Available Actions |
Moves to Threat Monitoring |
Available for Dig Plan |
Description |
Repair |
Y |
Y |
This action is used to have the field repair the anomaly based on the company's repair procedures. |
Remove |
N |
N |
This action is used to state that the anomaly should be removed from any field activities. Examples of this would be if it was previously cutout, evaluated, or repaired. |
Evaluate |
Y |
Y |
This action is used to have the field further evaluate the anomaly. |
Unclassified |
N |
N |
This is the default action that is assigned by the analysis engine when the action is unknown. This action must be changed before being able to submit the analysis for approval. |
Cutout |
Y |
Y |
This action is used to have the field cut out the anomaly. |
Hold |
Y |
N |
This action is used to state that the anomaly will be held for further analysis. |
Monitor |
Y |
N |
This action is used to state that any change in the anomaly status must be monitored closely. |
Watch |
Y |
N |
This action is used to state that the anomaly is removed from field activities but still monitored by the office. These anomalies typically have a due date associated with the next scheduled tool run. |
Strikeout |
Y |
N |
This action is used to state that the anomaly is to be removed from the list. |
Comments
0 comments
Please sign in to leave a comment.