PHMSA Gas Transmission (GT) Integrity Management
Time: 05/26/2013 02:41 AM
Protocol Item C.02
PHMSA Home |
Pipeline Safety Website |
C.02 Data Gathering and Integration
Verify that the operator gathers and integrates existing data and information on the entire pipeline that could be relevant to covered segments, and verify that the necessary pipeline data have been assembled and integrated. [§192.917(b)]
Verify that the operator has in place a comprehensive plan for collecting, reviewing, and analyzing the data. [ASME B31.8S-2004, Section 4.2 and ASME B31.8S-2004, Section 4.4]
- Verify that the operator has assembled data sets for threat identification and risk assessment according to the requirements in ASME B31.8S-2004, Section 4.2, ASME B31.8S-2004, Section 4.3, and ASME B31.8S-2004, Section 4.4. At a minimum, an operator must gather and evaluate the set of data specified in ASME B31.8S-2004, Appendix A (summarized in ASME B31.8S-2004, Table 1) and consider the following on covered segments and similar non-covered segments [§192.917(b)]:
- Past incident history
- Corrosion control records
- Continuing surveillance records
- Patrolling records
- Maintenance history
- Internal inspection records
- All other conditions specific to each pipeline.
Verify that the operator has utilized the data sources listed in ASME B31.8S-2004, Table 2, for initiation of the integrity management program. [ASME B31.8S-2004, Section 4.3]
- Verify that the operator has checked the data for accuracy. If the operator lacks sufficient data or where data quality is suspect, verify that the operator has followed the requirements in ASME B31.8S-2004, Section 4.2.1, ASME B31.8S-2004, Section 4.4, and ASME B31.8S-2004, Appendix A [ASME B31.8S-2004, Section 4.1, ASME B31.8S-2004, Section 4.2.1, ASME B31.8S-2004, Section 4.4, ASME B31.8S-2004, Section 5.7(e), and ASME B31.8S-2004, Appendix A]:
- Each threat covered by the missing or suspect data is assumed to apply to the segment being evaluated. The unavailability of identified data elements is not a justification for exclusion of a threat.
- Conservative assumptions are used in the risk assessment for that threat and segment or the segment is given higher priority.
- Records are maintained that identify how unsubstantiated data are used, so that the impact on the variability and accuracy of assessment results can be considered.
- Depending on the importance of the data, additional inspection actions or field data collection efforts may be required.
Verify that the operator's program includes measures to ensure that new information is incorporated in a timely and effective manner, as addressed in Protocol K. [§192.911(k), ASME B31.8S-2004, Section 11(b) and ASME B31.8S-2004, Section 11(d)]
- Verify that individual data elements are brought together and analyzed in their context such that the integrated data can provide improved confidence with respect to determining the relevance of specific threats and can support an improved analysis of overall risk. [ASME B31.8S-2004, Section 4.5]. Data integration includes:
- A common spatial reference system that allows association of data elements with accurate locations on the pipeline [ASME B31.8S-2004, Section 4.5];
- Integration of ILI or ECDA results with data on encroachments or foreign line crossings in the same segment to define locations of potential third party damage [§192.917(e)(1)].
Related Rule Sections:
05/26/2013 02:41 AM
Processing: 0.39 sec.
Browser: [unknown] [unknown]