this problem will involve the efforts and cooperation of a multi-disciplinary team.
2.4.1 Normative
[1] Bill Hollifield and Eddie Habibi, The Alarm Management Handbook, A Comprehensive Guide. PAS,
Houston, TX, 2006. ISBN: 0-9778969-0-0.
[2] Alarm systems: A Guide to Design, Management and Procurement, The Engineering Equipment
and Material User’s Association (EEMUA) Publication No. 191, Edition 2, 2007.
[3] Management of Alarm Systems for the Process Industries. ANSI/ISA 18.2 Standard, 2009.
[4] D.G. Dunn and N.P. Sands, “ISA-SP18 - Alarm Systems Management and Design Guide”,
presented at ISA Expo, Chicago, Illinois, 2005.
[5] Alarm Management, NAMUR Recommendation and Worksheets NA 102, 2003.
2.4.2 Informative
[6] Ergonomic Design of Power Station Control Suites Guideline, Eskom Technology 240-56355808
(36-456), 2014.
[7] Human Machine Interface Design Requirement, Eskom Technology 240-56355728, 2015.
2.5 DEFINITIONS
Definition Description
Alarm A “(process) alarm is a mechanism for informing an operator of an abnormal
(process) condition for which an operator action is required. The operator is
alerted in order to prevent or mitigate process upsets and disturbances.”
This definition is significant in that no event other than one that represents
an abnormal situation and requires an operator action should be an alarm.
The system that performs the alarming function can therefore be seen as an
operator-centric system.
Alarm Floods A burst rate of alarms which begins when the alarm rate exceeds 10 or
more alarms occurring in 10 minutes, and ends when the rate drops to
below 5 alarms in 10 minutes.
Alarm Management The process of applying ergonomic principles and engineering to manage
the design of alarms and optimize its usability to ensure safe and reliable
plant operation.
Alarm Priority Distribution A means to convey the sense of urgency of a specific process condition to
the operator, and is used to drive the order of operator responses.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 7 of 34
Definition Description
Chattering Alarm An alarm that appears and clears at least three times in one minute
Controlled Disclosure Controlled Disclosure to External Parties (either enforced by law, or
discretionary)
HMI The Human Machine Interface (HMI) is used by the operator for the
operation and monitoring of plant systems including mechanical, electrical
and C&I systems.
HMI Graphic The graphical representation or plant mimic of any plant component.
Manageable Alarm Rate Less than one alarm per 10 minutes, per plant operator, on average.
Operator Workstation The primary interface of the operating plant personnel via which the HMI is
accessed with the specified number of operating display units and pointing
devices.
Process Alarm A process alarm is a mechanism for informing a plant operator of an
abnormal process condition for which operator action is required. The plant
operator is alerted in order to prevent or mitigate process upsets and
disturbances.
Standing Alarm An alarm that is intentionally overridden in the alarm system such that it’s
not visible or auditable to the plant operator.
Suppressed Alarm A suppressed alarm is an alarm that is intentionally temporarily disabled
(suppressed) due to a known condition.
Target Average Process Alarm The number of Process Alarms per day as an indicator of the overall health
Rate of the alarm system.
2.6 ABBREVIATIONS
Abbreviation Description
C&I Control and Instrumentation
CED Capital Expansion Department
D&R Documentation and Rationalization
DCS Distributed Control System
EED Enterprises Engineering Department (now referred to as GTE)
EPB Emergency Push Button
ESD Emergency Shutdown System
GTE Group Technology Engineering
HAZOP Hazards and Operability Process
HMI Human Machine Interface
KPI Key Performance Indicator
SCADA Supervisory Control and Data Acquisition
SIL Safety Integrity Level
TDAC Technical Document Authorisation Committee
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 8 of 34
The Documentation & Rationalization (D&R) process and on-going maintenance of the Alarm System
shall be facilitated/co-ordinated by the Alarm System Champion. Checklists and sign-off sheets will be
signed-off by the appointed Alarm System Champion.
