641 Ni - 2017 12 PDF
641 Ni - 2017 12 PDF
641 Ni - 2017 12 PDF
Autonomous Shipping
December 2017
Guidance Note
NI 641 DT R00 E
1. INDEPENDENCY OF THE SOCIETY AND APPLICABLE TERMS 3.2. Subject to the Services performance and always by reference to 9.2. In such a case, the class granted to the concerned Unit and the
1.1. The Society shall remain at all times an independent contractor the Rules, the Society shall: previously issued certificates shall remain valid until the date of effect
and neither the Society nor any of its officers, employees, servants, • review the construction arrangements of the Unit as shown on the of the termination notice issued, subject to compliance with clause 4.1
agents or subcontractors shall be or act as an employee, servant or documents provided by the Client; and 6 above.
agent of any other party hereto in the performance of the Services. • conduct the Unit surveys at the place of the Unit construction; 10. FORCE MAJEURE
1.2. The operations of the Society in providing its Services are exclu- • class the Unit and enters the Unit's class in the Society's Register; 10.1. Neither Party shall be responsible for any failure to fulfil any term
sively conducted by way of random inspections and do not, in any cir- • survey the Unit periodically in service to note that the requirements or provision of the Conditions if and to the extent that fulfilment has
cumstances, involve monitoring or exhaustive verification. for the maintenance of class are met. The Client shall inform the been delayed or temporarily prevented by a force majeure occurrence
1.3. The Society acts as a services provider. This cannot be construed Society without delay of any circumstances which may cause any without the fault or negligence of the Party affected and which, by the
as an obligation bearing on the Society to obtain a result or as a war- changes on the conducted surveys or Services. exercise of reasonable diligence, the said Party is unable to provide
ranty. The Society is not and may not be considered as an underwriter, The Society will not: against.
broker in Unit's sale or chartering, expert in Unit's valuation, consulting • declare the acceptance or commissioning of a Unit, nor its construc- 10.2. For the purpose of this clause, force majeure shall mean any cir-
engineer, controller, naval architect, manufacturer, shipbuilder, repair tion in conformity with its design, such activities remaining under the cumstance not being within a Party's reasonable control including, but
or conversion yard, charterer or shipowner; none of them above listed exclusive responsibility of the Unit's owner or builder; not limited to: acts of God, natural disasters, epidemics or pandemics,
being relieved of any of their expressed or implied obligations as a re- • engage in any work relating to the design, construction, production wars, terrorist attacks, riots, sabotages, impositions of sanctions, em-
sult of the interventions of the Society. or repair checks, neither in the operation of the Unit or the Unit's bargoes, nuclear, chemical or biological contaminations, laws or action
1.4. The Services are carried out by the Society according to the appli- trade, neither in any advisory services, and cannot be held liable on taken by a government or public authority, quotas or prohibition, expro-
cable Rules and to the Bureau Veritas' Code of Ethics. The Society those accounts. priations, destructions of the worksite, explosions, fires, accidents, any
only is qualified to apply and interpret its Rules. 4. RESERVATION CLAUSE labour or trade disputes, strikes or lockouts
1.5. The Client acknowledges the latest versions of the Conditions and 4.1. The Client shall always: (i) maintain the Unit in good condition after 11. CONFIDENTIALITY
of the applicable Rules applying to the Services' performance. surveys; (ii) present the Unit after surveys; (iii) present the Unit for sur- 11.1. The documents and data provided to or prepared by the Society
1.6. Unless an express written agreement is made between the Parties veys; and (iv) inform the Society in due course of any circumstances in performing the Services, and the information made available to the
on the applicable Rules, the applicable Rules shall be the rules applica- that may affect the given appraisement of the Unit or cause to modify Society, are treated as confidential except where the information:
ble at the time of the Services' performance and con tract's execution. the scope of the Services. • is already known by the receiving Party from another source and is
1.7. The Services' performance is solely based on the Conditions. No 4.2. Certificates referring to the Society's Rules are only valid if issued properly and lawfully in the possession of the receiving Party prior
other terms shall apply whether express or implied. by the Society. to the date that it is disclosed;
2. DEFINITIONS 4.3. The Society has entire control over the Certificates issued and • is already in possession of the public or has entered the public
2.1. "Certificate(s)" means class certificates, attestations and reports may at any time withdraw a Certificate at its entire discretion including, domain, otherwise than through a breach of this obligation;
following the Society's intervention. The Certificates are an appraise- but not limited to, in the following situations: where the Client fails to • is acquired independently from a third party that has the right to dis-
ment given by the Society to the Client, at a certain date, following sur- comply in due time with instructions of the Society or where the Client seminate such information;
veys by its surveyors on the level of compliance of the Unit to the fails to pay in accordance with clause 6.2 hereunder. • is required to be disclosed under applicable law or by a governmen-
Society's Rules or to the documents of reference for the Services pro- 5. ACCESS AND SAFETY tal order, decree, regulation or rule or by a stock exchange authority
vided. They cannot be construed as an implied or express warranty of 5.1. The Client shall give to the Society all access and information nec- (provided that the receiving Party shall make all reasonable efforts
safety, fitness for the purpose, seaworthiness of the Unit or of its value essary for the efficient performance of the requested Services. The Cli- to give prompt written notice to the disclosing Party prior to such
for sale, insurance or chartering. ent shall be the sole responsible for the conditions of presentation of disclosure.
2.2. "Certification" means the activity of certification in application of the Unit for tests, trials and surveys and the conditions under which 11.2. The Society and the Client shall use the confidential information
national and international regulations or standards, in particular by del- tests and trials are carried out. Any information, drawings, etc. required exclusively within the framework of their activity underlying these Con-
egation from different governments that can result in the issuance of a for the performance of the Services must be made available in due ditions.
certificate. time. 11.3. Confidential information shall only be provided to third parties
2.3. "Classification" means the classification of a Unit that can result 5.2. The Client shall notify the Society of any relevant safety issue and with the prior written consent of the other Party. However, such prior
or not in the issuance of a class certificate with reference to the Rules. shall take all necessary safety-related measures to ensure a safe work consent shall not be required when the Society provides the confiden-
2.4. "Client" means the Party and/or its representative requesting the environment for the Society or any of its officers, employees, servants, tial information to a subsidiary.
