exSILentia User Guide
exSILentia User Guide
User Guide
RELEASED 2022.03.10
Copyright © 2022 exida Innovation LLC. All rights reserved.
Information in this document is subject to change without notice. The software described in this
document is furnished under a license agreement or nondisclosure agreement. The software may be
used or copied only in accordance with the terms of those agreements. No part of this publication may
be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser's personal
use without prior written permission of exida Innovation LLC.
Chapter 1 Introduction 15
3.1 Dashboard 27
3.2 Process Hazard Analysis (PHA) 27
3.3 Layer of Protection Analysis (LOPA) 28
3.4 SIL Target Selection (SILect) 28
3.5 Safety Requirements Specification (SRS) 28
3.6 SIL Verification (SILver™) 29
3.7 Design SRS 29
3.8 SIS Logic 29
3.9 Proof Test Generator 30
3.10 Lifecycle Cost Estimator 30
3.11 Alarm Rationalization (SILalarm™) 30
3.12 Life Event Recording (SILStat™) 30
3.13 exSILentia® Cyber 31
Chapter 6 Dashboard 45
Abbreviations 257
Index 287
PHA + LOPA Combined Process Hazards Analysis and Layer of Protection Analysis tool
Note: Do not insert the exSILentia® v4 USB key into your computer's USB port until you have
installed the exSILentia® v4 software.
If setup does not start automatically for any reason, follow these steps:
1. Insert the exSILentia® v4 CD into your CD-ROM drive.
2. Type Run in the Start Search box of the Start menu
3. Type d:\setup.exe, where d is the letter assigned to your CD-ROM drive.
4. Click OK.
Setup starts and guides you through the installation of the exSILentia® v4 software.
To continue the installation process you will need to accept the terms and conditions of the exSILentia®
v4 Software License Agreement. A copy of the agreement is included in this user guide, see Software
License Agreement – exSILentia® Standalone. If you do not agree with the exSILentia® v4 Software License
Agreement do not install the software on your system.
When the installation is complete, a dialog box will appear that indicates that the exSILentia® v4 Setup
has been completed. Click “Finish” to conclude the installation.
2.1.3 Licensing
exSILentia® v4 uses the Thales Sentinel HASP software to enforce its licensing. Your Microsoft Windows
operating system will automatically install the required Sentinel HASP Drivers when you plug the
exSILentia® v4 USB key into you machine for the first time.
In order to use exSILentia® v4 you need the exSILentia® v4 USB key inserted in a USB port of your
system. The exSILentia® v4 program will not work without this USB key; if the USB key cannot be
detected an error message will appear. If this message appears when you do have the USB key inserted
in a USB port, please try using a different USB port. If that doesn’t resolve the issue, please contact exida
for additional support.
The exSILentia® v4 licensing allows you to install the software on multiple machines, e.g. a desktop
station in the office and a laptop used while traveling. However the software can only be used on the
system where the USB key is inserted.
Note: exSILentia® 1.x, 2.x, 3.x USB license keys will not work with exSILentia® v4. If you have an
older version of exSILentia® your old USB license key will still work for that version of the software.
Multiple versions of the software can be installed on the same computer.
Contact the exSILentia® team at http://support.exida.com or your local exida representative for
upgrade options and pricing.
As the user of the exSILentia® Cloud platform, you can choose where you want to save your exSILentia®
project files (see section 4.2 Launching the Program). You can save your project files on the exSILentia®
Cloud server (typically you will have a dedicated H drive) or you can save your files on your local
machine by accessing the Client\ machine via the network options in the save as dialog. To be able to
save files to your local machine you will need to give the exSILentia® Cloud server by means of the Citrix®
Receiver permission to access your local files. When you launch exSILentia® you will see the following
security warning, simply select Permit all access.
To install the exSILentia® v4 software on the target computer follow the steps as described for
exSILentia® v4 Standalone, see section 2.1 exSILentia® Standalone.
The Site USB key Communication Driver is the Sentinel HASP/LDK Run- time. The exSILentia® team
recommends that you do a web search for the latest version of this run-time, alternatively you can
contact the exSILentia® team at http://support.exida.com for a download link.
The communication driver must be installed on both user's computer and the License Server, i.e. the
computer that will hold the exSILentia® v4 Site USB key. The license server does not need to be a
dedicated server, it could be the computer of one of the users of the software. In addition to installation
of the communication driver, you need to make sure that port 1947 is open for incoming traffic on the
license server and the same port (1947) is open for outgoing traffic on each of the users' computers.
2.3.3 Licensing
exSILentia® v4 uses the SafeNet HASP software to enforce its licensing. Insert the Site USB key in the
license server (and simply leave it there).
Upon first launch of exSILentia® v4 an error message will appear, this is as expected.
Click on the Configure Licensing link in the error message or select the Tools - License Configuration
menu option. For the Authentication Mode in the License Configuration window can select server. In the
Server text box enter either hostname for the license server, or the license server’s static IP address, and
press OK. exSILentia® v4 will establish a connection with the license server and you will be able to start
using exSILentia® v4.
3.1 Dashboard
The exSILentia® v4 Dashboard is the first window you will see when you open a project or after creating
a new project. The dashboard is exSILentia® v4's central hub through which all lifecycle activities are
initiated. It is shared by all exSILentia® v4 tools. In addition to providing the main navigation of the tool,
the dashboard also provides you with the ability to evaluate the status of a project through summary
information as well as graphical representation of results.
A detailed description of the various aspects of the dashboard as well as instructions on how to
customize your dashboard are provided in Chapter 6 Dashboard.
4.1.1 Training
FSE 242: Process Hazard Analysis with exSILentia®
Process Hazard Analysis with exSILentia®, FSE 242, details how the exSILentia PHAx™ module can be
used to conduct HAZOP methodology based Process Hazard Analysis. This course is targeted towards
students that are experienced in process hazard analysis who want to learn how to leverage the
advanced features of PHAx™. It will cover how to configure a project, define risk criteria, and use the
advanced libraries to store valuable project specific information. The students will learn how to define
units, nodes, and how to benefit from the PHAx™ smart deviations. It also addresses how hazard
scenarios are to be defined for use in subsequent lifecycle phases.
FSE 243: Layer of Protection Analysis with exSILentia®
Layer of Protection Analysis with exSILentia®, FSE 243, explains how the exSILentia LOPAx™ module is
used to conduct a Layer of Protection Analysis and how SIF requirements can be documented using the
exSILentia SRS module. This course is targeted towards students that have a general understanding of
layer of protection analysis and safety requirements specifications who want to learn how to leverage
the advanced features of LOPAx™ and SRS. It will cover how to analyze hazard scenarios considering the
frequency of initiating events and the probability of failure for each independent protection layer (IPL) as
well as enabling conditions and conditional modifiers. This course will show how to calculate the
required Risk Reduction Factor of an IPL and identify Safety Instrumented Functions (SIF). Users will
learn how to record mandatory functional and integrity requirements for each SIF. It will teach users
how to transfer data from PHAx™ to LOPAx™ as well as from LOPAx™ to SRS.
FSE 244: SIL verification with exSILentia®
SIL verification with exSILentia®, FSE 244, explains how the exSILentia SILver™ module is used to
perform a SIL verification for Safety Instrumented Functions. Students will learn to leverage the tool to
model different SIF architectures ranging from simple 1oo1 configuration to more complex examples.
This course also covers review of the key parameters that determine the probability of failure of a SIF as
well as minimum hardware fault tolerance and systematic capability aspects. It will show the impact of
these parameters on the detailed design, implementation, and operation of the SIF. Furthermore,
students will learn how to transfer data from the SILver™ module to the Design SRS module and
subsequently complete the Design SRS requirements. Finally, the course covers the impact of proof
testing and specification of proof test procedures using the Proof Test Generator module.
If you want to create a new exSILentia® v4 project once a project is already open, you can select the File
- New menu option. This will create a Default Project, as described above, allowing you to immediately
specify specific project information such as Project Type,Project ID, Project Name , Company , and
Project Description. If you would like to create an Empty or Custom new project you can select Cancel,
this will revert you to the Welcome Screen where you can choose these options.
4.2.4 Auto-Save
exSILentia® has an auto-save feature. You can enable the auto-save by clicking on the circle in front of
the Last save information. You can enable the auto-save feature as well as specify the time interval for
the auto-save ranging from every minute to every 10 minutes.
Note: When enabling auto-save, exSILentia® will overwrite your file every time the auto-save is
executed. Undoing changes by simply not saving is not an option in this case.
5.1.1 File
Menu Item Keyboard Shortcut Function Description
New Ctrl+N Launches a new project
Open Ctrl+O Allows you to browse to a project file to be opened
Recent Shows recent projects that may then be opened
Save Ctrl+S Saves the project file
Save As Ctrl+Shift+S Allows you to save a project with a different file name
Close Ctrl+E Closes current project while keeping application open
Exit Alt+F4 Closes the application
5.1.2 View
Menu Item Keyboard Shortcut Function Description
Project Configuration Launches the Project Configuration window
Risk Configuration Launches the Risk Configuration window
Has four sub- items to launch the Safeguards,
Library Recommendations, References, and Hazard Scenarios
Library window respectively
Members Launches the Members window
Sessions Launches the Sessions window
Action Items Launches the Action Items window
Parking Lot Items Launches the Parking Lot Items window
5.1.4 Tools
Menu Item Keyboard Shortcut Function Description
Allows you to request an update to your license key
License Configuration and subsequently check for an available update
(requires exida license key processing)
Provides a list of user created exSILentia® v4 plug-in
Plugins
modules (once interfaces are made public)
Provides a list of all licensed exSILentia® v4 software
Modules
modules and their individual versions
5.1.5 Help
Menu Item Keyboard Shortcut Function Description
View Help Launches the help window
User Guide Allows you to access all User Guide material
Check for Updates Allows you to check if a more recent version of the
exSILentia® v4 program is available and install that
newer version if applicable
Contact exida Will launch a web browser and directs you to the
exSILentia® online support ticket system. Here you will
be able to launch a support request.
Release Notes Allows you to see the history of feature upgrades
5.2 Shortcuts
For a Microsoft Windows based application you would expect a certain set of standard shortcuts, these
are also available in exSILentia® v4 in a wide variety of locations. The following is a limited overview of
some of the shortcuts implemented.
Keyboard Shortcut Function Description
Ctrl+C Copy
Ctrl+V Paste
Ctrl+X Cut
Delete (Del) Deletes the currently selected item(s)
Enter Create a new item
Shift+Enter Create a new child item
Shift+Enter In HAZOP Worksheet when consequence or associated Safeguard or
Recommendation selected: Create a new Safeguard
Ctrl+Shift+Enter In HAZOP Worksheet when consequence or associated Safeguard or
Recommendation selected: Create a new Recommendation
Tab In worksheet changes focus to next field from left to right, top to bottom
Shift+Tab In worksheet changes focus to previous field from right to left, bottom to top
Up/Down/Left/Right In worksheet changes focus to relevant surrounding field
l Specify a role by selecting an option from the drop down list (the Team Roles can be modified
from within the project configuration)
To modify a Team Member:
l Highlight the Team Member
l Edit Team Member Properties, i.e. First Name, Last Name, Initials, Title, e-mail, and Notes
To delete a Team Member:
6.7 Sessions
exSILentia® v4 provides the ability to define (work) sessions and document dates and associated
participants. To access an overview of all defined sessions for the current project click on the Sessions
button on the dashboard. Alternatively you can select the View - Sessions menu option.
To add a Session:
l Click on the green plus (+) symbol in the lower left hand portion of the window
l Highlight the new Session
l Edit the Session Properties, i.e. Name, Description, and Location
l Select the Session Start Date using the calendar function
l Select the Session End Date using the calendar function
l Select the Session Type, e.g. PHA, LOPA, etc.
l Check the relevant check boxes to indicate which Team Members are part of the Session
To modify a Session:
6.10 Library
The library capability, build into exSILentia® v4, for identical items that can be (re-)used in multiple
locations, can dramatically increase the efficiency and consistency of the various work activities
performed. A detailed description of the Library functionality as well as an overview of the items for
which libraries are defined is provided in Chapter 13 Project Libraries.
To remove all widgets from you desktop click on the delete icon in the upper right hand corner of the
widget area.
To lock all widgets in place click on the lock icon in the upper right hand corner of the widget area.
Note: The Safeguard Category Type allow you to define if a safeguard category is of type IPF,
ALM, or Other. Based on these selections certain additional fields will be available as part of a
safeguard. For example any safeguard category of type IPF will have additional Interlock fields
available as well as a Is SIF checkbox. The latter is the unique identifier for exSILentia® v4 to
indicate that a safeguard should be considered in subsequent Safety Instrumented Function
related lifecycle phases.
Note: By indicating if a reference category is a Regulatory Standard, any documents marked with
the particular reference category will be included in the regulatory standard section of the various
reports.
The figure below provides a partial example using the ALM – Alarm Process Safety Information exida
default data and shows two text fields and a choice field.
Note: Custom Data may be used for more than one custom data type, i.e. "ALM - Alarm Process
Safety Information" can be linked to an Alarm safeguard category and could at the same time be
used for an "OCC - Occupancy Restriction" safeguard category if those two categories require
identical Custom Data.
Note: As exSILentia® v4 project schema can be expanded with every release, some older project
configurations, e.g. based on v4.0 or v4.1, may not set specific parameters like Safeguard Category
type, as this parameter was introduced after those releases. You should verify your project
configuration if the source file is older than the current released version of the software.
Both parameters are descried below and relate to the range of risk reduction factors associated with
each SIL as shown in the following figure.
The Report Wizard will allow you to select the report you want to generate. In addition through the
Report Options selections you can control what sections are included within the report. Once you
completed making all appropriate report option selections you can click the Generate Report button in
the lower right hand portion of the Report Wizard window. This will open the Save As dialog and prompt
you with a default name which is based on the project file name.
The Export Wizard will allow you to select what data you want to export. The Comprehensive Export will
create a single workbook with separate worksheets for Safeguards, Recommendations, Members, Action
Items, References, and Sessions. Once you make the appropriate data export selections you can click the
Export button in the lower right hand portion of the Export Wizard window. This will open the Save As
dialog and prompt you with a default name which is based on the project file name.
Note: The easiest way to ensure your import format conforms with what exSILentia® v4 is
expecting, it is best to export from the desired library and use this exported file as the template to
create the import file. The text of certain fields must match what is expected or the field will not
import.
The following screen shot shows a Microsoft Excel worksheet, prepared as an import file for the hazard
scenario library. The first row contains the column headings and the subsequent rows contain the data
to be imported. Notice column D which communicates a Boolean value of Yes/No regarding the
completeness of the LOPA. You must follow this format of TRUE or FALSE in this case to represent
Yes/No to ensure correct import into the exSILentia® v4 hazard scenario library.
Note: Causes are referred to as Initiating Events in Layer of Protection Analysis terminology.
To review causes defined in the Causes Library click on Library icon on the exSILentia® v4 Dashboard, or
select the View - Library menu option, and select the Causes Library item.
analysis is conducted
To modify a Cause in the library:
l Highlight the Cause
l Edit the Cause Properties, i.e. Name, Description, and Frequency
To delete a Cause from the library:
l Highlight the Cause
l Click on the red minus (-) symbol in the lower left hand portion of the window
l This will remove that Cause and its Cause Properties
CAUTION: Deleting a cause from the library deletes every instance of that cause on every
worksheet where it has previously been used.
Note: The MS Excel spreadsheet should have columns defined for ID , Name , Description , and
Frequency.
It is possible that after adding, modifying, deleting, and/or importing causes, there will be gaps between
Cause IDs. IDs are assigned by exSILentia® v4 to be unique values, similar to a serial number. When a
cause is deleted it will create a gap between numbers. A feature has been provided to allow reordering
these IDs, but caution is advised if the IDs are being used external to the program as part of managed
documentation.
To reorder Cause IDs:
CAUTION: Reordering Cause IDs has the potential to cause inconsistency with data maintained
outside of exSILentia® v4. When you reorder Cause IDs you need to ensure that any reference
external to project file is updated manually.
CAUTION: Deleting a safeguard from the library deletes every instance of that safeguard on every
worksheet where it has previously been used.
Note: The MS Excel spreadsheet should have columns defined for ID , Description , Tag , and
Category.
It is possible that after adding, modifying, deleting, and/or importing safeguards, there will be gaps
between Safeguard IDs. IDs are assigned by exSILentia® v4 to be unique values, similar to a serial
number. When a safeguard is deleted it will create a gap between numbers. A feature has been provided
to allow reordering these IDs, but caution is advised if the IDs are being used external to the program as
part of managed documentation.
To reorder Safeguard IDs:
l Click on Reorder Safeguard IDs in the lower left hand portion of the window
CAUTION: Reordering Safeguard IDs has the potential to cause inconsistency with data maintained
outside of exSILentia® v4. When you reorder Safeguard IDs you need to ensure that any reference
external to the project file is updated manually.
CAUTION: Modifying a recommendation in the library will impact all instances where the
recommendation is used.
CAUTION: Deleting a recommendation from the library deletes every instance of that
recommendation on every worksheet where it has previously been used.
Note: The MS Excel spreadsheet should have columns defined for ID , Description , Category ,
Assigned To, Due Date, and Status.
It is possible that after adding, modifying, and/or deleting recommendations, there will be gaps between
Recommendation IDs. IDs are assigned by exSILentia® v4 to be unique values, similar to a serial number.
When a recommendation is deleted it will create a gap between numbers. A feature has been provided
to allow reordering these IDs, but caution is advised if the IDs are being used external to the program as
part of managed documentation.
To reorder Recommendation IDs:
l Click on Reorder Recommendation IDs in the lower left hand portion of the window
CAUTION: Reordering Recommendation IDs has the potential to cause inconsistency with data
maintained outside of exSILentia® v4. When you reorder Recommendation IDs you need to ensure
that any reference external to project file is updated manually.
To view details for a recommendation, you can select the recommendation in the library, right click, and
select View.
l You can create a hyperlink (Link) to the reference or embed (Attachment) the actual reference in
the project
To modify a Reference in the library:
l Highlight the Reference
l Edit the Reference Properties, i.e. Document Number, Title, Description, Revision, Revision Date,
and select the Reference Type from the drop down box.
l You can delete the reference Link or Attachment by clicking on the red X icon next to the link or
attachment. You can then specify an alternate file to hyperlink or embed.
CAUTION: Modifying a reference in the library will impact all instances where the reference is used.
CAUTION: Deleting a reference from the library deletes every instance of that reference where it
has previously been used.
Note: The MS Excel spreadsheet should have columns defined for ID, Document Number, Title,
Revision, Revision Date, and Type.
It is possible that after adding, modifying, and/or deleting references, there will be gaps between
Reference IDs. IDs are assigned by exSILentia® v4 to be unique values, similar to a serial number. When a
reference is deleted it will create a gap between numbers. A feature has been provided to allow
reordering these IDs, but caution is advised if the IDs are being used external to the program as part of
managed documentation.
To reorder Reference IDs:
l Click on Reorder Reference IDs in the lower left hand portion of the window
CAUTION: Reordering Reference IDs has the potential to cause inconsistency with data maintained
outside of exSILentia® v4. When you reorder Reference IDs you need to ensure that any reference
external to project file is updated manually.
CAUTION: Modifying a hazard scenario in the library will impact all instances where the hazard
scenario is used.
CAUTION: Deleting a hazard scenario from the library deletes every instance of that hazard
scenario on every worksheet where it has previously been used.
It is possible that after adding, modifying, and/or deleting hazard scenarios, there will be gaps between
Hazard Scenario IDs. IDs are assigned by exSILentia® v4 to be unique values, similar to a serial number.
When a hazard scenario is deleted it will create a gap between numbers. A feature has been provided to
allow reordering these IDs, but caution is advised if the IDs are being used external to the program as
part of managed documentation.
To reorder Hazard Scenario IDs:
l Click on Reorder Hazard Scenario IDs in the lower left hand portion of the window
CAUTION: Reordering Hazard Scenario IDs has the potential to cause inconsistency with data
maintained outside of exSILentia® v4. When you reorder Hazard Scenario IDs you need to ensure
that any reference external to project file is updated manually.
CAUTION: Deleting a enabling condition from the library deletes every instance of that enabiling
condition on every worksheet where it has previously been used.
Note: The MS Excel spreadsheet should have columns defined for ID, Name, and Probability.
It is possible that after adding, modifying, deleting, and/or importing enabling conditions, there will be
gaps between Enabling Condition IDs. IDs are assigned by exSILentia® v4 to be unique values, similar to
a serial number. When an enabling condition is deleted it will create a gap between numbers. A feature
has been provided to allow reordering these IDs, but caution is advised if the IDs are being used external
to the program as part of managed documentation.
To reorder Enabling Condition IDs:
l Click on Reorder Enabling Condition IDs in the lower left hand portion of the window
CAUTION: Reordering Enabling Condition IDs has the potential to cause inconsistency with data
maintained outside of exSILentia® v4. When you reorder Enabling Condition IDs you need to ensure
that any reference external to project file is updated manually.
CAUTION: Deleting a conditional modifier from the library deletes every instance of that
conditional modifier on every worksheet where it has previously been used.
Note: The MS Excel spreadsheet should have columns defined for ID, Name, and Probability.
It is possible that after adding, modifying, deleting, and/or importing conditional modifiers, there will be
gaps between Conditional Modifier IDs. IDs are assigned by exSILentia® v4 to be unique values, similar to
a serial number. When a conditional modifier is deleted it will create a gap between numbers. A feature
has been provided to allow reordering these IDs, but caution is advised if the IDs are being used external
to the program as part of managed documentation.
To reorder Conditional Modifier IDs:
l Click on Reorder Conditional Modifier IDs in the lower left hand portion of the window
CAUTION: Reordering Conditional Modifier IDs has the potential to cause inconsistency with data
maintained outside of exSILentia® v4. When you reorder Conditional Modifier IDs you need to
ensure that any reference external to project file is updated manually.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 100 of 292
l Group Name
l Description
l Application Test Parameters
l Voting
l Beta Factor
l Mean Repair Time
l Proof Test Parameters
l Places Used
Likewise, the library stores each sensor leg defined in SIL Verification in the SILver module. The leg
information stored in the library includes:
l Leg Name
l Description
l Places Used
These parameters can be modified in the library if you prefer, and will be updated accordingly in the
SILver module. For details on each of these parameters see section 20.5 SILver Worksheet - Sensor Group.
13.11 Devices
The library stores each individual device defined during SIL Verification in the SILver module. Each
sensor or final element specified during the design of your safety instrumented system is given a unique
entry in the library, making it possible to re-use the device in different SIFs. For more information on
Sensor Devices see section 20.5 SILver Worksheet - Sensor Group. For more information on Final Element
Devices, see section 20.7 SILver Worksheet - Final Element Group.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 101 of 292
13.12 Device Models
The library stores each Device Model used during SIL Verification in the SILver module. One Device Model
can be used for various devices and can be selected from exida's Safety Equipment Reliability Handbook
database or entered as a User Defined device model. You can also add Device Models directly into the
library if you have, for example, many sensors or final elements of the same model from the same
vendor in a process.
To add a Device Model directly into the library, select the + button, and select a device model from
exida's SERH.
13.14 Tags
The library stores tag information input in the SILver module during SIL Verification. The tags can also be
input directly into the library and linked to a Sensor Leg or Final Element Leg. For more details on tags,
see section 20.11 SILver Worksheet - Tags.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 102 of 292
13.16 Library Clean Up
Depending on your use of exSILentia® v4, it is possible that the various libraries collect unused items. For
example, when you are modeling a SIF and remove a Sensor Group from a SIF after concluding that it is
identical to one you already modeled or if the sensor group represents an auxiliary action, the extra
sensor group may remain in the library. Several of the library views will have clean up function that will
remove any item in that library that is not used within the project, e.g. orphaned sensor groups. To
initiate the clean up action, you can click on the broomstick icon. exSILentia® will then determine
which entries in the library are not used and provide you with a message box asking for confirmation
that you want to remove the unused library items.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 103 of 292
Chapter 14 Embedded Databases
Consistency and efficiency during the execution of the various Safety Lifecycle tasks revolves around the
use and availability of reliability data. exSILentia® is equipped with two embedded databases. These are:
l LOPA database
l SERH database
The embedded databases are accessible through the respective tools that they are used in. In addition
they can be accessed from the exSILentia® v4 Dashboard.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 105 of 292
14.1.1 exida LOPA Database
The exida LOPA database is a read-only database with initiating event frequencies and independent
protection layer probabilities of failure on demand. The data is evaluated by exida and deemed
applicable for use in process industry layer of protection analysis. The exida LOPA database is
automatically installed on your system with the exSILentia® v4 installation. Updates to this database will
be included in exSILentia® v4 updates. Note that there is no data specified for enabling conditions and
conditional modifiers in the exida LOPA database as these are application specific.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 106 of 292
14.1.4 Managing LOPA Database Items
You can review LOPA database entries by clicking on the LOPA icon on the exSILentia® v4 Dashboard
which will launch the LOPA Database Editor dialog. When you select the Generic LOPA database or User
Defined Data LOPA Database Data Source you will be able to maintain the respective entries, i.e. add,
modify or delete a database items. The management of a protection layer, enabling condition,
conditional modifier, or initiating event database item is identical, you just need to make sure you have
selected the appropriate LOPA Database tab.
This includes Fire and Gas, Flame Monitoring, Flow, Level, Pressure, Proximity, and Temperature
measurements
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 107 of 292
Volume 02: Logic Solvers and Interface Modules
This includes Barriers, Surge protection devices, Relays, logic solvers, Fire and Gas Systems, and
solenoid drivers
This includes Final Element interfaces such as solenoids and digital valve positioners, Pneumatic
interfaces such as Quick Exhaust valves, Actuators, Valves such as ball, butterfly, gate, etc. valves, and
Gas Pressure Regulating Valves.
You can access the SERH database by clicking on the SERH icon on the exSILentia® v4 Dashboard. This
will launch the SERH database window. Within the window you can search, sort, filter etc. to view the
equipment items in the database.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 108 of 292
By expending the right hand side bar, you will be able to view the SERH data page for the equipment
item that you selected.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 109 of 292
Chapter 15 Upgrading from exSILentia® v3
This chapter provides an overview of differences between the exSILentia® v3 and exSILentia® v4
software. exSILentia® v4 can open exSILentia® v3 format project files, but will at that point convert the
project information to the new exSILentia® v4 format. In most cases the conversion is one- to- one
between the two versions of the software, however in some cases the structure of the two versions differ
which require a specific conversion algorithm to be implemented. For each of the exSILentia® v3 tools an
overview is provided on how information is converted for which there is no direct one- to- one
relationship with an exSILentia® v4 data item.
When you upgrade your exSILentia® v3 project to the exSILentia® v4 format, a log will be created of all
conversion actions taken. The log will be embedded as a reference in the exSILentia® v4 project. In
addition the original exSILentia® v3 project file will be embedded as a reference as well.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 111 of 292
15.2.1 PHAx™ v2
The PHAx™ component of exSILentia® v3 was available as a standalone product. This standalone product
was PHAx™ v2. To convert a PHAx™ v2 project to the exSILentia® v4 PHAx module, simply open a PHAx™
v2 project file. On the project open dialog, see section 4.2 Launching the Program, select the PHAx 2
Project (.pxi) file type and then select the appropriate project file.
The PHAx™ v2 project information is completely converted to exSILentia® v4.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 112 of 292
15.4.3 Hazard Matrix
The exSILentia® v3 Hazard Matrix tolerable risk calibration is directly copied into the exSILentia® v4 Risk
Configuration Risk Matrix. The Hazard Matrix method is renamed to Risk Matrix. To review the
exSILentia® v4 Risk Configuration click on the Risk Configuration button on the Dashboard, see Chapter 9
Project Risk Configuration.
The exSILentia® v4 SILect™ module supports the Risk Matrix SIL Target Selection method. When
converting an exSILentia® v3 project that uses this SIL Target Selection method, the individual SIF
selections will be placed in a temporary container, embedded in the project file. Upon release of the
SILect™ module the data conversion will be completed.