The Engineering Manager shall appoint the Alarm System Champion. In addition, an engineering
resource from the site-specific C&I Engineering department must be identified to shadow the Alarm
System Champion.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 9 of 34
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 10 of 34
3.1.1 Philosophy
The alarm philosophy documents Eskom’s approach to alarm management, and is included herein. It
specifies the criteria, definitions and principles for the alarm system. Refer to Appendix A: 8. Alarm
Philosophy Document.
3.1.2 Identification
Identification of possible alarms must be done using the principles and processes as per Section 8.9
Alarm Documentation and Rationalization (D&R).
The identified possible alarms are reviewed to document the rationale for the alarm, as well as the basic
information such as the operator action, response time and consequence of deviation. Once the
consequences and the response time have been documented, each alarm is assigned a priority based
on a matrix of consequences and priorities. This matrix is defined in Section 8.9 Alarm Documentation
and Rationalization (D&R), as part of the Alarm Philosophy Document.
The D&R process ensures that the operator receives only those alarms that are meaningful and
actionable [1]; it is described further in Section 8.9 Alarm Documentation and Rationalization (D&R).
Pro-forma signoff sheets to be used for the D&R exercise are provided in Appendix A: 9. PRO-FORMA
D&R SIGN-OFF SHEET PER ALARM.
Similar alarms can be grouped and signed-off using a single sign-off sheet provided they are identical in
characteristics (Impact, time to respond, priority, set points and operator response).
3.1.4 Design
The design stage includes the basic configuration of alarms, the design of the HMI for alarms, and the
advanced methods of alarm management.
The design is supported by a design guide prepared by the contractor and documents control system
specific implementations of the alarm philosophy principles.
3.1.6 Operation
In this phase, the alarm system is in service and reporting abnormal conditions to the operator, as
designed.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 11 of 34
All necessary changes shall be done via appropriate Management of Change procedures. Monitoring
and analysis of data from the Maintenance stage provides an indication of the maintenance efficiency.
3.1.8 Maintenance
Periodic maintenance is necessary to ensure the alarm system functions as designed. It covers system
testing, replacements and repairs and is the stage during which issues such as chattering/fleeting alarms
are rectified.
3.1.9 Assessment
Assessment is a periodic audit of the alarm system and the processes, which are detailed in the alarm
philosophy, against performance criteria contained in Section 8.7.2, Alarm System Key Performance
Indicators (KPIs). The assessment could lead to a modification of the alarm system process, the
philosophy, the design guidance, or the need to improve the organization’s discipline to follow the
processes.
4. AUTHORISATION
This document has been seen and accepted by:
Name & Surname Designation
Bongi Mdodana C&I Engineering Manager – Matimba Power Station
Sifiso Mzulwini C&I Engineering Manager – Camden Power Station
Teboho Ramonotsi C&I Engineering Manager – Tutuka Power Station
Mauritz Van Der Bank C&I Engineering Manager – Arnot Power Station
Louis Nel C&I Engineering Manager – Lethabo Power Station
Tsumza Tsumane C&I Engineering Manager – Kriel Power Station
Xolelwa Siboza C&I Engineering Manager – Kendal Power Station
Mantombi Mkemezulu C&I Engineering Manager – Grootvlei Power Station
Piet Janse van Rensburg C&I Engineering Manager – Komati Power Station
Hans Smit C&I Engineering Manager – Matla Power Station
Willy Mangena C&I Engineering Manager – Hendrina Power Station
Thabani Nxumalo C&I Engineering Manager – Majuba Power Station
Vero Masuku C&I Engineering Manager – Duvha Power Station
Sonto Mkhithi C&I Engineering Manager – Medupi Power Station
Hardus Scheepers C&I Engineering Manager – Kusile Power Station
Winston Seima Senior Technologist – Electrical CoE
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 12 of 34
5. REVISIONS
Date Rev. Compiler Remarks
March 2007 0 B. Moodley Compilation of Alarm Management System guideline document
November 2010 0.1 N. Moodley Minor update in line with ISA 18.2.
