You are on page 1of 54

Alarm Management for Process Control

a Best Practice Guide for Design


Implementation and Use of Industrial
Alarm Systems Rothenberg
Visit to download the full and correct content document:
https://textbookfull.com/product/alarm-management-for-process-control-a-best-practic
e-guide-for-design-implementation-and-use-of-industrial-alarm-systems-rothenberg/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

NFPA 72 National Fire Alarm and Signaling Code 2019


NFPA 72 National Fire Alarm and Signaling Code Handbook
2019 Edition Edition National Fire Protection
Association
https://textbookfull.com/product/nfpa-72-national-fire-alarm-and-
signaling-code-2019-nfpa-72-national-fire-alarm-and-signaling-
code-handbook-2019-edition-edition-national-fire-protection-
association/

Electronic Design Automation for IC Implementation


Circuit Design and Process Technology 2nd Edition
Luciano Lavagno

https://textbookfull.com/product/electronic-design-automation-
for-ic-implementation-circuit-design-and-process-technology-2nd-
edition-luciano-lavagno/

Process Systems and Materials for CO2 Capture Modelling


Design Control and Integration 1st Edition Athanasios
I. Papadopoulos

https://textbookfull.com/product/process-systems-and-materials-
for-co2-capture-modelling-design-control-and-integration-1st-
edition-athanasios-i-papadopoulos/

Soil Mapping and Process Modeling for Sustainable Land


Use Management Paulo Pereira

https://textbookfull.com/product/soil-mapping-and-process-
modeling-for-sustainable-land-use-management-paulo-pereira/
The Design, Implementation, and Audit of Occupational
Health and Safety Management Systems (Workplace Safety,
Risk Management, and Industrial Hygiene) 1st Edition
Ron C. Mckinnon
https://textbookfull.com/product/the-design-implementation-and-
audit-of-occupational-health-and-safety-management-systems-
workplace-safety-risk-management-and-industrial-hygiene-1st-
edition-ron-c-mckinnon/

Industrial Control Systems Security and Resiliency


Practice and Theory Craig Rieger

https://textbookfull.com/product/industrial-control-systems-
security-and-resiliency-practice-and-theory-craig-rieger/

Database Systems: Design, Implementation, and


Management 13th Edition Carlos Coronel

https://textbookfull.com/product/database-systems-design-
implementation-and-management-13th-edition-carlos-coronel/

Database Systems Design Implementation Management 12th


Edition Carlos Coronel

https://textbookfull.com/product/database-systems-design-
implementation-management-12th-edition-carlos-coronel/

Management Control with Integrated Planning Models and


Implementation for Sustainable Coordination Lukas
Rieder

https://textbookfull.com/product/management-control-with-
integrated-planning-models-and-implementation-for-sustainable-
coordination-lukas-rieder/
Alarm Management for Process Control FROM THE FIRST EDITION Rothenberg Douglas H. Rothenberg
“This book provides a thorough view of what it takes
Second Edition to manage our alarms. But it is not just a book on
by Douglas H. Rothenberg, PhD alarm management; the underlying messages are
about Safety and Awareness. It solidly conveys the
mantra that the most effective way to run a manufac-
The first edition of this book received enthusiastic reception in the industrial turing site is this: Ensure employee safety & provide
communities world wide. Through its careful treatment and broad coverage, a work environment that delivers the right amount

Alarm
it has elevated alarm management to a place of importance for control room of information at exactly the right time. The book
operational safety. contains details and insight that can only be gained
This book elevates alarm management from a fragmented collection of through experience, lessons learned, and problem

Management
procedures, metrics, experiences, and trial-and-error, to the level of a technology solving. It is presented for those of us with an interest
discipline. It provides a complete treatment of best practices in alarm management. or desire for proper alarm management, yet who
The technology and approaches found here provide the opportunity to completely do not know where to start or how to sustain our
understand the what, the why, and the how of successful alarm systems. progress.”

for Process
No modern industrial enterprise, particularly in such areas as chemical —A. T. Stump
processing, can operate without a secure and reliable infrastructure of alarms and
controls—they are an integral part of all production management and control “His book is a comprehensive treatment of the

Control
systems. Improving alarm management is an effective way to provide operators current best practices in industrial process control

for Process Control


Alarm Management
with high-value support and guidance to successfully manage industrial plant alarm management. Doug covers the entire alarm
operations. Readers will find: management process from how to recognize the level
• Recommendations and guidelines are developed from fundamental con- of performance of existing systems through the meth-
cepts to provide powerful technical tools and workable approaches. odology and procedures for redesigning (or designing
• Alarms are treated as indicators of abnormal situations, not simply sensor new) state-of-the-practice alarm systems. All critical

A Best-Practice Guide for


readings that might be out of position. tasks are explained, with examples and insight into
• Alarm improvement is intimately linked to infrastructure management, what they mean.”
including the vital role of plant maintenance to alarm management, the —W. Boyes, Control Magazine
need to manage operators’ charter to continue to operate during abnormal
situations vs. cease operation, and the importance of situation awareness “This is the most complete book on alarm manage-
Design, Implementation,
and Use of Industrial
without undue reliance upon alarms ment; it covers the theory and many years of practical
The ability to appreciate technical issues is important, but this book requires experience in resolving alarm issues. I found the book
no previous specific technical, educational, or experiential background. to be full of gems for an alarm management rational-
The style and content are very accessible to a broad industrial audience
from board operator to plant manager. All critical tasks are explained
ization team.”
—Ian Nimmo, Founder of ASM Consortium; Alarm Systems
with workflow processes, examples, and insight into what it all means. currently President of UCDS
Alternatives are offered everywhere to enable users to tailor-make solutions

Second Edition
to their particular sites.