Services. agents or subcontractors and shall comply with all applicable safety 11.4. The Society shall have the right to disclose the confidential infor-
2.5. "Conditions" means the terms and conditions set out in the regulations. mation if required to do so under regulations of the International Asso-
present document. ciation of Classifications Societies (IACS) or any statutory obligations.
6. PAYMENT OF INVOICES
2.6. "Industry Practice" means International Maritime and/or Offshore
6.1. The provision of the Services by the Society, whether complete or 12. INTELLECTUAL PROPERTY
industry practices.
not, involve, for the part carried out, the payment of fees thirty (30) days 12.1. Each Party exclusively owns all rights to its Intellectual Property
2.7. "Intellectual Property" means all patents, rights to inventions, utility
upon issuance of the invoice. created before or after the commencement date of the Conditions and
models, copyright and related rights, trade marks, logos, service marks,
6.2. Without prejudice to any other rights hereunder, in case of Client's whether or not associated with any contract between the Parties.
trade dress, business and domain names, rights in trade dress or get-up,
payment default, the Society shall be entitled to charge, in addition to 12.2. The Intellectual Property developed for the performance of the
rights in goodwill or to sue for passing off, unfair competition rights, rights
the amount not properly paid, interests equal to twelve (12) months LI- Services including, but not limited to drawings, calculations, and re-
in designs, rights in computer software, database rights, topography
BOR plus two (2) per cent as of due date calculated on the number of ports shall remain exclusive property of the Society.
rights, moral rights, rights in confidential information (including know-
days such payment is delinquent. The Society shall also have the right 13. ASSIGNMENT
how and trade secrets), methods and proto cols for Services, and any
to withhold certificates and other documents and/or to suspend or re- 13.1. The contract resulting from to these Conditions cannot be as-
other intellectual property rights, in each case whether capable of regis-
voke the validity of certificates. signed or transferred by any means by a Party to a third party without
tration, registered or unregistered and including all applications for and
6.3. In case of dispute on the invoice amount, the undisputed portion the prior written consent of the other Party.
renewals, reversions or extensions of such rights, and all similar or
of the invoice shall be paid and an explanation on the dispute shall ac- 13.2. The Society shall however have the right to assign or transfer by
equivalent rights or forms of protection in any part of the world.
company payment so that action can be taken to solve the dispute. any means the said contract to a subsidiary of the Bureau Veritas
2.8. "Parties" means the Society and Client together.
2.9. "Party" means the Society or the Client. 7. 7. LIABILITY Group.
2.10. "Register" means the register published annually by the Society. 7.1. The Society bears no liability for consequential loss. For the pur- 14. SEVERABILITY
2.11. "Rules" means the Society's classification rules, guidance notes and pose of this clause consequential loss shall include, without limitation: 14.1. Invalidity of one or more provisions does not affect the remaining
other documents. The Rules, procedures and instructions of the Society • Indirect or consequential loss; provisions.
take into account at the date of their preparation the state of currently avail- • Any loss and/or deferral of production, loss of product, loss of use, 14.2. Definitions herein take precedence over other definitions which
able and proven technical minimum requirements but are not a standard loss of bargain, loss of revenue, loss of profit or anticipated profit, may appear in other documents issued by the Society.
or a code of construction neither a guide for maintenance, a safety hand- loss of business and business interruption, in each case whether 14.3. In case of doubt as to the interpretation of the Conditions, the
book or a guide of professional practices, all of which are assumed to be direct or indirect. English text shall prevail.
known in detail and carefully followed at all times by the Client. The Client shall save, indemnify, defend and hold harmless the Society
15. GOVERNING LAW AND DISPUTE RESOLUTION
2.12. "Services" means the services set out in clauses 2.2 and 2.3 but from the Client's own consequential loss regardless of cause.
15.1. The Conditions shall be construed and governed by the laws of
also other services related to Classification and Certification such as, but 7.2. In any case, the Society's maximum liability towards the Client is
England and Wales.
not limited to: ship and company safety management certification, ship limited to one hundred and fifty per-cents (150%) of the price paid by
15.2. The Society and the Client shall make every effort to settle any
and port security certification, training activities, all activities and duties the Client to the Society for the performance of the Services. This limit
dispute amicably and in good faith by way of negotiation within thirty
incidental thereto such as documentation on any supporting means, soft- applies regardless of fault by the Society, including breach of contract,
(30) days from the date of receipt by either one of the Parties of a writ-
ware, instrumentation, measurements, tests and trials on board. breach of warranty, tort, strict liability, breach of statute.
ten notice of such a dispute.
2.13. "Society" means the classification society 'Bureau Veritas Ma- 7.3. All claims shall be presented to the Society in writing within three
15.3. Failing that, the dispute shall finally be settled by arbitration under
rine & Offshore SAS', a company organized and existing under the (3) months of the Services' performance or (if later) the date when the
the LCIA rules, which rules are deemed to be incorporated by refer-
laws of France, registered in Nanterre under the number 821 131 844, events which are relied on were first discovered by the Client. Any
ence into this clause. The number of arbitrators shall be three (3). The
or any other legal entity of Bureau Veritas Group as may be specified claim not so presented as defined above shall be deemed waived and
place of arbitration shall be London (UK).
in the relevant contract, and whose main activities are Classification absolutely time barred.
