Alarm Management
Alarm Management
October 2019
Alarm Management for DeltaV
Build an effective alarm management program that protects people, assets and profitability.
www.emerson.com/deltav
White Paper
October 2019
Alarm Management for DeltaV
Table of Contents
Alarm Management for DeltaV ................................................................................................................................................ 1
Introduction ............................................................................................................................................................................... 3
An Overview of the ISA-18.2 Standard’s Lifecycle ............................................................................................................... 4
ISA-18.2 Recommended Alarm Metrics ................................................................................................................................. 6
Solutions Overview for DeltaV Customers ............................................................................................................................ 7
Alarm Operations ...................................................................................................................................................................... 14
Learn More ................................................................................................................................................................................ 14
www.emerson.com/deltav 2
White Paper
October 2019
Alarm Management for DeltaV
Introduction
This document describes how the DeltaV distributed control system and related alarm management products and services
from Emerson combine to provide a complete and effective foundation for implementing and sustaining an alarm management
program that conforms to industry standards.
Why implement an alarm management program? All too often, process control systems are implemented with little attention
given to the justification of and expected operator response to alarms. The near-zero engineering effort required to create
alarms, combined with many new alarm sources, has contributed to their proliferation. The result is a heightened risk for alarm
floods and nuisance alarms, with consequential adverse effects on product quality, process efficiency, equipment protection,
environmental incident and personnel safety.
There are two primary industry standards that outline alarm management requirements:
Prior to publication of the standards, the primary industry reference was EEMUA 191 Alarm Systems – A Guide to Design,
Management and Procurement. However, where EEMUA 191 is a guide, ISA-18.2 and IEC 62686 are industry standards with
normative clauses. Many control system owners in the past implemented alarm management programs based on EEMUA
guidelines. They will be pleased to know that the standards are consistent with and build upon this prior publication.
This whitepaper cites ISA-18.2 throughout but is completely relevant to EEMUA-191 and IEC 62682.
ISA-18.2 is being rapidly adopted by the insurance industry and regulatory bodies as the basis for measuring good engineering
practice relative to alarms. Thus, an effective alarm management program is becoming more than a guide to good operational
practices for operating a safer plant; for some it will become a mandated business necessity.
Emerson recognizes that best practices around alarm management continue to evolve and actively participates with voting
membership on the ISA-18 committee and with other groups such as the Center for Operator Performance.
The definition of an alarm is of central importance when establishing an alarm management program. ISA-18.2 defines
Alarm as:
“audible and/or visible means of indicating to the operator an equipment malfunction, process deviation, or abnormal
condition requiring a timely response”
Note that this definition requires two key characteristics for an alarm and implies a third:
Abnormal – The items in the definition that initiate the alarm are all abnormal. A notification may indicate a normal (planned
and expected) condition; this is not an alarm by definition.
Action(response) – There is an available and required action for the board operator associated with this notification. If the
board operator can just silence/acknowledge the noise and then do nothing else without consequence, this is not an alarm.
Consequence (implied) – An undesirable result is likely to occur if no or inadequate corrective action is taken – if no
potential negative consequence exists, no action is necessary; hence this is not an alarm.
Relevant – The alarm is understandable to the operator and is needed in the current operating state of the plant.
Unique – No other alarm will sound to alert the operator of the same condition or event.
www.emerson.com/deltav 3
White Paper
October 2019
Alarm Management for DeltaV
Emerson incorporates all the above-mentioned characteristics into the five-keyword approach to alarm justification. Any
proposed alarm that does not qualify under all five keywords is to be considered for deletion.
Although the scope of this whitepaper is confined to alarms, other types of operator notifications do exist and are available in
DeltaV. One way of distinguishing among alarms as defined in ISA-18.2 and other types of Operator notification is illustrated in
the following diagram. The DeltaV system provides native capabilities to differentiate these Operator notifications.
Philosophy – The usual starting point in the alarm management lifecycle is the development of an alarm philosophy. The
philosophy provides guidance for all other lifecycle stages. It includes key definitions like the definition of an alarm, which by
itself is a critical element to alarm management. It takes into account the alarm handling capabilities of the control system
and other site-specific considerations. It can include guidance for how to configure common alarm types. The philosophy
ensures the processes for other lifecycle stages are planned and documented.
