Augmenting Risk Mitigation with Leak Detection and Repair

Author(s):  
Lorna Harron ◽  
Rick Barlow ◽  
Ted Farquhar

Increasing concerns and attention to pipeline safety have engaged pipeline companies and regulatory agencies to extend their approaches to pipeline integrity. The implementation of High Consequence Areas (HCAs) has in particular had an impact on the development of integrity management protocols (IMPs) for pipelines. These IMPs can require that a risk based assessment of integrity issues be applied to specific HCA risk factors. This paper addresses the development of an operational risk assessment approach for pipeline leak detection requirements for HCAs. A detailed risk assessment algorithm that includes 25 risk variables and 28 consequence variables was developed for application to all HCA areas. The significant likelihood and consequence factors were chosen through discussions with the Leak Detection Risk Assessment Model Working Group and subject matter experts throughout Enbridge. The leak detection algorithm focuses on sections of pipe from flow meter to flow meter, as these are the locations that impact the leak detection system used by Enbridge. Each section of pipe is evaluated for likelihood, consequence and risk. When a high or medium risk area has been identified, an evaluation of potential Preventive and Mitigative (P&M) measures will be undertaken. A P & M Matrix has been developed to identify potential mitigation strategies to be considered for higher risk variables, called risk drivers, in the model. The matrix has been developed to identify potential risk mitigation strategies to consider for each variable used in the HCA Leak Detection Risk Assessment. The purpose of the matrix is to guide the user to consider actions identified for variables that drive the risk for the particular location. Upon review of the matrix, the user determines feasibility of the risk mitigation strategies being considered to identify an action. The paper will describe the consultative process that was used to workshop the development of this algorithm. Included in this description is how the process addressed various methods of leak detection across a wide variety of pipelines. The paper closes with “development challenges” and future steps in applying operation risk assessment techniques to mainline leak detection risk management.


Author(s):  
David G. Parman ◽  
Ken McCoy

Pipeline risk mitigation in high consequence areas can be facilitated through the use of a high sensitivity external leak detection (HSELD) system. Such systems have been implemented for both off-site and on-site pipeline applications, including the Longhorn Pipeline (Texas) and the Madrid Barajas International Airport (Spain). We define high-sensitivity external leak detection as a leak detection system that will continuously and automatically detect very small amounts of liquid fuels and is physically independent of pipeline pumping operations. In addition, such systems monitor their own integrity on a continuous basis, without requiring periodic recalibration or operator interaction. The HSELD system we describe incorporates a distributed sensor cable, installed in a slotted PVC conduit which is run in close proximity to the pipeline. Many pipeline leaks start out as very small cracks or holes resulting from corrosion and wear. In their initial stages, such leaks go undetected by standard leak detection methods, but over time large volumes of liquid fuel may leak into the environment. In high consequence areas, such as above aquifers and other environmentally sensitive areas, the leak may go undetected until traces show up in water samples. The critical characteristic of an effective HSELD is its ability to detect and accurately locate very small volumes of liquid fuels, so that these small leaks can be identified, cleaned up and repaired before environmental damage is done.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


Author(s):  
A. Navarro ◽  
Juan Diego Sanchez-Torres ◽  
O. Begovich ◽  
G. Besancon ◽  
Julian Alberto Patino-Murillo
Keyword(s):  

2020 ◽  
Vol 8 (2) ◽  
pp. 9
Author(s):  
Mohamad Zabidi Bin Ahmad ◽  
Rosylin Mohd. Yusof ◽  
Ahmad Rizal Mazlan

Purpose: The objective of this research is to highlight issues and review the Interbank Commodity Murabahah (CM) practice as a tool of liquidity requirement from both the Shariah and industry’s operational perspectives. Accordingly, this study seeks to analyze structure and mechanism of CM as instrument to meet the liquidity need of the Islamic financial institutions and provides an opportunity for investments. In doing so, the paper seeks to review issues related to Shariah and operations in Islamic banking. Design/methodology/approach: By conducting interview with Treasurers, Shariah Scholars and funding dealers of Islamic banks in Malaysia, the study evaluates reassessment on CM practices and operational issues in relation risk and compliance. The study focuses on Islamic Treasury Division of Islamic banks in Malaysia. Findings: The findings of the study suggest that the two most significant issues in Islamic liquidity management of Islamic banks in Malaysia are i) resembling interest ii) nature of tradability iii) structure of CM iv) the timing the transaction to be completed and v) the real brokerage cost involved in adopting the CM transactions. Research limitations/implications: The research proposes a risk mitigation and enhanced Shariah compliance framework such as strait through processing (STP) and commodity broker’s standard guideline for Islamic banks to adopt CM practices. Practical implications: This study provides direction and guidance to the Islamic Commercial Banks, Commodity Brokers and regulator (BNM) involved in the banking system to reflect upon the importance to understand the issues and limitation of CM. By highlighting the importance of efficiency in terms of time and cost saving together with Shariah issues, Islamic banks can design policies to enhance efficiency in order to either decide to maintain the adoption of CMP or to consider the proposed alternative. Social implications:Understanding the Shariah compliance and operational issues will enhance the integrity of Islamic banks which is consistent with Key Economic Growth Area of making Malaysia as International Islamic Financial Hub 2.0.


1994 ◽  
Author(s):  
Valerie Belcher ◽  
Daniel Mackowski ◽  
Roy Hartfield, Jr. ◽  
Sushil Bhavnani

Sign in / Sign up

Export Citation Format

Share Document