N. Soodhoo
July 2012 0.2 N. Moodley Formatted as per the updated Eskom 32-4 Document
Template.
February 2013 1 N. Moodley Review and update (template only) of existing document as per
B2B TDAC process
Final Document for Authorisation
October 2015 1.1 Nimesh Soodhoo Review and consolidation of 240-57859210: Alarm System
Performance of Control Systems Applied in Fossil Plant
Standard into one document represented in this guideline.
October 2015 1.2 Nimesh Soodhoo Draft Document for Comments Review
July 2016 1.3 Nimesh Soodhoo Update as per comments review cycle
October 2016 2 Nimesh Soodhoo Final Document for Authorisation and Publication
6. DEVELOPMENT TEAM
Navern Moodley
Devan Govender
7. ACKNOWLEDGEMENTS
None
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 13 of 34
8.1 INTRODUCTION
The alarm philosophy documents Eskom’s approach to alarm management. It specifies the criteria,
definitions and principles for an alarm system, in line with international best practices and related to the
lifecycle of alarm management ([1], [3]).
The following are the key assumptions made in this alarm philosophy:
1. No amount of alarm management is able to replace the constant surveillance of a qualified operator.
2. Operators are trained on the alarm management strategy.
3. Operators will respond to all alarms, regardless of priority.
The acknowledgement of an alarm without assessing the situation is NOT acceptable.
4. The alarm priorities will determine the order of an operator’s response to the annunciated alarms.
5. The alarm system is routinely maintained and kept up to date.
8.3 DEFINITIONS
Definition Description
Alarm A “(process) alarm is a mechanism for informing an operator of an abnormal (process)
condition for which an operator action is required. The operator is alerted in order to
prevent or mitigate process upsets and disturbances.”
This definition is significant in that no event other than one that represents an abnormal
situation and requires an operator action should be an alarm. The system that performs
the alarming function can therefore be seen as an operator-centric system.
Diagnostic Alarm An alarm which is primarily used to warn the operator of instrument and system
malfunctions.
Nuisance Alarm An alarm that annunciates excessively, unnecessarily, or does not return to normal after
the correct response is taken (e.g., chattering, fleeting, stale, instrument malfunction
alarms).
Shelving Shelving is the mechanism of temporarily suppressing an alarm, typically initiated by an
operator.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 14 of 34
The Documentation & Rationalization (D&R) process and on-going maintenance of the Alarm System
shall be facilitated/coordinated by the Alarm System Champion. Checklists and sign-off sheets will be
signed-off by the appointed Alarm System Champion.
If the above definition of an alarm and the associated principles are adhered to when performing the
alarm identification exercise, it will go a long way in achieving the objectives of this document.
NOTE: Although the output from a Hazard and Operability (HAZOP) Study and associated Safety
Integrity Level (SIL) review process may assist in identifying alarms, they are not the basis for the design
of alarms, and further it is not a pre-requisite that they precede the D&R process.
There is one sub-category of the Low priority that is essentially used for instrument malfunctions (Section
8.10.4, Instrument Malfunctions) or Diagnostic alarms that are not feeding the above mentioned priority
alarms. This sub-category is the lowest priority and applies to (instrument malfunction or Diagnostic)
alarms with very limited and prescribed operator action. There is no recommended percentage
distribution for such Diagnostic alarms, since there is no recommended frequency for instrument failure.
The Diagnostic alarm only requires the operator to log a maintenance work order. The rationale for
having this sub-category is that during high alarm rate situations, the Diagnostic alarm sub-category can
be safely ignored.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 15 of 34
The colours shown in Table 1 are reserved for the Alarm Management System i.e. they are used only for
the annunciation of the alarms on the alarm system and on associated HMI graphics which are depicting
plant items in the abnormal state. No other symbols in their normal state will use these colours.
1. Detect: The operator’s attention is drawn to the symptoms of an abnormal situation that requires
operator response.
