ASME 831. 8S-2014 pdf download
ASME 831. 8S-2014 pdf download.Managing System Integrity of Gas Pipelines.
System integrity requires commitment by all opcrating personnel using comprchcnsive. systematic, and integrated processes to safely operate and maintain pipeline systems. In order to have an effective integrity management program, the program shall address the operator’s organization, processes, and the physical system.
An integrity management program is continuously evolving and must be flexible. An integrity management program should be customized to meet each operator’s unique conditions. The program shall be periodically evaluated and modified to accommodate changes in pipeline operation, changes in the operating environment, and the influx of new data and information about the system. Periodic evaluation is required to ensure the program takes appropriate advantage of improved technologies and that the program utilizes the best set of prevention, detection, and mitigation activities that are available for the conditions at that time. Additionally, as the integrity management program is implemented, the effectiveness of the activities shall be reassessed and modified to ensure the continuing effectiveness of the program and all its activities.
Information integration is a key component for managing system integrity. A key element of the integrity management framework is the integration of all pertinent information when performing risk assessments. Information that can impact an operator’s understanding of the important risks to a pipeline system comes from a variety of sources. The operator is in the best position to gather and analyze this information. By analyzing all of the pertinent information, the operator can determine where the risks of an incident are the greatest, and make prudent decisions to assess and reduce those risks.
Risk assessment is an analytical process by which an operator determines the types of adverse events or conditions that might impact pipeline integrity. Risk assessment also determines the likelihood or probability of those events or conditions that will lead to a loss of integrity, and the nature and severity of the consequences that might occur following a failure. This analytical process involves the integration of design, construction, operating, maintenance, testing, inspection, and other information about a pipeline system. Risk assessments, which are the very foundation of an integrity management program. can vary in scope or complexity and use different methods or techniques.
Under thc prescriptive approach, availabic data arc compared to prescribed criteria (see Nonmandatory Appendix A). Risk assessments are required in order to rank the segments for integrity assessments. The performance-based approach relies on detailed risk assessments. There are a variety of risk assessment methods that can be applied based on the available data and the nature of the threats. The operator should tailor the method to meet the needs of the system. An initial screening risk assessment can be beneficial in terms of focusing resources on the most important areas to be addressed and where additional data may be of value. Section 5 provides details on the criteria selection for the prescriptive approach and risk assessment for the performance-based approach. The results of this step enable the operator to prioritize the pipeline segments for appropriate actions that will he defined in the integrity management plan. Nonmandatory Appendix A provides the steps to he followed for a prescriptive program.
2.3.4 Integrity Assessment. Based on the risk assessment made in the previous step, the appropriate integrity assessments are selected and conducted. The integrity assessment methods are in-line inspection, pressure testing, direct assessment, or other integrity assessment methods, as defined in para. 6.5. Integrity assessment method selection is based on the threats that have been identified. More than one integrity assessment method may be required to address all the thi-eats to a pipeline segment.
A performance-based program may be able, through appropriate evaluation and analysis, to determine alternative courses of action and time frames for performing integrity assessments. It is the operators’ responsibility to document the analyses justifying the alternative courses of action or time frames. Section 6 provides details on tool selection and inspection.
Data and information from integrity assessments for a specific threat may be of value when considering the presence of other threats and performing risk assessment for those threats. For example, a dent may he identified when running a magnetic flux leakage (MFL) tool while checking for corrosion. This data element should be integrated with other data elements for other threats, such as third-party or construction damage.