The Health and Safety Executive, IEC 61511-3, Annex D, E, and Single Tolerable Risk Quantitative FBT
tolerable risk calibration options are all covered by the Linear Tolerable Risk conversion. These tolerable
risk calibrations are not a direct fit for the exSILentia® v4 Risk Configuration as they only specify a single
target frequency. The actual severity levels are defined through a combination of individual event
consequence and a risk tolerance set per year for each risk receptor. For the conversion of these
tolerable risk calibrations all Severity Levels are determined for each risk receptor while determining the
associated tolerable frequency. For each unique tolerable frequency a Severity Level is defined in the
exSILentia® v4 Risk Configuration. Though the conversion results in an exact match, it is recommended
that you review your SIL Target Selection results upon completion of the conversion.
The Qualitative option of the Single Tolerable Risk calibration option is a close fit for the exSILentia® v4
Risk Configuration. In the conversion a fixed set of 7 Severity Levels is created. The weight factors
specified for the personnel category are used to calculate the tolerable frequency for each severity level.
Generic descriptions are used of the severity level names. If weight factors differ for the different risk
receptors, you should review your SIL Target Selection results upon completion of the conversion.
The Qualitative option of the Tolerable Risk Categories is a direct fit for the exSILentia® v4 Risk
Configuration. Tolerable risk calibration level descriptions are directly copied into the exSILentia® v4
project.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 113 of 292
Tolerable Risk Categories (Quantitative)
The Quantitative option of the Tolerable Risk Categories is a close fit for the exSILentia® v4 Risk
Configuration. The Personnel Fatalities and Personnel Injuries risk receptors are combined into 1
Severity Category. Tolerable risk calibration level descriptions are directly copied into the exSILentia® v4
project.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 114 of 292
exSILentia® v3 Field Conversion Action
Changed from text field to number field. Field is left blank, the v3
Max. Spurious Trip Rate
field text is added to the Notes.
Diagnostics The diagnostic description is added to the Notes.
Notes Added text from fields where a type change occurred from v3 to v4.
The sensor part description is added to the Input / Output
Sensor Part Description
Functional Relationship field.
The logic solver part description is added to the Input / Output
Logic Solver Part Description
Functional Relationship field.
The final element part description is added to the Input / Output
Final Element Part Description
Functional Relationship field.
The following table lists exSILentia® v3 SIF SRS fields that have been renamed or redefined in exSILentia®
v4. The core functionality of these fields has not been affected, the name and/or functionality has been
improved.
exSILentia® v3 Field exSILentia® v4 Field
Desired Proof Test Interval Sensor Part
SIF Test Interval Desired Proof Test Interval Logic Solver Part
Desired Proof Test Interval Final Element Part
Overall Response Time Maximum Response Time SIF
Sensor Part Description
Logic Solver Part Description Input / Output Functional Relationship
Final Element Part Description
The following table lists exSILentia® v3 Process SRS General SIS Requirements fields that are no longer
supported in exSILentia® v4 or whose type changed from exSILentia® v3 to exSILentia® v4. The table also
documents the conversion action applied on these fields.
exSILentia® v3 Field Conversion Action
Action on Logic Solver Fault
Added boiler plate text to field text.
Detection
The boiler plate text and environment conditions text is added to
Environment Conditions
the Other Environmental Extremes field.
The interior equipment environment conditions text is added to the
Interior Equipment Environment
Other Environmental Extremes field.
The exterior equipment environment conditions text is added to
Exterior Equipment Environment
the Other Environmental Extremes field.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 115 of 292
The following table lists exSILentia® v3 Process SRS General SIS Requirements fields that have been
renamed or redefined in exSILentia® v4. The core functionality of these fields has not been affected, the
name and/or functionality has been improved.
exSILentia® v3 Field exSILentia® v4 Field
Environment Conditions
Interior Equipment Environment Other Environmental Extremes
Exterior Equipment Environment
The following table lists exSILentia® v3 Process SRS General SIF Requirements fields that are no longer
supported in exSILentia® v4 or whose type changed from exSILentia® v3 to exSILentia® v4. The table also
documents the conversion action applied on these fields.
exSILentia® v3 Field Conversion Action
Changed from text field to number field. Field is left blank, the v3
Max. Spurious Trip Rate
field text is added to the General SIF Notes.
Changed from text field to list field. Field is left blank, the v3 field
Demand Mode
text is added to the General SIF Notes.
Changed from text field to number field. Field is left blank, the v3
Mission Time
field text is added to the General SIF Notes.
Changed from text field to number field. Field is left blank, the v3
Maximum Response Time Sensor
field text is added to the General SIF Notes.
Maximum Response Time Logic Changed from text field to number field. Field is left blank, the v3
Solver field text is added to the General SIF Notes.
Maximum Response Time Final Changed from text field to number field. Field is left blank, the v3
Element field text is added to the General SIF Notes.
Changed from text field to number field. Field is left blank, the v3
Test Interval
field text is added to the General SIF Notes.
Changed from text field to reference field. Field is left blank, the v3
Design Guidelines
field text is added to the General SIF Notes.
The transmitter low detection description is added to the
Transmitter Low Detection
Transmitter Fail Safe State field.
The transmitter low detection value is added to the Transmitter Fail
Transmitter Low Detection Value
Safe State field.
The transmitter high detection description is added to the
Transmitter High Detection
Transmitter Fail Safe State field.
The transmitter high detection value description is added to the
Transmitter High Detection Value
Transmitter Fail Safe State field.
Diagnostics The diagnostic description is added to the General SIF Notes.
The maintenance override text 1 field is added to the General
Maintenance Override Text 1
SIF Maintenance Override field.
The maintenance override text 2 field is added to the General
Maintenance Override Text 2
SIF Maintenance Override field.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 116 of 292
The following table lists exSILentia® v3 Process SRS General SIF Requirements fields that have been
renamed or redefined in exSILentia® v4. The core functionality of these fields has not been affected, the
name and/or functionality has been improved.
exSILentia® v3 Field exSILentia® v4 Field
Desired Proof Test Interval Sensor Part
Test Interval Desired Proof Test Interval Logic Solver Part
Desired Proof Test Interval Final Element Part
Transmitter Low Detection
Transmitter Low Detection Value
Transmitter Fail Safe State
Transmitter High Detection
Transmitter High Detection Value
Maintenance Override Text 1
General SIF Maintenance Override
Maintenance Override Text 2
The following table lists exSILentia® v3 Process SRS SIF Specific Requirements fields that are no longer
supported in exSILentia® v4 or whose type changed from exSILentia® v3 to exSILentia® v4. The table also
documents the conversion action applied on these fields.
exSILentia® v3 Field Conversion Action
Changed from text field to number field. Field is left blank, the v3
SIF Test Interval
field text is added to the Notes.
Changed from text field to number field. Field is left blank, the v3
Overall Response Time
field text is added to the Notes.
Changed from text field to toggle field with options de-energize to
Protection Method trip and energize to trip. Selection set to de-energize to trip, the
v3 field text is added to the Notes.
Changed from text field to number field. Field is left blank, the v3
Max. Spurious Trip Rate
field text is added to the Notes.
Diagnostics The diagnostic description is added to the Notes.
Notes Added text from fields where a type change occurred from v3 to v4.
Added text from Demand fields where a type change occurred from
Demand Source
v3 to v4.
Changed from text field to number field. Field is left blank, the v3
Demand Rate
field text is added to the Demand Source.
Changed from text field to list field. Field is left blank, the v3 field
Demand Mode
text is added to the Demand Source.
Changed from text field to number field. Field is left blank, the v3
Mission Time
field text is added to the Notes.
The following table lists exSILentia® v3 Process SRS SIF Specific Requirements fields that have been
renamed or redefined in exSILentia® v4. The core functionality of these fields has not been affected, the
name and/or functionality has been improved.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 117 of 292
exSILentia® v3 Field exSILentia® v4 Field
Desired Proof Test Interval Sensor Part
SIF Test Interval Desired Proof Test Interval Logic Solver Part
Desired Proof Test Interval Final Element Part
Overall Response Time Maximum Response Time SIF
CAUTION: It is unrealistic to expect that SILver in exSILentia® v4 will yield the same results as
SILver in exSILentia® v3 due to the change in logic solver channel and module handling as well as
potential for updated failure rate data.
The following table lists exSILentia® v3 SILver™ fields or selections that are no longer supported in
exSILentia® v4. The table also documents the conversion action applied on these fields and if the
conversion action could impact the calculated SIL verification results of the SIF.
SIFs
exSILentia® v3 Field/Selection Conversion Action
Impacted
Architectural Constraints: Use IEC 61511 Architectural Constraints selection is changed
Yes
tables [ignore 11.4.3 for Type A devices] to Use IEC 61511 Tables per IEC 61511-1:2016.
Architectural Constraints selection is changed
Architectural Constraints: Use IEC 61511 Yes
to Use IEC 61508 Tables per IEC 61511-1:2016.
Architectural Constraints selection is changed
to Use IEC 61508 Tables per IEC 61508-2:2010
Architectural Constraints: Use IEC
in accordance with IEC 61511- 1:2016 clause Yes
61508:2000
11.4.3, you should review the SILver results for
the affected SIFs.
The selection is no longer supported. The
modeling of all application level tests will be
Application Test Method - IEC 61508:2010 No
done using the IEC 61508:2010 modeling
methodology.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 118 of 292
SIFs
exSILentia® v3 Field/Selection Conversion Action
Impacted
The selection is no longer supported. The
modeling of all application level tests will be
Application Test Method - IEC 61508:2000 Yes
done using the IEC 61508:2010 modeling
methodology.
Change to 1oo1 voting and set Trip on
Sensor Group Voting: 1oo1D No
Transmitter Fault to Yes
Change to 1oo2 voting and set Trip on
Sensor Group Voting: 1oo2D No
Transmitter Fault to No
The following table lists exSILentia® v3 SILver™ fields that have been renamed in exSILentia® v4. The
functionality of these fields has not been affected, the name and/or description has been improved.
exSILentia® v3 Field exSILentia® v4 Field
Maintenance Capability Index Site Safety Index
Architectural Constraints: Use IEC 61508:2010
IEC 61511-1 11.4.5, IEC 61508:2010 tables
tables [per 61511-1 11.4.5]
Architectural Constraints: Use IEC 61511 tables IEC 61511-1 tables 5 & 6
Sensor Group Configuration: Alarm setting Transmitter Fault Direction
Sensor Group Configuration: Over/Under Range Out of Range Detection
Sensor Group Configuration: Alarm Filter Transmitter Fault Filter
Sensor Group Configuration: Alarm Voted as Trip Trip on Transmitter Fault
The following table lists specific exSILentia® v3 to exSILentia® v4 SILver™ conversion actions including if
the conversion action could impact the calculated SIL verification results of the SIF.
SIFs
Conversion Action exSILentia® v3 to v4 Conversion Step Description
Impacted
The v3 to v4 converter only converts the automatically
Logic Solver I/O Channel Count determined number of I/O channels due to a Yes
restructuring of the I/O channel handling.
The v3 to v4 converter attempts to convert the v3 string
Tag EU Low to a Decimal value in v4. If the converter is not No
successful the Range Low value in v4 will be left empty
The v3 to v4 converter attempts to convert the v3 string
Tag EU High to a Decimal value in v4. If the converter is not No
successful the Range High value in v4 will be left empty
The v3 to v4 converter attempts to convert the v3 string
Tag Trip Limit to a Decimal value in v4. If the converter is not No
successful the Limit value in v4 will be left empty
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 119 of 292
15.7 Lifecycle Cost Estimator
The exSILentia® v4 Lifecycle Cost Estimator module functionality is an extension of the Lifecycle Cost
Estimator functionality in exSILentia® v3. All information is converted into the new exSILentia® v4
functionality.
The exSILentia® v4 Lifecycle Cost Estimator module is currently not yet released. exSILentia® v4 will
support all exSILentia® v3 Lifecycle Cost Estimator fields. Therefore no specific conversion actions are
taken. When converting an exSILentia® v3 project with configured Lifecycle Cost Estimator data, the data
will be placed in a temporary container, embedded in the project file. Upon release of the Lifecycle Cost
Estimator module the data conversion will be completed.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 120 of 292
Part 3
Modules
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 121 of 292
Chapter 16 PHAx™
The PHA tab navigates to the exSILentia® v4 process hazard analysis tool PHAx™. Availability of the
PHA tab, and therefore the PHAx™ tool, is based on your exSILentia® v4 license (see Chapter 1
Introduction for an overview of the exSILentia® v4 license options). The PHAx™ tool allows process hazard
analysis to be performed using the Hazard and Operability (HAZOP) methodology.
16.1 Introduction
The HAZOP functionality in the PHAx™ tool uses a spreadsheet type interface with defined columns for
the various HAZOP items.
In the subsequent sections the PHAx™ tool hierarchy, the worksheet, and its reporting capability will be
explained.
16.2 Hierarchy
The hierarchical top level for an exSILentia® v4 project is a plant. Within the plant level several units can
be defined and within the unit level nodes can be defined. Deviations which are the cornerstone of the
HAZOP methodology are defined for each node.
l Plant (exSILentia® v4 project)
l Units
l Nodes
l Deviations
16.2.1 Units
A unit allows division of an exSILentia® v4 project plant.
To add a Unit:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 123 of 292
l Click on the green plus (+) symbol in the Unit row
l Edit the Unit Properties, i.e. Name, select the Plant Type from the drop down box (optional), and
select the Process Type from the drop down box (optional)
l See section 8.1 for more information on Plant and Process Types
Note: The default value for Plant Type is Unknown . The Process Type field will remain blank
without drop down box selections until a Plant Type has been defined.
Upon completion of all study items associated with a particular unit, the Complete check box can be
checked. The box to the far right of the unit will turn orange and show a green bold check mark.
To navigate between units you can use the navigation tree in the left hand side bar, click the Unit drop
down box and select the desired Unit, or click on the up or down icons until the applicable Unit is
selected.
To modify a Unit:
l Highlight the Unit
l Click the icon
l Edit the Unit Properties, i.e. Name, select the Plant Type from the drop down box (optional), and
select the Process Type from the drop down box (optional)
To delete a Unit:
l Highlight the Unit
l Click on the red minus (-) symbol in the Unit row
l Click Yes to confirm you want to delete the Unit
l This will remove that Unit, its Unit Properties, and all associated data
16.2.2 Nodes
A HAZOP Node represents a specific section of the plant unit system in which (the deviations of ) the
design/process intent are evaluated.
To add a Node:
l Select the Unit where the node will be added
l Click on the green plus (+) symbol in the Node row
l Edit the Node Properties, i.e. Name, Node Intention, and Comments (optional)
l To take advantage of Smart Deviations:
l Check the Smart Deviation check box
l Within the Node Window, select the node type from the drop down box that aligns with
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 124 of 292
l Highlight the Node
l Click the icon
l Edit the Node Properties, i.e. Name, Node Intention, and Comments (optional)
To delete a Node:
l Highlight the Node
l Click on the red minus (-) symbol in the Node row
l Click Yes to confirm you want to delete the Node
l This will remove that Node, its Node Properties, and all associated data
You can link references from the reference library (see section 13.4 for more information on the
Reference Library) to a Node by clicking on the link Icon and selecting a reference from the list of
available references. Once a reference is linked, you can click on the red minus (-) symbol to remove the
link.
16.2.3 Deviations
A HAZOP Node Deviation is a way in which the process conditions may depart from its design/process
intent. It is created by combining guide words with process parameters resulting in a possible deviation
from design intent.
If you selected the Smart Deviations check box when defining the Node the deviations associated with
the specific Node Type will be automatically defined for the Node. The following steps can be used if you
did not use Smart Deviations or want to add or modify the Smart Deviations. You will also be able to
delete a smart deviation if it is not applicable to the Node, however to document that you considered
the specific deviation it is better to leave it in the project and mark it as not applicable.
To add a Deviation:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 125 of 292
l Select the Node where the deviation will be added
l Click on the green plus (+) symbol in the Deviation row
l Edit the Deviation Properties, i.e. Name and Design Intent
Upon completion of all study items associated with a particular deviation, the Complete check box can
be checked. The box to the far right of the deviation will turn orange and show a green bold check mark.
If for a deviation no causes or consequences of no significance are found, then the “No Issues” check box
can be checked. This will document “No Issues Found ” on the worksheet.
To navigate between deviations you can use the navigation tree in the left hand side bar, click the
Deviation drop down box and select the desired Deviation within a Node, or click on the up or down
icons until the applicable Deviation is selected for the selected Node.
To modify a Deviation:
l Highlight the Deviation
l Click the icon
l Edit the Deviation Properties, i.e. Name and Design Intent
To delete a Deviation:
l Highlight the Deviation
l Click on the red minus (-) symbol in the Deviation row
l Click Yes to confirm you want to delete the Deviation
l This will remove that Deviation, its Deviation Properties, and all associated data
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 126 of 292
16.3.1 Cause
PHAx™ causes are comprised of four related data fields, i.e. ID, Description, Cause Category, and Cause
Likelihood. The Cause ID is automatically generated and assigned to ensure relational data integrity. If
more than one Likelihood Category was defined in the Risk Matrix, a drop down list will allow you to
select the applicable Cause Category. The Cause Likelihood is intended to be the likelihood with NO
Safeguards or the scenario where all safeguards have failed. When combining the Cause Likelihood with
the Consequence Severity a Risk Without Safeguards is obtained from the Risk Matrix. The Cause
Likelihood is selected from a drop down list of likelihoods configured within the Risk Matrix. The list that
appears is based on the associated Cause Category.
To add a Cause:
l Click on the Add Cause button at the bottom of the HAZOP worksheet
l Edit the Cause Properties, i.e. Description, Cause Category, and Cause Likelihood
l Once a Cause Description has been entered you can click the Enter key on your keyboard to add
a new Cause
To delete a Cause:
l Highlight the Cause ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Cause is really to be deleted
CAUTION: Deleting a Cause will delete all consequences, safeguards, and recommendations that
are related to it.
16.3.2 Consequence
PHAx™ consequences are comprised of five related data fields, i.e. ID, Description, Consequence
Category, Severity, and Risk. The Consequence ID is automatically generated and assigned to ensure
relational data integrity. If more than one Consequence Category was defined in the Risk Matrix, a drop
down list will allow you to select the applicable Category. The Consequence Severity is selected from a
drop down list that is based on the Consequence Category selected. The Risk, representing the risk
without safeguards, is automatically determined based on the Risk Matrix given the Cause Likelihood
and Consequence Severity selected.
To add a Consequence:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 127 of 292
l Click on the Add Consequence button that is in line with the Cause that you want to add the
Consequence to.
l Enter Consequence Description, and choose the Severity Categories that apply. Multiple severity
categories can be attributed to one consequence. For each applicable category, choose the
severity from the drop down and the tool will show the applicable Risk from the Risk
Configuration.
l If you often analyze all severity categories, select the 'Severity Categories Start as
Applicable' check box. In this case all severity categories will be automatically selected
(buttons will be orange), and you can indicate if any are not applicable (button will appear
gray). If you would like to hide categories that do not apply select the 'Hide Non
Applicable Severity Categories' check box.
l If you often analyze one severity category at a time, leave the 'Severity Categories Start as
Applicable' check box unchecked. In this case the categories are not applicable by default
(buttons will be gray), and you can indicate which are applicable (button will appear
orange).
l If you prefer, you can select 'Ask for Severity Categories', and the tool will allow you to
select applicable categories from a window upon adding each new consequence.
l Once a Consequence Description has been entered you can click the Enter key on your keyboard
to add a new Consequence
To delete a Consequence:
l Highlight the Consequence ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Consequence is really to be deleted
CAUTION: Deleting a Consequence will delete all safeguards and recommendations that are
related to it.
16.3.3 Safeguards
PHAx™ safeguards are comprised of four related data fields, i.e. ID, Description, Safeguard Tag, and
Safeguard Category. The Safeguard ID is automatically generated and assigned to ensure relational data
integrity. The Safeguard Tag can be used to uniquely identify a specific Safeguard within a process plant.
The Safeguard Tag also enables links to the Safeguard from other applications. The Safeguard Category
is selected from a drop down list. Categorizing Safeguards allows for enhanced safeguard reporting.
Furthermore Safeguard Category specific process safety information can be specified by clicking on the
Category Icon. In addition to the four data fields identified above, Custom Data/process safety
information data fields can be configured in the Custom Data section within the Project Configuration
(see section 8.7 ).
To add a New Safeguard:
l Click on the Add Safeguard button that is in line with the Consequence that you want to add the
Safeguard to
l Edit the Safeguard Properties, i.e. Description, Safeguard Tag, and Safeguard Category
l Once a Safeguard Description has been entered you can click the Enter key on your keyboard to
add a new Safeguard
To add a Safeguard directly from the Safeguard Library:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 128 of 292
l Click on the Link Safeguard Icon
l For ease, search the safeguard library using the search bar at the bottom of the link window. This
will search all attributes of the safeguard including name, tag, and type as well as any labels
applied to the safeguard.
l Highlight the Safeguard to add
l Click on Add
To delete a Safeguard:
l Highlight the Safeguard ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Safeguard is really to be deleted
Note: When a Safeguard is deleted and it is the last place where it is used, you will be asked if you
want to permanently delete the Safeguard from the Library. Click Yes or No as applicable.
To edit the Custom Data/process safety information for a safeguard, click on the icon. The applicable
Custom Data entry form will appear.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 129 of 292
16.3.4 Safeguard Labels
User defined labels can be defined in the library under the labels entry. The label name, description and
label color can be configured there. To apply labels to a safeguard, navigate to the safeguard library, and
view the safeguard. At the bottom of the safeguard view, select the label button and apply the
appropriate labels from the list. There is no limit to the number of labels applied to a safeguard.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 130 of 292
16.3.7 Recommendations
PHAx™ recommendations are comprised of six related data fields, i.e. ID, Description, Category, Assigned
to, Due Date, and Status. The Recommendation ID is automatically generated and assigned to ensure
relational data integrity. The Recommendation Category is selected from a drop down list. Categorizing
Recommendation allows for easy recommendation sorting and reporting. The Assigned to is selected
from a drop down list. The list is populated with Member names that can be configured from the
Dashboard (see section 6.6 ). The Due Data is selected from the pop-up calendar. The Status is selected
from a drop down list where Open is the default value.
To add a New Recommendation:
l Click on the Add Recommendation button that is in line with the Consequence that you want to
add the Recommendation to
l Edit the Recommendation Properties, i.e. Description, Category, Assigned to, Priority,Due Date, and
Status
l Once a Recommendation Description has been entered you can click the Enter key on your
keyboard to add a new Recommendation
To add a Recommendation directly from the Recommendation Library:
l Click on the Link Recommendation Icon
l Highlight the Recommendation to add
l Click on Add
To delete a Recommendation:
l Highlight the Recommendation ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Recommendation is really to be deleted
16.3.8 LOPA
The LOPA column allows the PHA team to record if a detailed Layer of Protection Analysis (LOPA) is
required for a specific Cause-Consequence pair scenario. The drop down list allows a Yes, No, or N/A
(default) selection. When a Cause- Consequence pair scenario is to be further evaluated it can be
assigned to a Hazard Scenario. To add, edit, or remove a Hazard Scenario click on the Hazard Scenario
icon .
Note: The Cause-Consequence pair will only be available for further evaluation in the LOPAx™
worksheet if the LOPA drop down box selection is Yes, even when the Cause-Consequence pair is
assigned to a Hazard Scenario.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 131 of 292
l Highlight the applicable Hazard Scenario
l Click on the Left arrow
To remove a Hazard Scenario from a Cause-Consequence pair:
l Highlight the assigned Hazard Scenario
l Click on the Right arrow
16.3.9 Comments
Comments can be edited directly in the Comments text box. A Comment is associated with a single
Cause. To delete a comment, highlight the text and click on the Delete key on your keyboard.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 132 of 292
16.4.1 Tree Hierarchy / Navigation
The PHAx™ Navigation Tree allows a quick glance at the project hierarchy from the Unit all the way down
to the Safeguards, Recommendations, and Hazard Scenarios. In addition it allows rapid navigation
throughout the project by double clicking on any entry. The Navigation Tree also has Expand and
Contract buttons to allow a portion of the hierarchy to be expanded or collapsed. This allows for quick
reference to make changes without having to navigate back and forth repeatedly. This also ensures that
you can compare entries rather quickly by switching the selection back and forth.
Note: If you are in the middle of a drag and drop operation and you wish to abort you can press
the escape (ESC) key on your keyboard to abort the operation.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 133 of 292
Drag Drop On Operation
Recommendation Consequence Moves Recommendation to the end of the Recommendation list
within the Consequence. Since a Recommendation is a Library
item, the link to the old Consequence will be replaced with a
link to the new Consequence.
Recommendation Recommendation Not permitted. The order of the Recommendations within a
Consequence is chronological, this list is not sorted and cannot
be reordered.
Hazard Scenario Consequence Moves Hazard Scenario to the end of the Hazard Scenario list
within the Consequence. Since a Hazard Scenario is a Library
item, the link to the old Consequence with be replaced with a
link to the new Consequence.
Hazard Scenario Hazard Scenario Not permitted. The order of the Hazard Scenarios within a
Consequence is chronological, this list is not sorted and cannot
be reordered.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 134 of 292
16.5.1 HAZOP Worksheet Column Widths
When using the PHAx™ tool HAZOP worksheet, the number of columns in the worksheet and the width of
your screen can result in not all columns being displayed on your screen. Scrolling left and right to be
able to view the respective columns can be inconvenient during a PHA session. PHAx™ allows you to
adjust the width of each column on the HAZOP worksheet by placing the cursor over a vertical line
between column headings and drag left or right until the column is the desired width.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 135 of 292
16.5.4 Worksheet Search, Back, Forward and Bookmarks
The PHA worksheet allows the user to search the entire PHA using the Search Button in the header, next
to the Nodes. To find a particular item in the worksheet, the user can select the Search button and enter
the name, description, or tag they are looking for. This will show the all places the item is found and
allow the user to select an entry and navigate to it.
The PHA worksheet allows the user to move back and forward to the previous deviations analyzed. It
also allows the user to set bookmarks at any unit, node, deviation, cause, consequence, safeguard or
recommendation. This makes it possible to navigate easily to specific places in the worksheet. To set a
bookmark, the user can select a location, right click and select bookmark from the menu. To find a
bookmark select the Bookmark button in the header, next to the search button. This will show all
bookmarks, allowing the user to choose a location by double clicking the specific bookmark.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 136 of 292
The Report Options allow you to Filter the Team Members in the report as well as specify the and Unis
and Nodes that should be included in the report. In addition you can choose which introductory sections
should be included in the report. Finally, you can indicate what columns should be included in the
HAZOP worksheets in the report as well as if empty Nodes and Deviations should be included or
Deviations that are marked "No Issue".
