Hi, Duane,
We at Cook also use spreadsheets and stand-alone programs for many tasks, including surveillances. All products must be either independently reviewed or use software is controlled via our station's software control procedure. Typically, spreadsheets fall into the former category, while compiled programs are controlled.
David Goff Reactor Engineer Donald C. Cook Nuclear Plant 269-465-5901 x1465
"Gore, Duane" degore@stpegs.com Sent by: pwrrm@retaqs.com 09/28/2009 02:22 PM Please respond to PWR Reactivity Management pwrrm@retaqs.com
To "'PWR Reactivity Management'" pwrrm@retaqs.com cc
Subject [Pwrrm] Use of Spreadsheets for Surveillances
We at STP use spreadsheets to perform surveillance calculations. The results are then independently verified by a second engineer using an independently generated spreadsheet. Neither spreadsheet has been formally verified per our station Software Quality Assurance procedure. In cases where the results are used without further verification, we do properly QA the spreadsheets (usually in the cases where other groups use the spreadsheets).
Our QA department is of the opinion that at least one of these spreadsheets used for surveillances must by fully verified and documented per our station Software Quality Assurance procedure.
It would help my case if I could cite other Rae?s practices with regards to the use of spreadsheets. What is the practice at your plant?
Thank you,
Duane Gore Supervisor, Reactor Engineering STPNOC
(361) 972-8909 _______________________________________________ PWRRM mailing list PWRRM@retaqs.com http://www.keffective.com/mailman/listinfo/pwrrm
---------------------------------------------------------------- This e-mail message and all attachments transmitted with it from the Nuclear Generation Group of American Electric Power are for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message.