Hello everyone, I recently started working on functional security, after 10 years of experience in HAZOP and LOPA. I have a couple of questions.
1. How are systematic constraints determined, especially for architectures with HFT=1
2. at what stage is the SIL confirmation carried out, what is regulated it and does it include checking the SIF response time