Doug Rothenberg is founder and president of D-RoTH, Inc., a leading world-class consulting
firm in all areas of alarm management systems for industrial manufacturing and technology
providers, based in Shaker Heights, Ohio. He holds a BSEE in electrical engineering from
Virginia Tech, a MSEE from Case Institute of Technology, and a PhD in systems engineering
from Case Western Reserve University. He is past president of the Cleveland section of the
International Society of Automation and remains active in both regional and national engi-
neering and professional societies, including ISA and Sigma Xi. He serves on ISA 18 and API Second Edition
1167 alarm management standards committees.

ISBN: 978-1-94708-334-9
Alarm
Management
for Process
Control
Alarm
Management
for Process
Control
A Best-Practice Guide for
Design, Implementation,
and Use of Industrial
Alarm Systems
Second Edition

DOUGLAS H. ROTHENBERG

MOMENTUM PRESS, LLC, NEW YORK


Alarm Management for Process Control: A Best-Practice Guide for Design, Implementation, and Use
of Industrial Alarm Systems, Second Edition

Copyright © Doug Rothenberg, 2018

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means—electronic, mechanical, photocopy, recording or any other
except for brief quotations, not to exceed 400 words, without the prior permission of the publisher

First published in 2009 by


Momentum Press®, LLC
222 East 46th Street, New York, N.Y. 10017
www.momentumpress.net

ISBN-13: 978-1-94708-334-9 (print)


ISBN-13: 978-1-94708-335-6 (e-book)

Cover and interior design by Exeter Premedia Services Private Ltd., Chennai, India

Second Edition: 2018

10 9 8 7 6 5 4 3 2 1

Printed in the United States of America


To my dearest wife, constant companion, champion, and best friend, Katarzyna
Gustaw, under whose sheltering roof and within whose protecting walls the first
words to this book, nearly the final words, and much in between were written.

Książkę tą dedykuję mojemu najlepszemu przyjacielowi, drogiej żonie mojej


Katarzynie Gustaw. Za jej to przyczyną i w jej przyjaznym domu pracowałem
przez długi czas, rozpocząłem i zakończyłem pisanie.
About the Author

D
ouglas H. Rothenberg is the president and principal
consultant of D-RoTH, Inc., a technology consult-
ing company providing innovative technology and
services for industry. His background includes nearly 20 years
as an independent consultant to Fortune 1000 companies;
over 20 years with Standard Oil, BP Oil, and BP Amoco,
where he was responsible for new, state-of-the-art technology
to support advanced manufacturing solutions; and 10 years
in academia at Case Western Reserve University. Current
areas of specialty with D-RoTH include alarm management,­
fit-for-purpose product design, and innovation development
for new products and services. He has a world-renowned
­reputation in consulting, training, and services in alarm management.
Rothenberg has a PhD in systems and control engineering from Case Western
Reserve University, an MS in electrical engineering from Case Institute of Technology,
and a bachelor of electrical engineering degree from Virginia Polytechnic Institute. He
has several patents in instrumentation and controls. He is active in the ­International
Society of Automation (ISA; formerly Instrumentation, Systems, and Automation
Society; and before that the Instrument Society of America) and a member of Sigma Xi,
the Scientific Research Society. He is the recipient of 2005 Educator of the Year Award
from Cleveland Technical Societies Council, Cleveland, Ohio. His early work helped
shape the approach and content of the EEMUA Publication 191 Alarm ­Management.
He is serving on the ISA18.2 Alarm Management Standards ­ Committee and the
­American Petroleum Institute API 1167 Alarm Management ­Standards Committee.

vii
Contents

About the Author vii


List of Figures xxviii
List of Tables xxxiv
Foreword xxxvii
Acknowledgments xxxix
Second Edition Preface xl
Credits xlii
Introduction xliii
Not a Handbook xlv
Audience xlv
Usefulness xlvi
Contents xlvi
Part I: The Alarm Management Problem xlvii
Part II: The Alarm Management Solution xlvii
Part III: Implementing Alarm Management xlvii
Book Deliverables xlviii
Important Word xlviii
Notes xlix

Part 1: The Alarm Management Problem 1

Chapter 1: Meet Alarm Management 3

1.1 Key Concepts 4


1.2 Alarm Performance Problems 5
Symptoms 5
Evidence 5
1.3 Reasons for Alarm Improvement 6
How Alarms Fit into Process Operating Situation 6
ix
Contents • Chapter 1

