Templating and Rubber- Stamping in RCM

Similar documents
Mystery Shopping BBC Trust Conclusions

Why the Threat of Downtime Should Be Keeping You Up at Night

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

Handling Complaints Tracy Bedwell Managing Director Sales Training International Ltd

The Systems Engineering Tool Box

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Computer Aided Draughting and Design: Graded Unit 1

NDIS Quality and Safeguards Commission. Incident Management System Guidance

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture

Chapter 1.6 Systems Development Life Cycle.

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Assets Condition Monitoring Using ISA100.11A Wireless System. Standards Certification Education & Training Publishing Conferences & Exhibits

Automating IT Asset Visualisation

The New Government Security Classification System -

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework

ISO INTERNATIONAL STANDARD. Ergonomic requirements for office work with visual display terminals (VDTs) Part 11: Guidance on usability

DATA BASE MANAGEMENT SYSTEM

Executive summary. Natural disasters including bushfires, floods, storms and cyclones have destructive and devastating consequences for Australia

ASSET RISK MANAGEMENT Criticality Framework

Migrating Complex Oracle Forms Applications to APEX: Utopia or Reality?

The Hidden Costs of Free Database Auditing Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere

Moving from a Paper to Paperless validation effort and how to get the most efficient mix of Manual vs. Automated testing.

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security

Quality and usability: A new framework

TERMINOLOGY MANAGEMENT DURING TRANSLATION PROJECTS: PROFESSIONAL TESTIMONY

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Broadcast Notification solutions

110.4 Use of Equipment.

Placing you at the heart of your operations. Vijeo Citect

Executive summary. by Michel Bonnet, Maximilien Laforge, and Jean-Baptiste Samuel

Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: March 2, 2014

This qualification has been reviewed. The last date to meet the requirements is 31 December 2019.

Higher National group award Graded Unit Specification

Paper 7 SO6 Annex 2 Annual Customer Service Complaints Report John Stevenson, Head of Complaints Standards Authority (CSA) May Purpose

nddprint 360 White Paper - Corporate Printing

Expression des Besoins et Identification des Objectifs de Sécurité

SEARCH ENGINE OPTIMIZATION ALWAYS, SOMETIMES, NEVER

2

THE OPEN & SHUT CASE FOR ENHANCING SECURITY IN HAZARDOUS AREAS SECURITY IN HAZARDOUS AREAS. By Doug Woodbridge PRODUCT PHOTO

COMBINED PROCESS CONTROL SYSTEMS AND SAFETY INSTRUMENTED SYSTEMS (SIS) DEMONSTRATION OF INDEPENDENCE

Solution Oil & Gas. tgood.com

SECTION 9 POLICY AND PROCEDURES

This Document is licensed to

3D Industrial plants. Documentation

Smart Pointers - What, Why, Which?

Strategy for information security in Sweden

National Certificate in Horticulture (Floriculture) (Level 4)

The New Data Protection Law a Basic Guide

Intelligent Sensors in Vibration Monitoring

Policy No: I-AS 002/2014. Ind-Aussie Solar (P) Ltd outlines protocols to be followed in using the mobile phones. Purpose:

PORTAL RESOURCES INFORMATION SYSTEM: THE DESIGN AND DEVELOPMENT OF AN ONLINE DATABASE FOR TRACKING WEB RESOURCES.

CLOUD COMPUTING READINESS CHECKLIST

Proximity Warning. Site Zone PWS. System. Personal protection & identification to help safeguard personnel from vehicle & machinery hazards

Chartered Membership: Professional Standards Framework

Disaster Recovery and Business Continuity

Installing Your Microsoft Access Database (Manual Installation Instructions)

A Letting agency s shop window is no longer a place on the high street, it is now online

6 Tips to Help You Improve Configuration Management. by Stuart Rance

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

Programming with MPI

Period from October 1, 2013 to September 30, 2014

(Refer Slide Time: 02.06)

HEALTH AND SAFETY PROGRAM 207 Permit Writer Certification Procedure

Evaluating the Acrobat PDF accessibility checker. 8 November, 2010

Marine Engineer Class 2

Building a website. Should you build your own website?

The Accreditation and Verification Regulation - Verification report

coal mining Solutions

QINEO DATA MANAGER. Perfect welding machine management

Overcoming the Challenges of Server Virtualisation

Integrated and Separate?

