The concept of Integrated Integrity Management refers to an approach that utilizes  a Governance Control System to manage the execution of  “Process / Workflow” for  any asset class.  The approach has applicability to transmission piping, a distribution system or gas storage.

 

  • Integrated Integrity Management begins with the establishment of processes to manage the data / information associated with System Knowledge.
    • Within these processes, the P&M programs and O&M activities are identified, their associated data is sourced, the determination as the level of “Structure” that applies to each data set, the means by which quality assurance is applied to the data.
      • In the event it is determined that data quality is an issue, data collection investigation will be initiated.
    • Additionally, as part of System Knowledge the threat specific data will be trended for use in Performance / Risk.
  • The results of the System Knowledge data management processes are then utilized in the identification of higher level 9 threats required by code and as a means of measuring threat specific performance.
    • Identified threats with their associated severity and the effectiveness of the programs and activities designed to manage their risk are then utilized in the evaluation of risk.
    • Threats with higher risk and then subjected to a Threat Specific Analysis.
    • Within this analysis specific locations are identified and as required the 22 threat sub causes as detailed in B31.8s are considered, resulting in the decision to perform Threat Specific Investigation.
      • When referring to threat locations, for corrosion, materials, manufacturing and possibly construction this may be specific pipe segments; however, when addressing the remaining threats, the locations will be geographical as the programs and activities design to manage their risk are implemented on a non-segment basis, i.e. Public Awareness.
  • The objective of the investigations is to determine the root cause of the poor performance in the management of each targeted threat.
    • In most cases the expectation is that the root causes will be organizational in nature or that the programs and activities are being properly executed and are not effectively managing the threat.
  • When root causes are identified, the next progression is the determination of possible corrective actions, managed though the management of change process.
    • Each potential corrective action identified will be required to have an associated performance metric and timeline  so that the effectiveness of those changes implemented can be determined .
  • Following management approval the corrective actions are implemented, documented and communicated to the appropriate parties.
    • The corrective actions may be one off mitigation or they may focus on the enhancement of existing programs and/or activities and/or the development of new programs.
  • Improvement to the P&M programs and/or O&M activities results in more data/information begin available to be managed within System Knowledge.