Already a subscriber?
MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?
ASME B31.8S Managing System Integrity of Gas Pipelines , 2010
- FOREWORD
- COMMITTEE ROSTER
- SUMMARY OF CHANGES
- 1 INTRODUCTION [Go to Page]
- 1.1 Scope
- 1.2 Purpose and Objectives
- 1.3 Integrity Management Principles
- 2 INTEGRITY MANAGEMENT PROGRAM OVERVIEW [Go to Page]
- 2.1 General
- 2.2 Integrity Threat Classification
- 2.3 The Integrity Management Process [Go to Page]
- 2.3.1 Identify Potential Pipeline Impact by Threat.
- 2.3.2 Gathering, Reviewing, and Integrating Data.
- 2.3.3 Risk Assessment.
- 2.3.4 Integrity Assessment.
- 2.3.5 Responses to Integrity Assessment, Mitigation Repair and Prevention, and Setting Inspection Intervals.
- 2.3.6 Update, Integrate, and Review Data.
- 2.3.7 Reassess Risk.
- 2.4 Integrity Management Program [Go to Page]
- 2.4.1 Integrity Management Plan.
- 2.4.2 Performance Plan.
- 2.4.3 Communications Plan.
- 2.4.4 Management of Change Plan.
- 2.4.5 Quality Control Plan.
- 3 CONSEQUENCES [Go to Page]
- 3.1 General
- 3.2 Potential Impact Area
- 3.3 Consequence Factors to Consider
- 4 GATHERING, REVIEWING, AND INTEGRATING DATA [Go to Page]
- 4.1 General
- 4.2 Data Requirements [Go to Page]
- 4.2.1 Prescriptive Integrity Management Programs.
- 4.2.2 Performance-Based Integrity Management Programs.
- 4.3 Data Sources
- 4.4 Data Collection, Review, and Analysis
- 4.5 Data Integration
- 5 RISK ASSESSMENT [Go to Page]
- 5.1 Introduction
- 5.2 Definition
- 5.3 Risk Assessment Objectives
- 5.4 Developing a Risk Assessment Approach
- 5.5 Risk Assessment Approaches
- 5.6 Risk Analysis [Go to Page]
- 5.6.1 Risk Analysis for Prescriptive Integrity Management Programs.
- 5.6.2 Risk Analysis for Performance-Based Integrity Management Programs.
- 5.7 Characteristics of an Effective Risk Assessment Approach
- 5.8 Risk Estimates Using Assessment Methods
- 5.9 Data Collection for Risk Assessment
- 5.10 Prioritization for Prescriptive-Based and Performance-Based Integrity Management Programs
- 5.11 Integrity Assessment and Mitigation
- 5.12 Validation
- 6 INTEGRITY ASSESSMENT [Go to Page]
- 6.1 General
- 6.2 Pipeline In-Line Inspection [Go to Page]
- 6.2.1 Metal Loss Tools for the Internal and External Corrosion Threat.
- 6.2.2 Crack Detection Tools for the Stress Corrosion Cracking Threat.
- 6.2.3 Metal Loss and Caliper Tools for Third-Party Damage and Mechanical Damage Threat.
- 6.2.4 All Other Threats.
- 6.2.5 Special Considerations for the Use of In-Line Inspection Tools
- 6.2.6 Examination and Evaluation.
- 6.3 Pressure Testing [Go to Page]
- 6.3.1 Time-Dependent Threats.
- 6.3.2 Manufacturing and Related Defect Threats.
- 6.3.3 All Other Threats.
- 6.3.4 Examination and Evaluation.
- 6.4 Direct Assessment [Go to Page]
- 6.4.1 External Corrosion Direct Assessment ECDA for the External Corrosion Threat.
- 6.4.2 Internal Corrosion Direct Assessment Process ICDA for the Internal Corrosion Threat.
- 6.4.3 Stress Corrosion Cracking Direct Assessment SCCDA for the Stress Corrosion Cracking Threat.
- 6.4.4 All Other Threats.
- 6.5 Other Integrity Assessment Methodologies
- 7 RESPONSES TO INTEGRITY ASSESSMENTS AND MITIGATION REPAIR AND PREVENTION [Go to Page]
- 7.1 General
- 7.2 Responses to Pipeline In-Line Inspections [Go to Page]
- 7.2.1 Metal Loss Tools for Internal and External Corrosion.
- 7.2.2 Crack Detection Tools for Stress Corrosion Cracking.
