Preliminary Risk Assessment

The Preliminary Risk Assessment app enables you to analyze complex systems, which are safety-related. From this app, you can:

  • Identify hazardous situations resulting from functional failures in specific operating modes and operational situations.
  • Qualify the risk with quantitative or qualitative criteria.
  • Define the response to these qualified risks by providing or pointing to the elements demonstrating that the risk is acceptable. This risk can be acceptable according to regulations or by assigning objectives (requirements) that further analyses can demonstrate.

See Also
What's New
Preliminary Risk Assessment Basics
In Other Guides
3DEXPERIENCE Platform
3DEXPERIENCE Dashboard Apps

A Preliminary Risk Assessment (PRA) analysis is performed on the system to be analyzed instantiated in its environment. This system corresponds to a logical component that can be defined with architecture authoring apps (Functional & Logical Design, Electrical & Electronics Architecture, ...).

The Preliminary Risk Assessment app offers the following main capabilities:

  • Analyze systems.
  • Identify the functions of components to define their potential failure modes.
  • Identify hazardous events or select existing ones.
  • As a result of the risk assessment, define the rigor with which the analyzed system can be developed. This rigor is often expressed with Assurance Levels or Integrity Levels (ASIL) depending on the specific industry.
  • Associate safety goals or point to the evidence demonstrating that the risk is acceptable with respect to applicable regulations or standards.
  • Generate a report from an analysis.

This product might use or depict Intellectual Property (IP) protected data. It is the user’s responsibility to safeguard the IP protected data when allowing others to view, export, or print the data. This includes the thumbnail representations of parts or assemblies used in markup screens. For more information on the use of IP Protection and safeguarding IP Protected data, see Social and Collaborative: Enterprise Modeling and Execution: IP Controlled Access.