2. Identify: The operator then identifies the abnormal situation and the part of plant that is affected.
3. Verify: The operator then verifies whether the situation is an abnormal situation.
4. Acknowledge: The operator acknowledges the alarm having gone through the above 3 steps.
5. Assess: The operator then assesses the abnormal situation and determines what corrective action
must be taken.
6. Corrective Action: The operator carries out the required corrective action to ensure that the plant
returns to normal operation or that the risk posed by the abnormal situation has been mitigated.
7. Monitor: The operator monitors the process to ensure that the corrective action taken was
appropriate i.e. plant returns to normal operation or no further alarms of the same abnormal situation
are detected.
The Alarm System shall be designed to support the above 7-step process that the operator needs to
follow to respond to an alarm. The System shall exhibit the characteristics as shown in Table 2 below.
Table 2: Alarm System Characteristics to support the operator in the alarm response process
# Problem Process Phase Alarm System Characteristic
Text Size
Segregation of Alarms
1 Detect Colour
Flashing Text
Sound
2 Identify Provision of a quick link to the associated process HMI graphic.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 16 of 34
Alarm systems shall be designed, implemented and maintained in such a manner that:
a. Under all reasonably foreseeable conditions, steady state and abnormal conditions, the alarm rate
annunciated to the plant operator is manageable.
c. Each individual alarm must have an associated alarm response procedure as per 240-56355530
Alarm Response Work Instruction; Power Station’s Owner Manual, Operating function, Alarm
Response Procedures, or equivalent document.
d. Each alarm must be prioritised according to the respective Business Units priority matrix. It is
recommended that three priority levels be used (Low, high and critical).
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 17 of 34
Following the implementation of a new system or for the maintenance of an existing system, each Power
Station must monitor the performance of these alarm systems installed on its plant and take corrective
action when the alarm system’s performance doesn’t meet the key performance indicator (KPI) targets
as set out in Table 3.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 18 of 34
1. The station shift supervisor is made aware of this problem and authorises the temporary
suppression using the template contained in Appendix A: 11. PRO-FORMA TEMPORARY
SUPPRESSION REQUEST.
2. The method to suppress the alarm does not suppress other alarms on the same point e.g. the
operator must not suppress the high alarm when only the rate of change alarm requires
suppression.
3. The DCS holds a record (electronic version) of the suppressed alarms.
4. The DCS can issue a print out of the suppressed alarms which is maintained in a paper file titled
“Suppressed Alarms for [Power Station Name]”.
5. The DCS provides a pop-up list of suppressed alarms when the operator for the next shift logs in.
The operator must be able to choose to maintain or remove the suppressions.
6. The problem is reported to a site-specific technical person (C&I Engineering/Maintenance) and
changes to Alarm System must be made using the Alarm System Management of Change Process.
Refer to Section 8.10.13.
Therefore, methods must be employed to ensure that no alarms (including stale alarms) are produced in
these normal situations. Care should be taken to ensure that the state is in fact the OFF-state and must
include operator confirmation of the state.
Alarms can be placed in an out-of-service state only if the following conditions are met:
1. The station shift supervisor is made aware of the problem and authorizes placing the alarm in an
out-of –service state using the template contained in Appendix A: 12. MAINTENANCE – OUT OF
SERVICE REQUEST.
2. The method to place the alarm in an out-of-service state does not affect other alarms on the same
point.
3. The DCS holds a record (electronic version) of all out-of-service alarms including any replacements.
4. The DCS can issue a print out of the out-of-service alarms which is maintained in a paper file titled
“Suppressed Alarms for [Power Station Name]”.
5. The DCS provides a pop-up list of out-of-service alarms when the next operator logs in.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 19 of 34
common alarm will be annunciated with the contributing alarms available to the operator upon further
investigation.