Alarm Management 8
Benefits 8
1.4 A Brief History of Alarm Management 10
1.5 The “Management” in Alarm Management 11
1.6 Alarm Design Roadmap 12
1.7 Audience for this Book 13
1.8 Importance of Alarm Management 13
1.9 Fundamentals of Alarm Management 15
Bottom Line of Alarm Management 15
Fundamentals 15
Operator Action 17
Importance of the Fundamentals 18
1.10 Design for Human Limitations 19
1.11 Alarm Management and Six Sigma 19
1.12 Controls Platforms 21
PLC versus DCS 21
PLC Special Considerations 22
1.13 Continuous versus Discrete and Batch 22
1.14 Application Effect on Alarm Design 23
1.15 Time and Dynamics 24
1.16 Historical Incidents 27
Three Mile Island 27
Milford Haven 28
Texas City 29
Why Now? 30
1.17 The New Design 31
Not by Subtraction Alone 31
Starting Alarm Improvement 32
Alarm Philosophy 32
Data Gathering and Analysis 32
Alarm Conventions and Redesign Guidelines 36
1.18 Example Alarm Redesign (Rationalization) Results 39
1.19 Completing the Design 40
Advanced Techniques 40
Situation Awareness 40
Operator Screen Design 41

x
Contents • Chapter 2

Operational Integrity Improvement 41


Condition Monitoring 41
1.20 Alarm Improvement Projects 42
1.21 Lessons for Successful Alarm Management 43
1.22 Important Design and Safety Notice 44
1.23 Conclusion 44
1.24 Notes and Additional Reading 44
Notes 44
Recommended Additional Reading 45

Chapter 2: Abnormal Situations 47

2.1 Key Concepts 48


2.2 Introducing Abnormal Situations 49
Two Scenarios 49
The Two Sides of Abnormal Situations 50
2.3 Observing Abnormal Situations 51
2.4 Understanding Abnormal Situations 53
2.5 Understanding Incidents 55
General Concepts Learned 55
Your Plant Data 55
2.6 General Lessons from Incidents 56
Examination for Cause 57
Hazards Defined by the FAA 60
Two Events 61
2.7 Critical Contributors to Incidents 61
Subtle Abnormalities 61
The Human Nature of Operators 62
Stop in Time 63
2.8 The Importance of Time 63
An Example 63
Process Safety Time 65
SUDA 66
Alarm Activation Point and Time 67
2.9 Why Abnormal Situations Are Important 67
2.10 Message of Abnormal Situations 70
State of Control Loops 70

xi
Contents • Chapter 3

The Magic in a Control Loop 71


Abnormal Situations in Perspective 73
2.11 Notes and Additional Reading 73
Notes 73
Recommended Additional Reading 73

Chapter 3: Strategy for Alarm Improvement 75

3.1 Key Concepts 76


3.2 How We Got Ourselves into Trouble 76
Controls Technology Evolution 77
How We Think 78
The Way Forward 79
3.3 The Alarm Management Problem 80
Symptoms 80
Root Causes 81
A Good Alarm 81
So Many Alarms, So Little Time 81
Benefits of Rationalization 82
3.4 Alarm Activation Path 83
3.5 The Geography of Alarm Management 84
Plant Area Model 85
Smallest Area of Rationalization 86
3.6 Alarm Improvement Teams 87
Representation 87
Local Teams 89
Site Team 89
Large Corporate Team 90
3.7 Alarm Improvement Projects 90
3.8 Standards and Regulations Overview 92
Best Practices Summary 92
Key Messages 93
Guides, Standards, and Regulations 94
3.9 Regulations 94
Department of Transportation (United States) 94
3.10 Standards and Guides 95
EEMUA 191 95

xii
Contents • Chapter 4

NAMUR (Germany) 98
ANSI/ISA 18.2 100
OSHA (United States) 101
HSE (UK) 102
API (United States) 103
IEC 62682 103
EPRI (United States) 104
Remarks 104
3.11 Conclusion 105
3.12 Notes and Additional Reading 105
Notes 105
Recommended Additional Reading 106

Chapter 4: Alarm Performance 107

4.1 Key Concepts 108


4.2 Alarm Problems 108
4.3 Alarm Performance Assessment 109
4.4 Alarm Metrics and Benchmarks 109
Why Have Metrics? 110
Plant Area of Focus—A Single-Operator Area 111
Basic Configuration Metrics 111
Basic Activation Metrics 113
4.5 Alarm Assessment Tools 114
Why Use a Tool? 115
Characteristics of Good Tools 115
Tool Providers 115
Getting the Data In 117
Configuration Data 117
Activation Data 118
4.6 Configuration Analysis 120
4.7 Activation Analysis 122
Activation Analysis across Industrial Segments 125
Deriving Implications from Activation Analyses 126
Alarm Priority Activation Rates 126
Acknowledgment Ratio 127
Time to Acknowledge 128

xiii
Contents • Chapter 4

Time to Clear 128


Alarm Flood 128
Chattering and Repeating 128
Related and Consequential 129
Standing and Stale 129
Nuisance Alarms (Bad Actors) 129
4.8 Advanced Activation Analysis 132
4.9 Alarm Correlation Analyses 132
Situations 132
General Comments 134
4.10 One Day in the Life of an Alarm System—
Configuration 135
Number of Tags and Tags with Alarms 135
Number of Alarms by Alarm Type 135
Priority of Configured Alarms 136
Duplicate Alarms 137
4.11 One Day in the Life of an Alarm System—Activation 138
The Raw Data 139
Amount of Data Produced in One Day 140
Alarm Activations 141
Time in Alarm 142
Time to Acknowledge 142
Operator Actions 144
4.12 Alarm System Performance Levels 144
4.13 Conclusion 146
4.14 Notes and Additional Reading 147
Notes 147
Recommended Additional Reading 147