16. PROFESSIONNAL ETHICS
and Certification of ships or offshore units. 8. INDEMNITY CLAUSE
16.1. Each Party shall conduct all activities in compliance with all laws,
2.14. "Unit" means any ship or vessel or offshore unit or structure of 8.1. The Client agrees to release, indemnify and hold harmless the So-
statutes, rules, and regulations applicable to such Party including but
any type or part of it or system whether linked to shore, river bed or sea ciety from and against any and all claims, demands, lawsuits or actions
not limited to: child labour, forced labour, collective bargaining, discrim-
bed or not, whether operated or located at sea or in inland waters or for damages, including legal fees, for harm or loss to persons and/or
ination, abuse, working hours and minimum wages, anti-bribery, anti-
partly on land, including submarines, hovercrafts, drilling rigs, offshore property tangible, intangible or otherwise which may be brought
corruption. Each of the Parties warrants that neither it, nor its affiliates,
installations of any type and of any purpose, their related and ancillary against the Society, incidental to, arising out of or in connection with
has made or will make, with respect to the matters provided for here-
equipment, subsea or not, such as well head and pipelines, mooring the performance of the Services except for those claims caused solely
under, any offer, payment, gift or authorization of the payment of any
legs and mooring points or otherwise as decided by the Society. and completely by the negligence of the Society, its officers, employ-
money directly or indirectly, to or for the use or benefit of any official or
3. SCOPE AND PERFORMANCE ees, servants, agents or subcontractors.
employee of the government, political party, official, or candidate.
3.1. The Society shall perform the Services according to the applicable 9. TERMINATION 16.2. In addition, the Client shall act consistently with the Society's
national and international standards and Industry Practice and always 9.1. The Parties shall have the right to terminate the Services (and the Code of Ethics of Bureau Veritas. http://www.bureauveritas.com/
on the assumption that the Client is aware of such standards and In- relevant contract) for convenience after giving the other Party thirty home/about-us/ethics+and+compliance/
dustry Practice. (30) days' written notice, and without prejudice to clause 6 above.
Bureau Veritas Marine & Offshore General Conditions - Edition January 2017
GUIDANCE NOTE NI 641
SECTION 1 GENERAL
December 2017
Section 1 General
1 General 5
1.1 Context
1.2 Scope of the guidelines
1.3 Organization of the guidelines
1.4 Definitions
1.5 Acronyms
2 Safety and security conditions 6
2.1 General
2.2 Main ship capabilities
2.3 Infrastructure
2.4 Reliability
2.5 Human factors
2.6 Cybersecurity
2.7 Cargo
3 Regulations 8
3.1 General
3.2 SOLAS
3.3 MARPOL
3.4 COLREGs
3.5 STCW
4 Machinery system 17
4.1 Goal
4.2 Functional requirements
4.3 References
4.4 Monitoring
4.5 Maintenance
4.6 Emergency management
SECTION 1 GENERAL
1.2 Scope of the guidelines • Latency: the time interval between the instant at which
an instruction control unit issues a call for data and the
1.2.1 This Guidance Note sets out the main recommenda- instant at which the transfer of data is started
tions for the design or the operation of systems which may (ISO/IEC/IEEE 24765:2010)
be used to enhance the autonomy in the shipping.
• Level of autonomy: degree of decision making (author-
1.2.2 This Guidance Note is mainly focused on surface ity) deferred from the human to the system. A global
units which may be considered as a ship by the authorities level of autonomy of the ship should be defined accord-
(e.g. Maritime Autonomous Surface Ships of 500 GT or ing to the main roles between the human and the sys-
more). This excludes small ships (typically length less than tems. Descriptions of different levels of autonomy from
20 m) and unmanned underwater vehicles. the conventional ship to the fully autonomous ship are
given in Tab 1. A level of autonomy should be defined
for every autonomous ship’s system prior to any assess-
1.3 Organization of the guidelines ment (see Sec 2, [3.4])
1.3.1 In addition to the current introductive section, this • Lookout: activity carried out at all times by sight and
Guidance Note includes 3 sections: hearing as well as by all available means appropriate in
• Sec 2 is about the risk and technology assessment of the prevailing circumstances and conditions so as to
new technologies used in autonomous shipping make a full appraisal of the situation and of the risk of
collision (ISO 8468:2007)
• Sec 3 provides guidelines for ensuring a suitable level
of functionality for autonomous systems
• Navigation: all tasks relevant for deciding, executing
• Sec 4 provides guidelines for improving the reliability and maintaining course and speed in relation to waters
of autonomous systems. and traffic (IACS Unified Requirements N1)
Authority to Actions
Ship category Level of autonomy Manned Method of control
make decisions initiated by
Automated or manual operations are
Conventional 0 Human operated Yes Human Human
under human control
Decision support
Smart 1 Human directed Yes/No Human Human
Human makes decisions and actions
2 Human delegated Yes/No Human must confirm decisions Human System
System is not expecting confirmation
3 Human supervised Yes/No Human is always informed of the Software System
Autonomous decisions and actions
System is not expecting confirmation
4 Fully autonomous No Human is informed only in case of Software System
emergency
Note 1: Definitions of the level of autonomy are given in Sec 2, Tab 16
2.2 Main ship capabilities their vicinity. However, the autonomous ships should be
able to respond at any usual request (e.g. identification,
2.2.1 The autonomous ships should be capable of: position) from other ships by means of radio communica-
tions or visual signals.
• managing a pre-defined voyage plan and updating it in
real-time if relevant Port and coastal authorities should be able to communicate
• navigating according to the predefined voyage plan and with autonomous ships in order to be informed about the
avoid collisions with obstacles coming from the traffic planned manoeuvres and to be able to regulate the traffic.
or unexpected objects
• keeping a sufficient level of manoeuvrability and stability 2.4 Reliability
in various sea states
• withstanding unauthorized physical or virtual trespassing. 2.4.1 Compared to a conventional ship, the autonomous
ships may have less or even no crew aboard to rely on for
2.2.2 The autonomous ships should be designed to author- maintenance operations and corrective tasks due to system
ize a human to come aboard for controlling the ship, for failure. Consequently, the systems should be designed to be
example when a critical situation arises (e.g. fire, flooding, resilient to failure (e.g. fault tolerant) and to have extended
loss of propulsion etc). maintenance intervals (see Sec 4).
