Wednesday, February 17, 2016

Pipeline Integrity Management

What is pipeline integrity management?
In the oil and gas industry, management of the integrity of pipeline has grown to become a serious business because of the overall consequence of pipeline failure: economic, social, environmental, and possibly legal. There are many different definitions of pipeline integrity management (PIM), including those listed within API 1160 and ASME B31.8S. As a simple and understood-by-all definition, the following is proposed: “a system to ensure that a pipeline network is safe, reliable, sustainable and optimised.”
A pipeline integrity management program is needed to increase their reliability and availability, and to effectively manage and minimize maintenance, repair, and replacement costs over the long run. Pipeline Integrity Management System is an innovative approach to generate a suite of activities required to properly manage pipeline assets so as to deliver greater safety by minimizing risk of failures, higher productivity, longer asset life, increased asset availability from improved reliability, lower integrity related operating costs, and ensure compliance with the regulations.
Pipeline Integrity Management Systems are developed to serve unique operational needs peculiar to particular pipeline system. For new pipelines systems, the functional requirements for integrity management shall be incorporated into the planning, design, material selection, and construction of the system. However, for pipelines which are already in operation, the integrity management plan is drawn after baseline assessments and data integration.
Integrity Management Process
The integrity management process could be summarized in the flow chart below:
IM Plan
What are the key benefits of a PIM System?
A PIM System can vastly improve the safety of your pipelines by:
  • Taking into account results from previous years in order to compare, analyze and update data.
  • Allowing operators to reflect on their best practices, remaining compliant with the latest regulations and adopting the most appropriate standards.
  • Identifying and analyzing actual and potential threats, ensuring data integrity
Source :

No comments:

Post a Comment