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 137 of 292
Data
Category Field Name Valid Values Required
Type
Deviation Name String X
Design Intent String
Deviation "TRUE", "T", "YES", "FALSE", "F", "NO"
Complete String
Blank or not specified is unchecked
"TRUE", "T", "YES", "FALSE", "F", "NO"
No Issues String
Blank or not specified is unchecked
Cause Name String X
Matches Code field in Likelihood
Cause Category String
Categories
Cause
Matches Code field in Likelihood
Likelihood String
Levels
Frequency Decimal
Consequence Name String X
Matches Code field in Severity
Severity Category String
Category
Severity String Matches Code field in Severity Levels
Consequence
String
Consequence Comments
Likelihood w/ Matches Code field in Likelihood
String
Safeguards Levels
"TRUE", "T", "YES", "FALSE", "F",
LOPA String
"NO", "N/A"
Hazard Scenario String
Safeguard Name String X
Safeguard
String
Description
Safeguard Tag String
Matches Code property in Safeguard
Safeguard Category String Category within the Project
Configuration
Safeguards "TRUE", "T", "YES", "FALSE", "F", "NO"
Note: Requires Safeguard Category to
Safeguard is SIF String
be selected that has its Category Type
set to IPF
List of one or more references
Safeguard Reference String
delimited by a semicolon ‘;’
Safeguard
String
Comments
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 138 of 292
Data
Category Field Name Valid Values Required
Type
Recommendation
String X
Name
Recommendation
String
Description
Matches Code property in
Recom. Category String Recommendation Category within the
Project Configuration
Recommendations
Recom. Assigned To String "Firstname Lastname"
Recom. Due Date Date
Matches Code property in
Recom. Status String Recommendation Status within the
Project Configuration
Recommendation
String
Comments
A dialog will appear. Click on the button Open File to Import. The file types that you can select include
.xls, .xlsx, .xlsm and .csv. You may select more than one file to import. See the next section on the
template. If you want to reuse existing Nodes, Deviations, Causes and Consequences check that box
prior to importing. This setting will always default to unchecked.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 139 of 292
After the import completes you should see the tree view populated with your imported items as shown
below in this example import.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 140 of 292
16.8 PHAx™ Data Export
In order to export PHAx™ data select the Export Data button from the Dashboard, this will launch the
Export Wizard. The Export Wizard will show applicable Export Selections, i.e. Action Item, Comprehensive,
Hazard Scenario , Member , Parking Lot Item , Recommendation , Recommendation Sign off , Reference ,
Safeguard, and Session.
When you select any of the PHAx™ export selections, except the Comprehensive option, and click on
Export Selected, the relevant data will be exported to a MS Excel Worksheet creating a single Workbook
for each selected export item. If you select the Comprehensive export selection a single Workbook will be
generated with worksheets for each of the individual selection options except for the Parking Lot Items.
In some cases when you use the export data function, you may be asking for a particular export
selection to be generated while no data is available for that option. exSILentia® v4 will in that case not
create a Workbook or Worksheet for that item. If you however wish that even empty Workbooks or
Worksheets are generated you can select the Create Worksheets Even When No Data Available option.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 141 of 292
Chapter 17 LOPAx™
The LOPA tab navigates to the exSILentia® v4 layer of protection analysis tool LOPAx™. Availability of the
LOPA tab, and therefore the LOPAx™ tool, is based on your exSILentia® v4 license (see Chapter 1
Introduction for an overview of the exSILentia® v4 license options). The LOPAx™ tool allows layer of
protection analysis to be performed using a Hazard Scenario basis with multiple initiating events and
variable effectiveness of protection layers for each initiating event and each Severity Category.
17.1 Introduction
The layer of protection analysis functionality in the LOPAx™ tool uses a spreadsheet type interface that
enables the specification of multiple Initiating Events (IE) and their associated Enabling Conditions (EC),
Independent Protection Layers (IPL), and Conditional Modifiers (CM).
In the subsequent sections the LOPAx™ worksheet, its embedded risk reduction calculations
functionality, and its reporting capability will be explained. The available interfaces with the PHAx™ tool
will also be addressed.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 143 of 292
17.2 LOPA Worksheet
The LOPAx™ tool layer of protection analysis worksheet uses a spreadsheet type interface for the
evaluation of each Hazard Scenario. This provides a clear overview of the applicable initiating events
and protection layers for the respective Severity Categories. Within the worksheet interface buttons exist
for adding Initiating Events (IE), Enabling Conditions (EC), Independent Protection Layers (IPL), and
Conditional Modifiers (CM) to the LOPA Worksheet for a specific Hazard Scenario. Applicability of a EC,
IPL, and/or CM can be edited directly in the worksheet. As the Initiating Events, Enabling Conditions,
Independent Protection Layers, and Conditional Modifiers are part of the Project Libraries (see Chapter
13 Project Libraries) they can be linked to existing items. The LOPA worksheet consists of three main
areas: the toolbar, the Hazard Scenario list, and the workspace.
An example of the LOPAx™ tool layer of protection analysis worksheet is shown in the figure below.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 144 of 292
To delete a Hazard Scenario:
l Select the Hazard Scenario in the Hazard Scenario list
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Hazard Scenario is really to be deleted
CAUTION: Deleting a Hazard Scenario will delete all instances where the Hazard Scenario was
used. This will include any linking done in the PHAx™ tool.
You can also define the target frequencies based on severity levels associated with the Hazard Scenario.
You can change this basis for the target frequencies by clicking on the User Defined button in the header
.
The target frequencies that are used in this case are linked to the severity levels as defined earlier in the
Risk Configuration, see section 9.1 Consequence Categories and Severity Levels.
When transferring data from PHA to LOPA, see section 17.4 Hazard Scenario Data Transfer from PHAx™,
the target frequencies will be automatically defined based on the severity level selections related to the
Hazard Scenario. Again in this case, the target frequencies that are used were defined earlier in the Risk
Configuration, see section 9.1 Consequence Categories and Severity Levels.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 145 of 292
17.2.3 Initiating Events (IE)
An initiating event represents the start of a Hazard Scenario sequence. During the process hazard
analysis, Initiating Events are referred to as Causes. Though the label is different, in PHAx™and LOPAx™
the cause and initiating event entities are the same.
To add a new Initiating Event:
l Click on the Add IE button at the upper left hand corner of the toolbar
l This will immediately add the Initiating Event to the LOPAx™ Worksheet
l This will also add the Initiating Event to the Causes (Initiating Events) library
To edit the Initiating Event Name:
l Double click the initiating event name in the worksheet, or
l Right click on the initiating event in the worksheet and select View
To add an Initiating Event directly from the Causes (Initiating Events) Library:
l Click on the Link Initiating Event Icon
l Highlight the Initiating Event(s) to add
l Click on Link Selected
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 146 of 292
To delete an Initiating Event:
l Highlight the Initiating Event
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Initiating Event is really to be deleted
Note: When an Initiating Event is deleted and it is the last place where it is used, you will be asked
if you want to permanently delete the Initiating Event from the Library. Click Yes or No as
applicable.
When you add an initiating event a default initiating event frequency of 1 per year is associated with the
initiating event. This value can of course be update as needed. There are two ways to update the
associated initiating event frequency, you can
l Directly edit the frequency within the workspace, or
l Reference one of the LOPA databases, see section 14.1 LOPA Database regarding the source or
population of these databases
To directly edit the frequency within the workspace:
l Highlight the Initiating Event frequency value
l Type in the applicable value (frequency must be per year)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 147 of 292
To obtain data from one of the LOPA databases:
l
Click on the database icon
l Select the applicable initiating event from the database
l Click on Apply Data
l A warning message will appear asking for confirmation to overwrite any existing data
l Upon confirmation, the applicable initiating event frequency, assumptions, comments, and
reference will be copied to the selected Initiating Event
Note: When an Initiating Event is used in multiple locations, changing its properties (including the
initiating event frequency) will impact all locations where that initiating event is used.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 148 of 292
l Click on the Link Enabling Condition Icon
l Highlight the Enabling Condition(s) to add
l Click on Link Selected
To delete an Enabling Condition:
l Highlight the Enabling Condition
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Enabling Condition is really to be deleted
Note: When an Enabling Condition is deleted and it is the last place where it is used, you will be
asked if you want to permanently delete the Enabling Condition from the Library. Click Yes or No
as applicable.
When you add an Enabling Condition a default probability of the situation occurring of 1 is associated
with the Enabling Condition. In addition the Enabling Condition is set to be Not Applicable (NA) to all
Initiating Events in the LOPAx™ Worksheet. Applicability and probability of the situation occurring can be
update as needed. To change the applicability of an enabling condition to a specific initiating event,
simply double click the intersection of enabling condition and initiating event. The NA will then change
to the probability associated with the enabling condition.
There are two ways to update the Enabling Condition probability, you can
l Manually edit the probability, or
l Reference one of the LOPA databases, see section 14.1 LOPA Database regarding the source or
population of these databases
To manually edit the probability:
l Click on the Edit icon when hovering over the Enabling Condition or right click on the Enabling
Condition in the worksheet and select View
l Type in the applicable value (probability must range from 0 to 1)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 149 of 292
To obtain data from one of the LOPA databases:
l
Click on the database icon
l Select the applicable Enabling Condition from the database
l Click on Apply Data
l A warning message will appear asking for confirmation to overwrite any existing data
l Upon confirmation, the applicable Enabling Condition probability, assumptions, comments, and
reference will be copied to the selected Enabling Condition
Note: When an Enabling Condition is used in multiple locations, changing its properties (including
the enabling condition probability) will impact all locations where that enabling condition is used.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 150 of 292
l Highlight the Independent Protection Layer
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Independent Protection Layer is really to be deleted
Note: When an Independent Protection Layer is deleted and it is the last place where it is used,
you will be asked if you want to permanently delete the Independent Protection Layer from the
Library. Click Yes or No as applicable.
When you add an Independent Protection Layer a default probability of failure of 1 is associated with the
Independent Protection Layer. In addition the Independent Protection Layer is set to be Not Applicable
(NA) to all Initiating Events in the LOPAx™ Worksheet. Applicability and probability of failure can be
update as needed. To change the applicability of an independent protection layer to a specific initiating
event, simply double click the intersection of independent protection layer and initiating event. The NA
will then change to the probability associated with the enabling condition.
There are three ways to update the Independent Protection Layer probability, you can
l Manually edit the probability, or
l Reference one of the LOPA databases, see section 14.1 LOPA Database regarding the source or
population of these databases
l Use the achieved Risk Reduction from the SILver tool, see Chapter 20 SILver™, if the IPL is a SIF
To manually edit the probability:
l Click on the Edit icon when hovering over the Independent Protection Layer or right click on
the Independent Protection Layer in the worksheet and select View
l Type in the applicable value (probability must range from 0 to 1)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 151 of 292
To obtain data from one of the LOPA databases:
l
Click on the database icon
l Select the applicable Independent Protection Layer from the database
l Click on Apply Data
l A warning message will appear asking for confirmation to overwrite any existing data
l Upon confirmation, the applicable Independent Protection Layer probability, assumptions,
comments, and reference will be copied to the selected Independent Protection Layer
Note: When an Independent Protection Layer is used in multiple locations, changing its properties
(including the independent protection layer probability) will impact all locations where that
enabling condition is used.
To use the achieved Risk Reduction from the SILver tool for a SIF:
l Click on the Edit icon when hovering over the Independent Protection Layer or right click on
the Independent Protection Layer in the worksheet and select View
l
Click on the SILver icon
l The calculated achieved Risk Reduction will be copied to the LOPA probability of failure/Risk
Reduction
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 152 of 292
17.2.6 Conditional Modifiers (CM)
A conditional modifier is typically defined as one of the three independent factors of probability of
ignition, probability of occupancy, and probability of injury, i.e. probabilities generally associated with
the post incident part of an incident sequence.
To add a new Conditional Modifier:
l Click on the Add CM button at the upper left hand corner of the toolbar
l This will immediately add the Conditional Modifier to the LOPAx™ Worksheet
l This will also add the Conditional Modifier to the Conditional Modifiers library
To edit the Conditional Modifier Name:
l Double click the Conditional Modifier name in the worksheet, or
l Click on the Edit icon when hovering over the Conditional Modifier, or
l Right click on the Conditional Modifier in the worksheet and select View
To add a Conditional Modifier directly from the Conditional Modifier Library:
l Click on the Link Conditional Modifier Icon
l Highlight the Conditional Modifier(s) to add
l Click on Link Selected
To delete a Conditional Modifier:
l Highlight the Conditional Modifier
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Conditional Modifier is really to be deleted
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 153 of 292
Note: When a Conditional Modifier is deleted and it is the last place where it is used, you will be
asked if you want to permanently delete the Conditional Modifier from the Library. Click Yes or No
as applicable.
When you add a Conditional Modifier a default probability of 1 is associated with the Conditional
Modifier. In addition the Conditional Modifier is set to be Not Applicable (NA) to all Initiating Events in
the LOPAx™ Worksheet. Applicability and probability can be update as needed. To change the
applicability of an conditional modifier to a specific initiating event, simply double click the intersection
of conditional modifier and initiating event. The NA will then change to the probability associated with
the conditional modifier.
There are two ways to update the Conditional Modifier probability, you can
l Manually edit the probability, or
l Reference one of the LOPA databases, see section 14.1 LOPA Database regarding the source or
population of these databases
To manually edit the probability:
l Click on the Edit icon when hovering over the Conditional Modifier or right click on the
Conditional Modifier in the worksheet and select edit
l Type in the applicable value (probability must range from 0 to 1)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 154 of 292
l
Click on the database icon
l Select the applicable Conditional Modifier from the database
l Click on Apply Data
l A warning message will appear asking for confirmation to overwrite any existing data
l Upon confirmation, the applicable Conditional Modifier probability, assumptions, comments, and
reference will be copied to the selected Conditional Modifier
Note: When a Conditional Modifier is used in multiple locations, changing its properties (including
the conditional modifier probability) will impact all locations where that conditional modifier is
used.
Given the target frequency specified and the actual frequency calculated a target Risk Reduction Factor
(RRF) for the Hazard Scenario is calculated. If the actual frequency is less than or equal to the target
frequency, the Risk Reduction Factor will state a NA for not applicable, indicating no further risk
reduction is required. The calculated Risk Reduction Factor is input to the SIL Target Selection
performed in the SILect™ tool where a Safety Instrumented Function is to be defined that protects
against the initiating events identified for the Hazard Scenario.
If the Hazard Scenario risk reduction factor indicates that additional risk reduction is needed, LOPAx™
can also determine the required risk reduction for one of more specific Independent Protection Layers.
This is useful for a scenario where one of the independent protection layers identified is a potential
Safety Instrumented Function, rather than assuming a specific target SIL the tool will allow the
calculation of the exact risk reduction required for.
To enable the automatic required risk reduction calculation for a specific independent protection layer:
l Click on the Edit icon when hovering over the Independent Protection Layer, or right click on
the Independent Protection Layer in the worksheet and select edit, and click the Calculator
icon right next to the probably specification fields, or
l Click on the Calculator icon when hovering over the Independent Protection Layer
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 155 of 292
The calculation algorithm will look at the severity category with the worst case difference between
actual and target frequency and use that as the basis for the Risk Reduction Factor calculation.
If you indicate that you want to “calculate probability for multiple independent protection layers,
LOPAx™ will perform a similar calculation assuming that each IPL must provide adequate risk reduction
weighed to the initiating event, or initiating events, they are protecting against.
If the target frequency cannot be met due to the limited applicability of the independent protection
layer, the calculated required risk reduction will be 1, i.e. the probability of failure on demand of the
independent protection layers is assumed to be 1. In this case a target risk reduction will be indicated
for the Hazard Scenario.
An Independent Protection Layer that is marked of type SIF, where risk reduction is required, is
automatically flagged for subsequent activities in the Safety Lifecycle. In this case the calculated Risk
Reduction Factor is simply to be converted into a target SIL during the SIL Target Selection performed in
the SILect™ tool.
17.2.8 Comments
Comments can be edited directly in the Comments text box. A Comment is associated with a single
Initiating Event. To delete a comment, highlight the text and click on the Delete key on your keyboard.
Note that LOPAx Comments are independent of the PHAx Comments.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 156 of 292
17.3.1 LOPA Worksheet Column Widths
When using the LOPAx™ worksheet, the number of columns in the worksheet and the width of your
screen can result in not all columns being displayed on your screen. Scrolling left and right to be able to
view the respective columns can be inconvenient during a LOPA session. LOPAx™ allows you to adjust
the width of each column on the LOPA worksheet by placing the cursor over a vertical line between
column headings and drag left or right until the column is the desired width. LOPAx™ also allows you to
change the width of the navigation list by placing the cursor over the vertical line between the
navigation list and the worksheet area. You can hide or unhide the navigation list by clicking on the line
between the navigation list and the worksheet area.
When opting to review the LOPA analysis for multiple severity categories at the same time the LOPAx™
worksheet can be easily used to determine for which severity categories a protection layer is considered
effective.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 157 of 292
When opting to review the LOPA analysis for a single severity category at a time, the LOPAx™ worksheet
limits the visibility to only those selections that are applicable.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 158 of 292
Once the Apply to All button is used it converts to an Un-Apply fromAll button. Clicking this button
will set all intersection to NA.
Through the available options, you can indicate if you want to include the Safeguard Tag in the
IPL header and if you want the LOPA tool to indicate if the required Risk Reduction from the LOPA does
not meet the achieved Risk Reduction from the SILver analysis of the specific SIF. In this latter case a red
SILver icon will appear for the specific SIF.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 159 of 292
17.4 Hazard Scenario Data Transfer from PHAx™
The exSILentia® v4 integration of Process Safety / Functional Safety software tools allows for seamless
data exchange between the different phases of the Lifecycle. If the Process Hazard Analysis was
performed using PHAx™, Hazard Scenarios were created, and the associated Cause-Consequence pair
was flagged for LOPA evaluation, information from the PHA can be automatically transferred to LOPAx™.
The PHA data is transfer to the LOPA Worksheet as indicated in the table below.
The automatic transferring of data from the PHA to the LOPA worksheet ensures that all relevant
information is transferred. As a user you will still need to determine if PHA identified safeguards are
indeed IPLs and assign the relevant probability of failures. In addition you will need to assign the
applicable frequency to each Initiating Event and review any potential Enabling Condition and/or
Conditional Modifiers.
There are two ways to transfer data from the PHA to the LOPA worksheet, you can transfer data
l for all Hazard Scenarios at once
l for one Hazard Scenario at a time
To transfer data for all Hazard Scenarios at once:
l Select the LOPA tab in exSILentia®
l Click on the Load data from PHA for all Hazard Scenarios button
To transfer data for one Hazard Scenario at a time:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 160 of 292
l Select the LOPA tab in exSILentia®
l Select the desired Hazard Scenario in the Navigation List
l Click on the Load data from PHA for current Hazard Scenario button
When transferring data there are two warning messages that you will need to answer affirmatively. The
first warning advises you that the PHA information will be merged into the existing Hazard Scenario
LOPA information which could delete information that you specified previously.
The second warning advises you that the currently specified target frequency for the Hazard Scenario
will be overwritten.
A message box will appear, allowing you to choose if you want a SIF that is currently in "calculate" mode
to be set to manual entry with the SILver based results or if you would like it to remain in the "calculate"
mode.
To transfer data for one IPL at a time:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 161 of 292
l Select the LOPA tab in exSILentia®
l Select the desired Hazard Scenario in the Navigation List
l Click on the Edit icon when hovering over the Independent Protection Layer or right click on
the Independent Protection Layer in the worksheet and select View
l
Click on the SILver icon
l The calculated achieved Risk Reduction will be copied to the LOPA probability of failure/Risk
Reduction
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 162 of 292
17.8 LOPAx Data Export
In order to export LOPAx™ data select the Export Data button from the Dashboard, this will launch the
Export Wizard. The Export Wizard will show applicable Export Selections, i.e. Action Item , Hazard
Scenario , Member , Parking Lot Item , LOPA , Recommendation , Recommendation Sign off , Reference ,
Safeguard, Session, etc.
When you select the LOPA export option, the relevant data will be exported to a MS Excel Worksheet
creating a single Workbook with worksheets for each Hazard Scenario evaluated in the LOPA. Several
options are available to be included with the LOPA worksheets.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 163 of 292
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 164 of 292
Chapter 18 SILect™
The SILect tab navigates to the exSILentia® v4 Safety Integrity Level (SIL) selection tool SILect™.
Availability of the SILect tab, and therefore the SILect™ tool, is based on your exSILentia® v4 license (see
Chapter 1 Introduction for an overview of the exSILentia® v4 license options). The SILect™ tool supports
determination of the target SIL for each Safety Instrumented Function identified in the LOPA worksheet
that is required to provide risk reduction. The SILect™ tool also supports SIL selection based on the Risk
Graph and Risk Matrix methodologies for those users who do not use the LOPA methodology.
18.1 Introduction
The Safety Integrity Level selection process in the SILect™ tool is rather straight forward. The interface
depends on the type of SIL selection method used, e.g. LOPA, Risk Graph, or Risk Matrix.
In the subsequent sections the SILect™ worksheet, the embedded relationship between Hazard
Scenarios and Safety Instrumented Functions, and its reporting capability will be explained. The
available interfaces with the PHAx™ and LOPAx™ tool will also be addressed.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 165 of 292
18.2 SILect Worksheet
The SILect™ tool safety integrity level target selection worksheet interface depends on the type of SIL
selection method used, e.g. LOPA, Risk Graph, or Risk Matrix (see sections 18.3 , 18.4 , and 18.5
respectively). The SIL target selection is typically performed for each Hazard Scenario individually as you
would want to address multiple initiating events that can lead to the consequence of concern. The
SILect™ tool, however, allows you to look at the SIL selection from both a Hazard Scenario perspective
as well as an individual Instrumented Protection Functions (IPF) / Safety Instrumented Function (SIF)
perspective.
Within the SIL selection worksheet interface buttons exist for adding Hazard Scenarios as well as IPFs.
The Hazard Scenarios and Instrumented Protection Functions are part of the Project Libraries (see
Chapter 13 Project Libraries). The SILect™ worksheet consists of three main areas: the toolbar, the Hazard
Scenario list or IPF list, and the workspace.
An example of the SILect™ tool LOPA based SIL target selection worksheet with a Hazard Scenario focus
is shown in the figure below
An example of the SILect™ tool LOPA based SIL target selection worksheet with an IPF focus is shown in
the figure below.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 166 of 292
18.2.1 Creating Hazard Scenarios
SILect™ Hazard Scenarios are comprised of several data fields including an ID. This Hazard Scenario ID is
automatically generated and assigned to ensure relational data integrity. Other fields that make up a
Hazard Scenario include Name, Description, and Consequence Severity levels. Hazard Scenarios can be
defined manually within the SILect™ tool or obtained from the work previously done using the PHAx™
and LOPAx™ tools. The transferring of data from PHA and/or LOPA to SILect is described in section 18.6
SILect Data Transfer.
To add a Hazard Scenario:
l Click on the Add Hazard Scenario button in the upper left hand corner of the toolbar
l This will immediately add the Hazard Scenario to the Hazard Scenario list
To edit the Hazard Scenario Name:
l Right click on the Hazard Scenario in the Hazard Scenario list and select view
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 167 of 292
To delete a Hazard Scenario:
l Select the Hazard Scenario in the Hazard Scenario list
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Hazard Scenario is really to be deleted
CAUTION: Deleting a Hazard Scenario will delete all instances where the Hazard Scenario was
used. This will include any linking done in the PHAx™ and LOPAx™ tools.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 168 of 292
l Highlight the Instrumented Protection Function
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Instrumented Protection Function is really to be deleted
Note: When an Instrumented Protection Function is deleted and it is the last place where it is used,
you will be asked if you want to permanently delete the Instrumented Protection Function from
the Library. Click Yes or No as applicable.
When you add an Instrumented Protection Function a default Analysis RRF of 1 is associated with the
Instrumented Protection Function in case you use the LOPA SIL selection method. In addition the "Is SIF"
checkbox is unchecked. To define that the instrumented protection function is a SIF, simply click the
checkbox. To specify the LOPA RRF double click the default RRF of 1 and type the appropriate value.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 169 of 292
By changing the SILect™ worksheet view from Hazard Scenario focus to IPF/SIF focus you can look at the
various Hazard Scenarios that a particular SIF is part of. This can help identifying which of the Hazard
Scenarios is driving the target RRF for a specific SIF and provide an easy way to identify for which Hazard
Scenario additional layers of protection may need to be defined.
To review the structure of the risk graph during the SIL selection process, click the eyeball icon .
This will launch a dialog with the risk graphs as defined for each of the severity categories.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 170 of 292
The result from the Risk Graph SIL selection is shown for each IPF/SIF under the heading Target SIL:
l Under the heading 'Category' the resulting Target SIL Level for the Severity Category is shown,
l Under the heading 'Hazard Scenario' the resulting Target SIL Level for the entire Hazard Scenario
is shown. This is the worst case between the different Severity Categories.
l Under the heading 'Overall'; the final resulting Target SIL Level is shown. This is the worst case
between all Hazard Scenarios the SIF is protecting against.
By changing the SILect™ worksheet view from Hazard Scenario focus to IPF/SIF focus you can look at the
various Hazard Scenarios that a particular SIF is part of.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 171 of 292
To review the structure of the risk matrix during the SIL selection process, click the eyeball icon .
This will launch a dialog with the risk matrix as defined for the project.
The result from the Risk Matrix SIL selection is shown for each IPF/SIF under the heading Target SIL:
l Under the heading 'Category' the resulting Target SIL Level for the Severity Category is shown,
l Under the heading 'Hazard Scenario' the resulting Target SIL Level for the entire Hazard Scenario
is shown. This is the worst case between the different Severity Categories.
l Under the heading 'Overall'; the final resulting Target SIL Level is shown. This is the worst case
between all Hazard Scenarios the SIF is protecting against.
By changing the SILect™ worksheet view from Hazard Scenario focus to IPF/SIF focus you can look at the
various Hazard Scenarios that a particular SIF is part of.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 172 of 292
18.6.1 SIL Selection - LOPA
If the Layer of Protection Analysis was performed using LOPAx™, Hazard Scenarios and Independent
Protection Layers were defined. If the Independent Protection Layers are of type IPF, they could
represent potential SIFs. The automatic transferring of data from the LOPA to the SILect worksheet
ensures that all relevant information is transferred. As a user there is very little left to do, other than
confirming that the required risk reduction from the analysis work applies to the IPF and if the IPF is an
actual SIF. When you open the SILect™ tab in exSILentia® v4, you will notice that the Hazard Scenarios
and Independent Protection Layers of type IPF with their associated LOPA RRF automatically populate
the SILect™ workspace. You can now transfer the LOPA RRF over to the Target RRF to perform the target
SIL selection.
The Data Transfer can make this task easier. In the SILect Data Transfer Window choose the Transfer
From - From LOPA and the Transfer To - LOPA options.
Next you can choose to transfer the LOPA RRF over to the Target RRF
l for all Hazard Scenarios at once
l for the current Hazard Scenario only
Clicking the 'Begin Transfer' button will now transfer the LOPA RRF over to the Target RRF and target
SILs will be automatically calculated for each Instrumented Protection Function considering the Risk
Configuration SIL Selection settings as described in section 9.7 SIL Selection.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 173 of 292
18.6.2 SIL Selection - Risk Graph
If you perform SIL selection using the Risk Graph method, you will notice that when you open the
SILect™ tab in exSILentia® v4, that the Hazard Scenarios are automatically shown in the SILect™
workspace. In this case you will need to transfer the PHA information including likelihood and severity
level selections to SILect.
When you launch the SILect Data Transfer Window choose the Transfer From - From PHA and the
Transfer To - Risk Graph options.
Next you can choose to transfer data
l for all Hazard Scenarios at once
l for the current Hazard Scenario only
Clicking the 'Begin Transfer' button will now transfer the PHA information including all IPF safeguards to
the SILect™ module.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 174 of 292
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 175 of 292
Chapter 19 Safety Requirements Specification
The SRS tab navigates to the exSILentia® v4 safety requirements specification tool SRS. Availability of the
SRS tab, and therefore the SRS tool, is based on your exSILentia® v4 license (see Chapter 1 Introduction
for an overview of the exSILentia® v4 license options). The SRS tool allows detailed specification of
functional and integrity requirements for the Safety Instrumented System (SIS) as a whole, generic for all
Safety Instrumented Functions (SIF), and specific for each SIF.
19.1 Introduction
The Safety Requirements Specification functionality in the SRS tool uses a template type interface that
enables the specification of general SIS, general SIF, and SIF specific requirements.