Part 2: The Alarm Management Solution 149

Chapter 5: Permission to Operate 151

5.1 Key Concepts 152


5.2 Management’s Role 152
5.3 Operating Situations 153
Operating in Uncertainty 153

xiv
Contents • Chapter 5

Unique Events 153


Explosive Events 154
Definitions 155
5.4 How Permission to Operate Came to Be 155
5.5 How Permission to Operate Works 156
5.6 Permission to Operate 156
5.7 Alternative Methods for Granting Permission 157
De Facto Decisions 157
Operating Modality Decisions 158
5.8 Managing the Operator’s Permission 159
Qualifying Abnormal 159
No Help at Hand 159
Observer Evaluation 160
Operator Evaluation 160
Putting It All Together 162
5.9 Shut Down and Safe Park 162
Operator-Initiated Shutdown 163
Automated Shutdown 163
Safe Park 164
5.10 Special Technology 164
Detection and Warning of Abnormal Conditions 165
Conditions Related to the Plant 165
Conditions Related to the Operator 165
5.11 Operator Redeployment 166
5.12 Process Complexity 169
Linearly Related Complexity 170
Integrated/Complex Related 170
5.13 Training and Skills 171
Industrial Manufacturing 171
Military Training 172
5.14 Other Key Principles of Operation 173
Additional Operating Principles 173
Field Principles 174
Safety System Principles 174
Design and Inspection Principles 174
Management Principles 174

xv
Contents • Chapter 6

5.15 What Is Being Done by Others 175


Technology in Development 175
5.16 Conclusion 175
5.17 Notes 176

Chapter 6: Alarm Philosophy 177

6.1 Key Concepts 178


6.2 Caveats 178
A Foundation Is at the Bottom 178
Owner versus Designer 179
Reliance on Philosophy 179
Completeness 179
6.3 Getting Started 179
Operator Survey 180
Advice to the Reader on Timing of This Topic 180
6.4 Special Alarm Issues 181
Types of Alarms and Their Recommended Use 181
Smart Field Devices 182
Light Boxes 182
Special Cases of Redundant Alarms 182
About Alerts 183
Classes of Alarms 184
6.5 Overview of Alarm Philosophy 184
Philosophy 101 185
Operator-Centric Items 185
Plant-Centric Items 186
Alarm System Purpose 187
Philosophy Intent 187
Elements in the Philosophy 188
6.6 Alarm Priority 189
Priority Levels 190
Priority Names 192
Humorous Illustration of Priority 193
Consequence and Severity 194
Propagation of Abnormal Situations 197
Urgency 198

xvi
Contents • Chapter 6

Priority Assignment 199


Alarm Priority Assignment Setup Review 199
6.7 Enterprise Philosophy Framework 201
Overview 201
Framework Philosophy Document 203
At the Enterprise Level 203
Factoring It All into the Philosophy 205
6.8 Site-Level Philosophy 206
Site Personality 207
The Rest of the “Bases” 207
6.9 Alarm Design Principles 208
Fundamental Principles 208
Functional Principles 209
Key Performance Indicators 210
Critical Success Factors 210
Approved Management of Change Requirements 211
Procedure for Rationalization 211
Alarm Configuration: Specific Issues 212
Alarm Activation Point Determination 212
Priority Assignment 212
Alarm Presentation 212
Operator Roles 213
Interplay with Procedures 213
Training 214
Escalation 215
Maintenance 215
6.10 Example Procedure: To Silence or to Acknowledge 216
6.11 Philosophy Hit List 220
6.12 Alarm Philosophy Workshop 221
Workshop Details 221
Facilitation 224
Preparation 224
6.13 Enterprise Philosophy Framework 226
6.14 Conclusion 227
6.15 Notes 227

xvii
Contents • Chapter 7

Chapter 7: Rationalization 229

7.1 Key Concepts 229


7.2 Introduction 230
Basic Approaches 231
Cornerstone Concepts of Alarm Management 232
7.3 About the Word “Rationalization” 234
7.4 Checklist 234
7.5 Getting Ready to Rationalize 235
Housekeeping 235
Bad Actors 236
Filters and Deadbands 237
The Data 239
Alarm Documentation and Rationalization Tools 239
Rationalization Is Not Just About Numbers 240
7.6 Alarm Response Manual 241
Header Information 243
Configuration Data 244
Causes 244
Confirmatory Actions 244
Consequences of Not Acting 245
Automatic Actions 245
Manual Corrective Actions 245
Advanced Alarm Requirements 246
Alarm Response Timing Data 246
Safety-Related Testing Requirements 246
Example Online Alarm Response Sheet 246
Additional Items 247
7.7 Rationalization Methods 248
Alarms Are Not the Important Part 248
Rationalization Approaches 248
“Starting from Where You Are” Rationalization 249
“Starting from Zero” Rationalization 250
7.8 Required Alarms 252
7.9 Common Elements and Common Subsystems 252
7.10 “Starting from Where You Are” Rationalization 254
Work Process 255

