1 / 60

DIMSA A Distribution Integrity Management SME Approach August – 2009

Explore DIMSA's approach to distribution integrity management, including program performance risk management, written plans, distribution integrity procedures, and threat-specific risk management.

tandrus
Télécharger la présentation

DIMSA A Distribution Integrity Management SME Approach August – 2009

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DIMSA A Distribution Integrity Management SME Approach August – 2009

  2. DIMSA • A Distribution Integrity Management SME Approach • The Approach is predicated on • Program Performance Risk Management • Programs currently being implemented are utilized to demonstrate compliance / risk management • The Approach Includes • The Written Plan • Your Current Methodology for 49 CFR 192 Compliance • Three Distribution Integrity Procedures • Program Performance Evaluation • Threat Specific Risk Management • Results Driven Improvement • This is NOT Transmission, • so we will NOT treat it as such…

  3. DIMSA Collaboration • SEMPRA Utilities • SoCal Gas / San Diego Gas & Electric • Largest LDC in the country • PI Confluence • Procedural Implementation Management (ICAM) • Manage • Schedule • Track • Document • Report

  4. Your Operations Would say your systems are safe and reliable? Do you believe you are currently managing safety & reliability? Are you in compliance with the requirements of 49 CFR 192?

  5. Your Operations Are you currently analyzing the results of your 49 CFR 192 compliance activities? Can you correlate these results back to your incident / safety record? Are you currently evaluating these analyses to determine the effectiveness of your programs? Have you documented these analyses . Evaluations to support a defensible position that you are in fact managing safety & reliability?

  6. Program Performance Risk Management • The Premise • In most cases the operators are doing the right things to manage integrity • In most cases the operators safety / reliability records and excellent • Implementing the requirements of 49 CFR 192 manages risk… • It is all about demonstrating performance

  7. Programs Required by 49 CFR 192 • Leak Survey and Leak Prioritization • Metallic Leak Repair • Plastic Leak Repair • Damage Prevention • Public Awareness • Pipeline Patrol • Corrosion Control • Land Movement Management • Plastic Pipe Management • Main and Service Replacement • Bridge and Span Inspections • Equipment Inspections • Internal Operations Audit • Operator Qualifications • Drug and Alcohol • Emergency Planning • EFV Program

  8. Program Performance Risk Management • Program Performance Risk Management • Programs currently being implemented are utilized to demonstrate risk management • Performance may be measured through the use of Key Performance Indicators (KPI) • KPI take two forms, leading and lagging • Leading indicators refers to the measurement of the effort • Lagging indicators refers to the measurement of the results

  9. Risk Evaluation / PrioritizationCorrosion

  10. Risk Evaluation / PrioritizationExcavation

  11. Risk Evaluation / PrioritizationOther Damage

  12. Risk Evaluation / PrioritizationNatural Forces

  13. Risk Evaluation / PrioritizationMaterial / Weld Failure

  14. Risk Evaluation / PrioritizationEquipment Failure

  15. Risk Evaluation / PrioritizationInappropriate Operations

  16. Quote from Texas Railroad Commission • “Operators are sleep walking thru the rule” • They are performing the requirements of 192 • They are capturing the required data • They are NOT looking at the data • They are not improving based on the results

  17. Program Performance Risk Management • The Plan Objective • State the company positions • Formalize program descriptions • Analyze and Evaluate program performance • Correlate results to safety • Take credit where credit is due • Improve IF and WHERE necessary

  18. Statistics • Over 91% of significant incidents are caused by other outside force damage, excavation damage and other causes. • PHMSA currently defines a significant pipeline incident as those reported by pipeline operators when any of the following conditions are met: • fatality or injury requiring in-patient hospitalization • $50,000 or more in total costs, measured in 1984 dollars • highly volatile liquid releases of 5 barrels or more or other liquid releases of 50 barrels or more • liquid releases resulting in an unintentional fire or explosion

  19. Statistics Damage of various types accounts for 65% of the significant incidents with all other causes adding another 26%. PHMSA Significant Incident Data 2008