- 7.2.3 Metal Loss and Caliper Tools for Third-Party Damage and Mechanical Damage.
- 7.2.4 Limitations to Response Times for Prescriptive-Based Program.
- 7.2.5 Extending Response Times for Performance-Based Program.
- 7.3 Responses to Pressure Testing [Go to Page]
- 7.3.1 External and Internal Corrosion Threats.
- 7.3.2 Stress Corrosion Cracking Threat.
- 7.3.3 Manufacturing and Related Defect Threats.
- 7.4 Responses to Direct Assessment Inspections [Go to Page]
- 7.4.1 External Corrosion Direct Assessment ECDA.
- 7.4.2 Internal Corrosion Direct Assessment ICDA.
- 7.4.3 Stress Corrosion Cracking Direct Assessment SCCDA.
- 7.5 Timing for Scheduled Responses
- 7.6 Repair Methods
- 7.7 Prevention Strategy/Methods
- 7.8 Prevention Options
- 8 INTEGRITY MANAGEMENT PLAN [Go to Page]
- 8.1 General
- 8.2 Updating the Plan
- 8.3 Plan Framework [Go to Page]
- 8.3.1 Gathering, Reviewing, and Integrating Data.
- 8.3.2 Assess Risk.
- 8.3.3 Integrity Assessment.
- 8.3.4 Responses to Integrity Assessment, Mitigation Repair and Prevention, and Intervals.
- 9 PERFORMANCE PLAN [Go to Page]
- 9.1 Introduction
- 9.2 Performance Measures Characteristics [Go to Page]
- 9.2.1 Process or Activity Measures.
- 9.2.2 Operational Measures.
- 9.2.3 Direct Integrity Measures.
- 9.3 Performance Measurement Methodology
- 9.4 Performance Measurement: Intrasystem
- 9.5 Performance Measurement: Industry Based
- 9.6 Performance Improvement
- 10 COMMUNICATIONS PLAN [Go to Page]
- 10.1 General
- 10.2 External Communications
- 10.3 Internal Communications
- 11 MANAGEMENT OF CHANGE PLAN
- 12 QUALITY CONTROL PLAN [Go to Page]
- 12.1 General
- 12.2 Quality Management Control
- 13 TERMS, DEFINITIONS, AND ACRONYMS [Go to Page]
- 14 REFERENCES AND STANDARDS
- 14 REFERENCES AND STANDARDS
- FIGURES [Go to Page]
- Fig. 1 Integrity Management Program Elements
- Fig. 2 Integrity Management Plan Process Flow Diagram
- Fig. 3 Potential Impact Area
- Fig. 4 Timing for Scheduled Responses: Time-Dependent Threats, PrescriptiveIntegrity Management Plan
- Fig. 5 Hierarchy of Terminology for Integrity Assessment
- TABLES [Go to Page]
- Table 1 Data Elements for Prescriptive PipelineIntegrity Program
- Table 2 Typical Data Sources for Pipeline
Integrity Program
- Table 3 Integrity Assessment Intervals:Time-Dependent Threats, Internal and External Corrosion, Prescriptive Integrity Management Plan
- Table 4 Acceptable Threat Prevention and Repair Methods
- Table 5 Example of Integrity Management Plan for Hypothetical PipelineSegment (Segment Data: Line 1, Segment 3)
- Table 6 Example of Integrity Management Plan for Hypothetical Pipeline Segment(Integrity Assessment Plan: Line 1, Segment 3)
- Table 7 Example of Integrity Management Planfor Hypothetical Pipeline Segment(Mitigation Plan: Line 1, Segment 3)
- Table 8 Performance Measures
- Table 9 Performance Metrics
- Table 10 Overall Performance Measures
- NONMANDATORY APPENDIX A THREAT PROCESS CHARTS AND PRESCRIPTIVE INTEGRITY MANAGEMENT PLANS [Go to Page]
- A-1 EXTERNAL CORROSION THREAT [Go to Page]
- A-1.1 Scope
- A-1.2 Gathering, Reviewing, and Integrating Data
- A-1.3 Criteria and Risk Assessment
- A-1.4 Integrity Assessment
- A-1.5 Responses and Mitigation
- A-1.6 Other Data
- A-1.7 Assessment Interval
- A-1.8 Performance Measures
- A-2 INTERNAL CORROSION THREAT [Go to Page]
- A-2.1 Scope
- A-2.2 Gathering, Reviewing, and Integrating Data
- A-2.3 Criteria and Risk Assessment
- A-2.4 Integrity Assessment
- A-2.5 Responses and Mitigation
- A-2.6 Other Data
- A-2.7 Assessment Interval
- A-2.8 Performance Metrics
- A-3 STRESS CORROSION CRACKING THREAT [Go to Page]
- A-3.1 Scope
- A-3.2 Gathering, Reviewing, and Integrating Data
- A-3.3 Criteria and Risk Assessment [Go to Page]
- A.3.3.1 Possible Threat of SCC.