xviii
Contents • Chapter 7

7.11 “Starting from Zero” Rationalization 257


Work Process 258
Wrap-Up 260
7.12 Only Four Alarms 260
7.13 Identifying Subsystem Boundaries 261
Decomposition 262
7.14 “Starting from Zero” Examples 266
Furnace 266
Heat Exchanger 268
7.15 Working Through the Database 270
Method of Flows 270
Method of Elements 272
Choosing a Method 273
7.16 The Alarm Activation Point 273
Alarm Activation Point Determination 274
A Digression in Setting Alarm Activation Points 277
The Limit of Alarm Limits 278
Generalizing Alarm Activation Point Calculations 279
Too Much Time; Just Enough Time 281
Alarm “Pick-Up” Order 282
7.17 Determining Alarm Priority 286
Assigning Priority 287
Calibrating the Alarm Priority Assignment Process 289
Nonweighted Maximum Severity with Urgency
Direct to Priority 291
7.18 Alarm Priority Assignment Examples 294
Sum of All Severities 294
Sum of All Severities Weighted by Urgency 295
Maximum Severity 296
Urgency Only 296
Maximum Severity Weighted by Urgency 297
Summary of Examples 298
7.19 Purpose of Alarm Priority 299
7.20 Rationalization Working Sessions 299
Teams 299
Participant Preparation 301

xix
Contents • Chapter 8

Work Areas 301


Work Sessions 302
Events Schedule 303
7.21 Partial Rationalizations 305
Concepts and Experience 305
Bad Actors 306
Rationalize Only Important Parts of the Operator’s
Area 306
Rationalize Only Alarms that Activate 307
Bottom Line 308
7.22 Conclusion 309
7.23 Notes and Additional Reading 309
Recommended Additional Reading 309

Chapter 8: Enhanced Alarm Methods 311

8.1 Key Concepts 312


8.2 Beginning 312
8.3 The Situation 314
8.4 Safety Notice 315
Operator Awareness 315
Monitoring 316
Unsafe Operations 316
8.5 Enhanced Alarm Functions 316
8.6 Enhanced Alarm Infrastructure 318
General Considerations 318
Alarm Processors 318
Basic Infrastructure 318
Enhanced Infrastructure 319
Alarm Integrity Monitoring 319
8.7 Operator Consent 319
Implement Automatically 320
Implement Unless Cancelled 321
Suggest with Positive Response Required 321
Suggest Only 322
8.8 Operator-Controlled Suppression Techniques 322
8.9 Preconfigured, Simplified Suppression Techniques 324

xx
Contents • Chapter 9

8.10 Informative Assistance 326


When Informative Assistance Is Useful 326
How to Do It 327
Examples 328
More Examples 330
8.11 Knowledge-Based 331
Pattern Recognition 332
Neural Networks 333
Fuzzy Logic 334
Knowledge-Based Reasoning 335
Model-Based Reasoning 336
8.12 Keeping Track of Plant State 337
Explicit Plant States 338
Implicit Plant States 338
8.13 Alarm Information without Alarm Activation 339
Plant Area Model 340
Conditional Alarming Facilitators 341
8.14 Alarm Activation Permissions 342
Category I Alarms 343
Category II Alarms 344
Category III Alarms 344
8.15 Conclusion 344
8.16 Notes and Additional Reading 345
Notes 345
Recommended Additional Reading 345

Part 3: Implementing Alarm Management 347

Chapter 9: Implementation 349

9.1 Key Concepts 349


9.2 Beginning 350
9.3 Implementation Steps 351
Approvals 351
Configuration 352
Enhanced Alarm Features 352
Process Graphics and Other Displays 353

xxi
Contents • Chapter 10

Procedures 353
Training 353
Documentation 353
Infrastructure 354
Operability Review 354
Final Approval 354
9.4 Implementation 355
Simulators and Training 355
Cutover and Testing 355
Moving On 355
9.5 Conclusion 355

Chapter 10: Life Cycle Management 357

10.1 Key Concepts 357


10.2 Assess Alarm Performance 358
Initial Assessment 359
Periodic Assessment 359
Timing of Assessments 359
Collection of Data 360
Every Alarm Activation Points to Opportunity 360
10.3 Interpretation of Periodic Assessments 361
Evaluate 361
Look for Added Benefits 361
Modify and Repair 362
Monitor and Enforce 362
Nuisance Alarms 362
Alarm Creep 363
Adding and Removing Alarms 364
10.4 Advanced Interpretation of Periodic Assessments 364
Nomenclature and Design 364
Value 366
Cases 366
10.5 Statistical Process Control and Alarm Management 376
Background 376
Relevance to Alarm Management 377
Guidance 378

xxii
Contents • Chapter 11

10.6 Enforcement 379


Enforcement by Shift 380
Periodic Enforcement 381
Aperiodic Enforcement 381
10.7 Notes 381