In the subsequent sections the SRS worksheet, its template structure and integrated relationship
between general SIS, general SIF, and SIF specific requirements, and its reporting capability will be
explained. The available interfaces with the SILect™ and SILver™ tools will also be addressed.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 177 of 292
19.2 SRS Worksheet
The Safety Requirements Specification functionality in the SRS tool uses a template type interface that
enables the specification of general SIS, general SIF, and SIF specific requirements. The output of the
SRS tool is a detailed Safety Requirements Specification document. Furthermore, much of the
information specified here, will serve as the basis for the SIL verification task. The interface has been set
up such that specification of requirements benefits from information defined in previous phases of the
Lifecycle as well as information defined as generally applying to the SIS and all SIFs. The work flow is
setup such that you define general requirements first and then transfer those requirements to the
individual SIF specific requirements. The SRS worksheet consists of three main areas: the toolbar, the
SIF navigation list, and the workspace.
An example of the SRS tool safety requirements specification worksheet is shown in the figure below.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 178 of 292
l Right click on the SIF in the SIF navigation list and select view, or
l Edit the SIF Name and SIF Tag directly in the toolbar
To delete a SIF:
l Select the SIF in the SIF navigation list
l Right click on the SIF and select Delete, click on the Delete SIF button, or click on the Delete key
on your keyboard
l Click on Yes when asked if the SIF is really to be deleted
CAUTION: Deleting a SIF will delete all instances where the SIF was used. This will include any
linking done in the PHAx™, LOPAx™, and/or SILect™ tools.
General Information
The General Information section of the General SIS Requirements allows you to specify an overall
purpose and scope of the SIS, specify specific references, and terms and abbreviations that are
applicable to the SRS document.
To edit the SRS General Information:
l Select General Information from the Requirements Selection drop down box
l Edit the relevant information on the right hand side of the worksheet
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 179 of 292
To add a reference to the list of standards/references in the General Information section:
l Click the green plus (+) symbol below the list of references
l From the overview of references defined in the reference library that appears select the
applicable reference you want to add and click the Link button
To add a definition to the list of definitions in the General Information section:
l Click the green plus (+) symbol below the list of definitions
l From the overview of definitions defined in the definition library that appears select the
applicable definition you want to add and click the Link button
To add an abbreviation to the list of abbreviations in the General Information section:
l Click the green plus (+) symbol below the list of abbreviations
l From the overview of abbreviations defined in the abbreviation library that appears select the
applicable abbreviation you want to add and click the Link button
The SIS Logic Solver Hardware Requirements section of the General SIS Requirements allows you to
specify general requirements with regard to the hardware of the Safety Instrumented System, focusing
specifically on the logic solver. Aspects that need to be addressed revolve around the systematic
capability of the logic solver, the expected response of the logic solver upon detection of a failure, etc. In
addition, interfaces to an engineering station, the BPCS etc. should be specified as well as environmental
extremes the logic solver must be able to withstand. All requirements are specified through text fields.
To edit the SRS SIS Logic Solver Hardware Requirements:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 180 of 292
l Select SIS Logic Solver Hardware Requirements from the Requirements Selection drop down
box
l Edit the relevant information on the right hand side of the worksheet
In addition to the exSILentia® v4 defined SRS fields for the SIS Logic Solver Hardware Requirements you
can add your own requirement fields through the Custom Data option which is shown at the bottom of
the list of SIS Logic Solver Hardware Requirements. From the dropdown box select the applicable
custom data data-set. This will add the fields specified in the custom data data-set to the exSILentia® v4
defined fields.
CAUTION: Deleting or changing the custom data data-set will remove all associated fields from the
project. Any custom data specified information will be lost.
The SIS Application Software Requirements section of the General SIS Requirements allows you to
specify general requirements with regard to the user defined application program of the Safety
Instrumented System. Aspects that need to be addressed revolve around structure of the application
program, validation of process variables, performance, and monitoring functionality. Furthermore
,communication interfaces must be defined as well as any requirements to support normal operation
and test and maintenance activities like proof testing. All requirements are specified through text fields.
To edit the SRS SIS Application Software Requirements:
l Select SIS Application Software Requirements from the Requirements Selection drop down box
l Edit the relevant information on the right hand side of the worksheet
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 181 of 292
In addition to the exSILentia® v4 defined SRS fields for the SIS Application Software Requirements you
can add your own requirement fields through the Custom Data option which is shown at the bottom of
the list of SIS Application Software Requirements. From the dropdown box select the applicable custom
data data-set. This will add the fields specified in the custom data data-set to the exSILentia® v4 defined
fields.
CAUTION: Deleting or changing the custom data data-set will remove all associated fields from the
project. Any custom data specified information will be lost.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 182 of 292
In addition to the exSILentia® v4 defined SRS fields for the General SIF Requirements you can add your
own requirement fields through the Custom Data option which is shown at the bottom of the list of
General SIF Requirements. From the dropdown box select the applicable custom data data-set. This will
add the fields specified in the custom data to the exSILentia® v4 defined fields. By adding custom data to
the General SIF Requirements you will automatically add the same custom data fields to the set of SIF
specific requirements fields.
CAUTION: Deleting or changing the custom data data-set will remove all associated fields from the
project. For General SIF Requirements custom data this also means that the fields will be removed
from the SIF Specific Requirements. Any custom data specified information will be lost.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 183 of 292
There are two ways to copy specifications from the General SIF Requirements to SIF Specific
Requirements. You can copy data from the general SIF requirements to SIF specific requirements
l for all SIFs at once
l for one SIF at a time
To transfer data for all SIFs at once:
l Click on the Load data from General SIF Requirements to SIF Specific Requirements for all SIFs
button
To transfer data for one SIF at a time:
l Select the desired SIF in the SIF Navigation List
l Click on the Load data from General SIF Requirements to SIF Specific Requirements for current
SIF button
When transferring data, you will receive a warning that advises you that the General SIF Requirements
data will be merged into the existing SIF(s) Specific Requirements which could delete information that
you specified previously.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 184 of 292
19.3 Safeguard to SRS Data Transfer
The exSILentia® v4 integration of Process Safety / Functional Safety software tools allows for seamless
data exchange between the different phases of the Lifecycle. If the Process Hazard Analysis was
performed using PHAx™ and Safeguards where defined of Safeguard Category Type IPF additional data
fields where added to the safeguard. One of these data fields allowed you to check the "Is SIF" property
which ensured that the specific SIF showed up in the SIF navigation list in the SRS tool. Similarly, if the
Layer of Protection Analysis was performed using LOPAx™ or the SIL selection was done using SILect™
and Safeguards/IPLs defined of Safeguard Category Type IPF the same additional data fields were added
to the safeguard. Any data specified in the safeguards data fields can be automatically transferred to the
SRS tool.
There are two ways to transfer safeguard data to the Safety Requirements Specification. You can copy
safeguard data to a SIF's SRS data
l for all SIFs at once
l for one SIF at a time
To transfer data for all SIFs at once:
l Click on the Copy safeguard data to SRS for all SIFs button
To transfer data for one SIF at a time:
l Select the desired SIF in the SIF Navigation List
l Click on the Copy safeguard data to SRS for selected SIF button
When transferring data, you will receive a warning that advises you that the safeguard data will be
copied into the SIF (s) Specific Requirements which could overwrite information that you specified
previously.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 185 of 292
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 186 of 292
Chapter 20 SILver™
The SILver tab navigates to the exSILentia® v4 Safety Integrity Level (SIL) verification tool SILver™.
Availability of the SILver tab, and therefore the SILver™ tool, is based on your exSILentia® v4 license (see
Chapter 1 Introduction for an overview of the exSILentia® v4 license options). The SILver™ tool allows
comprehensive modeling of each Safety Instrumented Function’s (SIF) conceptual design within an
exSILentia® v4 project to determine if that conceptual design meets the requirements specified in the
Safety Requirements Specification (SRS). The result of the SIL verification will be an Achieved Safety
Integrity Level for the specific SIF’s conceptual design.
20.1 Introduction
The SILver™ tool uses a discrete Markov model calculation technique during all analyses. For equipment
selections, it features the exida Safety Equipment Reliability Handbook database. This allows you to
perform a reliability analysis of your favorite equipment without the hassle of manually filling in all
reliability data, while ensuring accurate calculation results. The exSILentia® development process, and
specifically the SILver™ calculation engine development, meets IEC 61508 software development process
requirements. The user of the SILver™ tool should review and understand all assumptions that are the
basis of SILver™ calculations. The user is also responsible for reviewing all selections made during the
analysis.
Note: SIL verification using the exSILentia® SILver™ tool can be performed for all conceptual
designs up to SIL 4. For any safety functions that need to achieve SIL 4, independent verification of
the results should be performed by the user as required by IEC 61508 / IEC 61511.
When modeling a SIF conceptual design in SILver™, it is essential to understand the structure of the
SILver™ tool. Similar to the functional safety standards IEC 61508 and IEC 61511, SILver™ distinguishes
three unique parts in a SIF:
l Sensor Part
l Logic Solver Part
l Final Element Part
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 187 of 292
More detailed modeling of a SIF's conceptual design is supported through the ability to divide the
Sensor Part and the Final Element Part into groups. A maximum of 10 groups is supported for both the
Sensor Part and the Final Element Part. These groups allows you to model voting arrangements between
groups of equipment items, e.g. a main fuel valve in series with 4 individual burners valves.
SILver™ supports the following voting options for voting between groups (in words with X being the
number of groups):
l 1ooX: one group needs to trip for the safety function to trip.
l XooX: all groups need to trip for the safety function to trip.
l 2oo3: two out of three groups need to trip for the safety function to trip; available only in case 3
groups are used in the conceptual design.
SILver™ supports further definition of the Sensor and Final Element groups through the use of legs.
These legs can be either identical or diverse. The maximum number of legs within a group depends on
the voting arrangements available for the particular group.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 188 of 292
SILver™ provides the following voting options for Sensor groups:
l 1oo1
l 1oo2, 2oo2
l 1oo3, 2oo3, 3oo3
l 1oo4, 2oo4, 3oo4, 4oo4
l 1oo5, 2oo5, 3oo5, 4oo5, 5oo5 (Identical legs only)
l MooN (Identical legs only)
SILver™ provides the following voting options for Final Element groups:
l 1oo1
l 1oo2, 2oo2
l 1oo3, 2oo3, 3oo3
l 1oo4, 4oo4
l 2oo4 [2oo(1oo2)] (Identical legs only)
l 1oo5, 5oo5 (Identical legs only)
l 6oo6 (Identical legs only)
l 7oo7 (Identical legs only)
l 8oo8 (Identical legs only)
l 9oo9 (Identical legs only)
l MooN (Identical legs only)
Note: Given the flexibility of the voting arrangements within the Sensor and Final Element groups,
SIFs are typically modeled using a single group only.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 189 of 292
In the subsequent sections the SILver™ worksheet, its modeling options for sensors, logic solvers, and
final elements, and its reporting capability will be explained. In addition the concept of devices and
device models will be addressed. The available interfaces with the SRS tool will also be addressed.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 190 of 292
20.2.1 Creating Safety Instrumented Functions
Within exSILentia® v4 Safety Instrumented Functions (SIF) are Safeguards of Safeguard Category Type
IPF (Instrumented Protection Function) where the "Is SIF" property is checked. The exSILentia® v4 SIFs
therefore comprise of many related data fields inherited from Safeguards, IPFs, and SIF specific fields.
Each SIF has a unique Safeguard ID which is automatically generated and assigned to ensure relational
data integrity. SIFs can be defined manually within the SILver™ tool or obtained from the work
previously done using the PHAx™, LOPAx™, SILect™, and/or SRS tools. The transferring of data from PHA,
LOPA, and SIL selection to SIL verification and SRS to SIL verification is described in section SILver Data
Transfer.
To add a SIF:
l Click on the New SIF button in the upper left hand corner of the toolbar
l This will immediately add the SIF to the SIF navigation list
To edit the SIF properties:
l Right click on the SIF in the SIF navigation list and select view, or
l Edit the SIF Name and SIF Tag directly in the SIF worksheet (see below)
To delete a SIF:
l Select the SIF in the SIF navigation list
l Right click on the SIF and select Delete or click on the Delete key on your keyboard
l Click on Yes when asked if the SIF is really to be deleted
CAUTION: Deleting a SIF will delete all instances where the SIF was used. This will include any
linking done in the PHAx™, LOPAx™, SILect™, and/or SRS tools.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 191 of 292
20.3.1 General SIF Information
The General SIF Information in the SILver™ SIF level conceptual design includes the following properties
that are part of the IPF Type Safeguard information and are therefore most likely already specified in the
PHA, LOPA, SILect, and/or SRS tools.
l SIF Name
l SIF Description
l SIF Tag
In addition to these properties, there are specific items that are unique to the SILver™ tool
l Analyst
l Analysis Date
l Comments
l Design References
l Units
To define an Analyst, simply select a Team Member from the drop down box. See section 6.6 Team
Members for more information on specifying Team Members.
To specify the Analysis Date, enter the date directly into the date field or use the Calendar Icon to
select the date from the calendar pop-up.
In the Comments field you can document any specific remarks or assumptions related to the SIL
verification of this SIF.
The Design References item allows you to link specific project references to the SIL verification of this
SIF. Click the Link Icon and select the applicable reference from the list that appears by double
clicking that reference.
The Units section allows you to identify what unit this SIF is part of. The units are typically defined in the
PHA tool, but can also be directly defined in the library.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 192 of 292
20.3.2 Architectural Constraints
You can indicate if Architectural Constraints should be considered in the conceptual design evaluation of
this SIF. Architectural constraints place minimum Hardware Fault Tolerance (HFT) requirements on the
elements in a Safety Instrumented Function. SILver™ provides the following architectural constraints
options:
l None
l Use IEC 61508 Tables
l Use IEC 61511 Tables
If you select None, minimum hardware fault tolerance requirements are ignored when determining the
achieved SIL level for this SIF.
If you select IEC 61508 Tables, the achieved SIL of the Safety Instrumented Function will be limited to
the SIL supported by either Route 1H or Route 2H as defined in IEC 61508. Per clause 11.4.3 of IEC 61511
users can opt to follow the IEC 61508 tables instead of the IEC 61511 tables. Route 1 H architectural
constraints are described in clause 7.4.4.2 and table 2 or 3 of IEC 61508-2:2010. These are based on
Equipment Type, Safe Failure Fraction and Hardware Fault Tolerance. Route 2H architectural constraints
are described in clause 7.4.4.3 of IEC 61508-2:2010.
If you select IEC 61511 Tables, the achieved SIL of the SIF will be limited to the SIL supported by clause
11.4.5 to 11.4.9 of IE 61511:2016 clause 11.4 which includes table 6 of that standard.
The architectural constraints are set for each SIF individually. To specify the applicable architectural
constraints, simply select your preferred method from the drop down box in the SILver™ SIF level
workspace. To specify the default SSI values for this project, see section 8.10 SILver Project Parameters.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 193 of 292
20.3.4 Mission Time
In the Mission Time field, the time period that the SIF is expected to be operational should be selected.
For Low Demand applications, the PFD AVG parameter, which determines the achieved Safety Integrity
Level, is determined over this mission time. At the end of the mission time it is expected that all
equipment in the SIF is either replaced or factory-new refurbished. The mission time is typically at least
as long as the largest proof test interval. To account for different replacement or refurbishment intervals
per sensor group/final element group/logic solver see section 20.5 , 20.7 , and 20.8 respectively.
To specify the default Mission Time value for this project, see section 8.10 SILver Project Parameters.
Note: It is a common misconception that the Startup Time should be greater than the mean repair
time (MRT) as logic dictates that the sum of repair time and clean up time is always greater than
the repair time assuming the clean up time is not 0. In conceptual design evaluation, a MRT is
typically chosen such that there is an extra buffer of time that allows the user to make sure the
replacement part is in place and/or the system is in a good state to shutdown. As such the mean
repair time typically specified is the repair time plus a order part/wait time.
To specify the default Startup Time value for this project, see section 8.10 SILver Project Parameters.
Note: To indicate that the SIF is operating in continuous mode when using the Based On Demand
Rate option, the demand interval should be specified as 0 month.
To specify the default Demand Mode value for this project, see section 8.10 SILver Project Parameters.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 194 of 292
20.3.7 Batch Operation
The SILver™ tool allows you to indicate if the SIF is active in a Batch operation environment. In batch
operation, the Hazard Scenario may not be present when the process is offline. If the SIF is not expected
to protect against the Hazard Scenario its Probability of Failure is 0. Due to the more frequent startup
and shutdown actions, there is an opportunity to perform more tests, for example, a full stroke at the
end of each batch. By selecting the Batch Operation option, you can specify the Batch Duration as well
as the Time Between Batches.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 195 of 292
Level Description
Almost perfect - Repairs are correctly performed, Testing is done correctly and on schedule,
Equipment is replaced before end of useful life, Equipment is normally selected based on the
SSI 3 specified environmental limits and a good analysis of the process chemistry and compatible
materials, Electrical power supplies are normally clean of transients and isolated, Pneumatic
supplies and hydraulic fluids are mostly kept clean, etc.
Good - Repairs are usually correctly performed, Testing is done correctly and mostly on
schedule, Equipment is mostly replaced before end of useful life, Equipment is often selected
SSI 2 according to the specified environmental limits and process compatible materials, Electrical
power supplies may have transient voltage spikes and surges, Pneumatic supplies and
hydraulic fluids are usually kept clean, etc.
Medium – Repairs are mostly correctly performed, Testing is done and often on schedule,
Equipment is sometimes replaced before end of useful life, Equipment is sometimes selected
SSI 1 according to the specified environmental limits and process compatible materials, Electrical
power supplies have transient voltage spikes and surges, Pneumatic supplies and hydraulic
fluids are sometimes kept clean, etc.
None - Repairs are not always done, Testing is not done, Equipment is replaced upon failure,
Equipment is selected based on history, Electrical power supplies may drop out and have
SSI 0
transient voltage spikes and surges, Pneumatic supplies and hydraulic fluids are sometimes
kept clean, etc.
The Site Safety Index is a parameter that is specific for each SIF individually and can be specified for
sensors, logic solvers, and final elements separately. To specify the applicable Site Safety Indexes for this
SIF, simply select the appropriate level from the drop down boxes in the SILver™ SIF level workspace. To
specify the default SSI values for this project, see section 8.10 SILver Project Parameters.
Furthermore you can indicate if the Site Safety Index should be considered in the failure rate selection
for each of the devices in the SIF. In the figure below you can see that the Safety Equipment Reliability
Handbook holds different failure rates for different SSI levels. For exSILentia® v4 projects created prior to
the 4.9 release, the failure rates are set to SSI 2 level which corresponds with good process industry
practices. If your plant approaches a near laboratory application environment with perfect maintenance
etc., the SSI 4 failure rates may be applicable. If your plant is a plain mess and good process industry
practices are not applied, you may need to use SSI 1 or even SSI 0 failure rates.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 196 of 292
20.4 SILver Worksheet - Sensor Part
To configure the SIF's Sensor Part in the SILver™ tool, select Sensor Part for the SIF in the SIF list. The
SILver™ workspace will now show the sensor part conceptual design information as shown in the figure
below.
As described in section 20.1 Introduction a Sensor Part can consist of up to 10 Sensor Groups.
To add a new Sensor Group to the Sensor Part:
l Click on the Add Group button in the middle of the SILver™ workspace
l This will immediately add the Sensor Group to the SILver™ workspace
l This will also add the Sensor Group to the Sensor Groups library
To add a Sensor Group directly from the Sensor Groups Library:
l Click on the Link Sensor Group Icon
l Double Click the Sensor Group to add the group to the Sensor Part
After adding the applicable number of Sensor Groups to the Sensor Part, update the Sensor Part voting,
i.e. the voting between groups, in the upper left hand corner of the SILver™ workspace. You can also
specify the beta factor to account for common cause between groups. The beta factor must be entered
as an integer between 0% and 100%. The default value for the common cause between groups is 0% as
different groups are typically used to model independent equipment items. In case there is no complete
independence however, i.e. there is common cause susceptibility, a beta factor other than 0% should be
used. Use the beta factor estimator feature for assistance in determining an applicable beta factor by
clicking the beta estimator icon , see also section 20.10 SILver Worksheet - Features.
To delete a Sensor Group from the Sensor Part:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 197 of 292
l Right click on the specific Sensor Group
l Select Delete from the pop-up menu
l Click on Yes when asked if the Sensor Group is really to be deleted
Note: When a Sensor Group is deleted and it is the last place where it is used, you will be asked if
you want to permanently delete the Sensor Group from the Library. Click Yes or No as applicable.
As part of the Sensor Group conceptual design configuration, you can specify a Name and Description
for the sensor group.
Note: Uniquely naming a Sensor Group is not essential to perform a SIL verification, however to
efficiently use the full library aspects of exSILentia®, it is highly encouraged.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 198 of 292
The Group Details button allows you to see the equipment that you selected for the Sensor Group
including the associated failure rates. Click this button once you have completed the configuration of
the Sensor Group.
When you change the Voting option within the Sensor Group, a Warning Icon will appear next to the
Voting selection in addition to a message box. This icon indicates that after you change the voting
option, the number of legs associated with the Sensor Group no longer matches the voting option.
SILver™ can automatically adjust the number of legs or you can do this manually. The warning icon and
message are shown in the next figure.
Note: Sensor Legs are also an exSILentia® Library item and can therefore be reused in multiple
locations, not necessarily within the same Sensor Group.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 199 of 292
Finally you can indicate if the Proof Test Coverage of the proof test specified for the sensor group
should be determined based on the data associated with the respective equipment items selected for
the group, or if the you want to override that data and manually enter the Proof Test Coverage factor.
The Proof Test Coverage indicates the effectiveness of a proof test in revealing failures undetected
during normal operation. A 100% proof test coverage would mean that ALL failures would be revealable
by the test, which realistically is only feasible through replacement or complete refurbishment to an as
new state. The proof test coverage must be a value between 0 and 100%. See section 20.10 SILver
Worksheet - Features for details on the Proof Test Coverage Calculator.
20.5.4 Legs
You can add Sensor Legs to your SIF by allowing SILver to automatically adjust the number of legs based
on the Sensor Group voting. If you are modeling identical legs, you need only specify them once. If you
have selected the "Is Diverse" check box, you will need to specify each separately. As part of the Sensor
Leg conceptual design configuration, you can specify a Name and Description for the sensor leg.
Note: Uniquely naming a Sensor Leg is not essential to perform a SIL verification, however to
efficiently use the full library aspects of exSILentia®, it is highly encouraged.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 200 of 292
20.5.5 Leg Options
Once the Sensor Legs are created in SILver, you can select your Leg Options starting with the
Measurement Type . The different measurement types include:
l Pressure
l FireGas
l Proximity
l Flow
l Temperature
l Level
l Other
The remaining Leg Options allow you to specify if the Trip Direction is High or Low, and if you have
External Comparison. If you have selected and a sensor that uses analog signals, you will be able to
specify if a Transmitter Fault drives the signal Over Range or Under Range.
Trip Setting:Specify whether a High Trip or Low Trip is configured in the application software. This is
especially important for 4-20 mA operating devices. For such devices a failure resulting in an output
below 4 mA is considered a Fail Low failure and a failure resulting in an output above 20 mA is
considered a Fail High failure. Depending on the PLC Detection Configuration settings, Fail Low and Fail
High failures will either be classified as safe or dangerous, detected or undetected.
External Comparison: External Comparison is an additional diagnostic implemented by the user. It
indicates whether the device signal is compared with a similar second signal. External comparison is
highly effective for analog signals since one can monitor differences in dynamic signals and see if
something is wrong with one of the analog devices. It is very ineffective for digital signals since digital
signals have a static output. IEC 61508 allows claims up to 99% diagnostic coverage on external signal
comparison. In exSILentia the user can specify a value ranging from 0% to a more conservative 95% for
the external comparison. The default value is 90% for analog signals and 0% for digital signals.
Transmitter Fault Direction: The Transmitter Fault Direction selection determines whether the analog
output is driven Over Range or Under Range by the transmitter, upon detection of an internal failure
(Fail Detected). This is typically done by setting a switch on the transmitter itself. This will determine
how Fail Detected faults are classified, either Fail High or Fail Low. This will lead to subsequent
classification into safe or dangers, detected or undetected.
PLC Detection Configuration (Analog Devices Only). These options allow you to indicate the type of input
signal diagnostics that are implemented in the logic solver connected to the devices selected in the
Sensor Group. These options appear in the Sensor Group view after you choose an analog device.
Out of Range Detection: Select this option if the logic solver connected to the devices selected can
detect out of range signals (>20 mA and <4 mA) and you programmed the logic solver to use this
functionality, there is input range checking. If this is the case for your application, select the check box
for Out of Range Detection.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 201 of 292
Transmitter Fault Filter: Select this option if the logic solver performs a type of sampling, for example,
the value communicated form the input card to the CPU is averaged or a median value is used. The
effect here is that if there is an internal fault in, for example, a transmitter which drives the output over
range (Fail High) and you would have a high trip this will not immediately lead to a trip on the
application level as sudden input signal transitions are filtered. A next sampling of the input signal is
very likely to show an over range signal rather than a signal in active scale above the trip point as
internal failure transitions are typically very fast. If this is the case for your application, select the check
box for Transmitter Fault Filter.
Trip on Transmitter Fault: Select this option if you would like to trip the plant in the event of a
transmitter fault. In some cases, end-users do not want to cause any transmitter malfunction to result in
a shutdown of a unit but simply have an alarm and perform maintenance on the specific unit that failed.
Other end-users do not want to operate in such a degraded mode where, arguable, the SIF protection is
lost. If this is the case in your application, select the check box for Trip on Transmitter Fault.
20.5.6 Devices
For each Sensor Group the following devices must be specified:
l Process Connection (1 per Sensor Leg): Select the "New Process Connection" button. exida's
SERH database will open in a new window showing all available process connections for the
measurement type selected. Scroll to the device of your choosing and double click to apply it to
your SIF. You can also select the device once and click the "Add Device" button.
l Sensor (1 per Sensor Leg): Select the "New Sensor" button. exida's SERH database will open in a
new window showing all available sensors for the measurement type selected. Scroll to the
device of your choosing and double click to apply it to your SIF. You can also select the device
once and click the "Add Device" button.
l Input Interface (Unlimited): Select the "New Input Interface" button. exida's SERH database will
open in a new window showing all available interfaces for the measurement type selected. Scroll
to the device of your choosing and double click to apply it to your SIF. You can also select the
device once and click the "Add Device" button.
Devices already specified in other SIF's can be re-used by selecting the link button and selecting the
device in question. Keep in mind, this would mean the SIFs share this equipment. If you are re-using a
Device Model used previously in the project, select the from the device drop down list. In this case, this is
a new device in the safety instrumented system, but an identical device model.
To specify a User Defined device, select the UD button for the specific device type. This will open a
new window that allows you to fill in the device information including applicable failure rates. Upon
completing the information there, you can apply the device to your SIF by selecting the "Create" button.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 202 of 292
Note: If you specify an analog device for the Sensor Leg, additional Leg Options will appear that must
also be specified.
Note: As part of the process connections in exida's SERH database, the following selections are available
for Impulse lines:
l Clean Service: This selection means there is no plugging
l Impulse Line - plugging very unlikely: This selection means there is a low frequency of plugging (1
per 400 years).
l Impulse Line - plugging unlikely: This selection means there is a medium frequency of plugging (1
per 40 years).
l Impulse Line - plugging likely: This selection means there is a high frequency of plugging (1 per 4
years).
As described in section 20.1 Introduction a Final Element Part can consist of up to 10 Final Element
Groups.
To add a new Final Element Group to the Final Element Part:
l Click on the Add Group button in the middle of the SILver™ workspace
l This will immediately add the Final Element Group to the SILver™ workspace
l This will also add the Final Element Group to the Final Element Groups library
To add a Final Element Group directly from the Final Element Groups Library:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 203 of 292
l Click on the Link Final Element Group Icon
l Double Click the Final Element Group to add the group to the Final Element Part
After adding the applicable number of Final Element Groups to the Final Element Part, update the Final
Element Part voting, i.e. the voting between groups, in the upper left hand corner of the SILver™
workspace. You can also specify the beta factor to account for common cause between groups. The beta
factor must be entered as an integer between 0% and 100%. The default value for the common cause
between groups is 0% as different groups are typically used to model independent equipment items. In
case there is no complete independence however, i.e. there is common cause susceptibility, a beta
factor other than 0% should be used. Use the beta factor estimator feature for assistance in determining
an applicable beta factor by clicking the beta estimator icon , see also section 20.10 SILver Worksheet -
Features.