Colburn Community Primary School ICT and Computing Policy

Mo Metrics, Mo Problems? Our guide to marketing metrics

Report on Collaborative Research for Hurricane Hardening

Industry Standards Utilities Engineering Technician

Understanding Software Engineering

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Operating Instructions. VEGA DataViewer. Software for archive, administration and display of DTM data. Document ID: 51547

Guidelines for Traffic Counting. May 2013

As the UK leaders in the supply and installation of industrial ovens and finishing equipment we have the knowledge and expertise to keep your

New Technology Briefing

BCS Foundation Certificate in Software Asset Management Essentials Syllabus

Bluetooth Smart: How to avoid making dumb devices

Guidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005

Main challenges for a SAS programmer stepping in SAS developer s shoes

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme. Version 1.2

Submission to the Australian Government Consultation on Possible Amendments to Telecommunications Carrier Powers and Immunities.

Testing Lotus Notes applications Most of the Lotus Notes applications come under the technical domain of Rapid Application Development (RAD).

Siemens Controls. SAP interface COMOS. Platform SAP interface. Trademarks 1. Introduction. Technical prerequisites 3

Thinking Outside The Box Kieron Smith Kingspan Cleanroom Systems

Design Patterns. Paul Jackson. School of Informatics University of Edinburgh

Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 22 Slide 1

SWIFT USER MANUAL CONSULTANT MODULE. March 2013

Citizen Information Project

ETNO Expert Contribution IP Addressing in a post IPv4 World - Principles

and Adaptation Christopher R. Bennett William D. O. Paterson

CURRICULUM The Architectural Technology and Construction. programme

Transcription:

Templating and Rubber- Stamping in RCM RCM Notes series Dr Mark Horton, Numeratis.com, March 2011 Introduction The implementation of RCM requires the investment of a significant level of resources. Those resources are primarily those of manpower: the time of group members, facilitators, project managers, auditors and implementers. If the RCM implementation has been correctly planned, these individuals will be those who know the equipment best and those who are the best managers and auditors, so their time is doubly precious to the organisation. Given the immense benefits to be gained by implementing RCM, both in operational and safety terms, it is natural to ask what techniques might be used to reduce these resource requirements and to ensure that RCM schedules are implemented as quickly as possible. This paper has three objectives: To present tools and techniques that are genuinely effective and can safely be used as part of an RCM implementation To outline the circumstances under which it is safe to employ these techniques To discuss the circumstances under which applying these techniques might be inadvisable or potentially dangerous Templating: A Health Warning The appeal of these techniques is that correct application can significantly reduce the time spent on an RCM analysis. Before discussing where and how templating may be applied and where it must not be applied it must be emphasised that inappropriate use can be hazardous and could result in severe safety, environmental or operating consequences. The decision on whether templating should be applied is normally the facilitator s. If he or she is in any doubt at all on the decision, it must be referred to an RCM expert before proceeding. Level of Templating Templating may be applied at any one of a number of levels. In the simplest case, templating involves modifying a whole RCM analysis to fit a similar operating context. Templating may also be applied at a much lower level, to a single part or component, but in this case it is unlikely that a great deal of functional or failure effect information could be used. Templates at the component level are often a simple list of possible failure modes. What is templating? The principle of templating is simple: it is the process of using an existing RCM analysis as the basis for another.

The operating context condition must be considered seriously. The equipment must perform exactly the same duty, usually producing the same product or providing the same service to the same performance standards. Rubber- stamping specifically cannot be applied where one asset is a duty unit and the other a standby. Levels of RCM Analysis Templates Rubber-Stamping Rubber- stamping is the simplest templating process. It involves applying the same analysis to several pieces of equipment without change. An analysis may only be rubber- stamped if the following conditions apply. 1 The operating context of the assets must be identical. In other words they are expected to perform the same duty and work to the same performance standards. 2 The assets themselves must be physically identical so that they have the same failure modes and the same patterns of failure. 3 The failure effects must be identical in terms of direct operational losses (and the economic value of any downtime), safety hazards, environmental excursions and possible multiple failure effects. When considering whether items are physically identical, remember to review any components or materials that may have been used. Maintenance tasks may be rendered technically infeasible by design changes between versions of the same machine. Economic consequences must be properly considered since any variation in the cost of downtime may make tasks economically worthwhile for one asset but are ruled out for another. When is templating safe? It is not difficult to recognise a situation in which rubber- stamping is appropriate. It is similarly easy to reject templating if the assets are completely different. Deciding how (and whether) to apply templating is far more difficult in the broad grey zone between these two extremes. All of these conditions must be met before rubber- stamping is allowed. The technique is generally applied to fleets of identical assets that perform the same duty; in RCM terms, they have the same operating context. We can summarise the extent to which templating can be applied by looking at the seven questions of the RCM process. Rubber-stamping is the application of the same analysis to identical assets in the same operating context 2 Templating and rubber-stamping in RCM Copyright 2011-2012 numeratis.com

