5.1
Bypassing Steps
The following steps should be followed when placing a
critica
l protection device
in
bypass:
1.
Identify critical protection devices to be
temporarily
bypassed
2.
Obtain approval to bypass devices
3.
Flag devices to be bypassed
4.
Perform bypass
5.
Monitor the by
passed or blocked
-
out functions
6.
Complete startup, shutdown,
operation, maintenance
,
or test
ing activities
7.
Return critical protective dev
ice or system
to normal service
, and verify
functionality
8.
Check/verify work completion and notify affected
personnel before removing the