SlideShare a Scribd company logo
Key Elements to Assure a WellDeveloped Verification Plan for
Your Battery Powered Device
Presented by:
Cindy Millsaps
Energy Assurance LLC
September 18, 2012

Performance Compliance Success
Overview
• Why develop a verification and regulatory plan
• What are the key considerations in developing a
verification and regulatory plan
• How to integrate a verification and compliance
plan into your process and overcoming
implementation roadblocks
• What tools are available to help
Why have a plan?

• Risk Mitigation
– Performance verification
– Compliance verification

= Success
Performance Verification

• Use Environment
• User Experience
• Design Specification
• Foreseeable Misuse
Use Environment

• What will the battery be exposed to in normal
use?
And
• How will it perform under these conditions?
Outdoor Use
Vehicular Use
Handheld or Wearable Use
User Experience

• What does the end user or the direct customer
expect from the battery?
– Dis-satisfiers
– Perception versus reality
Consumer products
• Direct end user
feedback/input

Commercial products
• Limited or no access to
user information
Your Specification

• What do you say your product will do?
And
• How can you prove the product can do it?
Cycle life
Capacity
Fit
Foreseeable Misuse

• What might an end customer do to your battery
that is not intended?
And
• What will happen when they do?
Water exposure
Opening with a tool
Rigged connectors
Compliance Verification

Compliance verification is done for many different reasons:
• Shipping/transportation regulations
• Country/regional laws/codes
• End product driven requirements
• Customer requirements
• Market differentiation
Shipping/Transportation
Regulations
• What battery shipping regulations apply:
–
–
–
–
–

By chemistry
When shipped alone
When shipped with other equipment
For prototypes
For air transport

• When is re-test required for changes to the
product?
When does the testing need to be completed?
Country/Regional Laws and
Codes
• Where is the product going to ship?
– What areas/countries are priority?
– How will the battery be imported?
– How long will the approvals take to complete?
Be Realistic
End Product Driven
Requirements
• What end product will use the battery and how
does this change my compliance verification
needs?
–
–
–
–
–

Information technology equipment (ITE)
Cellular products
Medical devices
Energy Storage application
Automotive application
Know your end product customers requirements
Customer Driven
Requirements
• What approvals does the customer expect or require the
battery to have? (Even if it is not “required” for a battery)
– International compliance
• CB Scheme report or
• 3rd party verification/certification without CB or
• Self declared with data

– UL standards compliance
• UL or
• Other Nationally Recognized Test Laboratory (NRTL)
Market Differentiation
• Can you set yourself apart by having a
certification that others do not?
– Proven safer
– Globally compliant certifications
– Higher performance

• Is it worth the time and cost?
– Is your customer base educated on the certifications
Integrating a Verification
and Compliance Plan
• Create a checklist for verification and compliance
• Understand what stage of design completion is
needed to start testing and verification
• Build it into your schedule with room for the
unforeseeable issues

Make it a real priority
But don’t over-complicate it
Implementation
Roadblocks
• Business discipline
• Buy in from decision makers
• Strong customer voice
Business Discipline
• Customary state of operations
– Short design cycle
– Testing scheduled condensed
– Regulatory considered after design is final
RISKS
• Does not comply with global regulatory
• Does not meet customer requirements
• Does not align with customer regulatory needs

RESULT:
REDESIGN – DELAY – ADDED COST – UNHAPPY CUSTOMER
Buy-in from Decision Makers

• Leadership team must be behind the process
– Understand risks in not preparing
– Not just give it “lip service”
– Assign responsibilities - Accountability
– Take ownership

Change the culture
Where To Go for Help?
• The Web
–
–
–
–
–
–

Battery Directive
UN Manual Rev6
Transport FAQ
Battery Power Article
Large format link
Safety Link

• Your test lab expert
• Your design checklist
• Questions?

