
System Manual Modular Systems
2 Safety
HI 800 191 E Rev. 2.02
Page 13 of 114
2
Safety
All safety information, notes and instructions specified in this document must be strictly
observed. The product may only be used if all guidelines and safety instructions are adhered to.
The product is operated with SELV or PELV. No imminent risk results from the product itself.
The use in Ex-Zone is permitted if additional measures are taken.
2.1
Intended Use
This chapter describes the conditions for using HIMatrix systems.
2.1.1
Scope
The safety-related HIMatrix controllers can be used in applications up to SIL 3 in accordance
with IEC 61508.
The HIMatrix systems are certified for use in process controllers, protective systems, burner
controllers, and machine controllers.
2.1.1.1
Application in Accordance with the De-Energize to Trip Principle
The automation devices have been designed in accordance with the de-energize to trip
principle.
A system that operates in accordance with the de-energize to trip principle adopts the de-
energized state if a fault occurs.
2.1.1.2
Application in Accordance with the Energize to Trip Principle
The HIMatrix controllers can be used in applications that operate in accordance with the
'energize to trip' principle.
A system operating in accordance with the energize to trip principle switches on, for instance,
an actuator to perform its safety function.
When designing the controller system, the requirements specified in the application standards
must be taken into account. For instance, line diagnosis for the inputs and outputs or message
reporting a triggered safety function may be required.
2.1.1.3
Use in Fire Alarm Systems
The HIMatrix systems with detection of short-circuits and open-circuits are tested and certified
for used in fire alarm systems in accordance with DIN EN 54-2 and NFPA 72. To contain the
risks, these systems must be able to adopt an active state on demand.
The operating requirements must be observed!
2.1.2
Non-Intended Use
The transfer of safety-relevant data through public networks like the Internet is permitted
provided that additional security measures such as VPN tunnel or firewall have been
implemented to increase security.