It is important to keep the team small (maximum 8 members) but ensuring that the team is sufficiently
represented as per above roles. The Alarm D&R methodology seeks to achieve the performance criteria
specified in Section 8.7.2 Alarm System Key Performance Indicators (KPIs) by applying the core
principles defined in Sections 0 and 8.5 (Alarm Definition and Alarm Criteria), using a logical, consistent
and rigorous method.
For each point on the DCS, the D&R process has the following tasks:
In essence, if the event does not satisfy all the above 3 principles, then it must NOT be configured as an
alarm.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 20 of 34
This priority must take into consideration the severity of consequences of the operator not responding to
the alarm and the maximum time that the operator has in which to respond to the alarm.
For each point on the DCS, the discussion will be “If this was an alarm and the alarm was annunciated,
how severe would the consequences be if the operator did not take action?” for each of the 3 Areas of
Impact.
After the severity of consequence for each area of impact has been assigned separately, the worst-
case severity of consequence amongst the 3 areas of impact is taken to be the overall severity of
consequence for the alarm.
No disability
injuries, or Life
Reversible health
No lost time Threatening
effects (such as skin
recordable
irritation).
No Effect Local Environmental Contamination Limited or extensive
Areas of Impact
of statutory or communities.
Little, if any, clean
prescribed limit.
up. Repeated
Reporting at exceedances.
Internal or Routine
provincial
reporting Extensive clean-up
governmental level.
requirements only. measures.
Reporting at
national
governmental level.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 21 of 34
No loss Event cost < ZAR Event cost is Event cost is > ZAR
100k. between ZAR 100k 1 Million
(Costs / Production Loss /
If the overall severity of consequence turns out to be None, then this should not be an alarm. However, if
the overall severity of consequence is classified as Minor, Major or Severe, then this overall severity of
consequence rating will be consolidated with the maximum time to respond to the alarm (as per Section
8.9.6) to arrive at a priority for the alarm.
NOTE: It is inappropriate to consider probability in this D&R exercise. This is based on the premise that
the event (however improbable) can occur during the life cycle of the plant.
NOTE: Exceptions to the “No Alarm” decision can be made in cases where the consequences are
severe but require some action that can be taken within a period greater than 30 minutes. However, this
has to be justified and documented as stated in Section 8.9.8, Alarm Documentation.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 22 of 34
Respond
Time to
It is recommended that every Emergency alarm have a pre-alarm configured. This recommendation must
be considered if it is practical and if there is adequate time for the operator to take effective action to the
pre-alarm.
If time permits, the following could also be provided as part of the D&R alarm documentation set:
Method of alarm verification that the operator could use.
HAZOP study output documents
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 23 of 34
The D&R is not an equipment design process. Therefore, issues that focus on this must be minuted
separately and addressed in equipment design meetings, not in this D&R process.
Similar grids developed from HAZOP studies should not be used in the D&R process without
modification
Work within the tables provided in Appendix A: 9. PRO-FORMA D&R SIGN-OFF SHEET PER
ALARM.
Begin each event discussion by starting with the matrices provided in Appendix A: 9. PRO-FORMA
D&R SIGN-OFF SHEET PER ALARM.
D&R Sign-off Sheet per Alarm rather than discussion around the alarm causes or other items (Avoid
time consumers that add minimal value to the alarm D&R exercise).
8.10.1 Pre-Alarms
In some texts this is referred to as combination alarms [1]. It is poor engineering practice to use a rule of
thumb that assigns default values to Low, Low-Low, High and High-High alarms. Best practice dictates
that a point must NOT be alarmed twice for the operator to take the very same action.
It is recommended that every Emergency priority alarm have a pre-alarm configured. This
recommendation must be considered if it is practical and if there is adequate time for the operator to take
effective action to the pre-alarm.
Dead-band
Signal Type
(Percentage of Operating Range)
Flow Rate ~5%
Level ~5%
Pressure ~2%
Temperature ~1%
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 24 of 34
it has cleared. On-Delay and Off-Delay times should be used after careful evaluation of potential control
system operational effects. Table 8 [2] below provides recommended time delays based on signal types.