Identification – The identification stage provides a list of candidate alarms for the rationalization (the next lifecycle
stage). Identification sources can include P&ID reviews, process hazard reviews, layer of protection analysis, incident
investigations, environmental permits, etc. To ensure that the results are useful as an input to the alarm rationalization stage,
it is helpful to document the cause, potential consequence, expected response, and the time to respond for each suggested
alarm originating from one of these reviews. Emerson usually recommends that the complete identification list should
include all standard alarms on all tags configured in the control system, with alarms suggested from other sources labeled.
Any lesser list will invite an incomplete and potentially non-optimum rationalization.
Philosophy
Identification
Rationalization
Management
of Change
Detailed Design
Audit
Implementation
Operation
Monitoring &
Assessment
Maintenance
Rationalization – In the rationalization stage, each potential alarm is tested against the criteria documented in the alarm
philosophy to justify that it meets the requirements of being an alarm. The consequence, response time, and operator action
are documented. Alarms are analyzed to define their attributes (such as limit, priority and classification). Alarm limit (aka
setpoint or trip point) determines at what process value the alarm will annunciate. Alarm priority is an indication of relative
urgency of response and is typically based on the severity of the consequences and the time to respond. Classification
identifies groups of alarms with similar characteristics (e.g. environmental or safety) and common requirements for training,
testing, documentation, or data retention. The results of the rationalization are documented in a master alarm database.
Detailed Design – In the detailed design stage, alarms are designed to meet the requirements documented in the alarm
philosophy and the rationalization. Poor design and configuration practices are a leading cause of alarm management
issues. Alarm design includes the basic alarm design, advanced alarm design, and HMI design. Basic design incorporates
setting parameters such as deadband (aka hysteresis, to avoid chattering) and on/off-delay time (delays the initiation or
clearing of an alarm). Advanced alarm design includes dynamic alarming, alarm shelving or other advanced techniques
(described in other whitepapers). HMI design incorporates basic and advanced features to display alarms to the operator so
that they can effectively detect, diagnose, and respond.
Implementation – The implementation stage addresses putting approved alarms and alarm revisions into operation. It
includes the activities of training, testing, and commissioning. Testing and training are ongoing activities, particularly as new
instrumentation and alarms are added to the system over time or process design changes are made.
Operation – During the operation stage, an alarm performs its function of notifying the operator of the presence of an
abnormal situation. Dynamic alarming will monitor the state of the plant and make appropriate alarm changes automatically
as plant state changes. Key activities in this stage include exercising the tools the operator may use to deal with alarms
such as alarm displays, shelving functions, and accessing information gathered during rationalization such as an alarm’s
cause, potential consequence, corrective action, and the time to respond.
Maintenance – The process of placing an alarm out-of-service transitions the alarm from the operation stage to the
maintenance stage. In the maintenance stage, the alarm does not perform its function. The standard describes the required
and recommended elements of the procedure to remove an alarm from service and return an alarm to service.
Monitoring and Assessment – This lifecycle stage encompasses data gathered from the operation and maintenance
stages. Assessment is the comparison of the alarm system performance against the stated performance goals in the
philosophy. Key metrics include the average and peak alarm rates, and the % of time in flood. If too many alarms are
presented to the operator in too short a period of time, the operator will not be able to respond effectively. Recommended
metrics are summarized in the next section. Another key activity during this stage is identifying “nuisance” alarms - which
are alarms that annunciate excessively, unnecessarily, or do not return to normal after the correct response is taken (e.g.,
chattering, fleeting, or stale alarms). Another important activity in this stage is comparison of the actual configured alarm
attributes against approved values as documented in the master alarm database (detection of unauthorized changes).
Findings from this stage give rise to proposed corrective actions.
Management of Change – The management of change (MOC) stage includes the activity of review and authorization
for all changes proposed to the alarm system. This includes corrective actions proposed by monitoring and assessment
and alarm revisions proposed in rationalization and detailed design. MOC is applied to any alarm change, including the
additions, modifications, and deletions. Some alarm changes may require a less rigorous MOC than others, depending on
impact to operations. MOC requirements are detailed in a facility’s alarm philosophy. Alarm changes may only be configured
in the control system after MOC approval. A facility may elect to require MOC for changes to the alarm philosophy as well.