During the sea trials or for survey in service, the autono-
mous ships should be designed to accept the presence of a 2.4.2 Highest reliability should be achieved by introducing
human aboard or in their vicinity. efficient diagnostics and predictive algorithms for con-
trolling the risk of failures and pre-scheduling maintenance
Regardless of the possibility of a remote control, the auton- operations that should be performed in harbour (e.g. by
omous ships should be designed to be controlled aboard by using a condition-based maintenance).
either a portable device (e.g. laptop) or by a built-in control
system.
2.4.3 The usage of an intensive remote monitoring and
The possibility for a human to take the control aboard control of the status of the equipment should be considered
should be granted only to the authorized personnel, in par- in order to prevent failures.
ticular when the autonomous ships carry passengers.
A passenger of autonomous ships should have the possibility 2.4.4 A partial or full redundancy are some solutions to
to activate an emergency push button in case of critical situ- improve the availability for critical systems such as commu-
ation (e.g. passenger overboard, obstacle during docking). nication infrastructure or machinery.
2.3 Infrastructure 2.4.5 Redundancy is easiest to achieve for ships with elec-
trical propulsion. Generators producing electricity for
2.3.1 Shore Control Centre recharging batteries or additional emergency batteries
should be considered as a simple and cost-effective way to
The Shore Control Centre (SCC) should be considered as an improve the propulsion and steering reliability.
extension of the ship. To prevent that unexpected events on
the SCC could have consequences on the ship (e.g. fire,
earthquake), mitigation measures should be integrated in 2.5 Human factors
the design and operations of the SCC.
Those measures should not interfere with land-based regu- 2.5.1 The multiple sensors used for the monitoring increase
lations (e.g. lockdown during manoeuvre and procedure for a lot the amount of information provided to an operator. In
fire escape) which may differ from one country to the other order to avoid the risk of overload of information that may
depending on where the SCC is located. reduce the accuracy of the actual ship situation, a fusion of
the data collected by the sensors should be proposed to the
The SCC, including facility and manning, should be quali- operator.
fied with regard to each ship it is supervising. When the
SCC is used for an additional ship, a new qualification
2.5.2 The ergonomics of monitoring systems should take
should be obtained by the SCC for this ship.
into account the human vigilance that could be reduced
When the ship operates near restricted area (e.g. military during extended periods of remote control or when several
fleet), it should be necessary to have more stringent meas- ships which are in different situations are managed by only
ures for the protection of the SCC (e.g. to avoid terrorist one operator.
attack).
2.5.3 The remote operator should be aware of the latency
2.3.2 Interaction with the maritime infrastructure due to the communication that cause a delay between
Interaction with other autonomous or conventional ships his/her action and the actual ship reaction. The latency
should be taken into consideration during the design and should be continuously displayed during the operations
the operation. The autonomous ships should not interfere (e.g. manoeuvring) and a warning should be issued when
with the communications between other ships operating in the latency is over pre-defined limits.
1.1.3 The risk-based approach considers autonomous ships • safety and emergency
as a model of several different interconnected systems • security
aboard and onshore.
• ship strength and stability
1.1.4 The measures to mitigate the risks should be founded • passenger management
on prescriptive requirements already existing in the Rules or
• cargo management
in other standards or guidance notes from the industry or
regulatory bodies. • technical infrastructure.
2.3.1 Principles
2.1 Methodology
The hazards identification should cover all possible sources
2.1.1 References of hazards potentially contributing to undesirable events or
accidents.
The process for the risk assessment should be based on the
techniques available in the following documents: The consideration of a functional failure associated with the
consequence of an accident scenario should be governing
• IMO MSC-MEPC.2/Circ.12 Revised Guidelines for For- the process of identification.
mal Safety Assessment (FSA)
As a guidance, for some group of functions, a list of typical
• ISO/IEC 31010:2009 Risk management - Risk assess- hazards for autonomous ships are given in [2.3.2] to [2.3.9].
ment techniques
• ISO/IEC 27005:2011 Information technology — Secu- 2.3.2 Voyage
rity techniques — Information security risk manage- The hazards that should be considered for voyage purpose
ment. are summarized in Tab 1.
d) risk analysis and associated outcome (see [2.4]) 2.3.5 Safety and emergency
e) risk control options to eliminate intolerable risks (see The hazards that should be considered for safety and emer-
[2.5]). gency purpose are summarized in Tab 4.