Delay Time
Signal type
(On and Off)
Flow Rate ~15 Seconds
Level ~60 Seconds
Pressure ~15 Seconds
Temper ~60 Seconds
The exception to this rule is when the Bad Value alarm is configured on a sensor that feeds an
Emergency priority alarm. In this case, the Bad Value alarm will take on a High priority.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 25 of 34
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 26 of 34
8.12 MAINTENANCE
Maintenance of the alarm system is essential to keep it functioning optimally. This will include periodic
reporting, testing, replacements and repairs. The design of the Alarm System shall take into
consideration the maintenance aspects identified below.
Date(s) of testing.
Names(s) of person(s) who performed the test.
Equipment identification (Loop Number, Tag Number, Equipment Number etc.).
Results from test.
Test procedures should be provided for all alarm testing and contain at minimum the following:
Steps for placing the alarm in an out-of-service state as well as steps to place the alarm back into
service.
Information regarding affected control loops and equipment.
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 27 of 34
Date: YYYY-MM-DD
Attendees: ___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
1. Alarm KKS / AKZ (including 3rd level breakdown): _ ______ _____ ____
2. Alarm Description (Displayed on DCS):
_____________________________________________________________________
3. Alarm Purpose:
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
4. Alarm Value
_____________________________________________________________________
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 28 of 34
Severity of Consequences
None Minor Major Severe
No Slight injury (first Injury affects work Lost time injury >1
Personnel Safety
surrounding
Environment
Million.
only at the Holdings level
department level. Reporting required
at Eskom power
station or
Generation Cluster
Level.
Place an “X” for each of the 3 Areas of Impact (Personnel Safety, Environment, Economic).
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 29 of 34
7. Overall Severity of Consequences (worst-case for the 3 Areas of Impact – place an “X”):
8. The “maximum time to respond” is defined as the time within which the operator must take action to
prevent or mitigate the undesired consequence(s) caused by an abnormal situation.
9. Determine the Priority of the alarm using the information gained in points 7 and 8.
Consequence of Severity
Respond
Time to
NOTE: Exceptions to the “No Alarm” decision can be made in cases where the consequences are
Severe but require some action that can be taken within a period greater than 30 minutes.
10. If applicable:
a. Reason for overriding priority determination as per matrices:
_____________________________________________________________________
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 30 of 34
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
11. Specify the Operator Action when the alarm is annunciated (Abnormal Situation).
Please use a point-form format:
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 31 of 34
Name: __________________________________
Signature: __________________________________
Date: __________________________________
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 32 of 34
Date: YYYY-MM-DD
Name: __________________________________
Signature: __________________________________
Date: __________________________________
Name: __________________________________
Signature: __________________________________
Date: __________________________________
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 33 of 34
Date: YYYY-MM-DD
1. Alarm KKS / AKZ (including 3rd level breakdown): _ ______ _____ ____
2. Alarm Description (Displayed on DCS):
_____________________________________________________________
YYYY-MM-DD at HHhmm
6. Date and time of intended suppression removal
YYYY-MM-DD at HHhmm
Operator’s Signature
Shift-Supervisor’s Signature
Suppression Removed:
Operator’s Signature
Date: _________________________
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.
Alarm Management System Guideline Unique Identifier: 240-56355466
Revision: 2
Page: 34 of 34
Date: YYYY-MM-DD
1. Alarm KKS / AKZ (including 3rd level breakdown): _ ______ _____ ____
2. Alarm Description (Displayed on DCS):
_____________________________________________________________
YYYY-MM-DD at HHhmm
6. Date and time of placing alarm back in service
YYYY-MM-DD at HHhmm
Operator’s Signature
Date: _________________________
Shift-Supervisor’s Signature
Name: _________________________ Signature: ______________________
Date: _________________________
Suppression Removed:
Operator’s Signature
Date: _________________________
CONTROLLED DISCLOSURE
When downloaded from the EDMS, this document is uncontrolled and the responsibility rests with the user to ensure it is in line
with the authorised version on the system.