To delete a Final Element Group from the Final Element Part:
l Right click on the specific Final Element Group
l Select Delete from the pop-up menu
l Click on Yes when asked if the Final Element Group is really to be deleted
Note: When a Final Element Group is deleted and it is the last place where it is used, you will be
asked if you want to permanently delete the Final Element Group from the Library. Click Yes or No
as applicable.
As part of the Final Element Group conceptual design configuration, you can specify a Name and
Description for the final element group.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 204 of 292
Note: Uniquely naming a Final Element Group is not essential to perform a SIL verification,
however to efficiently use the full library aspects of exSILentia®, it is highly encouraged.
When you change the Voting option within the Final Element Group, a Warning Icon will appear next to
the Voting selection in addition to a message box. This icon indicates that after you change the voting
option, the number of legs associated with the Final Element Group no longer matches the voting
option. SILver™ can automatically adjust the number of legs or you can do this manually. The warning
icon and message are shown in the next figure.
Note: Final Element Legs are also an exSILentia® Library item and can therefore be reused in
multiple locations, not necessarily within the same Final Element Group.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 205 of 292
l The Proof Test Interval for the final element group, the time interval between two proof tests.
The proof test is the periodic test performed to reveal failures undetected during normal
operation. The interval ranges from 1 to 600 months and can be specified in years, months,
and/or days.
l Indicate if a Leak Test will be performed as part of the proof test by checking the associated
checkbox.
l Indicate if the proof test will be performed At Operating Conditions by checking the associated
checkbox.
You can also indicate how the proof test is Performed , either Online or Offline . If a proof test is
performed while online you can specify the following:
l For redundant configurations, is the testing done Staggered or not. Staggered indicates that only
one of the redundant units is bypassed at a time, ensuring that the final element configuration
remains capable to react to a process demand.
l Is Alternate Protection available during the proof test. This indicates if during the bypassing of
the final element configuration other means are available to detect the hazard and bring the
process to a safe state.
l The Duration of the proof test. This shows how long the final element configuration is in bypass,
the duration ranges from 1 to 24 hours.
Finally you can indicate if the Proof Test Coverage of the proof test specified for the final element group
should be determined based on the data associated with the respective equipment items selected for
the group, or if the you want to override that data and manually enter the Proof Test Coverage factor.
The Proof Test Coverage indicates the effectiveness of a proof test in revealing failures undetected
during normal operation. A 100% proof test coverage would mean that ALL failures would be revealable
by the test, which realistically is only feasible through replacement or complete refurbishment to an as
new state. The proof test coverage must be a value between 0 and 100%. See section 20.10 SILver
Worksheet - Features for details on the Proof Test Coverage Calculator.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 206 of 292
20.7.4 Legs
You can add Final Element Legs to your SIF by allowing SILver to automatically adjust the number of legs
based on the Final Element Group voting. If you are modeling identical legs, you need only specify them
once. If you have selected the "Is Diverse" check box, you will need to specify each separately. As part of
the Final Element Leg conceptual design configuration, you can specify a Name and Description for the
final element leg.
Note: Uniquely naming a Final Element Leg is not essential to perform a SIL verification, however
to efficiently use the full library aspects of exSILentia®, it is highly encouraged.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 207 of 292
20.7.6 Devices
Within the SILver™ tool a distinction is made between remote actuated valves and non-remote actuated
valves as the final element. For each Final Element Group that includes a remote actuated valve, the
following devices can be specified:
l Output Interface (Unlimited): Select the "New Output Interface" button. exida's SERH database
will open in a new window showing all available output interfaces. Scroll to the device of your
choosing and double click to apply it to your SIF. You can also select the device once and click
the "Add Device" button.
l If the remote actuated valve is an integrated Remote Actuated Valve Assembly
l Remote Actuated Valve Assembly (1 per Final Element Leg): Select the "New Remote
Actuated Valve Assembly" button. exida's SERH database will open in a new window
showing all available remote actuated valve assemblies. Scroll to the device of your
choosing and double click to apply it to your SIF. You can also select the device once and
click the "Add Device" button.
l If the remote actuated valve is build up from individual devices
l Final Element Interface (1 per Final Element Leg): Select the "New Final Element
Interface" button. exida's SERH database will open in a new window showing all available
final element interfaces. Scroll to the device of your choosing and double click to apply it
to your SIF. You can also select the device once and click the "Add Device" button.
l Pneumatic Element (Unlimited): Select the "New Pneumatic Element" button. exida's
SERH database will open in a new window showing all available pneumatic elements.
Scroll to the device of your choosing and double click to apply it to your SIF. You can also
select the device once and click the "Add Device" button.
l If the Actuator and Valve are delivered as an integrated assembly
l Actuator Valve Assembly (1 per Final Element Leg): Select the "New Actuator
Valve Assembly" button. exida's SERH database will open in a new window
showing all available actuator valve assemblies. Scroll to the device of your
choosing and double click to apply it to your SIF. You can also select the device
once and click the "Add Device" button.
l If the Actuator and Valve are individual devices
l Actuator (1 per Final Element Leg): Select the "New Actuator" button. exida's SERH
database will open in a new window showing all available actuators. Scroll to the
device of your choosing and double click to apply it to your SIF. You can also select
the device once and click the "Add Device" button.
l Valve (1 per Final Element Leg): Select the "New Valve" button. exida's SERH
database will open in a new window showing all available valves. Scroll to the
device of your choosing and double click to apply it to your SIF. You can also select
the device once and click the "Add Device" button.
For each Final Element Group that does not include a remote actuated valve, the following devices must
be specified:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 208 of 292
l Output Interface (Unlimited): Select the "New Output Interface" button. exida's SERH database
will open in a new window showing all available output interfaces. Scroll to the device of your
choosing and double click to apply it to your SIF. You can also select the device once and click
the "Add Device" button.
l Other (1 per Final Element Leg): Select the "New Other" button. exida's SERH database will open
in a new window showing all available other final element options. These include alarm bells,
relays, motor starters , general MCC's, among others. Scroll to the device of your choosing and
double click to apply it to your SIF. You can also select the device once and click the "Add Device"
button.
Devices already specified in other SIF's can be re-used by selecting the link button and selecting the
device in question. Keep in mind, this would mean the SIFs share this equipment. If you are re-using a
Device Model used previously in the project, select the from the device drop down list. In this case, this is
a new device in the safety instrumented system, but an identical device model.
To specify a User Defined device, select the UD button for the specific device type. This will open a
new window that allows you to fill in the device information including applicable failure rates. Upon
completing the information there, you can apply the device to your SIF by selecting the "Create" button.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 209 of 292
As described in section 20.1 Introduction a Logic Solver Part does not have any further division into
groups like the Sensor and Final Element Parts.
To add a new Logic Solver to the Logic Solver Part:
l Click on the EBD button on the top right hand side of the SILver™ workspace
l exida's SERH database will open in a new window showing all logic solvers. Scroll to the logic
solver of your choosing and double click to apply it to your SIF. You can also select the device
once and click the link button .
l This will immediately add the logic solver to the SILver™ workspace
l This will also add the logic solver to the Logic Solvers library
To add a Logic Solver directly from the Logic Solver Library:
l Open the top drop down list in the SILver™ workspace
l Select the applicable logic solver to add it to the Logic Solver Part
To remove a Logic Solver from the Logic Solver Part:
l Click the EBD button and select a different logic solver from the exida SERH database, or
l Select a different logic solver from the drop down list
To permanently delete a Logic Solver from the exSILentia(R) Project:
l Open the project Library
l Select the specific logic solver from the Logic Solvers library
l Click the "-" button
l Confirm the action by clicking the Yes button
Caution: When a Logic Solver is deleted from the library, it will be deleted from all SIFs that it is
being used in.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 210 of 292
l For redundant configurations, is the testing done Staggered or not. Staggered indicates that only
one of the redundant units is bypassed at a time, ensuring that the sensor configuration remains
capable to react to a process demand.
l Is Alternate Protection available during the proof test. This indicates if during the bypassing of
the sensor configuration other means are available to detect the hazard and bring the process to
a safe state.
l The Duration of the proof test. This shows how long the sensor configuration is in bypass, the
duration ranges from 1 to 24 hours.
Finally you can indicate if the Proof Test Coverage of the proof test specified for the logic solver should
be determined based on the data associated with the selected logic solver, or if the you want to override
that data and manually enter the Proof Test Coverage factor. The Proof Test Coverage indicates the
effectiveness of a proof test in revealing failures undetected during normal operation. A 100% proof test
coverage would mean that ALL failures would be revealable by the test, which realistically is only
feasible through replacement or complete refurbishment to an as new state. The proof test coverage
must be a value between 0 and 100%. See section 20.10 SILver Worksheet - Features for details on the
Proof Test Coverage Calculator.
Application Level Diagnostic Testing allows you to account for additional testing an end- user
implements in addition to any automatic self-diagnostics that are part of the logic solver. You should not
select Application Level Diagnostic Test to account for standard device automatic self diagnostics as
these are accounted for in the device's failure rates.
To model application level diagnostic testing to the Logic Solver, first select the "Enabled" check box for
this option. Once enabled, you need to specify:
l The Application Level Diagnostic Test Interval for the sensor group, the time interval between two
tests. This can be specified in months and years.
l The Application Level Diagnostic Test Duration. This can be specified in hours.
l The Application Level Diagnostic Test Coverage. This indicates the effectiveness of the application
level diagnostic test in revealing failures. The test coverage must be a value between 0 and 100%.
You can also indicate if the test is automatic vs. manual, buy selecting the "Automatic" check box for this
option. Only in the case of an automatically performed application test does this impact the safe failure
fraction. The order of magnitude difference between the demand interval and diagnostic test interval is
not considered in classifying a failure as detected or undetected by automatic diagnostics.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 211 of 292
20.9 SILver Worksheet - Results
Once all of the parts of the Safety Instrumented Function are specified, SILver will display the overall
SIF performance metrics in the header at the top. You can now review the results and see if the
SIF meets the desired Safety Integrity Level. These metrics also include the RRF, PFDavg, MTTFS and the
SIL level according to PFDavg, Architectural Constraints and Systematic Capability. For each SIF these
metrics are shown for the sensor, logic solver and final element parts in addition to the overall SIF
results. Also included are pie charts that indicate the contribution of each part to the overall
SIF performance metrics for PFDavg and MTTFS respectively.
If the results do not meet the required SIL or if you want to try different selections, you can easily edit
the configuration by clicking on the specific group you want to change in the navigation tree. Note that
all SILver input and calculated results will be part of the exSILentia report for functional safety standard
compliance.
PFD Charts: The PFD charts show the PFD as a function of mission time in combination with the PFDavg
over the entire mission time. The clearly indicate the effects of the proof test interval and proof test
coverage. For SIFs where the various parts of the SIF use different proof test intervals, the PFD graphs
provide an indication of each parts proof test.
The PFD Charts can be viewed by selecting the "PFD Charts" button on the right side of the results
header. A window will open showing four PFD charts, one for the sensor group, logic solver, final
element group and overall SIF.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 212 of 292
20.10 SILver Worksheet - Features
There are several features build in the SILver Worksheet. In most cases these are available for sensor
groups, final element groups, and the logic solver.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 213 of 292
The scoring has been designed to allow for items that are not mutually exclusive. For example, a system
with logic subsystem channels in separate racks is entitles to score for "Are the logic subsystem channels
in separate cabinets?" and that for "Are the logic subsystem channels on separate printed circuit-
boards?". A number of items relate to the operation of the system, which may be difficult to predict a
the design time. In these cases, the designers should make reasonable assumptions and subsequently
ensure that the eventual user of the system is made aware of these assumptions. You can either
manually enter the resulting beta factor on the Sensor Group or Final Element Group views or have the
beta estimate automatically copy the calculated beta factor.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 214 of 292
If you prefer to manually enter your proof test coverage factor instead of using the coverage factors
associated with the equipment you have selected, simply check the Override Equipment Data checkbox
and a proof test coverage factor field will appear for you to manually enter the coverage factor that you
want to assume in the calculation.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 215 of 292
If you prefer to manually enter your partial valve stroke test coverage factor instead of using the
coverage factors associated with the equipment you have selected, simply check the Override
Equipment Data checkbox and a partial valve stroke test coverage factor field will appear for you to
manually enter the coverage factor that you want to assume in the calculation.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 216 of 292
The Proven In Use Justification checklist will allow you to specify the application that the proven in use
justification applies to. It also allows you to specify the specific revision of the product. The specific
application is important to ensure that the proven in use justification actually applies to the proposed
use of the equipment in the safety instrumented function, for example, proven experience in control
(dynamic) environment may not suit safety (static) application use. The revision is especially important
with regard to the software version of the product as this is usually the place with the majority of
systemic failures.
exida has specified a set of Proven In Use Justification criteria based on the IEC 61508 and IEC 61511
functional safety standards. The intent of the justification is to provide a rationale and reference to
reference documents why a criterion is met for the specific equipment item.
At the top of the dialog box, the Device Model and Device Usage should be automatically filled in. Then
you can document the revision of the Proven In Use Justification documentation, input the Device
Systematic Capability you are claiming, and list the Preparing Engineer and Project Engineer from the
team members listed in the Library. Next you will see a list of PIU Justification Requirements. For each
requirement that applies to your application, you select the adjacent check box. You can then document
your rationale and link any references from the library that apply. For those requirements that are not
met by the application, there is a space at the bottom to specify a basis for proven in use without those
requirements.
Once you complete a Proven In Use Justification it will be stored as part of the exSILentia project. If you
want to claim proven in use on the same device for a different SIF, simply choose the item from the drop
down list at the top of the Proven In Use Justification window. The Proven In Use Justification
documentation is stored in the Library for each Device Model.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 217 of 292
20.10.6 SILver Parameter Update Utility
Occasionally when you are working on the conceptual design verification of a number of SIFs, based
design parameters get change and you see yourself needing to update a large number of SIFs. For
example, mid project it could be decided that the mission time for the overall SIS needs to be set to 25
years from 20 years. Instead of manually updating each SIF individually, you can use the SILver
Parameter Update Utility. To do so click the SIF Overview button in the SILver worksheet header. The
SIF Overview dialog will appear. On the left hand side of the dialog you will see a list of all your SIFs and
their currently specified parameters. On the right hand side of the dialog you will see an overview of all
parameters that you can modify at once within the SILver module.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 218 of 292
To modify a specific parameter, e.g. mission time, enter the new value in the corresponding field on the
right hand side of the dialog. Then make sure the check mark on the right of the specific value is
highlighted. Next select the SIFs that the specific update needs to be applied to and click on the Apply
To Selected SIFs button.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 219 of 292
l Name: Here you would type in the tag name to be used in your application logic.
l Description: Here the user can describe the sensor or final element leg and the impact it has on
the system
l Unit of Measure: Input the unit of measure.
l Type: Chose from Sensor Type or Final Element Type.
l Input Type (Sensor Type Only): Chose from Process or Discrete
l Process Value (Sensor Type Only): Chose from Analog or Digital
l Range Low (Analog Sensor Type Only): Input the process value at 4 mA in the unit of measure
specified above.
l Range High (Analog Sensor Type Only): Input the process value at 20 mA in the unit of measure
specified above.
l Tolerance (Analog Sensor Type Only): Input the tolerance for the Range Low/High values.
l Profiles: Multiple profiles can be assigned to each tag.
l For Sensor Type, Analog: Input the trip direction, the limit (or set point), and the basis of
the limit.
l For Sensor Type, Digital: Input the trip direction, and the basis.
l For Final Element Type, Remote Actuated Valve: Input the action, fail position and if
Note: If you plan to use this information in your safety logic configuration this must match the
nomenclature used in the application program.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 220 of 292
20.12 SILver™ Reports
There are several SILver™ specific reports in exSILentia®. These are
l Proven In Use Report: Documents the Proven In Use justification for a device entered into the
SILver module.
l SIF List: Provides an overview of all the safety instrumented functions that are associated with
the current project. Details include the tag, name, description, status, required SIL and RRF, and
achieved SIL and RRF.
l SIF Detailed Report: Documents all required information for functional safety standard
conformance.
l SIF Summary Report: Provides a one page summary of key SIL Verification selections and results
of each SIF. Details include achieved SIL, calculated PFDavg, RRF and MTTFS results, as well as a
graphical representation of the SIF as modeled in SILver.
For the SILver Summary Report there are several report options which allow you to specify the order of
the SIFs as which SIFs to include in the summary report.
In order to generate one of the SILver™ reports select the Proven In Use Report, SIF List, SILver Detailed
Report, or SILver Summary Report option from the Report Wizard. The Report Wizard will show applicable
Report Options.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 221 of 292
The SILver Summary Export documents SIF information in an excel format. Includes:
l Project
l Unit Name
l SIF Name
l SIF Tag
l SIF Description
l Required SIL
l Achieved SIL
l Achieved RRF
l Achieved PFDavg
l SIL (Arch. Const.)
l SIL Capability
l MTTFS
l Proof Test Interval and Coverage for each device
l Limiting Subsystem
The SILver Tags Export documents information in an excel format including:
l SIF Name
l SIF Parts
l Part Tags
l Part Group
l Achieved SIL
In order to generate one of the SILver™ exports, navigate to the top menu and select Export and Export
Data, them choose from SILver Summary Export and SILver Tags Export.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 222 of 292
Chapter 21 Design SRS
The Design SRS tab navigates to the exSILentia® v4 detailed design Safety Requirements Specification
tool Design SRS. Availability of the Design SRS tab, and therefore the Design SRS tool, is based on your
exSILentia® v4 license (see Chapter 1 Introduction for an overview of the exSILentia® v4 license options).
The Design SRS tool allows detailed design specification of functional requirements for each Safety
Instrumented Function (SIF) identified in the exSILentia® project. The detailed design requirements are a
result of the conceptual design evaluation performed using the SILver™ tool.
21.1 Introduction
The Design Safety Requirements Specification functionality in the DSRS tool uses a template type
interface that enables the specification of general SIS, general SIF, and SIF specific requirements.
In the subsequent sections the DSRS worksheet, its template structure and integrated relationship
between general SIS, general SIF, and SIF specific requirements, and its reporting capability will be
explained. The available interfaces with the SILect™ and SILver™ tools will also be addressed.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 223 of 292
l Select the SIF in the SIF navigation list
l Right click on the SIF and select Delete, click on the Delete SIF button, or click on the Delete key
on your keyboard
l Click on Yes when asked if the SIF is really to be deleted
CAUTION: Deleting a SIF will delete all instances where the SIF was used. This will include any
linking done in the PHAx™, LOPAx™, SILect™, and/or SILver tools.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 224 of 292
Auxiliary Input Legs can also be added to a SIF in the DSRS. To add a new Auxiliary Input Leg, select 'Add
Auxiliary Leg' in the SIF Specific Sensor Section of the DSRS. Here you can enter Name, Description,
Type, PID number, Model/Datasheet, Action, Comparison Tag and Maintenance Override.
Finally Auxiliary Input Parameters can be added to a SIF in the DSRS. To add a new Auxiliary Input
Parameter, select 'Add Auxiliary Parameter' in the SIF Specific Sensor Section of the DSRS. Here you can
enter the Name, Description, Type, Security, Unit of Measure, Range, Setpoint and Trip Direction.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 225 of 292
Chapter 22 Proof Test Generator
The Proof Test Generator tab navigates to the exSILentia® v4 proof test generator tool. Availability of the
PTG tab, and therefore the Proof test generator tool, is based on your exSILentia® v4 license (see Chapter
1 Introduction for an overview of the exSILentia® v4 license options). The proof test generator tool
provides and easy way to generate a proof test plan for the equipment items specified as part of your
Conceptual Design verification using the SILver™ tool.
22.1 Introduction
Proof Test Generator is an automated way to create a draft proof test plan for inclusion in your
mechanical integrity program. The Proof Test Generator can save you hours of engineering time as it will
provided specific proof test for each equipment item specified as part of your Conceptual Design
verification using the SILver™ tool. The proof tests are directly obtained from the exida Safety Equipment
Reliability Handbook (SERH) database which contains both the proof test steps as well as the associated
proof test coverage.
A proof test is a manual test designed to reveal equipment item failures undetected by automatic
diagnostics during normal operation. This includes both safe and dangerous undetected failures as well
as diagnostic failures. The proof test interval in combination with the comprehensiveness of the proof
test, expressed through the proof test coverage, can have a dramatic impact on the achieved Safety
Integrity Level for the SIF that the equipment item is part of.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 227 of 292
In the Proof Test Generator (PTG) module, the navigation tree view options include organizing the proof
tests per SIF (Group by SIF), or simply listing the proof tests (No Grouping). For proof tests organized per
SIF, the proof test can be created on the same level the the proof test is defined. The other levels are
shown as reference, but are not used to build the proof test. In this case, the proof test pane will indicate
'No proof test on this level'. Simply navigate to the level on which the proof test will be defined.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 228 of 292
22.2.1 Proof Test Suggestions
Many SIF devices specified using exida's SERH have associated proof test steps that help to determine
the proof test coverage used in the SIL Verification calculation. These steps are not application specific
and are often provided from the manufacturer. In the 'Proof Test Suggestions' pane, to the right of the
navigation tree, the PTG module automatically populates these suggestions for the user to apply to the
proof test procedure. This can be done by selecting the arrow button next to each step to apply steps
one at a time. To apply all steps at once select the apply all suggestions button in the column between
the suggestions and the proof test.
Proof Test suggestions can be modified in the library in the Device Model view. Before making changes
remember that the steps provided correlate to the proof test coverage used in the SIL Verification
calculation. Changing the procedure to exclude steps would affect this coverage, rendering your results
invalid. However, information specific to the application or site may be added without affecting the
coverage. User defined steps may also be added to the Device Model library and will automatically
populate along with steps provided by the SERH.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 229 of 292
Steps can be added directly to the proof test using the 'Add Step' button. If any suggestions were
applied, they will appear in the Proof Test Procedure as well. Here the steps can be specified further.
This includes editing the text to add any application or site specific information to this procedure. They
can be re-ordered or deleted using the arrow and delete buttons to the far right of each step. The layout
can be specified to indicate the response or result required by the recorder of the proof test. Passing
criteria can also be specified. Child steps can be added by selecting the plus button next to the layout for
each step.
The different layouts include:
Text - In this case no passing criteria need be specified. The recorder is expected to write in
results.
Boolean - In this case a checkbox will appear. The user can indicate if the box should be checked
or left unchecked for passing criteria.
Number - In this case you can indicate that the result should be a value greater than, less than,
greater than or equal to, less than or equal to, equal to, not equal to or greater than or equal to
AND less than or equal to the specified value. A tolerance can be added for passing criteria, and
unit of measure can be indicated.
None - In this case a checkbox will appear to show that the step is completed, and nothing more.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 230 of 292
Upon completion of each proof test the status can be changed to 'Complete'. A green checkmark will
appear in the navigation tree to show which proof tests are complete. The header at the top of the
module shows number of 'Proof Tests Created' and 'Proof Tests Completed'. All proof tests created are
saved in the library, under Proof Tests.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 231 of 292
22.2.3 Starting PTG with an Existing Project File
If the SIL Verification was completed in a project file 4.7 or earlier, the SERH may need to be updated
before starting with the PTG. This will ensure the proper suggestions are given in the PTG module. To
update the SERH, use the SERH widget on the Dashboard. This can be found by navigating to the
Dashboard tab, and selecting the green plus button on the far right hand side. This shows all the widgets
available for the dashboard. Select the widget titled 'exida Safety Equipment Database'. The widget will
open on the dashboard. Select the checkbox that says show all devices. Make sure all are highlighted
and then select the 'Update All' button. This will populate the proof test suggestions needed to create
your proof test.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 232 of 292
22.3 Proof Test Generator Reports
In order to generate a Proof Test report select the Proof Test Procedures option from the Report Wizard.
The Report Wizard will show applicable Report Options.
The Report Option allows you to choose a report organized per SIF or per Proof Test. For each you can
choose to include all defined in the project, or select individual tests to be included.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 233 of 292
Chapter 23 Lifecycle Cost Estimator
The Cost tab navigates to the exSILentia® v4 Lifecycle Cost Estimator tool. Availability of the Cost tab,
and therefore the Lifecycle Cost Estimator tool, is based on your exSILentia® v4 license (see Chapter 1
Introduction for an overview of the exSILentia® v4 license options). The Lifecycle Cost Estimator tool
supports the evaluation of a Safety Instrumented Function's conceptual design on the basis of expected
overall lifecycle cost, accounting for aspects such proof test cost and proof test frequency. The Lifecycle
Cost Estimator tool can assist in making an economical justification why a particular conceptual design
may be better than an alternate conceptual design where both meet the same functional and integrity
requirements. The Lifecycle Cost Estimator takes many aspect into consideration, including spurious trip
rates, frequency of proof tests, maintenance requirements, installation cost etc., and determines based
on a discount rate what the net current cost is of a proposed Safety Instrumented Function. Many of the
parameters that impact overall lifecycle cost are automatically obtained from the conceptual SIF design
as modeled in the SILver™ tool.
In addition, the exSILentia® v4 Lifecycle Cost Estimator tool allows you to perform a cost benefit analysis
for a particular SIF, determining the financial impact of a SIF on overall plant risk.
23.1 Introduction
The lifecycle cost estimation functionality in the Cost tool use s a spreadsheet type interface to allow
you to specify SIF equipment, Design and Implementation, and Operation and Maintenance cost.
In the subsequent sections the Cost worksheet for both Lifecycle Cost Estimation and Cost Benefit
Analysis will be explained, as wells as the reporting capability. Interactions with the library regarding
items as Device Models and Team Members will also be addressed.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 235 of 292
23.2 Lifecycle Cost Estimator Worksheet
The Lifecycle Cost Estimator worksheet consists of two sub-worksheets, the Estimator worksheet and
the Cost Benefit Analysis worksheet. The cost benefit analysis relies on information specified as part of
the estimator work, so always start with the estimator.
SIF equipment
The SIF Equipment area shows all device models that are part of the specific SIF. The Cost tool
automatically determines the total quantity of device used for each device model as specific in the
SILver™ tool. For each device, you can specify:
l Cost per Device
l Reserve
The cost per device is automatically associated with the specific device model, meaning that if you
specify a cost for a device model here, it will automatically be used for all estimations that use the same
device model. This also means that you can specify the cost per device in the Device Model library.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 236 of 292
Design and Implementation
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 237 of 292
Operation and Maintenance
Operation and Maintenance Cost are further divided into Plant Events, Proof Tests, Routine
Maintenance, and Other Tasks. For each section events can be defined similar to the tasks in the Design
and Implementation cost section. In addition to the fields available for the Design and Implementation
tasks, the Operation and Maintenance section also include a field to specify the frequency of the event
per year.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 238 of 292
23.3 Lifecycle Cost Estimator Reports
In order to generate a Lifecycle Cost Estimator report select the Lifecycle Cost Report option from the
Report Wizard. The Report Wizard will show applicable Report Options.
The Report Option allows you to include or exclude SIFs in your Lifecycle Cost report.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 239 of 292
Chapter 24 exSILentia® Cyber
The CyberPHA tab navigates to the exSILentia® v4 cyber process hazard analysis tool CyberPHAx™
whereas the CyberSL™ tab navigates to the exSILentia® v4 cyber security level tool CyberSL™. Availability
of the CyberPHA and CyberSL tabs, and therefore the exSILentia® Cyber tools CyberPHAx™ and
CyberSL™, is based on your exSILentia® v4 license (see Chapter 1 Introduction for an overview of the
exSILentia® v4 license options). The CyberPHAx™ tool allows cyber risk assessment to be performed
based on the process industry Hazard and Operability (HAZOP) methodology. The CyberSL™ tool allows
for a security level evaluation to be performed on the various countermeasures identified for a particular
threat.