Hazard Consequence
Failure of ship-shore connection Loss
Collision
Sinking
Failure of update (e.g. of nautical publications, weather forecasts) Grounding
Sinking
Human error in input of voyage plan Loss
Human error in remote monitoring and control (e.g. through situation unawareness, data misinterpreta-
Collision
tion, SCC capacity overload)
Loss
Human error in remote maintenance
Sinking
Hazard Consequence
Heavy traffic Collision
Heavy weather Sinking
Low visibility Collision
Propulsion failure Collision
Grounding
Sensor failure Collision
Marine wildlife (e.g. whales, squids, carcasses) Collision
Floating objects Collision
Offshore installations Collision
Hazard Consequence
Failure in detection of small objects (wreckage) Collision
Failure in detection of collision targets Collision
Failure in detection of navigational marks Grounding
Failure in detection of ship lights and shapes Collision
Failure in detection of semi-submerged towed or floating devices (e.g. seismic gauges, fishing trawls) Collision
Detection of unforeseeable events (e.g. freak wave) Sinking
Detection of considerable data discrepancy between charted water depth and sounded water depth -
Grounding
grounding objects
Detection of considerable data discrepancy between weather forecast and actual weather situation Sinking
Hazard Consequence
Failure in position fixing (due to e.g. GPS selective availability) Collision
Loss of
Communication failure in case of other ship in distress (e.g. message reception, relay, acknowledgment)
other ship
Communication failure in case of own ship in distress (e.g. with SCC, relevant authorities, ships in vicinity) Loss
Fire Loss
Water flooding - sudden hull damage Loss
Hazard Consequence
Willful damage to ship structures by others (e.g. pirates, terrorists) Sinking
Illegal actions
Attempt of unauthorised ship boarding (e.g. pirates, terrorists, stowaways, smugglers) Hijack
Loss
Failure of ship's IT systems (e.g. due to bugs) Loss
Jamming or spoofing of AIS or GPS signals Collision
Jamming or spoofing of communications, hacker attack, also on SCC (e.g. in case of pirate or terrorist attack) Collision Grounding
Hazard Consequence
Loss of intact stability due to structural damage
Loss of intact stability due to unfavorable ship responses (e.g. to waves)
Sinking
Loss of intact stability due to shift and/or liquefaction of cargo
Loss of intact stability due to icing
Hazard Consequence
Too many passenger onboard (overload) Sinking
Passenger overboard Human injury or fatality
Passenger unwellness
Human injury
Passenger injured during arrival or departure
Illegal actions
Passenger interfering in an onboard system (deliberately or not) Hijack
Loss
Hazard Consequence
Sensor / Actuator failure Loss of control
Sensor / Actuator failure due to ship icing Loss of observation
Temporary loss of electricity (e.g. due to black-out) Loss of control
Loss of control
Permanent loss of electricity
Grounding
Failure of ship's IT infrastructure (e.g. due to fire in the server room) Loss of control
Part failure or total loss of propulsion system Loss of control
Part failure or total loss of rudder function Loss of control
Failure to drop anchor when drifting Grounding
Unavailability of SCC (fire, environmental phenomenon...) or of operator (faintness, emergency situa-
Loss of control
tion, etc.)
Per ship
Index Definition Definition
year
7 Frequent Likely to occur once per month on one ship 10
6 Common Likely to occur once per year on one ship 1
Likely to occur once per year in a fleet of 10 ships, i.e. likely to occur a few times during the
5 Reasonably 0,1
ship's life
4 Possible Likely to occur once per year in a fleet of 100 ships 10-2
Likely to occur once per year in a fleet of 1000 ships, i.e. likely to occur in the total life of sev-
3 Remote 10-3
eral similar ships
2 Unlikely Likely to occur once in the lifetime (20 years) of a fleet of 500 ships 10-4
Extremely
1 Likely to occur once in the lifetime (20 years) of a world fleet of 5000 ships 10-5
unlikely
2.5 Risk Control Options where choices are made in the design concept that
restrict the level of potential risk
2.5.1 Principles • procedural:
The Risk Control Options (RCO) should be determined to when operators control the risk by behaving in accor-
prevent the occurrence or to mitigate the consequences of dance with defined procedures.
an accident scenario.
Typical Risk Control Options for autonomous ships are
given as a guidance in Tab 14.
2.5.2 Risk Control Measures
The RCOs are constituted by a collection of Risk Control
Measure (RCM). Each potential RCM should be select100
3 Technology assessment
ed by considering one or more, but not limited to, the fol- 3.1 Reference
lowing attributes:
• preventive: 3.1.1 When the design and the reliability of a ship’s system
are not covered by any existing standard, a technology
when reducing the probability of the event assessment should be carried out.
• mitigate: The technology assessment should be based on the follow-
when reducing the severity of the outcome of the event ing methodologies:
• Risk Based Qualification of New Technology - Method-
• engineering:
ological Guidelines in the latest revision of the Bureau
where safety features (either built in or added on) are Veritas Guidance Note NI 525 and summarized in [3.3]
within the design • Independent Safety Assessment (ISA)
• inherent: • Goal Structuring Notation (GSN).
3.3.1 The novelty of the technology is rated taking into Application conditions
account both the level of maturity and the proposed condi- Technology maturity
Similar Different
tions of operation (see Tab 15).
Proven 0 1
3.4 Level of autonomy Limited references 1 2
3.4.1 The level of autonomy should be defined to make a Extrapolated from proven 2 3
distinction between the role of the human and the role of
the system among the various functions of the system. These New 3 3
2.5.2 The data for navigational and weather forecast should 2.8.3 Combined with predefined parameters and taking
be retrieved from combined external sources such as the into account stability and maneuverability conditions a
SCC, AIS transceivers or data providers (Navigational Telex route optimization should be conducted under weather
NAVTEX, SafetyNET). routing criteria.
2.5.3 The ANS should identify the COLREG obligation of 2.9 Collision avoidance
the ship towards all objects in the vicinity and calculate
COLREG-compliant deviation measures for a given traffic
2.9.1 To navigate the ship safely and to be COLREG-com-
conditions.
pliant a continuous monitoring of the current traffic situa-
For path planning, solutions like sampling-based algorithms tion should be performed.
should be used. For collision avoidance, algorithms like
velocity obstacles should be used. 2.9.2 All traffic-related data should be combined and
assessed and possible future scenarios predicted.
2.5.4 When the level of autonomy requests supervision
during operations in harbour (e.g. docking and undocking) 2.9.3 As soon as a potential close quarters situation is iden-
or heavy traffic conditions near shore, land-based commu- tified, appropriate measures should be taken, such as:
nication networks should be used to provide a maximum
• reduce speed
availability and a minimum latency.
