Skip Navigation Links
MenuExpand
ASSIST
   Data updated: 18 May 2026. Home |  About Quick Search |  ASSIST |  ASSIST Updates Document Details

Document ID:   DI-SESS-82539       Scroll down to access document images

Overview
Title:  Built-in-Test (BIT) Anomaly Reporting
Scope:  The BIT Anomaly Report is used to assess system health, diagnostic performance, and configuration-specific reliability during production acceptance testing, post-fielding induction, and recertification testing. The reported data supports failure reporting, analysis, and corrective action processes (e.g., FRACAS); verification of system readiness for fielding or return to service; and identification of trends related to manufacturing defects, maintenance-induced faults, and recurring failure modes. The data is also used to evaluate BIT effectiveness, including fault detection and isolation capability, and to inform safety, airworthiness, and sustainment decisions. BIT anomaly data shall be traceable to specific hardware and software configurations to enable correlation with test results, maintenance actions, and corrective actions.
Status:  Active DID Date:  05-MAY-2026      
  Next Review Due:  04-MAY-2031
SESS Doc Category:   Data Item Description  

Responsibilities
DID Approval Authority:  SA  Navy Supply Systems Command
  Preparing Activity: AS  Naval Air Systems Command
Coordination:  Full  
Navy Custodian:  AS   Naval Air Systems Command  

Projects
 Project Number:     SESS-2026-023
Revision History Click on column headings for a description of column content.

NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.


  About Quick Search  |  Contact Us  |  FAQ  |  ASSIST  |  Privacy and Security  |  Section 508 Compliance  |  Defense Standardization Program  

WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.