  20. Reality Check SO WHAT THREAT SHOULD WE BE FOCUSING OUR ATTENTION ON??? The Various Types of DAMAGE

  21. Programs Required by 49 CFR 192 • 10 /17 Programs address Damage in one way or another • Leak Survey and Leak Prioritization • Metallic Leak Repair • Plastic Leak Repair • Damage Prevention • Public Awareness • Pipeline Patrol • Corrosion Control • Land Movement Management • Main and Service Replacement • Bridge and Span Inspections

  22. Programs Required by 49 CFR 192 • EACH of these 10 programs includes risk based aspects that support program performance risk management • More frequent patrols in populated areas • More frequent leak surveys in area with higher consequence • Repairs of leaks prioritized by consequence

  23. Going Forward How are you going to take what you are currently doing, formalize it, analyze it, evaluate it and then correlate it back to your safety record? How are you going to demonstrate compliance and that your safety and reliability objectives are being met today? How will these same objectives be met in the future? A Program Performance Risk Management Approach

  24. Program Performance Risk Management

  25. Program Performance Risk Management • The Written Plan is new • Programs are already being implemented • Analysis, Evaluation and Improvement is new

  26. Program Performance Risk Management • The Written Plan will include sections that outline your position on each element of the rule • System Knowledge • Threat Identification • Risk Evaluation / Prioritization • Actions to Address Risk • Performance Measures • Plan Effectiveness / Improvement • Reporting

  27. A Different View of the Elements • However, Program Performance Risk Management takes a slightly different approach • Performance Measures are detailed prior to Risk Evaluation and Prioritization • Performance of the programs will be utilized to document that risk is being managed • Actions to Address Risk will be combined with Improvement • These additional actions will be a means of improving the plan • Plan improvement includes program modifications to enhance performance • Plan Effectiveness is rolled up into performance. • Performance is the how we measure plan effectiveness through the demonstration of risk management • Performance against threats • Performance against their associated consequences

  28. System Knowledge The Program Performance Risk Management approach includes formalized program descriptions which detail the data collected by each program and how this data supports an understanding of the system Additionally, the position on System Knowledge will describe the existence of other data sets, such as historical records, that also demonstrate the operators knowledge of their system

  29. Threat Identification The Program Performance Risk Management approach includes formalized program descriptions which detail how each program supports the identification of various threats to the system and where in the system they have a higher probability

  30. Threat Identification

  31. Threat Identification The Program Performance Risk Management approach takes advantage of the fact that, at a minimum, there are 2 - 4 programs utilized to identify each threat and the locations where they may have a higher probability.

  32. Performance Measures • Performance may be measured through the use of Key Performance Indicators (KPI) • KPI take two forms, leading and lagging • Leading indicators refers to the measurement of the effort • Lagging indicators refers to the measurement of the results • The premise of a performance based approach is that if the efforts are defined so as to generate the optimal results, and these efforts are in fact implemented, then the desired results will be a byproduct

  33. Performance Measures • The Quality Control Bill of Rights states that • The right person • Will do the right job • At the right time • In the right place • The right way • In order to achieve the Right Results

  34. Performance Measures • Required by the Rule • Lagging • Measurement of Results • Optional to the Operator • Leading • Measurement of Efforts • Implementation • Data Management • Data Analysis • Follow Up Actions • Incident Mapping

  35. Performance Measures • The basic implementation of EVERY program is the first and primary performance indicator. • If results indicate that performance of the program is not effective then the first analysis has to be … was the program properly implemented pursuant to its procedure • The programs must be properly implemented prior to the determination that any improvement might be required

  36. Performance Measures • The Program Performance Risk Management approach requires that each program be defined in terms of its ability to provide leading and/or lagging performance indicators. • These indicators, when measured will be used to determine the effectiveness of each program in terms of its ability to manage threats and their associated consequences • Through the management of threats and their associated consequences, we will be successfully managing risk

  37. Performance Measures The programs required by or that may have been implemented in support of 49 CFR192 provide either leading or lagging indicators

  38. Performance Measures Since leading indicator programs do not directly provide any measurable data that has value, their performance will be measured based on the actions they trigger.