24.1 CyberPHAx™
The CyberPHAx™ tool allows cyber risk assessment to be performed based on the process industry
Hazard and Operability (HAZOP) methodology.
24.1.1 Introduction
Since the cyber risk assessment approach is based on the HAZOP methodology, CyberPHAx™ shows
many similarities with exSILentia® PHAx™, see Chapter 16 PHAx™ . The CyberPHAx™ tool uses a
spreadsheet type interface with defined columns for the various cyber risk assessment items.
In the subsequent sections the CyberPHAx™ tool hierarchy, the worksheet, and its reporting capability
will be explained.
24.1.2 Hierarchy
The hierarchical top level for an exSILentia® v4 project is a plant. Within the plant level several cyber
zones can be defined and within the cyber zone level, cyber nodes can be defined. Threat vectors which
are the cornerstone of the cyber risk assessment are defined for each cyber node.
l Plant (exSILentia® v4 project)
l Cyber Zones
l Cyber Nodes
l Threat Vector
Cyber Zones
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 241 of 292
Note: The default value for Plant Type is Unknown . The Process Type field will remain blank
without drop down box selections until a Plant Type has been defined.
Upon completion of all study items associated with a particular cyber zone, the Complete check box can
be checked. The box to the far right of the unit will turn orange and show a green bold check mark.
To navigate between cyber zones you can use the navigation tree in the left hand side bar, click the
Cyber Zone drop down box and select the desired Cyber Zone, or click on the up or down icons
until the applicable Cyber Zone is selected.
To modify a Cyber Zone:
l Highlight the Cyber Zone
l Click the icon
l Edit the Cyber Zone Properties, i.e. Name , select the Plant Type from the drop down box
(optional), and select the Process Type from the drop down box (optional)
To delete a Cyber Zone:
l Highlight the Cyber Zone
l Click on the red minus (-) symbol in the Cyber Zone row
l Click Yes to confirm you want to delete the Cyber Zone
l This will remove that Cyber Zone, its Cyber Zone Properties, and all associated data
Cyber Nodes
A HAZOP Cyber Node represents a specific section of the cyber zone system in which threat vectors are
evaluated.
To add a Cyber Node:
l Select the Cyber Zone where the node will be added
l Click on the green plus (+) symbol in the Cyber Node row
l Edit the Cyber Node Properties, i.e. Name, Node Intention, and Comments (optional)
l To take advantage of Smart Threat Vectors:
l Check the Smart Threat Vectors check box
l Within the Cyber Node Window, select the cyber node type from the drop down box
Upon completion of all study items associated with a particular Cyber node, the Complete check box can
be checked. The box to the far right of the node will turn orange and show a green bold check mark.
To navigate between cyber nodes you can use the navigation tree in the left hand side bar, click the
Cyber Node drop down box and select the desired Cyber Node within a Cyber Zone, or click on the up
or down icons until the applicable Cyber Node is selected for the selected Cyber Zone.
To modify a Cyber Node:
l Highlight the Cyber Node
l Click the icon
l Edit the Cyber Node Properties, i.e. Name, Node Intention, and Comments (optional)
To delete a Cyber Node:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 242 of 292
l Highlight the Cyber Node
l Click on the red minus (-) symbol in the Cyber Node row
l Click Yes to confirm you want to delete the Cyber Node
l This will remove that Cyber Node, its Cyber Node Properties, and all associated data
You can link references from the reference library (see section 13.4 for more information on the
Reference Library) to a Cyber Node by clicking on the link Icon and selecting a reference from the list
of available references. Once a reference is linked, you can click on the red minus (-) symbol to remove
the link.
Threat Vectors
A Threat Vector is a way in which the process conditions may depart from its design/process intent. It is
created by evaluating the susceptibility of the specific Cyber Node.
If you selected the Smart Threat Vectors check box when defining the Cyber Node the threat vectors
associated with the specific Cyber Node Type will be automatically defined for the Cyber Node. The
following steps can be used if you did not use Smart Threat Vectors or want to add or modify the Smart
Threat Vectors. You will also be able to delete a smart threat vector if it is not applicable to the Cyber
Node, however to document that you considered the specific threat vector it is better to leave it in the
project and mark it as not applicable.
To add a Threat Vector:
l Select the Cyber Node where the threat vector will be added
l Click on the green plus (+) symbol in the Threat Vector row
l Edit the Threat Vector Properties, i.e. Name and Design Intent
Upon completion of all study items associated with a particular threat vector, the Complete check box
can be checked. The box to the far right of the threat Vector will turn orange and show a green bold
check mark.
If for a threat vectors no threats or consequences of no significance are found, then the “No Issues”
check box can be checked. This will document “No Issues Found ” on the worksheet.
To navigate between threat vectors you can use the navigation tree in the left hand side bar, click the
Threat Vector drop down box and select the desired Threat Vector within a Cyber Node, or click on the
up or down icons until the applicable Threat Vector is selected for the selected Cyber Node.
To modify a Threat Vector:
l Highlight the Threat Vector
l Click the icon
l Edit the Threat Vector Properties, i.e. Name and Design Intent
To delete a Threat Vector:
l Highlight the Threat Vector
l Click on the red minus (-) symbol in the Threat Vector row
l Click Yes to confirm you want to delete the Threat Vector
l This will remove that Threat Vector, its Threat Vector Properties, and all associated data
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 243 of 292
24.1.3 CyberPHA Worksheet
The CyberPHAx™ tool worksheet uses columns for the selected Threat Vector in a spreadsheet type
interface. This allows the Threat data to be viewed quickly so one Threat-Consequence pair can be
compared to another Threat-Consequence pair within the same Threat Vector. Within the worksheet
columns buttons exist for adding Threats, Consequences, Countermeasures, and Recommendations. For
Threats and Consequences content can be edited directly from within the worksheet. Content for the
Countermeasures and Recommendations can also be directly edited from within the worksheet,
however as they are part of the Project Libraries (see Chapter 13 Project Libraries ) additional
functionality is available. Within the worksheet you will be able to add a new Countermeasure or
Recommendation. When you begin typing a new name for a Countermeasure or Recommendation the
auto-complete feature will display a list of Countermeasures or Recommendations which match the
entered text. You can double click on an item in the list to create a link between the relevant
Countermeasure or Recommendation and the current Threat-Consequence pair.
Threats
CyberPHAx™ threats are comprised of four related data fields, i.e. ID, Description, Threat Category, and
Threat Likelihood. The Threat ID is automatically generated and assigned to ensure relational data
integrity. If more than one Likelihood Category was defined in the Risk Matrix, a drop down list will allow
you to select the applicable Threat Category. The Threat Likelihood is intended to be the likelihood with
NO Countermeasures or the scenario where all countermeasures have failed. When combining the
Threat Likelihood with the Consequence Severity a Risk Without Countermeasures is obtained from the
Risk Matrix. The Threat Likelihood is selected from a drop down list of likelihoods configured within the
Risk Matrix. The list that appears is based on the associated Threat Category.
To add a Threat :
l Click on the Add Threat button at the bottom of the CyberPHA worksheet
l Edit the Threat Properties, i.e. Description, Threat Category, and Threat Likelihood
l Once a Threat Description has been entered you can click the Enter key on your keyboard to add
a new Threat
To delete a Threat :
l Highlight the Threat ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Threat is really to be deleted
CAUTION: Deleting a Threat will delete all consequences, countermeasures, and recommendations
that are related to it.
Consequence
CyberPHAx™ consequences are comprised of five related data fields, i.e. ID, Description, Consequence
Category, Severity, and Risk. The Consequence ID is automatically generated and assigned to ensure
relational data integrity. If more than one Consequence Category was defined in the Risk Matrix, a drop
down list will allow you to select the applicable Category. The Consequence Severity is selected from a
drop down list that is based on the Consequence Category selected. The Risk, representing the risk
without countermeasures, is automatically determined based on the Risk Matrix given the Threat
Likelihood and Consequence Severity selected.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 244 of 292
To add a Consequence:
l Click on the Add Consequence button that is in line with the Threat that you want to add the
Consequence to
l Edit the Consequence Properties, i.e. Description, Consequence Category, Severity, and Risk
l Once a Consequence Description has been entered you can click the Enter key on your keyboard
to add a new Consequence
To delete a Consequence:
l Highlight the Consequence ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Consequence is really to be deleted
CAUTION: Deleting a Consequence will delete all countermeasures and recommendations that are
related to it.
Countermeasures
CyberPHAx™ countermeasures are comprised of four related data fields, i.e. ID, Description,
Countermeasure Tag, and Countermeasure Category. The Countermeasure ID is automatically generated
and assigned to ensure relational data integrity. The Countermeasure Tag can be used to uniquely
identify a specific Countermeasure within a process plant. The Countermeasure Tag also enables links to
the Countermeasures from other applications. The Countermeasure Category is selected from a drop
down list. Categorizing Countermeasures allows for enhanced Countermeasure reporting. Furthermore
Countermeasure Category specific process safety information can be specified by clicking on the
Countermeasure Icon. In addition to the four data fields identified above, Custom Data/process safety
information data fields can be configured in the Custom Data section within the Project Configuration
(see section 8.7 ).
To add a New Countermeasure:
l Click on the Add Countermeasure button that is in line with the Consequence that you want to
add the Countermeasure to
l Edit the Countermeasure Properties, i.e. Description, Countermeasure Tag, and Countermeasure
Category
l Once a Countermeasure Description has been entered you can click the Enter key on your
keyboard to add a new Countermeasure
To add a Countermeasure directly from the Countermeasure Library:
l Click on the Link Countermeasure Icon
l Highlight the Countermeasure to add
l Click on Add
To delete a Countermeasure :
l Highlight the Countermeasure ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Countermeasure is really to be deleted
Note: When a Countermeasure is deleted and it is the last place where it is used, you will be asked
if you want to permanently delete the Countermeasure from the Library. Click Yes or No as
applicable.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 245 of 292
To edit the Custom Data/process safety information for a Countermeasure, click on the icon. The
applicable Custom Data entry form will appear.
The Likelihood with Countermeasures is intended to reflect the Threat Likelihood assuming ALL
Countermeasures are successful. The Likelihood is selected from a drop down list of likelihoods
configured within the Risk Configuration. The list that appears is based on the associated Threat
Category.
The Risk with Countermeasures is automatically determined based on the Risk Matrix given the
Likelihood with Countermeasures and Consequence Severity selected.
Recommendations
CyberPHAx™ recommendations are comprised of six related data fields, i.e. ID, Description, Category,
Assigned to, Due Date, and Status. The Recommendation ID is automatically generated and assigned to
ensure relational data integrity. The Recommendation Category is selected from a drop down list.
Categorizing Recommendation allows for easy recommendation sorting and reporting. The Assigned to
is selected from a drop down list. The list is populated with Member names that can be configured from
the Dashboard (see section 6.6 ). The Due Data is selected from the pop-up calendar. The Status is
selected from a drop down list where Open is the default value.
To add a New Recommendation:
l Click on the Add Recommendation button that is in line with the Consequence that you want to
add the Recommendation to
l Edit the Recommendation Properties, i.e. Description, Category, Assigned to, Due Date, and Status
l Once a Recommendation Description has been entered you can click the Enter key on your
keyboard to add a new Recommendation
To add a Recommendation directly from the Recommendation Library:
l Click on the Link Recommendation Icon
l Highlight the Recommendation to add
l Click on Add
To delete a Recommendation:
l Highlight the Recommendation ID
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Recommendation is really to be deleted
CyberSL
The CyberSL column allows the CyberPHA team to record if a detailed Cyber Security Level Verification is
required for a specific Threat-Consequence pair scenario. The drop down list allows a Yes, No, or N/A
(default) selection. When a Threat- Consequence pair scenario is to be further evaluated it can be
assigned to a Cyber Event Scenario. To add, edit, or remove a Cyber Event Scenario click on the Cyber
Event Scenario icon .
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 246 of 292
Note: The Threat-Consequence pair will only be available for further evaluation in the CyberSL™
worksheet if the CyberSL drop down box selection is Yes, even when the Threat-Consequence pair
is assigned to a Cyber Event Scenario.
Comments
Comments can be edited directly in the Comments text box. A Comment is associated with a single
Threat. To delete a comment, highlight the text and click on the Delete key on your keyboard.
24.2 CyberSL™
The Cyber SL tool SL Verification analysis worksheet uses a spreadsheet type interface for the evaluation
of each Cyber Event Scenario. This provides a clear overview of the applicable cyber threats and
countermeasures for the respective Severity Categories. Within the worksheet interface buttons exist for
adding Threats (T), Countermeasures (CMR), Target Attractiveness (TA), Kill Chain Relevance (KCR), and
Conditional Modifiers (CM) to the Cyber SL Worksheet for a specific Cyber Event Scenario. Applicability of
a CMR, TA, KCR, and/or CM can be edited directly in the worksheet. As the Cyber Threats, Cyber
Countermeasures, Cyber Event Scenarios, Target Attractiveness, Kill Chain Relevance and Conditional
Modifiers are part of the Project Libraries (see Chapter 13 Project Libraries) they can be linked to existing
items. The Cyber SL worksheet consists of three main areas: the toolbar, the Cyber Event Scenario list,
and the workspace.
An example of the LOPAx™ tool layer of protection analysis worksheet is shown in the figure below.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 247 of 292
24.2.1 Creating Cyber Event Scenarios
Cyber SL Cyber Event Scenarios are comprised of two related data fields, i.e. ID and Name. The Cyber
Event Scenario ID is automatically generated and assigned to ensure relational data integrity. Cyber
Event Scenarios can be defined manually within the tool or obtained from the work previously done
using the Cyber PHAx tool.
To add a Cyber Event Scenario:
l Click on the Add Cyber Event Scenario button in the upper left hand corner of the toolbar
l This will immediately add the Cyber Event Scenario to the Cyber Event Scenario list
To edit the Cyber Event Scenario Name:
l Right click on the Cyber Event Scenario in the Cyber Event Scenario list and select edit, or
l Double click the Cyber Event Scenario name in the upper left hand corner of the worksheet
To delete a Cyber Event Scenario:
l Select the Cyber Event Scenario in the Cyber Event Scenario list
l Click on the Delete key on your keyboard
l Click on Yes when asked if the Cyber Event Scenario is really to be deleted
CAUTION: Deleting a Cyber Event Scenario will delete all instances where the Cyber Event Scenario
was used. This will include any linking done in the Cyber PHAx tool.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 248 of 292
l Double click the threat name in the worksheet, or
l Right click on the threat in the worksheet and select edit
To add a Threat directly from the Cyber Threats Library:
l Click on the Link Threat Icon
l Highlight the Threat(s) to add
l Click on Link Selected
To delete a Threat:
l Highlight the Threat
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Threat Event is really to be deleted
Note: When a Threat is deleted and it is the last place where it is used, you will be asked if you
want to permanently delete the Threat from the Library. Click Yes or No as applicable.
When you add a threat a default threat likelihood of attack of 1 per year is associated with the threat.
This value can of course be update as needed, directly in the workspace.
To directly edit the likelihood within the workspace:
l Highlight the Threat Likelihood value
l Type in the applicable value (likelihood must be per year)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
Note: When a Threat is used in multiple locations, changing its properties (including the Threat
Likelihood) will impact all locations where that initiating event is used.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 249 of 292
l Click on the Link Target Attractiveness Icon
l Highlight theTarget Attractiveness(s) to add
l Click on Link Selected
To delete a Target Attractiveness:
l Highlight the Target Attractiveness
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Target Attractiveness is really to be deleted
Note: When an Target Attractiveness is deleted and it is the last place where it is used, you will be
asked if you want to permanently delete the Target Attractiveness from the Library. Click Yes or No
as applicable.
When you add a Target Attractiveness, a default factor of 1 is associated with the Target Attractiveness.
In addition the Target Attractiveness is set to be Not Applicable (NA) to all Cyber Threats in the Cyber SL
Worksheet. Applicability and probability of the situation occurring can be update as needed. To change
the applicability of an Target Attractiveness to a specific threat, simply double click the intersection of
Target Attractiveness and Cyber Threat. The NA will then change to the factor associated with theTarget
Attractiveness.
To manually edit the Target Attractiveness factor:
l Click on the Edit icon when hovering over the Target Attractiveness or right click on the Target
Attractiveness in the worksheet and select edit
l Type in the applicable value (probability must range from 1 to 5)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
24.2.5 Countermeasures
A Countermeasure (SMR) is a device, system, or action that is capable of preventing a cyber event
scenario from proceeding to its undesired consequence independent of the threat or the action of any
other countermeasure associated with the scenario.
To add a new Countermeasure:
l Click on the Add CMR button at the upper left hand corner of the toolbar
l This will immediately add theCountermeasure to the Worksheet
l This will also add the Countermeasure to the Cyber Countermeasures library
To edit the Countermeasure Name:
l Double click the Countermeasure name in the worksheet, or
l Click on the Edit icon when hovering over the Countermeasure, or
l Right click on the Countermeasure in the worksheet and select edit
To add an Countermeasure directly from the Cyber Countermeasure Library:
l Click on the Link Countermeasure Icon
l Highlight the Countermeasure(s) to add
l Click on Link Selected
To delete an Countermeasure:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 250 of 292
l Highlight the Countermeasure
l Click on the Delete key on your keyboard (or right click and select Delete)
l Click on Yes when asked if the Countermeasure is really to be deleted
Note: When a Countermeasure is deleted and it is the last place where it is used, you will be asked
if you want to permanently delete the Countermeasure from the Library. Click Yes or No as
applicable.
When you add an Countermeasure a default probability of failure of 1 is associated with the
Countermeasure. In addition the Countermeasure is set to be Not Applicable (NA) to all Cyber Theats in
the Worksheet. Applicability and probability of failure can be update as needed. To change the
applicability of a Countermeasure to a specific cyber threat, simply double click the intersection of
Countermeasure and Cyber Threat. The NA will then change to the probability associated with the
Countermeasure.
To manually edit the Countermeasure:
l Click on the Edit icon when hovering over theCountermeasure or right click on
theCountermeasure in the worksheet and select edit
l Type in the applicable value (probability must range from 0 to 1)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
Note: When a Conditional Modifier is deleted and it is the last place where it is used, you will be
asked if you want to permanently delete the Conditional Modifier from the Library. Click Yes or No
as applicable.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 251 of 292
When you add a Conditional Modifier a default probability of 1 is associated with the Conditional
Modifier. In addition the Conditional Modifier is set to be Not Applicable (NA) to all Cyber Threats in the
Cyber SL Worksheet. Applicability and probability can be update as needed. To change the applicability
of an conditional modifier to a specific Cyber Threat, simply double click the intersection of conditional
modifier and Cyber Threat. The NA will then change to the probability associated with the conditional
modifier.
To manually edit the probability:
l Click on the Edit icon when hovering over the Conditional Modifier or right click on the
Conditional Modifier in the worksheet and select edit
l Type in the applicable value (probability must range from 0 to 1)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
Note: When a Kill Chain Relevance is deleted and it is the last place where it is used, you will be
asked if you want to permanently delete the Kill Chain Relevance from the Library. Click Yes or No
as applicable.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 252 of 292
When you add a Kill Chain Relevance, a default factor of 1 is associated with the Kill Chain Relevance. In
addition the Kill Chain Relevance is set to be Not Applicable (NA) to all Cyber Threats in the Cyber SL
Worksheet. Applicability and probability of the situation occurring can be update as needed. To change
the applicability of an Kill Chain Relevance to a specific threat, simply double click the intersection of Kill
Chain Relevance and Cyber Threat. The NA will then change to the factor associated with the Kill Chain
Relevance.
To manually edit the Kill Chain Relevance factor:
l Click on the Edit icon when hovering over the Kill Chain Relevance or right click on the Kill
Chain Relevance in the worksheet and select edit
l Type in the applicable value (probability must range from 0 to 1)
l Manually add the applicable assumptions, comments, and reference by clicking on the notes icon
Given the Target Likelihood specified and the Likelihood of Success calculated, a Remaining Cyber Risk
(RCR) is calculated for the Cyber Event Scenario. If theLikelihood of Success is less than or equal to the
Target Likelihood, the Remaining Cyber Risk will state a NA for not applicable, indicating no further risk
reduction is required.
24.2.9 Comments
Comments can be edited directly in the Comments text box. A Comment is associated with a single
Cyber Threat. To delete a comment, highlight the text and click on the Delete key on your keyboard.
Note that Cyber SL Comments are independent of the Cyber PHA Comments.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 253 of 292
Part 4
Miscellaneous
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 255 of 292
Abbreviations
BMS Burner Management System
BPCS Basic Process Control System
C&E Cause and Effect
CCF Common Cause Failure
CFSE Certified Functional Safety Expert
CFSP Certified Functional Safety Professional
CHAZOP Control Hazard & Operability Analysis
CISSP Certified Information Systems Security Professional
CM Conditional Modifier
CMF Common Mode Failure
DTT De-energize To Trip
E/E/PE Electrical/Electronic/Programmable Electronic
EC Enabling Condition
EMC Electro-Magnetic Compatibility
ESD Emergency Shutdown
ETT Energize To Trip
FAT Factory Acceptance Testing
FBT Frequency Based Targets
FMEA Failure Mode and Effects Analysis
FMEDA Failure Modes Effects and Diagnostic Analysis
FPL Fixed Program Language
FSA Functional Safety Assessment
FSM Functional Safety Management
FVL Full Variability Language
HAZOP Hazard and Operability study
HFT Hardware Fault Tolerance
HMI Human Machine Interface
IACS Industrial Automated Control System
IE Initiating Event
IEC International Electrotechnical Commission
IPL Independent Protection Layer
ISA International Society of Automation
L Likelihood
LOPA Layer of Protection Analysis
LVL Limited Variability Language
MOC Management Of Change
MTTFS Mean Time To Fail Spurious
MTTR Mean Time To Repair
PFD Probability of Failure on Demand
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 257 of 292
PFDAVG Average Probability of Failure on Demand
PFH Probability of a Dangerous Failure per Hour
PHA Process Hazard Analysis
PIU Proven In Use / Prior Use
PLC Programmable Logic Controller
PSI Process Safety Information
PSCAI Process Safety Controls, Alarms and Interlocks
PTC Proof Test Coverage
PTI Proof Test Interval
QRA Quantitative Risk Assessment
R Risk
RRF Risk Reduction Factor
S Severity of Consequence
SAT Site Acceptance Testing
SERH Safety Equipment Reliability Handbook
SFF Safe Failure Fraction
SG Safeguard
SIF Safety Instrumented Function
SIL Safety Integrity Level
SILac Achieved Safety Integrity Level based on Architectural Constraints
SILcap Achieved Safety Integrity Level based on Equipment Systematic Capability
SILpfd Achieved Safety Integrity Level based on Safety Instrumented Function
probability of failure
SIS Safety Instrumented System
SLC Safety Lifecycle
SOP Standard Operating Procedure
SRS Safety Requirements Specification
SSI Site Safety Index
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 258 of 292
Terms and Definitions
Basic Process Control System System that responds to input signals from the process, its
associated equipment, other programmable systems and/or an
operator and generates output signals causing the process and its
associated equipment to operate in the desired manner but that
does not perform any safety instrumented functions with a claimed
SIL greater than or equal to 1.
Batch Process A process that leads to the production of finite quantities of material
by subjecting quantities of input materials to an ordered set of
processing activities over a finite period of time using one or more
pieces of equipment.
Common Cause Failure Failure, which is the result of one or more events, causing failures of
two or more separate channels in a multiple channel system,
leading to system failure.
Common Mode Failure Failure of two or more channels in the same way, causing the same
erroneous result.
Conditional Modifier One of several possible probabilities included in scenario risk
calculations when risk criteria endpoints are expressed in impact
terms (e.g., fatalities) instead of in primary loss event terms (e.g.,
release, vessel rupture). Conditional modifiers include, but are not
necessarily limited to:
l Probability of a hazardous atmosphere
l Probability of ignition or initiation
l Probability of explosion
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 259 of 292
Failure Modes Effects and A systematic procedure during which each failure mode of each
Diagnostic Analysis component is examined to determine the effect of that failure on the
system and whether that failure is detected by any automatic
diagnostic function
Hardware Fault Tolerance The number of dangerous random failures tolerated by a system
while still maintaining the ability to successfully perform the safety
function
Hazard Scenario Scenario that consists of one or more sequence of events that
results in a final consequence of concern. Each Hazard Scenario
consists of at least one cause - consequence pair.
Impact A measure of the ultimate loss and harm of a loss event. Impact may
be expressed in terms of numbers of injuries and/or fatalities, extent
of environmental damage and/or magnitude of losses such as
property damage, material loss, loss of intellectual property, lost
production, market share loss, and recovery costs.
Incident An event or sequence of events that either resulted in or had the
potential to result in adverse impacts.
Independent Protection Layer A device, system, or action that is capable of preventing a scenario
from proceeding to the undesired consequence regardless of the
initiating event or the action of any other protection layer associated
with the scenario.
Initiating Event The event that initiates the scenario leading to the undesired
consequence.
Layer of Protection Analysis An approach that analyzes incident scenario(s) (cause-consequence
pair(s)) using values for the initiating event frequencies, enabling
conditions, independent protection layer failure probabilities, and
conditional modifiers as applicable in order to compare a Hazard
Scenario risk estimate to risk criteria to determine if additional risk
reduction or more detailed analysis is needed. Scenarios are
identified elsewhere, typically using a scenario based hazard
evaluation procedure such as a HAZOP Study.
Likelihood A measure of the expected frequency with which an event occurs.
This may be expressed as a frequency (e.g. events per year), a
probability of occurrence during a time interval (e.g. annual
probability), or a conditional probability (e.g. probability of
occurrence, given that a precursor event has occurred).
Mean Time To Repair The expected time to repair equipment items in case of a failure
detected by automatic equipment item diagnostics
Mission Time The time period that a SIF is expected to be operational. Typically
this period corresponds to the interval when all devices are either
replaced or refurbished to “as new condition”. It should not be
confused with the proof test interval.
Probability of Failure on Demand The probability that a system or other protective measure will fail to
perform a specified function on demand. PFD is expressed as a
dimensionless number ranging from zero to one.
Process Hazard Analysis A hazard evaluation of broad scope that identifies and analyzes the
significance of hazardous situations associated with a process or
activity.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 260 of 292
Proven In Use / Prior Use A Proven In Use assessment is a study of product operational hours,
revision history, fault reporting system, and field failures to
determine if there is evidence of systematic design faults in a
product. The IEC 61508 standard provides levels of operational
history required for each SIL level.
Quantitative Risk Assessment The systematic development of numerical estimates of the expected
frequency and consequence of potential incidents associated with a
facility or operation based on engineering evaluation and
mathematical techniques.
Risk A measure of human injury, environmental damage, economic loss,
loss of intellectual property or loss of privacy in terms of both the
incident likelihood and the magnitude of the loss or injury. A
simplified version of this relationship expresses risk as the product
of the likelihood and the consequences (i.e. Risk = Consequence x
Likelihood) of an incident.
Risk Assessment The process by which the results of a risk analysis (i.e. risk
estimates) are used to make decisions, either through relative risk
ranking of risk reduction strategies or through comparison with
tolerable risk levels.
Risk Mitigation A reduction of risk due to a reduction of the likelihood or impact
associated with a loss event.
Risk Receptor Something which could come to harm, including human health,
environment, or financial well-being.
Risk Reduction Factor (RRF) - The measure of the degree of risk reduction achieved by a
Achieved safeguard, countermeasure, or protection strategy. Achieved RRF
can be expressed as the ratio of unmitigated risk divided by
mitigated risk resulting from that safeguard, countermeasure, or
protection strategy. For an independent low demand safety
function, this can be expressed as the reciprocal of the average
probability of failure on demand.
Risk Reduction Factor (RRF) - The measure of the degree of risk reduction needed to achieve
Target/Required tolerable risk. RRF can be expressed as the ratio of unmitigated risk
divided by tolerable risk. Within exSILentia® a distinction is made
between Target and Required RRF.