• predict and anticipate the obstacle’s motions
2.6 Ship status and dynamics • deviate from the initial ship’s path.
2.6.1 The ship status data should include position with dis- 2.10 Voyage recording
placement, draft, trim, ship motions within 6 degrees of free-
dom and information about propulsion and steering systems. 2.10.1 Data from essential ship processes (e.g. navigation,
Cargo monitoring should also be part of the ship status. machinery, propulsion or any significant process identified
during the risk assessment) should be received and stored in
2.6.2 The dynamics of the ship (velocities and acceleration) the log book. Situational data are similar to what is
should be predicted within a short time frame (less than 5 recorded by a VDR and should be complemented with
minutes) based on own ship’s characteristics as well as envi- expected or unexpected events or decisions.
ronmental conditions (e.g. wind, wave headings and fre-
quencies). 2.10.2 Data type regularly submitted to the SCC and their
associated intervals and amount should depend on the cur-
2.6.3 The weight distribution aboard the ship should be rent ship control mode (e.g. remote or fully autonomous).
calculated to determine the ship’s buoyancy and to control
the stability. 2.10.3 All log book data should be able to be retrieved
directly by the SCC at any time.
2.7 Lookout
2.11 Emergencies and alarm
2.7.1 The ship should independently gather weather data
from its own sensors. The accumulated data like wind speed, 2.11.1 Situations which are potentially threatening the
wave frequencies, should be used for subsequent weather safety of the ship should be managed with permanent and
routing and should be also stored and provided to the SCC. reliable means to inform the SCC and other ship’s processes
(e.g. fire alarms).
2.7.2 Navigational sensors aboard the ship should continu-
ously gather data to generate a complete traffic picture of 2.12 Devices used for situational awareness
the vicinity of the ship. Objects should be detected, identi-
fied and tracked. This traffic assessment should be sup-
2.12.1 Relevant input parameters for the process of autono-
ported by at least one CCTV system.
mous navigation should be provided by devices (e.g. sen-
sors) to have an accurate situational awareness, which
2.8 Weather routing provides the ANS with a perception of the vicinity of the
ship, including environmental conditions as well as with
2.8.1 The weather data which have been gathered by the target data for detected objects.
ship should be evaluated in comparison with weather fore- This perception should be done for example by using a sen-
casts which have been received from shore via the SCC. sor fusion-based approach where raw sensor data from
existing navigational sensors (e.g. data provided by LIDARs,
2.8.2 With this data combination a valid estimation of cur- cameras, radars and GNSS) are gathered, processed and
rent and upcoming weather conditions along the naviga- correlated among themselves to map a realistic representa-
tional and voyage plan of the ship should be made. tion of the ship’s environment.
2.12.2 Special attention should be paid to the limitations 3.4.3 Line of sight communication systems should be
due to technical reasons and legal reasons (COLREGs). The mainly based on AIS or digital VHF systems with a range of
sensors should be able to detect floating or partly submerged at least two kilometers.
object of standard container size (typically several meters) in
a mid-range distance (typically less than one kilometer). 3.5 Performance
2.12.3 The sensors should be also capable of detection of a 3.5.1 Remotely controlled ship should require more com-
life raft or a person in the water in a short range distance munication bandwidth for operation than a conventional
(typically several hectometers). ship and should need several communication channels.
2.12.4 The sensors should be able to detect any limitation 3.5.2 Bandwidth and latency of the communication net-
in the operating range such as a reduced visibility (e.g. use work and system should be adequate for the traffic that is
of Circular Error Probability to detect uncertainties of object mainly oriented from ship to shore due to the amount of
position). data transmitted by the autonomous systems.
3.3.1 The communication network and system should be 4.2 Functional requirements
compliant with the applicable requirements from IEC
61850-90-4 Network Engineering. 4.2.1 The autonomous machinery system should control
and monitor the propulsion plant and steering system.
3.4 Type of communication system 4.2.2 The autonomous machinery system should mitigate
the impact of emergency situations such as fire and flooding.
3.4.1 For external communication, in order to maintain a
correct level of availability in case of failure, backup 4.2.3 A maintenance plan should be developed for an
arrangement is to be provided for the transmission of critical extensive period of time and should include adequate pre-
data. In the event of a failure, an automatic transition ventive actions for limiting periodic maintenance tasks.
between the main and the backup solution should be pro-
vided, and an alarm should be triggered. A solution should 4.3 References
be to use two independent communication systems, for
example the Iridium system and a VSAT system operating 4.3.1 The machinery system should be compliant with the
outside the L-band. applicable requirements and regulations related to the
assignment of the following additional class notation from
3.4.2 Different frequency bands should be used in order to NR467 Rules for Steel Ships:
minimize the risks of disturbance of signals due to atmo- • for integrated machinery spaces (AUT-IMS see NR467
spheric effects (e.g. fading due to heavy rain). Pt F, Ch 3, Sec 4)
• for automated operation in port (AUT-PORT see NR467 5.2 Functional requirements
Pt F, Ch 3, Sec 3)
• for availability of machinery (AVM-IPS see NR467 Pt F, 5.2.1 The autonomous cargo management system should
Ch 2, Sec 3). collect and monitor the main cargo parameters.
4.5.1 The machinery system should be designed to allow • for refrigerated cargo (REF-CARGO, see NR467 Pt F, Ch
an extended period of time without any physical interfer- 7, Sec 2).
ence in the machinery spaces (e.g. 500 hours).
5.4 Monitoring
4.5.2 Based on the condition assessment of the machinery,
the system should suggest or take corrective actions for the 5.4.1 The cargo parameters should be collected and anal-
prevention of machinery failure. Instead of a condition- ysed by means of sensors installed in the cargo hold, within
based maintenance, systematic preventive maintenance the carrying device or directly on the cargo. A visual moni-
should also be adopted. toring should be provided by at least one CCTV system.
4.5.3 Information on the need for spare parts that enable 5.4.2 The temperature, the pressure, the gas, the water
ordering in advance should be delivered to the operator. incoming, the cargo shifting, are the main parameters that
should be monitored.
4.6 Emergency management
5.4.3 An alarm system able to issue warning or alert to the
4.6.1 An alarm system should be provided to allow identifi- operator should be provided for the detection of abnormal
cation of faults in the machinery and should be able to values for each cargo parameter.
communicate with a remote SCC.