Chapter 11: Project Development 383

11.1 Key Concepts 384


11.2 The Fit of Alarm Improvement 384
11.3 The Business Case 386
Percentage of Daily Losses 386
Direct Calculation 387
Negotiation 388
Bottom Line 388
11.4 Project Design Approaches 388
Alarm Improvement by Starting from Where You Are 389
Alarm Improvement by Starting from Zero 391
Usefulness of Stages 393
11.5 Project Construction Alternatives 393
Sitewide, Comprehensive 394
Sitewide, Staged 395
Sitewide, Unit-by-Unit, Comprehensive 395
Review 396
11.6 Why Some Projects Fail 397
11.7 “Low-Hanging” Fruit 398
11.8 Conclusion 398

Chapter 12: Situation Awareness 399

12.1 Key Concepts 400


12.2 Operator Support Needs 400
The Hat 400
The Disaster Chain 401
Need for Situation Awareness 403
Visualizations 404
12.3 The Deviation Diagram 404
12.4 User-Centered Design—Human Factors 406

xxiii
Contents • Chapter 12

Human Factors Details 406


Environment 407
Scaling 408
Compensation 408
Understandability 408
Implementability 409
Unified Feel 409
12.5 Our Biological Clock 409
12.6 Other Operator Support Issues 411
Intent Recognition 411
Operator Vigilance 412
To Push or to Pull 412
12.7 Operator Displays 413
Physical Display Architecture 414
Modern Displays 415
Hierarchical Display Architecture 417
The Overview Level 419
The Secondary Level 421
The Tertiary Level 421
12.8 Navigation 424
12.9 Notifications Instead of Alarms 425
12.10 Perception Problems with Video Displays 427
Relationships and Size 427
Coding Conflicts 427
Color 430
Comments 436
12.11 New Operator Display Design 437
Coding Schemes and Icons 437
Overview Level 439
Secondary Level 440
Tertiary Level 443
Do ASM-Style Displays Work? 444
12.12 Wrap-Up 444
12.13 Notes and Additional Reading 446
Notes 446
Recommended Additional Reading 447

xxiv
Contents • Appendices

Appendix 1: Definitions of Terms, Abbreviations,


and Acronyms 449

Appendix 2: Review
 of Alarm Management Standards,
Guidelines, and Best Practices 463
A2.1 Setting the Stage 463
A2.2 IEC 62682; ANSI/ISA 18.2 470
A2.3 NAMUR 473
A2.4 Norwegian Petroleum Directorate 502
A2.5 Notes 526

Appendix 3: Operator Alarm Usefulness Questionnaire 527

A3.1 Operator Alarm Usefulness Questionnaire 528


Explanation 528
Purpose 528
General Instructions 528
Confidentiality 528
Surveyors 529
Additional Information If You Have Questions 529
Where Questionnaire Is to Be Returned 529
Operator Alarm Usefulness Questionnaire 530
Normal Steady Operation 532
Plant Faults and Trips 534
General 541
A3.2 Quiet Period Alarm Usefulness Questionnaire 543
Explanation 543
Instructions 543
Column Definitions 543
Survey Data Table 544
Summary 545

Appendix 4: Alarm Philosophy from


Honeywell European Users 547

Appendix 5: Overview of Alarm Management


for Process Control 563

A5.1 The Chapters 564

xxv
Contents • Appendices

Part I: The Alarm Management Problem 564


Part II: The Alarm Management Solution 567
Part III: Implementing Alarm Management 570

Appendix 6: Alarm Response Sheet 573

Appendix 7: Metrics and Key Performance Indicators 575

Part I: Recommended Requirements for Analysis Tools 575


A7.1 Purpose 575
A7.2 Background 575
A7.3 Analysis Types 576
A7.4 Queries 577
A7.5 Alarm Remediation Analyses 581
A7.6 Tools and Key Features 584
Part II: Metrics 587
A7.7 Introduction 587
A7.8 Static (Configuration) Metrics 588
A7.9 Dynamic (Activation) Metrics 590

Appendix 8: Alarm Management Pioneers 593

A8.1 Opening Notes 593


Father of Modern Alarm Management 593
A8.2 Alarm Management Taskforce 593
Pioneering Members 594
Objectives for Work 596
A8.3 Abnormal Situation Management Consortium 596
Key Players 597
Objectives for Work 597
A8.4 Additional Credits 598
Standards and Practice Organizations 598
Trainers and Consultants 598
Services Providers 598
Technology Providers 598
Industrial Controls Providers 598
Personalities at Large 599
A8.5 Note 599

xxvi
Contents • Appendices

Appendix 9: Qualitative Risk Method for Priority Assignment 601

Acknowledgment 601
A9.1 Qualitative Risk 601
A9.2 Porter’s Discussion on the Rationales for the
Qualitative Risk Matrix for Alarm Prioritization 602
Goal 602
Scope 602
A9.3 Description of Matrix 602
Probability Axis 602
Severity Axis 604
A9.4 Definition of Priorities 604

