MASS UK Industry Conduct Principles and Code of Practice 2022 (V6)
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
n Mini Trials Plans<br />
n Complex Trials Plans<br />
n Loadline Exemptions<br />
n Shipping Register Status (SSR)<br />
n Risk Assessments for the Operation that the vessel is about to undertake<br />
n St<strong>and</strong>ard Operating Procedures (SOP)<br />
n Vessel Log Books<br />
n User Manuals<br />
n OfCom License<br />
n Load Test Certification <strong>of</strong> lifting arrangements<br />
4.8.2 On initial engagement with a trial or operation authorisation agency, agree up front on the documentation required<br />
for the trial/demonstration or operation <strong>and</strong> build this into the delivery schedule to produce.<br />
5 Cyber Security Considerations for <strong>MASS</strong><br />
(Autonomous <strong>and</strong> Remotely Controlled)<br />
5.1 OBJECTIVE<br />
The objective <strong>of</strong> this Chapter is to provide guidance on the requirements for Cyber Safety <strong>and</strong><br />
Security for <strong>MASS</strong> operations.<br />
5.2 SCOPE<br />
5.2.1 The objectives <strong>of</strong> this <strong>Code</strong> are to ensure that all aspects <strong>of</strong> Cyber Safety <strong>and</strong> Security are addressed for all<br />
<strong>MASS</strong> operations.<br />
5.3 GENERAL<br />
5.3.1 We are currently living in what is commonly referred to as the 4th Industrial revolution, the digital age. Over the<br />
past 50 years technology has advanced <strong>and</strong> evolved in ways unimaginable in the 1970’s. A business computer<br />
system would have required a whole floor, in a large building, to house its data storage system. Now a mobile<br />
phone can hold more data, access it faster <strong>and</strong> communicate it to, virtually, anywhere on the planet with a suitable<br />
communication network.<br />
Remote Control Centre used for training<br />
5.3.2 Advances in material technology <strong>and</strong> miniaturisation techniques have allowed the creation <strong>of</strong> computer memory<br />
chips with capacities measured in Peta bytes (PB = 1×10^15) <strong>and</strong> Exa bytes (EB = 1×10^18). New technology<br />
has allowed the development <strong>of</strong> processor chips which can perform billions <strong>of</strong> operations per second (GHz). This<br />
has resulted in small, very fast, large memory capacity devices which are capable <strong>of</strong> dealing with large amounts<br />
<strong>of</strong> data very rapidly. Modern hardware <strong>and</strong> advanced s<strong>of</strong>tware combined with advanced communications<br />
technology, allow businesses <strong>and</strong> people to communicate <strong>and</strong> share information anywhere on the planet. Cloud<br />
computing has allowed us to remotely store, access <strong>and</strong> share massive amounts <strong>of</strong> data on dem<strong>and</strong>. There is no<br />
area <strong>of</strong> our working or private lives that has not been impacted by these technologies. In addition to being able<br />
to use these systems for complicated local tasks, we can communicate instantly with friends <strong>and</strong> family,<br />
collaborate with business colleagues, carry out online banking, shopping, education, video conferences, stream<br />
music <strong>and</strong> video <strong>and</strong>, more recently, perform remote audits, inspections, competence assessments <strong>and</strong> monitor<br />
performance. Dedicated machines are used to control <strong>and</strong> monitor industrial processes automatically <strong>and</strong><br />
generate alarms if the system detects anomalies which require human intervention.<br />
5.3.3 This technology, collectively known as Information Technology (IT), uses computer systems to process data or<br />
information. Combined with a communication system <strong>and</strong> associated peripheral equipment, such as sensors,<br />
specific data can be mined, processed, manipulated <strong>and</strong> analysed to provide monitoring <strong>and</strong> control <strong>of</strong> any<br />
system.<br />
5.3.4 Artificial intelligence (AI) <strong>and</strong> machine learning (ML) are processes by which an IT system monitors large amounts<br />
<strong>of</strong> data <strong>and</strong> identifies trends <strong>and</strong> anomalies <strong>and</strong> can improve processes <strong>and</strong> performance, such as digital twin<br />
<strong>and</strong> predictive maintenance (PM).<br />
36<br />
<strong>MASS</strong> <strong>UK</strong> <strong>Industry</strong> <strong>Conduct</strong> <strong>Principles</strong> <strong>and</strong> <strong>Code</strong> <strong>of</strong> <strong>Practice</strong> Version 6<br />
<strong>MASS</strong> <strong>UK</strong> <strong>Industry</strong> <strong>Conduct</strong> <strong>Principles</strong> <strong>and</strong> <strong>Code</strong> <strong>of</strong> <strong>Practice</strong> Version 6 37