  39. Performance Measures For example – a line patrol may determine the there was recent excavation in an area. This discovery would lead to further inspection of the area or possibly a new leak survey to determine if the pipeline was damaged The performance measure is how many times were these types of conditions discovered and how many times were they acted on If it can be show that in100% of the cases, if conditions were discovered that indicated potential damage to the system, action was taken to mitigate, then the program is being proper implemented and the leading indicators favorable reflect performance

  40. Performance Measures • Lagging indicator programs provide measurable data that has value and their performance will be measured based on these results. • For example – leak surveys allow us to determine the number of leaks, which is a lagging indicator because they already exist. One measure of the effectiveness of the integrity plan is whether this number is improving • The leak survey program also provides a leading indicator in that we are able to determine how many leaks found (grade 1 or 2) triggered the action of repair • If 100% of the grade 1 leaks are repaired immediately and 100% of the grade 2 leaks are addressed according to policy, then the leading performance indicator would suggest that the program was effective AND if the number of leaks by grade was trending downward, then the lagging performance indicator would suggest that the program was effective

  41. Performance Measures • In ALL cases, these performance measures may be utilized to manage threats or their associated consequences. • For example – by providing the leak grade information the leak surveys allow us to manage the consequences since by definition the grade is a function of the nature of the release • Regardless of the threat that may have contributed to the leak, the grading system allows us to trigger repairs. • These repairs allow us to determine and manage the root cause threat

  42. Performance Measures • Program Performance Risk Management begins with the evaluation of each program in terms of its effectiveness in managing specific threat and/or their associated consequences. • For each program the leading and lagging indicators will be defined and measured • The measurements will weighted in relation to the program and threat where applicable • On a program by program basis, the performance measures will be utilized to rank the program effectiveness in addressing each threat • The following table shows each program and the threats and/or consequences it manages

  43. Performance Measures

  44. Risk Evaluation / Prioritization The Program Performance Risk Management approach includes formalized program descriptions which detail how each program is being utilized to manage specific threats and the consequences associated with a failure whose root cause was that threat. The management of threats and their consequences, supports the management of risk, with the objective being to demonstrate the safety and reliability of the system.

  45. Risk Evaluation / Prioritization • Risk is managed, on a threat by threat basis relative to the specific areas where the program data substantiates that the probabilities are higher and/or the consequences are greater If You Manage Threats & If You Manage Consequences…. You are Managing Risk

  46. Risk Evaluation / Prioritization

  47. Risk Evaluation / Prioritization The Program Performance Risk Management approach is predicated on the fact that there are, at a minimum 3 - 6 programs utilized to manage each threat and 1-4 programs utilized to manage the associated consequences of these threats.

  48. Risk Evaluation / Prioritization • Risk Management is demonstrated by through the aggregated evaluation of each program performance metric as it applies to any given threat. • Total threat score is determined • Performance is measured on the threat score range for the specific threat • Improvement is driven by the results • No review / improvement required • Consider review / improvement • Review / improvement required • Implement Improvement Procedure

  49. Address Risk Considering the fact that the Program Performance Risk Management is program centric, the contention is that the programs themselves are currently managing risk • Leak Survey and Leak Prioritization • Metallic Leak Repair • Plastic Leak Repair • Damage Prevention • Public Awareness • Pipeline Patrol • Corrosion Control • Land Movement Management • Plastic Pipe Management • Main and Service Replacement • Bridge and Span Inspections • Equipment Inspections • Internal Operations Audit • Operator Qualifications • Drug and Alcohol • Emergency Planning • EFV Program

  50. Address Risk • The program performance evaluation results will serve as the drivers for both Additional Actions as well as Improvement • These additional actions / improvement may include • Plan Improvement • Program Improvement • Physical Improvement • Regulatory Improvement

More Related