5.5 Control
4.6.2 The alarm system should be triggered by sensors such
as IR-cameras, water inrush detectors, gas and fire detectors.
5.5.1 Means should be provided to automatically control
the cargo parameters, such as for heating, cooling, ventilat-
4.6.3 In case of the detection of an emergency situation, ing or pumping.
the system should be able to automatically activate means
to recover a safe situation or at least to mitigate the damages
(e.g. automatic change-over). 5.6 Loading and unloading
4.6.4 Fire fighting systems or pumps should be able to start 5.6.1 During the loading and unloading sequences, the
automatically upon the request of the system or the opera- autonomous cargo management system should monitor the
tor. Means should be provided to prevent any inadvertent cargo capacity, the ballast water, the ship’s structural
starting of fire fighting systems. strength and the stability (loads induced by the cargo).
5.1.1 The goal of the autonomous cargo management sys- 6.1.1 The goal of the passenger management system is to
tem is to ensure that cargo does not compromise the safety ensure the safety of passengers during a voyage on autono-
of the ship or not degrade the environment. mous ships.
6.2.2 During boarding and un-boarding sequences, the 7.1.1 The goal of the Shore Control Centre is to be able to
passenger management system should prevent any passen- continuously control and monitor several autonomous ships
ger from injury. of the same or different type.
6.2.3 In case of a critical incident (e.g. man overboard), the
passenger management system should provide means for 7.2 Functional requirements
alerting and rescuing.
7.2.1 The SCC system should be designed for displaying
6.2.4 All systems onboard should be designed to avoid any
suitable information, facilitate the decision making process
deliberate or unwilled interference or obstruction by a pas-
and remote control for the operator.
senger.
6.4.1 In order to prevent the overload, a system should be 7.3.1 The SCC should be linked to the ship, to the Vessel
provided to determine the number of passenger with regard Traffic Services (VTS), to the port authorities or the shipping
to the capacity of the ship. This system should be arranged company by using communication technologies that are
prior to the boarding stage of the passengers. available (e.g. GSM, WiMax, VHF or satellite).
6.4.2 In order to ensure that the ship has sufficient free-
board, an alarm should be installed and triggered when the 7.4 Control and monitoring
waterline exceed the load line.
7.4.1 The SCC should be able to plan and to upload voyage
6.4.3 The ship’s capacity should be estimated by a maxi-
data to the ship.
mum number of person and/or approximate weight. This
estimation should take into account a safety margin for addi-
tional weight per passenger (e.g. due to luggage, bicycle...). 7.4.2 The SCC operator should be able to easily identify
operational abnormalities, unexpected threats and errors
efficiently in a highly automated context and then commu-
6.5 Boarding sequence nicate this situation to other stakeholders in the SCC.
6.5.2 In case the system is not able to detect a situation of 7.4.4 In addition to have a clear visibility around the ship
danger, an emergency push button should be accessible to as requested by SOLAS Ch V reg 22 (Navigation bridge visi-
the passengers to stop the sequence. bility), the dashboard should also include sea chart, radar
screen and weather chart.
6.6 Life saving
7.4.5 The dashboard should display an information panel
6.6.1 The life saving appliances should be stowed in order summarizing the essential systems to have a clear view of
to be accessible for all passengers and should be designed the situation of the ship (e.g. navigation, machinery, cargo),
to be simple to use. A convenient solution should be for with for each of them, a coloured flag indicator:
each passenger to wear a life jacket.
• green for normal situation
6.6.2 In case of a passenger overboard, an alarm should be • yellow for warning that require operator attention and
accessible to the passengers onboard (emergency push but- verification
ton) and/or should be activated by the passenger in the
water (radio or water activated) to maintain the ship near • red for alert that require operator’s immediate corrective
the actual position and to alert the rescue team. actions.
2.1 References 2.5.2 The capacity of the stand-by power supply should be
sufficient to allow the normal operation of the system for at
2.1.1 The computerized based system lifecycle should be least half an hour.
based on the following international standards:
• ISO/IEC 15288:2015 Systems and Software Engineering 3 Human machine interface
- System Lifecycle Processes
• ISO/IEC 12207:2008 Systems and Software Engineering 3.1 References
- Software Lifecycle Processes
• ISO/IEC 61508:2010 (all parts) Functional safety of elec- 3.1.1 The ergonomics, the layout and interfaces of the sys-
trical/electronic/programmable electronic safety-related tem should be based on the following international stand-
ards:
systems.
• ISO 9241-210:2010 Ergonomics of human-system inter-
action - Part 210: Human-centred design for interactive
2.2 Risk-based design systems
2.2.1 A risk-based design approach (failure analysis) should • ISO 8468:2007 Ships and marine technology - Ship's
be adopted to identify, evaluate and mitigate the effects of a bridge layout and associated equipment - Requirements
system failure. The methodology should be based on a Fail- and guidelines
ure Mode Effects and Criticality Analysis (FMECA). • ISO 2412:1982 Shipbuilding - Colours of indicator
lights
2.2.2 The boundaries of the system should be clearly iden-
• IMO A.1021(26) Code on alerts and indicators.
tified with all critical components that may affect the safety
of operations.
3.2 Design
2.3 Component failure 3.2.1 The human machine interface should be designed to
be easily understood in a consistent style. Particular consid-
2.3.1 The system should be designed in such a way that a eration should be given to:
failure of one component should not affect the functionality
of other components except for those functions directly • symbols
dependent upon the information from the defective compo- • colours
nent. • controls
2.3.2 System and software should be fault tolerant and • information priorities
providing an acceptable level of resilience against unex- • layout.
pected failure.
3.2.2 System’s controls and indicators should be designed
2.3.3 This resiliency should be achieved by using an with due regard to the human operator. Controls and indi-
appropriate redundancy on the system’s critical compo- cators are to be so constructed that they can be efficiently
nents (e.g. power supply, communication equipment). operated by suitably qualified personnel.