Templating Functions and Functional Failures The following logic may be used to template functions and functional failures. Steps 1-3 are applied to each function in the template analysis. Templating Templating is applied to assets whose operating contexts differ or where failure effects are different. The decision to use templating is far more complex than rubber- stamping and involves considerable skill on the part of the facilitator. Templating involves two steps: 1 The creation of an outline or template analysis for the assets to be analysed. The template may be developed from scratch or by reworking an existing complete analysis. 2 Filling out the template for each asset to produce a complete RCM analysis. For templating to be applicable: 1 The assets must be physically very similar (preferably identical). 2 The operating contexts must be similar. In templating, unlike rubber- stamping, we allow the operating context to vary. This means that the template cannot include the decision worksheet, since tasks that are worth doing for one asset may be ruled out by a different context; failure modes that lead to no scheduled maintenance in a template may require a scheduled maintenance task when applied to a real asset. 1. Consider whether the function is relevant to the asset under analysis. If not, delete the function. 2. If the function is relevant, adjust each performance standard so that it reflects the operating context of the target asset. 3. Consider whether any additional performance standards apply to the asset. 4. When all template functions have been reviewed, check whether any additional functions apply to the equipment under analysis. Review drawings and check whether any protective or monitoring devices are present which are not listed in the template. 5. When all functions have been listed, follow the usual RCM process for listing functional failures. The example below shows how performance standards change between the template and the final analysis. Template The golden rule is therefore Analysis Templating only goes as far as the information worksheet Copyright 2011-2012 numeratis.com Templating and rubber-stamping in RCM 3

Templating Failure Modes Failure modes may be templated provided that the physical construction of the assets and their operating context are similar. At first sight it appears that the only prerequisite for successful templating is that the assets should be physically similar. However, it is not difficult to demonstrate that different operating contexts lead to different failure modes and different failure patterns. Are there any failure modes that might have been omitted by the template developer because there is preventive maintenance in place that might be preventing them from occurring? Failure Effects and Tasks We have already seen that the operating context of an asset can radically change its likely failure modes. A more subtle change of operating context can also change failure effects. In the example above, two identical pumps show a number of completely different failure modes not because of a difference in design, but because of the influence of their individual operating contexts. The influence of operating context poses a problem when preparing a template. If the template assumes a specific operating context, it may omit a number of important failure modes that appear when the context is changed. On the other hand, including all possible failure modes in the template requires the investment of a great deal of time and effort in analysing failure modes that may never be included in an analysis. It is because of the influence of operating context that the facilitator who uses templates must never lose sight of the RCM process itself. The facilitator must establish Is each template failure mode applicable to the equipment being analysed? Is the failure mode reasonably likely in the operating context under consideration? Are there any other failure modes that are reasonably likely to happen? Are there any failure modes that might have been omitted from the template, but could have severe consequences in the target operating context? In the example above, pumps A and B are identical and required to carry out the same duty. The operating contexts differ because pump B is protected by a standby pump which cuts in if pump B should fail for any reason. It is likely that both pumps A and B will experience the same failure modes, but the effects of each failure mode are radically different. If a failure mode occurs which stops pump A, production is immediately affected. If pump B fails, pump C will take over its duty until pump B is repaired. Although the same set of maintenance tasks might be effective in preventing failures of pumps A and B, it is likely that many tasks that would be selected for pump A will be rejected for pump B because the failure effects do not matter as much. Failure effects may be templated only if there is sufficient similarity between operating contexts. This will be affected by: The product or service and its value Any penalties that are incurred for failing to reach required service levels In manufacturing plant, any buffer stocks which reduce the economic consequences of failure The presence or absence of any protective devices and alarms 4 Templating and rubber-stamping in RCM Copyright 2011-2012 numeratis.com