Target RRF is used to identify the risk reduction needed to achieve
tolerable risk resulting from the LOPA/SIL selection.
Required RRF is used to identify the risk reduction specified in the
SRS which the SIF as designed should meet. The required RRF is
typically equal to or greater than the target RRF (if the user decides
to round the target RRF).
Risk Tolerance 1. Willingness by authority having jurisdiction to live with a risk so as
to secure certain benefits in the confidence that the risk is one that
is worth taking and that it is being properly controlled. However, it
does not imply that everyone would agree without reservation to
take that risk or have it imposed on them.
2. Risk the organization is willing to accept.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 261 of 292
Risk Tolerance Criteria A predetermined measure of risk used to aid decisions about
whether further efforts to reduce risk are warranted.
Safety Freedom from unacceptable risk.
Safety Integrity Level Discrete level (one out of a possible four) for specifying the safety
integrity requirements of the safety functions to be allocated to the
electronic / programmable electronic safety-related systems, where
safety integrity level 4 has the highest level of safety integrity and
safety integrity level 1 has the lowest [IEC 61508-4]
Safety Integrity Level - Within exSILentia® a distinction is made between Target and
Target/Required Required SIL.
Target SIL is used to identify the SIL needed to achieve tolerable risk
resulting from the LOPA/SIL selection.
Required SIL is used to identify the SIL specified in the SRS which the
SIF as designed should meet. The required SIL is typically equal to
the target SIL but would allow different target SILs to result from the
different SIL selection methods.
Severity A measure of the degree of impact of a particular consequence.
SIL Threshold Parameter to specify the boundary between target Safety Integrity
Levels Assume a calculated Required Risk Reduction Factor of 29,
which would fall in the 10 - 100 Risk Reduction range. With a SIL
Threshold Ratio of 1, a calculated Risk Reduction Factor of 29 would
result in a Target SIL of SIL 2. The calculated Risk Reduction Factor
is in this case greater than the SIL determination threshold which
lies at 10 (10 * 1). With a SIL Threshold Ratio of 3, a calculated Risk
Reduction Factor of 29 would result in a Target SIL of SIL 1. The
calculated Risk Reduction Factor is in this case less than the SIL
determination threshold which lies at 30 (10 * 3).
Startup Time The time it takes to re-start the process after a shutdown
Systematic Capability Indication of systematic failure protection for an equipment item.
Per IEC 61511 users of existing hardware either need to select
hardware that is developed and assessed per IEC 61508 or justify the
use of that hardware. The objective of the assessment or
justification is to identify that there are “no” systematic problems
with the equipment item under consideration. Systematic failure
protection is part of IEC 61508 compliant development processes,
alternatively sufficient recorded experience can also be used to
identify that there is no known systematic problem.
Useful Life That portion of life when the failure rate can be described by the
exponential distribution, i.e. constant failure rate. The useful life
follows infant mortality or burn- in and precedes the wear- out
portions of the overall life. For functional safety applications,
devices are expected to be replaced at the end of their useful life.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 262 of 292
Disclaimer and Assumptions
Limitations and assumptions associated with the use of exSILentia® v4 are documented in the following
sections.
Disclaimer
The user of the exSILentia® v4 software is responsible for verification of all results obtained and their
applicability to any particular situation. Calculations are performed per guidelines in applicable
international standards and common methods described in subject matter literature. exida Innovation
LLC accepts no responsibility for the correctness of the regulations, standards, or literature on which the
software tool is based.
In particular, exida Innovation LLC accepts no liability for decisions based on the results of the
exSILentia® v4 software. The exida Innovation LLC guarantee is restricted to the correction of errors or
deficiencies within a reasonable period when such errors or deficiencies are brought to the attention of
exida Innovation LLC in writing. exida Innovation LLC accepts no responsibility for modifications made by
the user to any reports and exports automatically generated by the exSILentia® v4 software.
exida has compiled a proprietary initiating event frequency and protection layer probability of failure
database. This database is a compilation of failure data collected from a variety of public and
confidential sources and presents an industry average. The database is available in the LOPAx™ module
of exSILentia® v4.
The user is responsible for determining the applicability of the initiating event frequencies and
protection layer probabilities of failure to any particular application. Accurate plant specific data
(historic data) is preferable to general industry average data. Industrial plant sites with high levels of
stress must use initiating event and protection layer data that is adjusted to a higher value to account
for the specific conditions of the plant.
exida has compiled a proprietary equipment failure database. This database is a compilation of failure
data collected from detailed predictive analysis performed through Failure Modes, Effects, and
Diagnostics Analysis (FMEDA) for specific manufacturer specific products and a variety of public and
confidential sources. The failure rate data presents an average worst-case estimate of failure rates to be
expected during normal operation of a particular equipment item. The database is published as the
“Safety Equipment Reliability Handbook, fourth edition” ISBN 978-1-934977-15-6. The reliability data
collection process is described in the SERH book.
The user is responsible for determining the applicability of the failure data to any particular
environment. The stress levels assumed to determine the equipment failure rate are average worst-case
for an industrial environment and are documented in the SERH book. Accurate plant specific data is
preferable to general industry average data. Industrial plant sites with high levels of stress must use
failure rate data that is adjusted to a higher value to account for the specific conditions of the plant.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 263 of 292
Assumptions LOPA
Assumptions SILect
The SILver Worksheet calculations are based on many of the assumptions that are identified in IEC
61508-6, Annex B. Specific assumptions on which the calculations within SILver Worksheet are based are
listed below.
l The sensor part ranges from the actual sensing element up to and including the logic solver input
channel or the logic solver input module depending on logic solver I/O channel configuration by
the user
l The logic solver part ranges from the logic solver input module to the logic solver output module
or includes just the CPU based on the logic solver I/O channel configuration by the user.
l The final element part ranges from the logic solver output channel or the logic solver output
module depending on the I/O channel logic solver configuration by the user up to and including
the final actuating element within the safety instrumented function
l Equipment item failure rates are constant over the useful life of the equipment item
l Only a single failure can occur within one independent part of a configuration
l The embedded diagnostic test time is much shorter than the average repair time
l The proof test interval is at least two orders of magnitude greater than the embedded diagnostic
test interval
l Limited coverage of failures during a proof test is modeled using the proof test coverage factor, it
is assumed that the proof test coverage has effect on all states, undetected and detected
l For each sensor, logic solver, and final element group there is a single proof test interval and
Mean Time To Repair
l Multiple repair teams are available to work on all known failures
l Repair rates are constant
l The Mean Time To Repair (MTTR) is an order of magnitude less than the expected demand rate
l Common cause failures are assumed to be the same in redundant units
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 264 of 292
Assumptions SILver - Proof Test Coverage Calculator
The SILver Worksheet Proof Test Coverage Calculator determines a suggested Proof Test Coverage factor
based on a manufacturer identified proof test and the effectiveness of that proof test. If you use the
suggested proof test coverage, you must ensure that the actual test(s) performed is (are) at least as
effective as the manufacturer suggested test(s).
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 265 of 292
Software License Agreement –
exSILentia® Standalone
IMPORTANT – READ CAREFULLY: This Software License Agreement is the legal agreement
(“Agreement”) between you, the customer who has acquired the software (“You”) and exida Innovation
LLC (“exida”) with offices at 80 North Main Street, Sellersville, PA, 18960, USA. Please read this
agreement carefully before completing the installation process and using the exida exSILentia ® tool
(together with its accompanying documentation, the “Software”). This agreement provides a license to
use the Software and contains warranty information and liability disclaimers.
BY INSTALLING, COPYING OR OTHERWISE USING THE SOFTWARE, YOU ARE CONFIRMING YOUR
ACCEPTANCE OF THE SOFTWARE AND AGREEING TO BECOME BOUND BY THE TERMS OF THIS
AGREEMENT. IF YOU DO NOT AGREE, DO NOT INSTALL OR USE THE PRODUCT.
IF YOU DID NOT ACQUIRE THE SOFTWARE FROM exida, THEN YOU MAY NOT ENTER INTO THIS
AGREEMENT OR USE THE SOFTWARE. NO OTHER PARTY HAS THE RIGHT TO TRANSFER A COPY OF
THE SOFTWARE TO YOU.
The Software is owned by exida and is protected by copyright laws and international copyright treaties,
as well as other intellectual property laws and treaties. THE SOFTWARE IS LICENSED, NOT SOLD.
If you have any questions or concerns about this agreement, please contact exida at the above listed
address.
1. DEFINITIONS
a. “Affiliates” means any company or entity controlled by, controlling, or under common
control with You or exida. For the purposes of this definition, “control” shall mean the
power to cause the direction of the management of such company or entity, directly or
indirectly, whether through ownership of voting securities or otherwise, it being
understood that ownership of 50% or more of the voting securities of another shall in all
circumstances constitute control.
b. “exida” means exida Innovation LLC and its Affiliates
c. “You”, “Your” means you, your company, and your company’s Affiliates
d. “Documentation” means the user manuals and any other materials in any form or medium
customarily provided by exida to You which will provide sufficient information to operate,
diagnose, and maintain the Software properly, safely and efficiently
e. “Software” means the product provided to You, which includes the exSILentia ® tool and
the associated media, printed materials, and “online” or electronic documentation. The
Software includes any updates or new versions that may be provided to You.
f. “Maintenance” is defined in the Maintenance and Support Article, section 4 of this
agreement
g. “Proprietary Information” means all of Your and your affiliates plans, processes, products,
business information, data, technology, Information Resources, computer programs and
documentation and the like. It includes any information or material that (a) is marked
“Confidential”, “Restricted”, or “Proprietary Information” or other similar marking, (b) is
known by the parties to be considered confidential and proprietary, or (c) should be
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 267 of 292
known or understood to be confidential or proprietary by an individual exercising
reasonable commercial judgment.
2. OWNERSHIP. The Software is owned and copyrighted by exida. The license granted to You
confers no title or ownership in the Software and is not a sale of any rights in the Software. exida
warrants that it has full power and authority to grant the licenses and rights granted under this
License Agreement without the consent or approval of any third party.
a. All information, artwork, graphics, text, copy, data, software, and other material included
in the Software are exida’s exclusive intellectual property.
3. LICENSE
1. GRANT OF LICENSE. exida grants You the following rights provided You comply with all
terms and conditions of this agreement. For each license You have acquired for the
Software:
a. You are granted a non-exclusive, non-transferable, license during the term of this
Agreement to install and use for your business purposes the Software on an
unlimited number of Your workstations. If the Software is a software suite or
bundle with more than one specified Software product, this license applies to all
such specified Software products.
b. You are granted a non-exclusive, non-transferable, right to apply quarterly updates
to the Safety Equipment Reliability Handbook database for the duration of 1 year
c. The USB license key(s) restricts use to a specified number of concurrent users only
d. You may make one copy of the Software for backup, disaster recovery, or archival
purposes
2. DOCUMENTATION. You are hereby granted the right to reproduce the user manuals and
other written materials created by exida to describe the functionality and use of the
Software (the “Documentation”) and to distribute a single copy of the Documentation in
soft form or in print to each user over Your internal network.
3. LICENSE RESTRICTIONS. You shall not grant access to the Software to any persons or
entities other than those of Your employees and on-site contractors who are located at
Your facilities nor shall You sell, lease or distribute the Software to any person or entity as
a standalone or bundled product or make any other commercial use thereof. You shall not
modify, reverse engineer, decompile, or disassemble the Software. You shall not adapt,
translate, or create derivative works based on the Software or the Documentation without
the prior written approval of exida. You shall not exceed the scope of the license granted
in Sections 3.1 and 3.2 above. You shall not export the Software or Documentation, or any
copies thereof, to any user in violation of applicable laws and regulations.
4. COPYRIGHT. exida owns the Software and related Documentation and their copyrights
that are protected by United States copyright laws and international treaty provisions.
This Agreement does not and shall not be construed as transferring ownership rights of
the Software, Documentation, any modifications thereto or any related materials to You or
to any third party. exida owns and shall retain all right, title and interest in the Software,
including all copyrights, patents, trade secret rights, trademarks, and other intellectual
property rights therein. You shall retain all copyright and trademark notices on the
Software and Documentation and as otherwise necessary to protect exida intellectual
property rights.
5. YOUR RESPONSIBILITY. You expressly agree to be fully responsible for compliance by
Your employees and on-site contractors with the applicable terms of this Agreement.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 268 of 292
6. COPIES. You are permitted to copy the Documentation and written materials for
distribution to employees using the Licensed Software, and to make and retain a copy of
the Software for archival purposes.
4. MAINTENANCE AND SUPPORT.
1. SUPPORT.
a. Limited Technical Support. During the term of this agreement You are entitled to
limited technical support. exida will provide technical support via its support
website http://support.exida.com . Safety Instrumented Function Consultancy is
excluded from the exida support under this agreement.
b. Upon payment of the Annual Maintenance Fee, You shall be entitled to 2 hours of
technical support per year for each concurrent user license. Bug reporting and
resolution is not counted towards your technical support allotment.
2. MAINTENANCE AND UPDATES.
a. Definitions. For the purposes of this section, the following shall apply:
i. Bug Fix: The term “Bug Fix” means any engineering patch intended to fix
bugs and errors in the Software.
ii. Functionality Update: The term “Functionality Update” means any new
release of the Software. Functionality Updates are issued provided that
maintenance and support is in good standing, i.e. maintenance period is
active and no lapses have occurred in the maintenance period. Updates do
not include any exida software, which constitutes a separate product by
virtue of different features or functionality. Updates do not include
standalone products that can be integrated with the Software.
iii. Equipment Database Update: The term “Equipment Database Update”
means any new version of the Safety Equipment Reliability Handbook
Database embedded in the Software. Equipment Database Updates are
issued quarterly.
iv. Maintenance: The term “Maintenance” means technical support,
Functionality Updates, and Equipment Database Updates, provided during
the Maintenance Period.
v. Maintenance Period. The term “Maintenance Period” for the Software
means any period commencing at the date of sale of the Software, or any
anniversary thereof, for which You have paid the Maintenance Fee for each
license of the Software you purchased.
b. Delivery of Updates. For any period in which You have paid the Maintenance Fee (or
the relevant pro-rated portion thereof in accordance with section 4.3), exida shall
provide automatic download of functionality, and Equipment Database updates.
c. License to Updates. exida hereby grants You a nonexclusive; nontransferable
license during the term of this Agreement to use the Updates delivered under this
section.
3. RENEWAL. If exida continues to offer support and updates for the Software, You may
renew Maintenance by delivering exida a purchase order referencing this Agreement on or
before the expiration of the Paid Maintenance Period. If You elect to renew the
Maintenance, You must do so for all copies of the Software licensed hereunder. As a
courtesy, exida agrees to notify you via automated message prior to the expiration of the
Maintenance Period to allow ample time for renewal. exida assumes no responsibility for
lapses in the Maintenance Period that occurs as a result of You failing to renew the
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 269 of 292
Maintenance Period before its expiration. If Maintenance is not renewed, maintenance fees
must be paid for the time of the maintenance lapse, in order to obtain full Functionality
and Equipment Database updates.
5. RESTRICTED USE.
a. You agree to use reasonable efforts to prevent unauthorized copying of the Software
b. You may not disable any licensing or control features of the Software or allow the
Software to be used with such features disabled
c. You may not share, rent, or lease Your right to use the Software
d. You may not modify, sublicense, copy, rent, sell, distribute or transfer any part of the
Software except as provided in this Agreement
e. You may not reverse engineer, decompile, translate, create derivative works, decipher,
decrypt, disassemble, or otherwise convert the Software to a more human-readable form
for any reason
f. You may not use the Software for any purpose other than to perform safety lifecycle tasks
in accordance with the accompanying documentation
g. You may not remove, alter, or obscure any confidentiality or proprietary notices (including
copyright and trademark notices) of exida on, in or displayed by the Software
h. You will return or destroy all copies of the Software if and when Your right to use it ends
i. You may not use the Software for any purpose that is unlawful
6. PROPRIETARY INFORMATION.
1. EXIDA SHALL
a. Not use or disclose Proprietary Information to any third party except as is clearly
necessary to provide the Services, provided such party is bound by a written
confidentiality agreement with terms no less stringent than the terms herein.
b. Not attempt to access any portion of Information Resources without authorization
of You. If unauthorized access is nevertheless obtained, whether inadvertently or
otherwise, exida shall have a duty to promptly report to You, in writing, each
instance thereof, setting out the extent and circumstances of such access.
c. Not attempt to defeat any security provisions maintained by You for the protection
of Information Resources or information contained therein.
d. Not remove, copy, alter, or install any software or information or data on any of
Your computers unless specifically authorized by You in connection with the
Services or make any attempt to learn or document passwords or other
information which could facilitate unauthorized access to Information Resources.
e. Require each of its employees, contractors and agents needing access to
Information Resources to obtain passwords from Your authority responsible for the
security of Information Resources, to use and protect passwords as required by
You, and to follow such protocols governing access as may be set out by You.
2. CONFIDENTIALITY. Neither party shall, during the term of this Agreement or thereafter,
disclose, make commercial or other use of, give or sell to any person, firm, or corporation,
any information of the other party that is treated and identified in writing as confidential,
except either party may disclose such information if (i) required to do so pursuant to
applicable law; (ii) it was rightfully in their possession from a source other than the other
party prior to the time of disclosure of said information; (iii) it was in the public domain
prior to the time of receipt; (iv) it became part of the public domain after the time of
receipt by any means other than an unauthorized act or omission by such party; (v) it is
supplied after the time of receipt without restriction by a third party who is under no
obligation to maintain such information in confidence; or (vi) it was independently
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 270 of 292
developed prior to the time of receipt. Both parties will use at least the same standard of
care as they do to protect their own Proprietary Information to ensure that their
employees, agents or consultants do not disclose or make any unauthorized use of such
Proprietary Information. Both parties will promptly notify the other party upon discovery
of any unauthorized use or disclosure of the Proprietary Information.
3. TERMINATION OF exida’s RIGHT TO POSSESS PROPRIETARY INFORMATION. Upon final
acceptance or earlier termination of this Agreement for any reason, exida's rights to
possession and use of any of the Proprietary Information in connection with the
performance of its obligations hereunder or otherwise shall terminate and exida shall
immediately deliver to You all of the Proprietary Information and all copies of any portion
thereof. exida shall, upon completion of such delivery, certify in writing to You that it has
fulfilled its obligations under this Article. exida will keep one copy of all Proprietary
Information provided for future reference and legal liability requirements.
7. DISCLAIMER OF WARRANTY. The Software is provided on an “AS IS” basis, without warranty of
any kind, including, without limitation, the warranties of merchantability, fitness for a particular
purpose, non-infringement title, and results. The entire risk as to the quality and performance of
the Software is borne by You. If the Software is intended to link to, extract content from or
otherwise integrate with a third party product, exida makes no representation or warranty that
Your particular use of the Software is or will continue to be authorized by law in Your jurisdiction
or that the third party product will continue to be available to You. This disclaimer of warranty
constitutes an essential part of the agreement.
1. WARRANTY. exida warrants that the Software does not infringe the intellectual property
rights of any third party.
8. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
TORT, CONTRACT, OR OTHERWISE, SHALL exida BE LIABLE TO YOU OR ANY OTHER PERSON
OR SHALL YOU BE LIABLE TO exida OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL,
PUNITIVE, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR WORK STOPPAGE, COMPUTER FAILURE OR LOSS OF
REVENUES, PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE OR ECONOMIC LOSSES.
IN NO EVENT WILL exida BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE AMOUNT PAID TO
LICENSE THE SOFTWARE, EVEN IF YOU OR ANY OTHER PARTY SHALL HAVE INFORMED exida
OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM. NO CLAIM, REGARDLESS OF
FORM, MAY BE MADE OR ACTION BROUGHT BY YOU MORE THAN ONE YEAR AFTER THE BASIS
FOR THE CLAIM BECOMES KNOWN TO THE PARTY ASSERTING IT.
9. TERM AND TERMINATION.
1. TERM. This Agreement shall continue for an indefinite period of time so long as the
License Fee is paid and use of the license as documented in this contract is not violated.
Maintenance and Support is defined in section 4 of this Agreement. You may choose to
renew the Maintenance Agreement upon expiration.
2. TERMINATION. exida may terminate Your license if You do not abide by the license terms.
Upon termination of license, You shall immediately discontinue the use of the Software
and shall within ten (10) days return to exida the USB License Key(s) and all copies of the
Software or confirm that You have destroyed all copies of it. Your obligations to pay
accrued charges and fees, if any, shall survive any termination of this Agreement. You
agree to indemnify exida for reasonable attorney fees in enforcing its rights pursuant to
this license. Sections 2, 5, 7, 8, 9 and 15 will survive expiration or termination of this
Agreement for any reason.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 271 of 292
10. exSILentia® USE. You are required to perform any verification activities when using the software
as described in the Documentation.
11. REGISTRATION. The software will only function if You are using a valid “License Key”. The
License Key will be provided by exida. Software registration is required.
12. UPGRADES. If this copy of the software is an upgrade from an earlier version of the software, it is
provided to You on a license exchange basis. Your use of the Software upgrade is subject to the
terms of this license, and You agree by Your installation and use of this copy of the Software to
voluntarily terminate Your earlier license and that You will not continue to use the earlier version
of the Software or transfer it to another person or entity.
13. ADDITIONAL SOFTWARE. This license applies to updates, upgrades, options and any other
additions to the original Software provided by exida, unless exida provides other terms along
with the additional software.
14. THIRD PARTY PRODUCTS.
a. The Software may make use of 3 rd party content. This 3 rd party content will be used per
the usage agreements and other restrictions set forth by the 3 rd party. exida agrees to
bear all responsibility for the proper implementation of embedded 3rd party content.
b. This Software may have the ability to make use of, link to, or integrate with 3 rd party
content not embedded within the Software or not required to enable You to use the
Software. The availability of this content is at the sole discretion of the 3 rd party content
providers and may be subject to usage agreements and other restrictions. You agree to
indemnify and hold harmless exida from all claims, damages, and expenses of whatever
nature that may be made against exida by these 3rd party content providers as a result of
Your use of the Software.
15. GENERAL.
1. SERVICES. There are no services provided under this Agreement. Support, maintenance,
and other services, if available, must be purchased separately from exida
2. APPLICABLE LAW. This license shall be interpreted in accordance with the laws of the
Commonwealth of Pennsylvania, USA without giving effect to any choice of law principles
that would require the application of the laws of a different state or country. Any disputes
arising out of this license shall be adjudicated in a court of competent jurisdiction in
Pennsylvania, USA. The United Nations Convention on Contracts for the International Sale
of Goods and the Uniform Computer Information Transactions Act (USA) do not apply to
this Agreement.
3. GOVERNING LANGUAGE. Any translation of this License is done for local requirements
and in the event of a dispute between the English and any non- English versions, the
English version of this License shall govern.
4. COMPLIANCE WITH LAWS. You will comply with all applicable export and import control
laws and regulations in your use or re-exportation of the Software and, in particular, you
will not export or re-export the Software without all required United States Bureau of
Export and Administration licenses. You will defend, indemnify, and hold harmless exida
and its suppliers from and against any violation of such laws or regulations by You.
5. RELATIONSHIP BETWEEN THE PARTIES. The parties are independent contractors and
neither party is the agent, partner, employee, fiduciary, or joint venture of the other party
under this Agreement. You may not act for, bind, or otherwise create or assume any
obligation on behalf of exida. There are no third party beneficiaries under this Agreement.
6. EXPORT OF TECHNICAL DATA. Neither party shall export, directly or indirectly, any
technical data acquired from the other party or any of its affiliated companies, or any
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 272 of 292
direct product of that technical data, to any other country for which the United States
Government or any agency of that government at the time of export requires an export
license or other governmental approval without first obtaining that license or approval,
when required by applicable United States law.
7. ASSIGNMENTS. You may not assign or transfer, by operation of law or otherwise, your
rights under this Agreement (including your licenses with respect to the Software) to any
third party without exida’s prior written consent. Any attempted assignment or transfer in
violation of the foregoing will be void. exida may freely assign its rights or delegate its
obligations under this Agreement.
8. SEVERABILITY. If any provision of this Agreement is held unenforceable by a court, such
provision may be changed and interpreted by the court to accomplish the objectives of
such provision to the greatest extent possible under applicable law and the remaining
provisions will continue in full force and effect. Without limiting the generality of the
foregoing, you agree that Section 8 will remain in effect notwithstanding the
unenforceability of any other provision of this Agreement.
9. TRADEMARKS AND TRADE NAMES. Nothing in this Agreement shall confer on You any
right to use any trademark or trade name belonging to exida.
16. ENTIRE AGREEMENT. This Agreement constitutes the entire agreement between the parties
relating to the Software and supersedes any proposal or prior agreement, oral or written, and any
other communication relating to the subject matter. Both parties acknowledge that they have not
been induced to enter into this Agreement by any representations or promises not specifically
stated herein. Any conflict between the terms of this License Agreement and any Purchase Order,
invoice, or representation shall be resolved in favor of the terms of this License Agreement. In the
event that any clause or portion of any such clause is declared invalid for any reason, such
finding shall not affect the enforceability of the remaining portions of this License and the
unenforceable clause shall be severed from this license. Any amendment to this agreement must
be in writing and signed by both parties.
IN WITNESS WHEREOF, this Agreement has been executed by the parties hereto as of the date first below
written.
By: By:
Date: Date:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 273 of 292
exida exSILentia® Software License Agreement v1.8 – Standalone (July 8, 2020)
Copyright © 2000-2020 exida Innovation LLC
80 North Main Street
Sellersville, PA 18960
USA
exSILentia ® , SILect™, SILver™, PHAx™, LOPAx™, SERH, SILstat™, and SILalarm™ are trademarks of exida
Innovation LLC
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 274 of 292
Software Service License Agreement –
exSILentia® Cloud
IMPORTANT – READ CAREFULLY: This Software Service License Agreement is the legal agreement
(“Agreement”) between you, the customer who has obtained access to the software service for the Term
of the agreement (“You”) and exida Innovation LLC (“exida”) with offices at 80 North Main Street,
Sellersville, PA, 18960, USA. Please read this agreement carefully before accessing or using all or any
portion of the exida exSILentia ® tool on the Cloud Licensing Platform (together with its accompanying
documentation, the “Software Service”). This agreement documents your access rights to the Software
Service for the Term of the agreement and contains warranty information and liability disclaimers.
THE TERMS AND CONDITIONS OF THIS AGREEMENT APPLY TO ANY AND ALL USE OF THE SOFTWARE
SERVICE BY YOU, WHETHER YOU ARE USING THE SOFTWARE SERVICE PURSUANT TO ANY TRIAL
PERIOD, OR THE TERM OF THIS AGREEMENT AND YOU AGREE TO BE BOUND BY THIS AGREEMENT
REGARDLESS OF THE TYPE OF USE OF THE SOFTWARE SERVICE BY YOU.
BY ACCESSING OR USING ALL OR ANY PORTION OF THE SOFTWARE SERVICE, OR BY PAYING FOR
THE SERVICE BY ANY MEANS OFFERED BY EXIDA, YOU ACCEPT ALL TERMS AND CONDITIONS OF
THIS AGREEMENT. YOU AGREE THAT THIS AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN
NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE, DO NOT PAY FOR OR USE THE
SOFTWARE SERVICE.
IF YOU DID NOT ACQUIRE ACCESS TO THE SOFTWARE SERVICE FROM exida, THEN YOU MAY NOT
ENTER INTO THIS AGREEMENT OR USE THE SOFTWARE SERVICE. NO OTHER PARTY HAS THE RIGHT
TO TRANSFER ACCESS TO THE SOFTWARE SERVICE TO YOU.
The Software is owned by exida and is protected by copyright laws and international copyright treaties,
as well as other intellectual property laws and treaties. THIS AGREEMENT DOES NOT CONSTITUTE A
SALE OF THE SOFTWARE.
If you have any questions or concerns about this agreement, please contact exida at the above listed
address.