Changes to philosophy can and will impact alarm configuration.
www.emerson.com/deltav 5
White Paper
October 2019
Alarm Management for DeltaV
Audit – The audit stage is primarily focused on the periodic review of the work processes of the alarm management
system. The goal is to maintain the integrity of the alarm system throughout its lifecycle and to identify potential areas of
improvement. Audit verifies that work processes are followed and that they are consistent with the alarm philosophy and with
applicable standards. The alarm philosophy document may need to be modified to reflect any changes resulting from the
audit process.
Annunciated priority distribution 3 priorities: ~80% low, ~15% medium, ~5% high or
4 priorities: ~80% low, ~15% medium, ~5% high, ~<1% highest
Other special-purpose priorities excluded from the calculation
An important note is that while ISA-18.2 requires that alarm systems are to be monitored and assessed, the standard does not
require any particular metric or its value. The above table lists recommended metrics and values only. These values are based
on generally accepted norms for human capabilities. Emerson accepts the above as default values in DeltaV Analyze and in
AgileOps EventKPI.
www.emerson.com/deltav 6
White Paper
October 2019
Alarm Management for DeltaV
First
and foremost is engineering services. Emerson has several subject matter experts on staff, with the capability of
performing the entire spectrum of alarm management services:
yyAlarm system assessment and auditing, performed by a qualified alarm management SME
yyMaster Control System Database (MCSD) – provides a master alarm database as required by ISA-18.2, including
current approved alarm attributes, rationalization tool with documentation of complete results, and comparison of the
control system configuration against the approved values. MCSD also ties rationalization data (causes, consequences
and expected responses) directly into DeltaV to provide operator help information.
yyDynamic Management (DM) – performs dynamic alarm management by continuously monitoring the control system
to detect changes in operation using pre-designed case logic, and automatically writes pre-determined alarm attribute
changes to the control system upon case changes. Includes the capability for designing and editing case determination
logic and alarm configuration by case. DM is capable of complex logic, multiple cases and multiple alarm modifications.
yyList Management (LM) – Emerson’s advanced alarm shelving tool. Includes both manual (operator action) and
automatic shelving (system shelves an alarm after it has been active for a pre-set time) with access control.
yyEventKPI (EKPI) – gathers alarm data from the DeltaV events log and develops reports of alarm system performance.
Standard and custom reports are available. Customizable metrics and targets are also available.
yyAlarm Help – online access to alarm rationalization results (causes, consequences, responses)
yyConditional alarming and dynamic alarming – tools available for modifying alarm parameters when needed for the
simpler situations (simple logic, a few alarms at a time).
yyAlarm Mosaic – Provides a quick overview of related alarms in an easy to review format. Useful in alarm flooding
situations and for troubleshooting.
yyDeltaV Analyze – tool for basic evaluation of alarm rates and comparison against ISA-18.2 suggested targets.
The following table identifies specific challenges and where the above Emerson solutions fit for each stage of the ISA-18.2
lifecycle. More details and examples are provided in other whitepapers.
www.emerson.com/deltav 7
White Paper
October 2019
Alarm Management for DeltaV
www.emerson.com/deltav 8
White Paper
October 2019
Alarm Management for DeltaV
www.emerson.com/deltav 9
White Paper
October 2019
Alarm Management for DeltaV
www.emerson.com/deltav 10
White Paper
October 2019
Alarm Management for DeltaV
www.emerson.com/deltav 11
White Paper
October 2019
Alarm Management for DeltaV
www.emerson.com/deltav 12
White Paper
October 2019
Alarm Management for DeltaV
www.emerson.com/deltav 13
White Paper
October 2019
Alarm Management for DeltaV
Alarm Operations
Alarm management functions that directly and daily affect the operator and system control engineer are called Alarm
Operations in the DeltaV System, distinct from Alarm Analytics and Alarm Rationalization. Alarm Operations functions are core
components of the DeltaV system. Alarm Operations is the subject of another complete whitepaper available from Emerson.
Learn More
Additional whitepapers along with product demonstration videos and product data sheets describing DeltaV system alarm
management solutions are available on-line, at www.emerson.com/alarmmanagement.