In general only local effects are similar. Where operating contexts are very different the facilitator should seriously consider whether templating is sensible since the group may spend its time reworking the template rather than applying its efforts to the analysis of each asset. In these circumstances it is easy to miss failure modes or to give insufficient consideration to failure effects. If assets are physically similar but their operating contexts are sufficiently different to rule out templating, the facilitator may want to create a list of failure modes which can be used as a checklist during separate analysis of each asset. Again, considerable care must be taken to ensure that the review group focuses on the asset, not on the ticklist of failure modes. Templating in Different Operating Contexts If the operating context of a template differs significantly from that of the target analysis, the functions, functional failures and failure effects cannot be templated. Failure modes must be treated with caution, since those listed in the template may not apply to the context under consideration. The best that can be done where operating contexts are different is to work with a list of possible failure modes and, in some cases, local failure effects. Such templates are usually applied only at the simple part or component level: for example, the template might list failure modes for a specific type of pump or motor. Using a list of failure modes is more problematic than working with a template information worksheet. The facilitator must verify which failure modes apply to the component in the operating context of the new analysis Each failure mode must be allocated to an appropriate functional failure Failure effects must be fully specified Any additional failure modes must be identified The application of templating from a list of failure modes requires considerable skill. It should be applied only to simple devices such as small switches, motors and pumps. In many cases it is quicker to create a zero- based analysis than to use a comprehensive and detailed failure mode list. Who is involved in RCM Templating? The RCM review group is no different from that convened to carry out a zero- based analysis. The analysis must be led by an experienced and knowledgeable facilitator who is aware of the potential pitfalls of templating. Template Quality In the same way that the quality of dies and presses dictates the quality of manufactured goods, so the quality of a template is critical to an RCM analysis. Templates that will be used many times must be rigorously checked and audited. They should also be accompanied by documentation that describes The equipment and its modification state Any assumptions made about the operating context when the template was developed Templating should not be thought of as a one- way process. RCM review groups will find problems and inconsistencies in any template. These should be fed back as quickly as possible so that the template is continuously improved. The Benefits Applied correctly, templating achieves a number of benefits. Less time is spent in the RCM analysis process Saving time is the primary motivation for templating. Functions, functional failures and failure modes are adapted from the template rather than being derived from a zero- based analysis, eliminating the time normally required to develop them from scratch. Copyright 2011-2012 numeratis.com Templating and rubber-stamping in RCM 5

Analyses are more consistent Because a single template is used as the basis for several analyses, the information worksheets of the derived analyses are more consistent than they might be if carried out from a zero base. One side effect is that the time required to audit the analyses may be reduced (although the auditors must be particularly vigilant to identify aspects of the analysis that make it different from the template). The RCM Analysis process is less repetitive Templating can reduce the degree of repetition involved in the RCM analysis and help to keep the group focused and motivated. The Pitfalls More time is spent on the RCM analysis process If templating is applied correctly to systems that are functionally and physically similar, then it might be expected to reduce the effort expended on the analysis. Templating between dissimilar systems diverts the review group from the RCM process itself into a discussion of the differences between the two systems. A great deal of effort may be expended on fruitless discussion of the template itself; this time might be better spent on a zero- based analysis. Failure modes are omitted One of the greatest dangers of templating is the possibility that significant failure modes will be missed because they are not present in the template. The facilitator must be aware of this danger and ensure that the group considers all relevant failure modes, including those not listed in the template. Inappropriate failure modes are included One of the most significant factors affecting the time taken to carry out an RCM analysis is the level of detail chosen by the facilitator. A detailed template may ensure that no significant failure modes are missed, but if too many irrelevant or unlikely failure modes are taken from the template analysis, the group will spend too much time analysing them. Paradoxically it is possible for a template to increase the time required to complete the analysis. Ownership is reduced The involvement of maintenance and operations personnel in the RCM process results in a feeling of ownership of the new maintenance schedules. By involving them in the functional analysis and task selection, it also gives them a new appreciation of the performance standards of the equipment and the limitations of maintenance. Templating inevitably reduces the number of individuals directly involved in the RCM process, and so may threaten the sense of ownership of the resulting schedules. Because templating is a rapid process, there is also a temptation to combine it with a "ʺtask force"ʺ approach to RCM, where a selected group analyses a wide range of assets. Although a specialised templating task force may complete the RCM analyses in fewer man- hours than separate groups, it does nothing to ensure the buy- in of maintenance and operations personnel and therefore may reduce the chances of a successful implementation. For this reason it is advisable to spread the RCM analysis and templating over a number of separate groups in order to involve as many individuals as possible. Conclusions Used correctly, templating is a powerful process which can reduce the resources needed to implement RCM while at the same time improving analysis consistency. Unless operating contexts and physical design are identical, templating involves a number of difficult decisions which should only be made by an experienced RCM facilitator. Terms of use and Copyright Neither the author nor the publisher accepts any responsibility for the application of the information and techniques presented in this document, nor for any errors or omissions. The reader should satisfy himself or herself of the correctness and applicability of the techniques described in this document, and bears full responsibility for the consequences of any application. 6 Templating and rubber-stamping in RCM Copyright 2011-2012 numeratis.com

Copyright 2011-2012 numeratis.com. Licensed for personal use only under a Creative Commons Attribution- Noncommercial- No Derivatives 3.0 Unported Licence. You may use this work for non- commercial purposes only. You may copy and distribute this work in its entirety provided that it is attributed to the author in the same way as in the original document and includes the original Terms of Use and Copyright statements. You may not create derivative works based on this work. You may not copy or use the images within this work except when copying or distributing the entire work. Copyright 2011-2012 numeratis.com Templating and rubber-stamping in RCM 7