Appendix 10: Manufacturing Modalities and Alarm


Management 609

A10.0 Note for Second Edition 609


A10.1 Introduction 609
A10.2 Characteristics of Manufacturing Modalities 610
A10.3 Comparison Matrix 612
A10.4 Note 615

Appendix 11: Notifications Management 617

A11.0 Note for Second Edition 617


A11.1 Introduction 618
A11.2 Points to Consider 618
A11.3 Questions and Issues 619
A11.4 Note 620

Index 621

xxvii
Figures

Figure 1.0.1. Alarms are an intrusive notification to the operator 4


Figure 1.3.1. Operating region versus modality of remediation 7
Figure 1.3.2. Aging workforce in U.S. power industry 10
Figure 1.6.1. Alarm redesign roadmap 12
Figure 1.9.1. Alarm design foundation fundamentals 16
Figure 1.9.2. Operator action types 18
Figure 1.15.1. Magical viewer stage 25
Figure 1.15.2. Looking into our process 26
Figure 1.16.1. The iceberg of alarm management 31
Figure 1.17.1. Number of alarm occurrences
within last 30 days (by frequency) 33
Figure 1.17.2. Example of an alarm flood 34
Figure 1.17.3. Typical alarm priority spread 35
Figure 1.17.4. Link between alarms and actions (3 months) 35
Figure 2.3.1. What an abnormal situation looks like 52
Figure 2.4.1. Incident severity triangle 54
Figure 2.6.1. Causes of incidents 56
Figure 2.8.1. Timeline of an explosive gas leak 64
Figure 2.8.2. Process safety time and SUDA 65
Figure 2.9.1. Mapping current production 68
Figure 2.9.2. Improved production through better process management 69
Figure 3.2.1. Exponential growth in configured alarms 77
Figure 3.2.2. Panel board semigraphic 78
Figure 3.2.3. Engraved window for dedicated panel-mounted alarm 78
Figure 3.3.1. Top ten reasons to rationalize your alarm system 82
Figure 3.4.1. Alarm activation path 83
Figure 3.5.1. Conceptual plant area model 85

xxviii
Another random document with
no related content on Scribd:
answered by [238]a “burning, as in hell-fire, of priestly shams and
lies,” and not one out of twenty French monasteries escaped the fury
of the avengers. Our Protestant clergymen see their temple walls
cracked by a breach of ever-multiplying schisms, and can prop their
prestige only by more and more humiliating concessions, and in
every intelligent community have to purchase popularity by rank
heresies against the dogmas of their predecessors. Here and there
the orthodox tenets of the New Testament have survived the
progress of rationalism, but haunt the shade, like specters scenting
the morning air, and momentarily expecting the summons that shall
banish them to the realms of their native night.

[Contents]

E.—REFORM.

When the harbinger of day dispels the specters of darkness, half-


awakened sleepers often mourn the fading visions of dreamland, as
they would mourn the memories of a vanished world, till they find
that the solid earth still remains, with its mountains and forests, and
that the enjoyment of real life has but just begun. With a similar
regret the dupes of Jesuitism mourn the collapse of their creed and
lament the decline of morality, till they find that religion still remains,
with its consolations and hopes, and that the true work of redemption
has but just begun.

The reign of superstition begins to yield to a religion of reason and


humanity. The first forerunners of that religion appeared at the end of
the sixteenth century, when the philosophers of northern Europe
[239]first dared to appeal from dogma to nature, and since that revival
of common-sense the prison walls of clerical obscurantism have
been shaken by shock after shock, till daylight now enters through a
thousand fissures.

But Secularism has a positive as well as a negative mission, and


after removing the ruins of exploded idols, the champions of reform
will begin the work of reconstruction. Temples dedicated to the
religion of progress will rise from the ruins of superstition.
Communities of reformants will intrust the work of education to
chosen teachers, who will combine the functions of an instructor with
those of an exhorter. In the languages of several European nations
the word “rector” still bears that twofold significance. The ministers of
Secularism will not sacrifice physical health to mental culture. They
will be gymnasiarchs, like the Grecian pedagogues who
superintended the athletic exercises of their pupils and accompanied
them on foot journeys and hunting excursions. They will be teachers
of hygiene, laboring to secure the foundations of mental energy by
the preservation of physical vigor, and to banish diseases by the
removal of their causes. They will seek to circumscribe the power of
prejudice by the extension of knowledge. They will obviate the perils
of poverty by lessons of industry and prudence. Their doctrines will
dispense with miracles; they will make experience the test of truth,
and justice the test of integrity; they will not suppress, but
encourage, free inquiry; their war against error will employ no
weapons but those of logic. [240]

The religion of reason will limit its proper sphere to the secular
welfare of mankind, but will ask, as well as grant, the fullest freedom
of metaphysical speculation. Why should the friends of light darken
the sunshine of earth with fanatical wars for the suppression of
private theories about the mystery of the unrevealed first cause?
Why should they rage about the riddle of the veiled hereafter to
please the ordainer of the eternal law that visits such inexorable
penalties upon the neglect of the present world? Should the friends
of common sense quarrel about guesses at the solution of
unknowable secrets? We need not grudge our wonder-loving brother
the luxury of meditating on the mysteries of the unseen or the
possibilities of resurrection. Shall the soul of the dying patriarch live
only in his children? Shall it wing its way to distant stars? Shall it
linger on earth:

“Sigh in the breeze, keep silence in the cave,


And glide with airy foot o’er yonder sea?”