More Related Content

Similar to Bppt 2012 final 9 18-2012

Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014
Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014
Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014Susan Schanta
 
Independent verification & validation presented by Maneat v02
Independent verification & validation presented by Maneat v02Independent verification & validation presented by Maneat v02
Independent verification & validation presented by Maneat v02
Dr. Pierpaolo Mangeruga
 
Driving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation TechniquesDriving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation TechniquesSusan Schanta
 
Regulatory 101 for Medical Device Start Ups
Regulatory 101 for Medical Device Start UpsRegulatory 101 for Medical Device Start Ups
Regulatory 101 for Medical Device Start Ups
EMMAIntl
 
How to build confidence in your release cycle
How to build confidence in your release cycleHow to build confidence in your release cycle
How to build confidence in your release cycle
DiUS
 
Alineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de softwareAlineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de software
Software Guru
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
EnergySec
 
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Anatoly Levenchuk
 
Fitman webinar 2015 06 Verification and Validation methodology
Fitman webinar 2015 06 Verification and Validation methodologyFitman webinar 2015 06 Verification and Validation methodology
Fitman webinar 2015 06 Verification and Validation methodology
FITMAN FI
 
Building a QMS for Your SaMD
Building a QMS for Your SaMDBuilding a QMS for Your SaMD
Building a QMS for Your SaMD
EMMAIntl
 
CEA SBP Overview
CEA SBP OverviewCEA SBP Overview
CEA SBP Overview
Joseph Johnson
 
SQA_Lec#01-1.ppt
SQA_Lec#01-1.pptSQA_Lec#01-1.ppt
SQA_Lec#01-1.ppt
Ahmad Abbas
 
5 Things You Need To Build A Rock-Solid UAT Test Plan
5 Things You Need To Build A Rock-Solid UAT Test Plan5 Things You Need To Build A Rock-Solid UAT Test Plan
5 Things You Need To Build A Rock-Solid UAT Test Plan
Serena Gray
 
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Barcoding, Inc.
 
Presentation Fundamentals of V&V
Presentation Fundamentals of V&VPresentation Fundamentals of V&V
Presentation Fundamentals of V&Vmelmaan
 
Supplierr audit checklist
Supplierr audit checklistSupplierr audit checklist
Supplierr audit checklist
Linda Bartlett
 
Software Testing
Software TestingSoftware Testing
Software Testing
KarthicaMarasamy
 
Requirement Management 2
Requirement Management 2Requirement Management 2
Requirement Management 2pikuoec
 
Software validation do's and dont's may 2013
Software validation do's and dont's may 2013Software validation do's and dont's may 2013
Software validation do's and dont's may 2013
John Cachat
 
Embedded development life cycle
Embedded development life cycleEmbedded development life cycle
Embedded development life cycle
Revathi Subramaniam
 

Similar to Bppt 2012 final 9 18-2012 (20)

Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014
Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014
Ambiguity_Reviews_Improving_Bus_Reqs_Schanta_StarEast2014
 
Independent verification & validation presented by Maneat v02
Independent verification & validation presented by Maneat v02Independent verification & validation presented by Maneat v02
Independent verification & validation presented by Maneat v02
 
Driving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation TechniquesDriving Ambiguities Out of Requirements through Stronger Elicitation Techniques
Driving Ambiguities Out of Requirements through Stronger Elicitation Techniques
 
Regulatory 101 for Medical Device Start Ups
Regulatory 101 for Medical Device Start UpsRegulatory 101 for Medical Device Start Ups
Regulatory 101 for Medical Device Start Ups
 
How to build confidence in your release cycle
How to build confidence in your release cycleHow to build confidence in your release cycle
How to build confidence in your release cycle
 
Alineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de softwareAlineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de software
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
Kerim Cakmak, Moshe Cohen -- Continuous Verification and Validation
 
Fitman webinar 2015 06 Verification and Validation methodology
Fitman webinar 2015 06 Verification and Validation methodologyFitman webinar 2015 06 Verification and Validation methodology
Fitman webinar 2015 06 Verification and Validation methodology
 
Building a QMS for Your SaMD
Building a QMS for Your SaMDBuilding a QMS for Your SaMD
Building a QMS for Your SaMD
 
CEA SBP Overview
CEA SBP OverviewCEA SBP Overview
CEA SBP Overview
 
SQA_Lec#01-1.ppt
SQA_Lec#01-1.pptSQA_Lec#01-1.ppt
SQA_Lec#01-1.ppt
 
5 Things You Need To Build A Rock-Solid UAT Test Plan
5 Things You Need To Build A Rock-Solid UAT Test Plan5 Things You Need To Build A Rock-Solid UAT Test Plan
5 Things You Need To Build A Rock-Solid UAT Test Plan
 
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
Mobility Analytics — Uncovering the Root Causes that are Limiting Your Mobile...
 
