Take heed to this text
The brand new American Nationwide Commonplace for Industrial Cell Robots – Security Necessities Half 2: Necessities for IMR system(s) and IMR software(s) is now obtainable. This doc is a component 2 of a deliberate 3-part doc sequence on the security of commercial cell robots (IMR). Half 1 defines what an IMR is, together with a variety of phrases and definitions which are helpful in creating a standard terminology for the trade.
It’s also the primary time that there’s a definition of the security issues for cell manipulators, or robotic techniques wherein an arm and gripper are mounted on a movable base.
This doc outlines the security necessities which are particular to the variation of IMR techniques for explicit purposes and their subsequent deployment at particular websites. Half 3, which will even be printed independently, will define the person necessities of the secure operation of IMRs and IMR techniques.
The producer and integrator every ought to furnish the person of the IMR and IMR system with pertinent data for its correct utilization. The aim of offering this data and directions is to make sure that customers possess the requisite data to securely function the gear supplied to them. The duty for creating coaching and implementing secure work practices based mostly on the data to be used lies with the person of IMRs and IMR techniques.
Observe that when a person modifies the IMR or IMR system supplied by the unique provider, they assume the position of a producer or integrator and are explicitly accountable for adhering to the related sections of this doc.
As described partially 1, there are three sorts of IMRs:
IMR Kind A: AMR with none attachments. Such platforms encompass the cell platform, alone, and are usually meant for use as the premise for an IMR Kind B or C.
IMR Kind B: AMR with both passive or energetic attachments, excluding manipulators. Such energetic attachments can embrace curler tables, conveyors, and linear raise units (e.g., choosing attachments).
IMR Kind C: IMR constructed from an AMR or an AGV as a cell platform with a manipulator because the attachment.
This half 2 doc is for IMR system integrators and goes into element concerning the danger evaluation for the system being deployed onto an end-user facility. Generally, the doc defines that the danger evaluation shall be carried out by the IMR system integrator. The danger evaluation shall be in accordance with ANSI/ISO 12100 or ANSI B11.0. Dangers related to the IMR system shall be diminished to a suitable stage. Residual dangers related to the anticipated use and misuse of the IMR system shall be recognized within the data to be used.
In case you are integrating cell robotics options in your personal group or for a shopper, then you’re inspired to familiarize your self with this documentation and to comply with the danger evaluation suggestions inside the doc. They need to be thought of finest practices for the trade.
That is the only most vital doc outlining all the security issues when integrating and deploying IMRs and is a “must-read” for system integrators and shoppers alike. Finish-users deploying IMRs within the U.S. should insist on R15.08-2 compliance from their integration companions.
You should buy your personal copy of the documentation right here: https://www.automate.org/retailer/merchandise/new-part-2-ansi-ria-r15-08-1-2023-american-national-standard-for-industrial-mobile-robots-safety-requirements-part-2-requirements-for-imr-system-s-and-imr-application-s-pdf