PHMSA Gas Transmission (GT) Integrity Management
Time: 12/20/2014 07:26 PM

Protocol Item C.02

C.02 Data Gathering and Integration

Verify that the operator gathers and integrates existing data and information on the entire pipeline that could be relevant to covered segments, and verify that the necessary pipeline data have been assembled and integrated. [192.917(b)]

  1. Verify that the operator has in place a comprehensive plan for collecting, reviewing, and analyzing the data. [ASME B31.8S-2004, Section 4.2 and ASME B31.8S-2004, Section 4.4]

  1. Verify that the operator has assembled data sets for threat identification and risk assessment according to the requirements in ASME B31.8S-2004, Section 4.2, ASME B31.8S-2004, Section 4.3, and ASME B31.8S-2004, Section 4.4. At a minimum, an operator must gather and evaluate the set of data specified in ASME B31.8S-2004, Appendix A (summarized in ASME B31.8S-2004, Table 1) and consider the following on covered segments and similar non-covered segments [192.917(b)]:
      1. Past incident history
      2. Corrosion control records
      3. Continuing surveillance records
      4. Patrolling records
      5. Maintenance history
      6. Internal inspection records
      7. All other conditions specific to each pipeline.
  1. Verify that the operator has utilized the data sources listed in ASME B31.8S-2004, Table 2, for initiation of the integrity management program. [ASME B31.8S-2004, Section 4.3]

  1. Verify that the operator has checked the data for accuracy. If the operator lacks sufficient data or where data quality is suspect, verify that the operator has followed the requirements in ASME B31.8S-2004, Section 4.2.1, ASME B31.8S-2004, Section 4.4, and ASME B31.8S-2004, Appendix A [ASME B31.8S-2004, Section 4.1, ASME B31.8S-2004, Section 4.2.1, ASME B31.8S-2004, Section 4.4, ASME B31.8S-2004, Section 5.7(e), and ASME B31.8S-2004, Appendix A]:
    1. Each threat covered by the missing or suspect data is assumed to apply to the segment being evaluated. The unavailability of identified data elements is not a justification for exclusion of a threat.
    2. Conservative assumptions are used in the risk assessment for that threat and segment or the segment is given higher priority.
    3. Records are maintained that identify how unsubstantiated data are used, so that the impact on the variability and accuracy of assessment results can be considered.
    4. Depending on the importance of the data, additional inspection actions or field data collection efforts may be required.
  1. Verify that the operator's program includes measures to ensure that new information is incorporated in a timely and effective manner, as addressed in Protocol K. [192.911(k), ASME B31.8S-2004, Section 11(b) and ASME B31.8S-2004, Section 11(d)]

  1. Verify that individual data elements are brought together and analyzed in their context such that the integrated data can provide improved confidence with respect to determining the relevance of specific threats and can support an improved analysis of overall risk. [ASME B31.8S-2004, Section 4.5]. Data integration includes:
    1. A common spatial reference system that allows association of data elements with accurate locations on the pipeline [ASME B31.8S-2004, Section 4.5];
    2. Integration of ILI or ECDA results with data on encroachments or foreign line crossings in the same segment to define locations of potential third party damage [192.917(e)(1)].
  1. Verify that the operator's program includes a procedure for ensuring the accuracy and completeness of information and data used in the identification of potential threats and the risk analysis.

  1. Verify that the operator's program includes plans for additional inspection activities or field data collection efforts as needed to ensure data completeness and accuracy.

  1. Verify that the records indicate that all existing data and information on the entire pipeline, that could be relevant to covered segments, has been gathered.

    Adequate records that demonstrate all data and information has been gathered should:
    1. Show that comprehensive collection, review and analyzing of data was performed.
    2. That data sets for threat identification and risk assessment were assembled in accordance with the requirements in ASME B31.8S-2004, Sections 4.2, 4.3 and 4.4.
    3. Show that data sources listed in ASME B31.8S-2004, Table 2, were utilized for initiation of the integrity management program.
    4. Show that new information was incorporated in a timely and effective manner.
    5. Show that controls to provide assurance of the completeness and accuracy of input information in accordance with the operator's procedure were properly applied.
    6. Show additional inspection or field data collection activities to improve the accuracy and completeness of the data were conducted.

Related Rule Sections:

Related Topics:

PHMSA Home | Pipeline Safety Website | Feedback | Privacy Policy | FOIA