Presentation Fundamentals of V&V
Presentation Fundamentals of V&VPresentation Fundamentals of V&V
Presentation Fundamentals of V&V
 
Supplierr audit checklist
Supplierr audit checklistSupplierr audit checklist
Supplierr audit checklist
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Requirement Management 2
Requirement Management 2Requirement Management 2
Requirement Management 2
 
Software validation do's and dont's may 2013
Software validation do's and dont's may 2013Software validation do's and dont's may 2013
Software validation do's and dont's may 2013
 
Embedded development life cycle
Embedded development life cycleEmbedded development life cycle
Embedded development life cycle
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Bppt 2012 final 9 18-2012

  • 1. Key Elements to Assure a WellDeveloped Verification Plan for Your Battery Powered Device Presented by: Cindy Millsaps Energy Assurance LLC September 18, 2012 Performance Compliance Success
  • 2. Overview • Why develop a verification and regulatory plan • What are the key considerations in developing a verification and regulatory plan • How to integrate a verification and compliance plan into your process and overcoming implementation roadblocks • What tools are available to help
  • 3. Why have a plan? • Risk Mitigation – Performance verification – Compliance verification = Success
  • 4. Performance Verification • Use Environment • User Experience • Design Specification • Foreseeable Misuse
  • 5. Use Environment • What will the battery be exposed to in normal use? And • How will it perform under these conditions? Outdoor Use Vehicular Use Handheld or Wearable Use
  • 6. User Experience • What does the end user or the direct customer expect from the battery? – Dis-satisfiers – Perception versus reality Consumer products • Direct end user feedback/input Commercial products • Limited or no access to user information
  • 7. Your Specification • What do you say your product will do? And • How can you prove the product can do it? Cycle life Capacity Fit
  • 8. Foreseeable Misuse • What might an end customer do to your battery that is not intended? And • What will happen when they do? Water exposure Opening with a tool Rigged connectors
  • 9. Compliance Verification Compliance verification is done for many different reasons: • Shipping/transportation regulations • Country/regional laws/codes • End product driven requirements • Customer requirements • Market differentiation
  • 10. Shipping/Transportation Regulations • What battery shipping regulations apply: – – – – – By chemistry When shipped alone When shipped with other equipment For prototypes For air transport • When is re-test required for changes to the product? When does the testing need to be completed?
  • 11. Country/Regional Laws and Codes • Where is the product going to ship? – What areas/countries are priority? – How will the battery be imported? – How long will the approvals take to complete? Be Realistic
  • 12. End Product Driven Requirements • What end product will use the battery and how does this change my compliance verification needs? – – – – – Information technology equipment (ITE) Cellular products Medical devices Energy Storage application Automotive application Know your end product customers requirements
  • 13. Customer Driven Requirements • What approvals does the customer expect or require the battery to have? (Even if it is not “required” for a battery) – International compliance • CB Scheme report or • 3rd party verification/certification without CB or • Self declared with data – UL standards compliance • UL or • Other Nationally Recognized Test Laboratory (NRTL)
  • 14. Market Differentiation • Can you set yourself apart by having a certification that others do not? – Proven safer – Globally compliant certifications – Higher performance • Is it worth the time and cost? – Is your customer base educated on the certifications
  • 15.
  • 16. Integrating a Verification and Compliance Plan • Create a checklist for verification and compliance • Understand what stage of design completion is needed to start testing and verification • Build it into your schedule with room for the unforeseeable issues Make it a real priority But don’t over-complicate it
  • 17. Implementation Roadblocks • Business discipline • Buy in from decision makers • Strong customer voice
  • 18. Business Discipline • Customary state of operations – Short design cycle – Testing scheduled condensed – Regulatory considered after design is final RISKS • Does not comply with global regulatory • Does not meet customer requirements • Does not align with customer regulatory needs RESULT: REDESIGN – DELAY – ADDED COST – UNHAPPY CUSTOMER
  • 19. Buy-in from Decision Makers • Leadership team must be behind the process – Understand risks in not preparing – Not just give it “lip service” – Assign responsibilities - Accountability – Take ownership Change the culture
  • 20. Where To Go for Help? • The Web – – – – – – Battery Directive UN Manual Rev6 Transport FAQ Battery Power Article Large format link Safety Link • Your test lab expert • Your design checklist