Measurement Canada  Canada wordmark
Skip first menu (access key: 1) Menu (access key: M)
 Français  Contact Us  Help  Search  Canada Site
Home  Site Map  What's New  About Us  Registration
Go to the 
Strategis home page Measurement Canada Electricity Communiques
What's New
Services
Authorized Service Providers
Mass
Approvals
Electricity
Documents for Consultation
Projects and Initiatives
Act, Regulations and Requirements
Communiques
Marketplace Monitoring
Complaints and Disputes
Contractors' Registry
Delegation of Authorities
Comments, Questions and/or Suggestions
Natural Gas
Consumer Page
Volume
Sector Review
CFTM
About Measurement Canada
Site Map
Marketplace Monitoring
Information for Job Seekers

  Measurement Canada
 Services   CFTM   Approvals   Electricity   Volume
 Sector Review   Authorized Service
 Providers
  Consumer Page   Natural Gas   Mass

1999-11-19 Principles for Event Loggers


Measurement Canada - Principles for Event Loggers

PDF Version

Guidelines
Category:
General
Guidelines:
Principles for Event Loggers
Date:
1999-11-19

Introduction

The event logger principles are an extension of the sealing principles which were finalized on July 15, 1999. These principles do not diminish, replace or supercede the original sealing principles in any way.

Based on consultation, Measurement Canada has determined that the event logger principles outlined here are reasonable and respect the obligations of our mandate as well as the viewpoint of industry as a whole.

The principles outlined in this document are being used as the basis for developing the metrological audit trail requirements which are also supported by the sealing principles.

Purpose of an Event Logger

The purpose of an event logger is to secure the integrity of metrologically sensitive adjustments and sealable parameters, while allowing changes to non-metrological features and functions. The role of the event logger is to store changes made to the device in memory so that a record of the device’s metrological integrity and functionality is available for the administration of applicable legislation and in case it becomes necessary to reconstruct the device’s programming over time in order to assist in the resolution of a complaint and/or dispute.

Principles for an Effective Event Logger

The following are the principles, and their underlying rationale, which must be satisfied by any event logging system.

1. The following information must be recorded at the time of the event.

  1. the date and time of the change in the all-numeric SI format, i.e., YYYY/MM/DD/HH/MM, or other formats in which the information is provided unambiguously,
  2. identification of the parameter(s) being changed, and the new value(s),
  3. a unique event number,
  4. an identifier for the organization or person that caused the event.

The first two items above constitute the minimum information considered necessary to reconstruct a device’s attributes over time.

The third item above is required as a means of validating the continuity of the event log and of the device owner’s records. Gaps in the numbering would expose gaps in the records.

The fourth item above is valuable in providing information necessary for the administration of the legislation by indicating traceability of work performed on the device.

Additional information, intended to be of assistance in these objectives might also be included. On the other hand, too much additional information is not advantageous because it makes extraction of the critical information more difficult. See principle 2 below for more on this principle.

2. It must be possible to readily extract the metrological information from a log.

This principle prevents formats which force inspectors to sort through a lot of extraneous information (e.g., history logs, process alarms) to find the information they need. In practice, databases which include non-metrological information along with "events" are possible, provided they are capable of presenting the metrologically-important information for each device on its own and in correct numerical sequence.

3. An event may include reprogramming of more than one parameter provided that all parameters changed during the event are changed simultaneously, and that the other principles for event loggers are all respected.

The reason for a simultaneous (or very nearly so) change is to ensure that non-simultaneous changes will be recorded as individual events and not as one event.

4. Entries in the event log shall be accessible from the device.

In the case where the event log is within the device, the relative cost of memory in the past has placed limitations on the amount of data which could be stored locally. In situations where two-way communication is in place, the accessibility requirement could be satisfied by a remotely-located data base which can be read from the in-service location of the device. In addition to cost considerations, the latter architecture has the added advantage that all entries in the log can be accessible from the device.

5. The device and the event logger shall be interlocked.

This means that it shall not be possible to metrologically affect the characteristics of the device which are intended to be secured by the event logger without creating an entry in the event log, and it shall not be possible to create an entry in the event log without affecting the secured characteristics of the device. This requirement applies even during deliberate attempts to disable the protective systems. In addition, it implies that where the system uses communications links to satisfy this objective, it must be sufficiently intelligent to reject attempts to reprogram or create entries should the communications links not be functional.

6. The event logger data shall be secure.

This means that the storage medium shall be such that the data will not be affected by changes in ambient conditions, power outages, accidental or deliberate attempts to access, alter or tamper with it, and so on. This also means that the information which is entered into the event logger, or that is downloaded from it, shall be protected from erasure, loss, seizure, substitution, or modification.

7. The programmed parameters of the device shall reside in the device itself.

This means that devices should be such that they will continue to operate satisfactorily, and can be verified, without access to communication links.

8. A device shall be designed so that the event log can be inspected in service without disrupting its normal operation.

This means that devices should be such that the event logger can be examined at in service conditions, with inconsequential disruption to the customer, but does not limit testing to in service conditions only.

9. The recording of a verification triggering event is analogous to the breaking of a physical seal.

This means that, for the purposes and administration of the legislation, the recording of a verification triggering event shall have the same ramifications and consequences as the breaking of a physical seal.

10. An event logger is an adjunct to a physical seal, not necessarily a replacement for it.

In many cases, a device which employs an event logger will still require a physical seal to secure access to critical components, connections, firmware, hardware, etc. Where this function of a physical seal is performed by means of a record in the event log, the event logger will not require augmentation by a physical seal.

11. It must be possible to readily determine whether or not a device has been metrologically compromised or reprogrammed since its last verification.

This requirement could be satisfied by an annunciator or some other simple flag.


    Created: 2005-08-04
Updated: 2006-02-13
Top of Page
Top of Page
Top of Page
Important Notices