Why should we wrangle about riddles which we cannot possibly


solve? But we might certainly have honesty enough to admit that
impossibility. Musing on the enigmas of the “land beyond the veil”
may entertain us with the visions of a dreamy hour, but should not
engross the time needed for the problems of the only world thus far
revealed.

Thus, founded on a basis of health-culture, reason, and justice, the


office of priesthood will regain its ancient prestige, and the best and
wisest of men will become ministers of Secularism by devoting their
lives to the science of happiness on earth. [241]
[Contents]
PROF. FELIX L. OSWALD’S WORKS.

THE SECRET OF THE EAST; or, The Origin of the


Christian Religion, and the Significance of its Rise
and Decline. Cloth, $1.

THE BIBLE OF NATURE; or, The Principles of


Secularism. A Contribution to the Religion of the
Future. Cloth, $1.

PHYSICAL EDUCATION; or, The Health-Laws of


Nature. Cloth, $1.

HOUSEHOLD REMEDIES; for the Prevalent


Disorders of the Human Organism. Cloth, $1.

THE POISON PROBLEM; or, The Cause and Cure of


Intemperance. Pap., 25cts; clo., 75cts.

SUMMERLAND SKETCHES; or, Rambles in the


Backwoods of Mexico and Central America.
Profusely Illustrated from Designs by H. F. Farny and H.
Faber. 8vo, cloth, $2.50.

ZOOLOGICAL SKETCHES. A Contribution to the


Outdoor Study of Natural History. 8vo, cloth, $2.

For all of the above address

THE TRUTH SEEKER CO.,


28 Lafayette Place, New York. [242]
[Contents]
WORKS OF
L. K. WASHBURN.

Sunday and the Sabbath. “A law regulating human


conduct on the Sabbath is an impertinence.” Price, 10
cents.

The False Teaching of the Christian Church. “The


Thirty-nine Articles of the Christian church are thirty-nine
poor, broken-down opinions.” Price, 10 cents.

The Foolishness of Prayer. “Think of a minister’s


praying God to kill grasshoppers, or trying to induce the
deity to undertake a crusade of one against the Colorado
beetle!” Price, 10 cents.

Followers of Jesus. Price, 10 cents.

Religious Problems. Price, 10 cents.

Spiritualism: Is It a Faith or a Fact? Price, 5 cents.

Do You Love Jesus? Price, 5 cents.

America’s Debt to Thomas Paine. Price, 5 cents.

Is Liberalism Moral? Price, 5 cents.

A Holy Superstition. Price, 5 cents.

Temperance and the Bible. Price, 5 cents.


Free Religion; or, The Religious Demand of To-day.
Price, 5 cents.

The Brute God of the Old Testament. Price, 5 cents.

The Public Schools and the Catholic Church. 5 cents.


Colophon
Availability

This eBook is for the use of anyone anywhere at no cost and with
almost no restrictions whatsoever. You may copy it, give it away or re-
use it under the terms of the Project Gutenberg License included with
this eBook or online at www.gutenberg.org ↗️.

This eBook is produced by the Online Distributed Proofreading Team


at www.pgdp.net ↗️.

Metadata

The Bible of Nature;


Or, The Principles of
Title: Secularism. A
Contribution to the
Religion of the Future
Felix Leopold Oswald Info
Author:
(1845–1906) https://viaf.org/viaf/16832833/
File
2023-11-15 20:45:25
generation
UTC
date:
Language: English
Original
publication 1888
date:

Revision History

2023-11-04 Started.
Corrections

The following corrections have been applied to the text:

Edit
Page Source Correction
distance
13 jailors jailers 1
31 - [Deleted] 1
38 night-shaft night-shift 1
42 Golgatha Golgotha 1
44 [Not in source] . 1
75 koenig König 3/2
75 koennen können 2/1
89 Jerstaecker Gerstäcker 3/2
90 Rhus Rushd 3
97 Hartz Harz 1
98 kreuze Kreuze 1
98 Luetzen Lützen 2/1
98 Oudenarde Oudenaarde 1
102 wordly worldly 1
105 Hooglyn Hooghly 2
117 cooperation coöperation 1/0
123 intemperence intemperance 1
124 eshalten erhalten 1
152 hypocrits hypocrites 1
160 michievousness mischievousness 1
165,
179, Moriscoes Moriscos 1
189
173 groessre grössre 2/1
188 gardenlands garden-lands 1
197 Budha-Pesth Buda-Pesth 1
226 favorit favorite 1
*** END OF THE PROJECT GUTENBERG EBOOK THE BIBLE OF
NATURE ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the


United States and most other parts of the world at no
cost and with almost no restrictions whatsoever. You may
copy it, give it away or re-use it under the terms of the
Project Gutenberg License included with this eBook or
online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the
country where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status by
the Internal Revenue Service. The Foundation’s EIN or federal
tax identification number is 64-6221541. Contributions to the
Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form

You might also like