1. DEFINITIONS
a. “Affiliates” means any company or entity controlled by, controlling, or under common
control with You or exida. For the purposes of this definition, “control” shall mean the
power to cause the direction of the management of such company or entity, directly or
indirectly, whether through ownership of voting securities or otherwise, it being
understood that ownership of 50% or more of the voting securities of another shall in all
circumstances constitute control.
b. “exida” means exida Innovation LLC and its Affiliates
c. “You”, “Your” means you, your company, and your company’s Affiliates
d. “Documentation” means the user manuals and any other materials in any form or medium
customarily provided by exida to You which will provide sufficient information to access
and operate the Software Service properly, safely and efficiently
e. “Software” means the product provided to You, which includes the exSILentia ® tool and
the associated media, printed materials, and “online” or electronic documentation. The
Software includes any updates or new versions that may be provided to You.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 275 of 292
f. “Software Service” means access to the “Software” via the Cloud Licensing Platform
g. “Maintenance” is defined in the Maintenance and Support Article, section 4 of this
agreement
h. “Term” is defined in the Term and Termination Article, section 9 of this agreement
i. “Proprietary Information” means all of Your and your affiliates plans, processes, products,
business information, data, technology, Information Resources, computer programs and
documentation and the like. It includes any information or material that (a) is marked
“Confidential”, “Restricted”, or “Proprietary Information” or other similar marking, (b) is
known by the parties to be considered confidential and proprietary, or (c) should be
known or understood to be confidential or proprietary by an individual exercising
reasonable commercial judgment.
2. OWNERSHIP. The Software is owned and copyrighted by exida. The access to the Software
Service granted to You confers no title or ownership in the Software and is not a sale of any rights
in the Software. exida warrants that it has full power and authority to grant the licenses and
rights granted under this License Agreement without the consent or approval of any third party.
a. All information, artwork, graphics, text, copy, data, software, and other material included
in the Software are exida’s exclusive intellectual property.
3. LICENSE
1. GRANT OF LICENSE. exida will provide and You and Your authorized Users will have
access to the Software Service during the Term, as defined in section 9, subject to this
Agreement. Subject to Your compliance with your obligations under this Agreement, You
are granted a non-exclusive, non-transferable, license during the Term of this Agreement
to:
a. Access and execute the Software on exida’s application server over the Internet.
b. Use the Documentation related to the Software.
c. Transmit data related to Your use of the Software to and from exida's application
server over the Internet and store such data on exida's application server.
d. Access and use exida's User interface on its website, https://my.exSILentia.com (the
“Site”).
2. SITE ACCESS.
a. Subject to the restrictions on use as set forth herein, You will have access to the
Software Service for its intended purpose and in accordance with the specifications
set forth in any Documentation relating to the Software Service provided by exida.
Such use and access will be continuous on a twenty-four (24) hour a day, seven (7)
day a week basis except for interruptions by reason of maintenance or downtime
beyond exida's reasonable control.
b. To access the Site the User will be provided a username and a password (the
“Login Credentials”). You are solely responsible in all respects for all use of and for
protecting the confidentiality of your Login Credentials. You agree to notify exida
immediately of any unauthorized use of your Login Credentials and any other
suspected breach of security regarding the Site. You are responsible for changing
your password if you believe your password has been stolen or might otherwise be
misused. exida has no duty or obligation to verify the identity of a user and may
assume, without independent investigation, that any person who logs on to this
Site through your Login Credentials does so with your consent and approval.
c. You will not:
i. Transmit or share identification or password codes to persons other than
authorized Users.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 276 of 292
ii. Permit the identification or password codes to be cached in proxy servers
and accessed by individuals who are not authorized Users.
iii. Permit access to the Software Service through a single identification or
password code being made available to multiple users on a network.
d. You may not access the Software Service if you are a direct competitor of exida,
except with exida's prior written consent. In addition, you may not access the
Software Service for purposes of monitoring its availability, performance or
functionality, or for any other benchmarking or competitive purposes.
e. You will be responsible for all equipment and software required for You to access
the Internet including, without limitation, a web browser compatible with the exida
Software Service.
3. DOCUMENTATION. You are hereby granted the right to reproduce the user manuals and
other written materials created by exida to describe the functionality and use of the
Software (the “Documentation”) and to distribute a single copy of the Documentation in
soft form or in print to each user over Your internal network.
4. LICENSE RESTRICTIONS. You shall not grant access to the Software or Software Service
to any persons or entities other than those of Your employees and on-site contractors who
are located at Your facilities nor shall You sell, lease or distribute the Software or Software
Service to any person or entity as a standalone or bundled product or make any other
commercial use thereof. You shall not modify, reverse engineer, decompile, or
disassemble the Software or Software Service. You shall not adapt, translate, or create
derivative works based on the Software, Software Service, or the Documentation without
the prior written approval of exida. You shall not exceed the scope of the license granted
in Sections 3.1, 3.2, and 3.3 above. You shall not export the Software, Software Service, or
Documentation, or any copies thereof, to any user in violation of applicable laws and
regulations.
5. COPYRIGHT. exida owns the Software and related Documentation and their copyrights
that are protected by United States copyright laws and international treaty provisions.
This Agreement does not and shall not be construed as transferring ownership rights of
the Software, Documentation, any modifications thereto or any related materials to You or
to any third party. exida owns and shall retain all right, title and interest in the Software,
including all copyrights, patents, trade secret rights, trademarks, and other intellectual
property rights therein. You shall retain all copyright and trademark notices on the
Software and Documentation and as otherwise necessary to protect exida intellectual
property rights.
6. YOUR RESPONSIBILITY. You expressly agree to be fully responsible for compliance by
Your employees and on-site contractors with the applicable terms of this Agreement.
4. MAINTENANCE AND SUPPORT.
1. SUPPORT.
a. Limited Technical Support. During the term of this agreement You are entitled to
limited technical support. exida will provide technical support via its support
website http://support.exida.com . Safety Instrumented Function Engineering
Services are excluded from the exida support under this agreement.
b. During the Term of this Agreement, You shall be entitled to technical support for a
duration, prorated based on the duration of the Term, of 2 hours per year for each
concurrent user license. Bug reporting and resolution is not counted towards your
technical support allotment.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 277 of 292
2. MAINTENANCE AND UPDATES.
a. Definitions. For the purposes of this section, the following shall apply:
i. Bug Fix: The term “Bug Fix” means any engineering patch intended to fix
bugs and errors in the Software.
ii. Functionality Update: The term “Functionality Update” means any new
release of the Software. During the Term of this Agreement, You will have
access to all Functionality Updates as they are implemented to the Software
or Software Service. Updates do not include any exida software, which
constitutes a separate product by virtue of different features or
functionality. Updates do not include standalone products that can be
integrated with the Software.
iii. Equipment Database Update: The term “Equipment Database Update”
means any new version of the Safety Equipment Reliability Handbook
Database embedded in the Software. During the Term of this Agreement,
You will have access to all Equipment Database Updates as they are issued
to the Software or Software Service. Equipment Database Updates are
issued quarterly.
iv. Maintenance: The term “Maintenance” means technical support,
Functionality Updates, and Equipment Database Updates, provided during
the Term of this Agreement.
v. Maintenance Period. The term “Maintenance Period” for the Software of
Software Service is equal to the Term of this Agreement.
b. Delivery of Updates. Updates are deployed to the Software Service when they
become available. No action is needed by You to implement an update.
c. License to Updates. exida hereby grants You a nonexclusive; nontransferable
license during the Term of this Agreement to use the Updates delivered under this
section.
5. RESTRICTED USE.
a. You agree to use reasonable efforts to prevent unauthorized access of the Software
Service
b. You agree to use reasonable efforts to prevent unauthorized copying of the Software
c. You may not disable any licensing or control features of the Software Service or allow the
Software Service to be used with such features disabled
d. You may not share, rent, or lease Your right to use the Software Service
e. You may not modify, sublicense, copy, rent, sell, distribute or transfer any part of the
Software or Software Service except as provided in this Agreement
f. You may not reverse engineer, decompile, translate, create derivative works, decipher,
decrypt, disassemble, or otherwise convert the Software to a more human-readable form
for any reason
g. You may not use the Software Service for any purpose other than to perform safety
lifecycle tasks in accordance with the accompanying documentation
h. You may not remove, alter, or obscure any confidentiality or proprietary notices (including
copyright and trademark notices) of exida on, in, or displayed by the Software and
Software Service
i. You will cease accessing the Software Service if and when Your right to use it ends
j. You agree to use the Software or Software Service in a manner consistent with this
Agreement and with all applicable laws and regulations, including without limitation, all
copyright, trademark, patent, trade secret and export control laws, as well as those laws
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 278 of 292
prohibiting the use of telecommunications facilities to transmit illegal, obscene,
threatening, harassing, or other offensive messages.
k. You acknowledge that exida is not responsible for any use or misuse of the Software
Service by Your employees and on-site contractors who are located at Your facilities. In
particular, You will not, nor shall You permit or assist others, to abuse or fraudulently use
the Software Service, including but not limited to:
i. Obtaining or attempting to obtain access to the Software Service by any
unauthorized means or device with intent to avoid payments.
ii. Using the Software Service to interfere with the use of the Software Service by
other companies or users.
6. PROPRIETARY INFORMATION.
1. EXIDA SHALL
a. Not use or disclose Proprietary Information to any third party except as is clearly
necessary to provide the Services, provided such party is bound by a written
confidentiality agreement with terms no less stringent than the terms herein.
b. Not attempt to access any portion of Information Resources without authorization
of You. If unauthorized access is nevertheless obtained, whether inadvertently or
otherwise, exida shall have a duty to promptly report to You, in writing, each
instance thereof, setting out the extent and circumstances of such access.
c. Not attempt to defeat any security provisions maintained by You for the protection
of Information Resources or information contained therein.
d. Not remove, copy, alter, or install any software or information or data on any of
Your computers unless specifically authorized by You in connection with the
Services or make any attempt to learn or document passwords or other
information which could facilitate unauthorized access to Information Resources.
e. Require each of its employees, contractors and agents needing access to
Information Resources to obtain passwords from Your authority responsible for the
security of Information Resources, to use and protect passwords as required by
You, and to follow such protocols governing access as may be set out by You.
2. CONFIDENTIALITY. Neither party shall, during the term of this Agreement or thereafter,
disclose, make commercial or other use of, give or sell to any person, firm, or corporation,
any information of the other party that is treated and identified in writing as confidential,
except either party may disclose such information if (i) required to do so pursuant to
applicable law; (ii) it was rightfully in their possession from a source other than the other
party prior to the time of disclosure of said information; (iii) it was in the public domain
prior to the time of receipt; (iv) it became part of the public domain after the time of
receipt by any means other than an unauthorized act or omission by such party; (v) it is
supplied after the time of receipt without restriction by a third party who is under no
obligation to maintain such information in confidence; or (vi) it was independently
developed prior to the time of receipt. Both parties will use at least the same standard of
care as they do to protect their own Proprietary Information to ensure that their
employees, agents or consultants do not disclose or make any unauthorized use of such
Proprietary Information. Both parties will promptly notify the other party upon discovery
of any unauthorized use or disclosure of the Proprietary Information.
3. TERMINATION OF exida’s RIGHT TO POSSESS PROPRIETARY INFORMATION. Upon final
acceptance or earlier termination of this Agreement for any reason, exida's rights to
possession and use of any of the Proprietary Information in connection with the
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 279 of 292
performance of its obligations hereunder or otherwise shall terminate and exida shall
immediately deliver to You all of the Proprietary Information and all copies of any portion
thereof. exida shall, upon completion of such delivery, certify in writing to You that it has
fulfilled its obligations under this Article. exida will keep one copy of all Proprietary
Information provided for future reference and legal liability requirements.
4. USAGE DATA. You hereby grant to exida a non- exclusive, fully paid, world- wide and
irrevocable license permitting exida to copy, anonymize, aggregate, process and display
Your Data to derive anonymous statistical and usage data, and data about the
functionality of the Software Service, provided such data cannot be used to identify You or
Your individual users ("Anonymous Data"), for the purposes of combining or incorporating
such Anonymous Data with or into other similar data and information available, derived or
obtained from other customers, licensees, users, or otherwise (when so combined or
incorporated, referred to as "Aggregate Data"), so as to permit exida to provide services
including the copying, publication, distribution, display, licensing or sale of Aggregate
Data and related or similar other statistics or data to third parties (and to You should You
elect to subscribe for same) pursuant to a separate licensing or services arrangement or
agreement. exida will be the owner of all right, title and interest in and to Aggregate Data.
Any access by You to Aggregate Data shall be pursuant to an additional license or services
agreement.
7. WARRANTY AND DISCLAIMER.
1. DISCLAIMER OF WARRANTY. The Software is provided on an “AS IS” basis, without
warranty of any kind, including, without limitation, the warranties of merchantability,
fitness for a particular purpose, non-infringement title, and results. The entire risk as to
the quality and performance of the Software is borne by You. If the Software is intended to
link to, extract content from or otherwise integrate with a third party product, exida
makes no representation or warranty that Your particular use of the Software is or will
continue to be authorized by law in Your jurisdiction or that the third party product will
continue to be available to You.
Except as otherwise provided herein, exida makes no representation, warranty, or
guaranty as to the reliability, timeliness, quality, suitability, truth, availability, accuracy or
completeness of the service or any component. exida does not represent or warrant that:
a. The use of the Software Service will be secure, timely, uninterrupted or error-free,
or operate in combination with any other hardware, service, system or data
b. The Software Service will meet your requirements or expectations
c. Any stored data will be accurate or reliable
d. The quality of any information obtained by you through the Software Service will
meet your requirements or expectations
e. Errors or defects will be corrected
f. The Software Service or the communication facilities, including, without limitation,
the internet that make the Software Service available are free of viruses or other
harmful components or are secure from interruption, interception or corruption by
third parties.
This disclaimer of warranty constitutes an essential part of the agreement.
2. WARRANTY. exida warrants that the Software does not infringe the intellectual property
rights of any third party. exida warrants the Software Service will be provided in
conformity with generally prevailing industry standards.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 280 of 292
8. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
TORT, CONTRACT, OR OTHERWISE, SHALL exida BE LIABLE TO YOU OR ANY OTHER PERSON
OR SHALL YOU BE LIABLE TO exida OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL,
PUNITIVE, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR WORK STOPPAGE, COMPUTER FAILURE OR LOSS OF
REVENUES, PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE OR ECONOMIC LOSSES.
IN NO EVENT WILL exida BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE AMOUNT PAID TO
LICENSE THE SOFTWARE, EVEN IF YOU OR ANY OTHER PARTY SHALL HAVE INFORMED exida
OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM. NO CLAIM, REGARDLESS OF
FORM, MAY BE MADE OR ACTION BROUGHT BY YOU MORE THAN ONE YEAR AFTER THE BASIS
FOR THE CLAIM BECOMES KNOWN TO THE PARTY ASSERTING IT.
9. TERM AND TERMINATION.
1. TERM. The term of this Agreement will commence the day the web site interface for the
Software Service is accessible to you via the Internet, and will continue for a period of one
year, six months, or three months, as selected by You or for such other initial term as
otherwise mutually agreed upon (the "Term").
2. TERM RENEWAL. If exida continues to offer the Software Service, You may renew the
Term by delivering exida a purchase order for a Term Renewal. The Term Renewal will
either extend the existing Term if the Term has not expired yet, or commence the day the
web site interface for the Software Service is accessible to you via the Internet. If You elect
to renew the Term, You must do so for the number of licenses covered under this
Agreement. A change in the number of licenses will constitute the creation of a new
agreement. As a courtesy, exida agrees to notify you via automated message prior to the
expiration of the Term to allow ample time for renewal. exida assumes no responsibility
for lapses in the Term that occur as a result of You failing to renew the Term before its
expiration.
3. END TO SITE ACCESS. Upon any expiration or termination of this Agreement:
a. Your right to use the Site and Software Services shall cease, and exida shall have no
further obligation to make the Site or Software Services available to you
b. Except as otherwise expressly stated herein, all right and licenses granted to you
under this Agreement will immediately cease
c. You will pay any unpaid fees payable for the remainder of the then-current term in
effect prior to the expiration or termination date.
4. TERMINATION. exida may terminate Your license if You do not abide by the license terms.
Upon termination of license, You shall immediately discontinue the use of the Software
Service. Your obligations to pay accrued charges and fees, if any, shall survive any
termination of this Agreement. License fees are not pro-rated upon termination of the
license because of Your breach of the license terms. You agree to indemnify exida for
reasonable attorney fees in enforcing its rights pursuant to this license. Sections 2, 5, 7, 8,
9 and 15 will survive expiration or termination of this Agreement for any reason.
10. exSILentia® USE. You are required to perform any verification activities when using the software
as described in the Documentation.
11. VOID WHERE PROHIBITED. Although the Site is accessible worldwide, not all products or
services discussed or referenced in or on the Site are available to all persons or in all geographic
locations or jurisdictions. exida reserves the right to limit the availability of the Site and/or the
provision of any Software Service described thereon to any person, geographic area, or
jurisdiction it so desires, at any time and in its sole discretion, and to limit the quantities of any
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 281 of 292
such products or services that it provides. Any offer for any Software Service made on the Site is
VOID where prohibited.
12. THIRD PARTY PRODUCTS.
a. The Software may make use of 3 rd party content. This 3 rd party content will be used per
the usage agreements and other restrictions set forth by the 3 rd party. exida agrees to
bear all responsibility for the proper implementation of embedded 3rd party content.
b. The Software Service may rely on 3rd party content to enable You to use the Software
Service. This 3rd party content will be used per the usage agreements and other
restrictions set forth by the 3rd party. exida agrees to bear all responsibility for the proper
implementation of embedded 3rd party content.
c. This Software may have the ability to make use of, link to, or integrate with 3 rd party
content not embedded within the Software or not required to enable You to use the
Software or Software Service. The availability of this content is at the sole discretion of the
3 rd party content providers and may be subject to usage agreements and other
restrictions. You agree to indemnify and hold harmless exida from all claims, damages,
and expenses of whatever nature that may be made against exida by these 3 rd party
content providers as a result of Your use of the Software.
13. GENERAL.
1. ENGINEERING SERVICES. There are no Engineering Services provided under this
Agreement. Support and other services, if available, must be purchased separately from
exida
2. APPLICABLE LAW. This license shall be interpreted in accordance with the laws of the
Commonwealth of Pennsylvania, USA without giving effect to any choice of law principles
that would require the application of the laws of a different state or country. Any disputes
arising out of this license shall be adjudicated in a court of competent jurisdiction in
Pennsylvania, USA. The United Nations Convention on Contracts for the International Sale
of Goods and the Uniform Computer Information Transactions Act (USA) do not apply to
this Agreement.
3. GOVERNING LANGUAGE. Any translation of this License is done for local requirements
and in the event of a dispute between the English and any non- English versions, the
English version of this License shall govern.
4. COMPLIANCE WITH LAWS. You will comply with all applicable export and import control
laws and regulations in your use or re-exportation of the Software or Software Service
and, in particular, you will not export or re- export the Software or Software Service
without all required United States Bureau of Export and Administration licenses. You will
defend, indemnify, and hold harmless exida and its suppliers from and against any
violation of such laws or regulations by You.
5. RELATIONSHIP BETWEEN THE PARTIES. The parties are independent contractors and
neither party is the agent, partner, employee, fiduciary, or joint venture of the other party
under this Agreement. You may not act for, bind, or otherwise create or assume any
obligation on behalf of exida. There are no third party beneficiaries under this Agreement.
6. EXPORT OF TECHNICAL DATA. Neither party shall export, directly or indirectly, any
technical data acquired from the other party or any of its affiliated companies, or any
direct product of that technical data, to any other country for which the United States
Government or any agency of that government at the time of export requires an export
license or other governmental approval without first obtaining that license or approval,
when required by applicable United States law.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 282 of 292
7. ASSIGNMENTS. You may not assign or transfer, by operation of law or otherwise, your
rights under this Agreement (including your licenses with respect to the Software Service)
to any third party without exida’s prior written consent. Any attempted assignment or
transfer in violation of the foregoing will be void. exida may freely assign its rights or
delegate its obligations under this Agreement.
8. SEVERABILITY. If any provision of this Agreement is held unenforceable by a court, such
provision may be changed and interpreted by the court to accomplish the objectives of
such provision to the greatest extent possible under applicable law and the remaining
provisions will continue in full force and effect. Without limiting the generality of the
foregoing, you agree that Section 8 will remain in effect notwithstanding the
unenforceability of any other provision of this Agreement.
9. FORCE MAJEURE. Neither party will be held responsible for any delay or failure in
performance of any part of this Agreement to the extent that such delay is caused by
events or circumstances beyond the delayed party's reasonable control. Lack of funds
does not entitle a party to claim force majeure.
10. STATUTE OF LIMITATIONS. You and exida agree that any cause of action arising out of or
related to this service must commence within one (1) year after the cause of action arose;
otherwise, such cause of action is permanently barred. Some jurisdictions may prohibit
the shortening of the time period in which a cause of action must be brought. In all such
jurisdictions, the applicable time period shall be the minimum allowed by law.
11. TRADEMARKS AND TRADE NAMES. Nothing in this Agreement shall confer on You any
right to use any trademark or trade name belonging to exida.
14. ENTIRE AGREEMENT. This Agreement constitutes the entire agreement between the parties
relating to the Software Service and supersedes any proposal or prior agreement, oral or written,
and any other communication relating to the subject matter. Both parties acknowledge that they
have not been induced to enter into this Agreement by any representations or promises not
specifically stated herein. Any conflict between the terms of this License Agreement and any
Purchase Order, invoice, or representation shall be resolved in favor of the terms of this License
Agreement. In the event that any clause or portion of any such clause is declared invalid for any
reason, such finding shall not affect the enforceability of the remaining portions of this License
and the unenforceable clause shall be severed from this license. Any amendment to this
agreement must be in writing and signed by both parties.
IN WITNESS WHEREOF, this Agreement has been executed by the parties hereto as of the date first below
written.
By: By:
Date: Date:
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 283 of 292
exida exSILentia® Software License Agreement v1.8 – Cloud (July 8, 2020)
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 284 of 292
Open Source Disclosure
Effective date: December 16, 2021
exida products include third-party code licensed to exida for use and redistribution under open-source
licenses. Below is a list of disclosures and disclaimers in connection with exida’s incorporation of certain
open-source licensed software into its products. Notwithstanding any of the terms and conditions of
your license agreement with exida, the terms of certain open-source licenses may be applicable to your
use of exida’s products, as set forth below.
This list of open-source code was compiled with reference to third-party software incorporated into the
products as of the date the list was generated. This list may be updated from time to time and may not
be complete.
ALL INFORMATION HERE IS PROVIDED "AS IS". exida AND ITS SUPPLIERS MAKE NO
REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, WITH REGARD TO THIS LIST OR ITS
ACCURACY OR COMPLETENESS, OR WITH RESPECT TO ANY RESULTS TO BE OBTAINED FROM USE
OR DISTRIBUTION OF THE LIST. BY USING OR DISTRIBUTING THIS LIST, YOU AGREE THAT IN NO
EVENT SHALL EXIDA BE HELD LIABLE FOR ANY DAMAGES WHATSOEVER RESULTING FROM ANY USE
OR DISTRIBUTION OF THIS LIST, INCLUDING, WITHOUT LIMITATION, ANY SPECIAL,
CONSEQUENTIAL, INCIDENTAL OR OTHER DIRECT OR INDIRECT DAMAGES.
Castle Core
Copyright © 2004-2018 Castle Project - http://www.castleproject.org/
You may obtain a copy of the license at http://www.apache.org/licenses/LICENSE-2.0.html
CommandLineParser
Copyright © 2005 - 2018 Giacomo Stelluti Scala & Contributors
You may obtain a copy of the license at https://opensource.org/licenses/MIT
CoreCLR-NCalc
Copyright © Sebastian Klose
You may obtain a copy of the license at https://opensource.org/licenses/MIT
Dapper
The Dapper library and tools are licensed under Apache 2.0: http://www.apache.org/licenses/LICENSE-
2.0
Humanizer
Copyright © .NET Foundation and Contributors
You may obtain a copy of the license at https://opensource.org/licenses/MIT
MathNet.Numerics
Copyright © 2002-2018 Math.NET Project
You may obtain a copy of the license at https://numerics.mathdotnet.com/License.html
Morelinq
Copyright © 2008 Jonathan Skeet.
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 285 of 292
Portions Copyright © 2009 Atif Aziz, Chris Ammerman, Konrad Rudolph.
Portions Copyright © 2010 Johannes Rudolph, Leopold Bushkin.
Portions Copyright © 2015 Felipe Sateler, “sholland”.
Portions Copyright © 2016 Andreas Gullberg Larsen, Leandro F. Vieira (leandromoh).
Portions Copyright © 2017 Jonas Nyrup (jnyrup).
Portions Copyright © Microsoft. All rights reserved.
You may obtain a copy of the license at http://www.apache.org/licenses/LICENSE-2.0.html
Prism.Core
Copyright © .NET Foundation
You may obtain a copy of the license at https://opensource.org/licenses/MIT
protobuf-net
Copyright © 2008 Marc Gravell
You may obtain a copy of the license at http://www.apache.org/licenses/LICENSE-2.0.html
Serialize.Linq
Copyright © 2012-2018 Sascha Kiefer
Copyright © 2007 Free Software Foundation, Inc. - http://fsf.org/
You may obtain a copy of the license at https://www.gnu.org/licenses/gpl-3.0.en.html
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 286 of 292
Index
A
Action Items 46
Architectural Constraints 193
Cause 127
Import 90
Library 89
Reorder IDs 91
Column Visibility 135
Conditional Modifier 153
Import 100
Library 99
Reorder IDs 100
Consequence 127, 244
Category 75
Continuous Editing 135
Countermeasures 245
Custom Data 65
Cyber Event Scenario 246
Cyber Node 242
Cyber Security Checklist 53
Cyber Zone 241
Data Export 85
LOPAx 163
PHAx 141
Data Import 87
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 287 of 292
Data Transfer
LOPA to SILect 172
PHA to LOPA 160
Safeguard to SRS 185
SILver to LOPA 161
Database
LOPA 105
SERH 107
Deviation 57-58, 125
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 288 of 292
Initiating Event 146
Instrumented Protection Function 168
Library 89
Causes 89, 146
Conditional Modifier 153, 251
Conditional Modifiers 99
Countermeasure 245
Enabling Condition 148
Enabling Conditions 98
Final Element Groups 203
Hazard Scenarios 96
Independent Protection Layer 150
Kill Chain Relevance 252
Logic Solver 210
Recommendations 92, 131, 246
References 95
Safeguards 91, 128
Sensor Groups 197
Likelihood 127, 244
Category 76
Likelihood Matrix 77
LOPA Database 105
exida 106
Generic 106
User Defined Data 106
Navigation
Dashboard 27, 45
PHAx™ 132
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 289 of 292
Node 124
Types 57
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 290 of 292
References 96
Safeguards 92
Report Generation 83
CyberPHAx 247
Lifecycle Cost Estimator 239
LOPAx 162
PHAx 136
SILect 174
SILver 221
SRS 185
Required Risk Reduction Factor 155
Reuse
Project Configuration 73
Risk Configuration 81
Risk Graph 78
Risk Matrix 75, 78, 130, 246
Safeguard 128
Category 59
Import 92
Labels 130
Library 91
Reorder IDs 92
Sessions 49
Severity Category Visibility 157
Severity Matrix 76
SIF Demand Mode 194
SIL Selection
LOPA 169
Risk Graph 170
Risk Matrix 171
SIL Threshold 80
Site Safety Index 195
Smart Deviations 57, 124-125
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 291 of 292
Smart Threat Vectors 242-243
SRS
SIF General 182
SIF Specific 183
SIS General 179
Startup Time 194
Systematic Capability 193
Unit 123
Upgrading 111
© exida Innovation LLC exSILentia® v4 User Guide - Safety Page 292 of 292