4.3 Performance 5.2.2 The quality plan should include the test procedure for
software and the results of tests should be documented.
4.3.1 A means of transmission control should be provided
and designed so as to verify the completion of the data
transmitted (CRC or equivalent acceptable method). When 5.3 Testing
corrupted data is detected, the number of retries should be
limited so as to keep an acceptable global response time. 5.3.1 Software should be tested in association with hard-
ware and evidences of testing should be produced accord-
4.3.2 All data should be identified with a priority level. The ing to the quality plan.
transmission software should be designed so as to take into
consideration the priority of data. 5.3.2 The software modules of the application software
should be tested individually and subsequently subjected to
4.3.3 Missing or corrupted data transmitted through the
an integration test. It should be checked that:
network should not affect functions which are not depend-
ent on this data. • the development work has been carried out in accord-
ance with the quality plan
4.3.4 When a hardware or software transmission failure
occurs, it should be detected by the transmitter and the • the documentation includes the method of testing, the
recipient which should activate an alarm. test programs producing, the simulation, the acceptance
criteria and the results.
4.3.5 A means should be provided to verify the activity of
transmission and its proper function (positive information).
5.3.3 Software module tests should provide evidence that
each module performs its intended function and does not
4.4 Redundancy perform unintended functions.
5.1.2 The software quality assurance is to comply with the 5.4 Configuration management
requirements of NR467 Pt C, Ch 3, Sec 3.
5.4.1 A software maintenance should be in place to man-
5.2 Quality plan age failure due to software change and in case of wrong
interaction with existing software from other systems.
5.2.1 The software development should be carried out
according to a quality plan defined by the software provider 5.4.2 Software change should be the responsibility of qual-
and records are to be kept. ified and authorised member (e.g. chief engineer).
6 Data quality assurance 6.4.3 The data storage should have a backup feature (e.g.
automatic duplication) and should be fault-tolerant (e.g.
due to power failure).
6.1 References
6.1.1 The data quality assurance should be based on the 6.5 Data authentication
following international standards:
• ISO 8000: Data quality 6.5.1 The authentication of data should be possible each
time it is requested by the system, by using a mechanism
• ISO/IEC 10181: Information technology - Open Systems
such as a digital signature or a secure protocol.
Interconnection - Security frameworks for open systems.
6.2.1 The data quality assessment should be carried on the 6.6.1 Data integrity (unaltered data) should be preserved by
following measurements: providing means of protection from unauthorised access,
the data should carry an internal data checksum against
• completeness:
deliberate or unintentional modifications.
all necessary data are recorded
• uniqueness:
6.7 Data confidentiality
no data will be recorded more than once
• timeliness: 6.7.1 Data confidentiality should be maintained by using
the degree to which data represent reality from the means of encryption and an adequate level of authorisation
required point in time for access in consultation of the data storage.
• validity:
data are valid if it conforms to the syntax (format, type, 7 Cybersecurity
range) of its definition
• accuracy: 7.1 References
the degree to which data correctly describes the «real
world» object or event being described 7.1.1 The cybersecurity should be managed by using the
following international standards or industry guidelines:
• consistency:
• ISO/IEC 15408:2009 Information technology -Security
the absence of difference, when comparing two or more
techniques - Evaluation criteria for IT security
representations of a data item against its definition. It is
possible to have consistency without validity or accuracy. • ISO/IEC 27001:2013 Information technology -Security
techniques - Information Security Management Systems
6.3 Data acquisition • IMO MSC.CIRC.1526 Interim Guidelines on Maritime
Cyber Risk Management
6.3.1 For the data acquisition, the location and the selec-
• National Institute of Standards and Technology (NIST)
tion of the sensors should be done so as to measure the
Framework for Cybersecurity (2014)
actual value of the parameters. Temperature, vibration and
electromagnetic interference levels should be taken into • ANSSI Best Practices for CyberSecurity On-board Ships
account. The sensors should be designed to withstand the • Bureau Veritas - BV SW 200 - Cybersecurity Guidelines
local environment. for Software Development & Assessment.
6.3.2 Means should be provided for testing, calibration and In addition, the requirements for the cybersecurity from the
replacement of sensors. Such means should be designed, as additional class notation SYS-COM (see NR467, Pt F, Ch 4,
far as practicable, so as to avoid perturbation of the normal Sec 3) should be considered.
operation of the system.
identify measures to back-up and restore cyber systems 7.4.4 In case of an automatic download and installation
necessary for shipping operations impacted by a cyber- from internet or e-mail, the software patches should be
event. retrieved from trusted sources (preferably from genuine soft-
ware provider).
7.3 Identification 7.4.5 The network and especially wireless network should
be protected by using secure protocols such as encrypted
7.3.1 An accurate map of the IT installations should be transmissions.
established and should be regularly updated. 7.4.6 The internet connection should be secured by a gate-
way enabling compartmentalisation between internet
7.3.2 This map should describe the network architecture access and the internal network.
and include a list of equipment (identified by a model num-
ber) and software (identified by a version number). 7.5 Detection
7.3.3 An inventory of all users accounts with the associated 7.5.1 Monitoring should be in place to detect abnormal
privileges should reflect the actual level of authorization events or intrusion such as massive data transfers (depend-
given to each user. ing on usual operating modes), several log-in failures to an
active or inactive account.
7.4.1 User access management should be based on a 7.6.1 In the event of an incident, a contingency plan
should be defined for working in downgraded mode. The
secure authentication protocol including best practises such
first measure should be to isolate all infected machines from
as avoidance of generic or anonymous accounts, a regular
the network. For each incident, a feedback should be capi-
password change with a required high level of complexity.
talised in order to be more effective in dealing with a similar
event in the future.
7.4.2 Procedures for arrival and departure of users (man-
agement of accounts, access to SCC or sensitive documen- 7.6.2 Essential information and software backup facilities
tation) should be created and followed. should be available for recovering to a clean system.