- A-3.3.2 Possible Threat of High pH SCC.
- A-3.4 Integrity Assessment [Go to Page]
- A-3.4.1 Bell Hole Examination and Evaluation Method.
- A-3.4.2 Hydrostatic Testing for SCC.
- A-3.4.3 In-Line Inspection for SCC.
- A-3.5 Other Data
- A-3.6 Performance Measures
- A-4 MANUFACTURING THREAT PIPE SEAM AND PIPE [Go to Page]
- A-4.1 Scope
- A-4.2 Gathering, Reviewing, and Integrating Data
- A-4.3 Criteria and Risk Assessment
- A-4.4 Integrity Assessment
- A-4.5 Responses and Mitigation
- A-4.6 Other Data
- A-4.7 Assessment Interval
- A-4.8 Performance Measures
- A-5 CONSTRUCTION THREAT PIPE GIRTH WELD, FABRICATION WELD, WRINKLE BEND OR BUCKLE, STRIPPED THREADS/BROKEN PIPE/COUPLING [Go to Page]
- A-5.1 Scope
- A-5.2 Gathering, Reviewing, and Integrating Data
- A-5.3 Criteria and Risk Assessment
- A-5.4 Integrity Assessment
- A-5.5 Responses and Mitigation
- A-5.6 Other Data
- A-5.7 Assessment Interval
- A-5.8 Performance Measures
- A-6 EQUIPMENT THREAT GASKETS AND O-RINGS, CONTROL/RELIEF, SEAL/PUMP PACKING [Go to Page]
- A-6.1 Scope
- A-6.2 Gathering, Reviewing, and Integrating Data
- A-6.3 Criteria and Risk Assessment
- A-6.4 Integrity Assessment
- A-6.5 Responses and Mitigation
- A-6.6 Other Data
- A-6.7 Assessment Interval
- A-6.8 Performance Measures
- A-7 THIRD-PARTY DAMAGE THREAT THIRD-PARTY INFLICTED DAMAGE IMMEDIATE, VANDALISM, PREVIOUSLY DAMAGED PIPE [Go to Page]
- A-7.1 Scope
- A-7.2 Gathering, Reviewing, and Integrating Data
- A-7.3 Criteria and Risk Assessment
- A-7.4 Integrity Assessment
- A-7.5 Responses and Mitigation
- A-7.6 Other Data
- A-7.7 Assessment Interval
- A-7.8 Performance Measures
- A-8 INCORRECT OPERATIONS THREAT [Go to Page]
- A-8.1 Scope
- A-8.2 Gathering, Reviewing, and Integrating Data
- A-8.3 Criteria and Risk Assessment
- A-8.4 Integrity Assessment
- A-8.5 Responses and Mitigation
- A-8.6 Other Data
- A-8.7 Assessment Interval
- A-8.8 Performance Measures
- A-9 WEATHER-RELATED AND OUTSIDE FORCE THREAT EARTH MOVEMENT, HEAVY RAINS OR FLOODS, COLD WEATHER, LIGHTNING [Go to Page]
- A-9.1 Scope
- A-9.2 Gathering, Reviewing, and Integrating Data
- A-9.3 Criteria and Risk Assessment
- A-9.4 Integrity Assessment
- A-9.5 Responses and Mitigation
- A-9.6 Other Data
- A-9.7 Assessment Interval
- A-9.8 Performance Measures
- NONMANDATORY APPENDIX B DIRECT ASSESSMENT PROCESS [Go to Page]
- B-1 EXTERNAL CORROSION DIRECT ASSESSMENT [Go to Page]
- B-1.1 Pre-Assessment
- B-1.2 Indirect Examinations
- B-1.3 Direct Examinations
- B-1.4 Post-Assessment
- B-2 INTERNAL CORROSION DIRECT ASSESSMENT
- NONMANDATORY APPENDIX C PREPARATION OF TECHNICAL INQUIRIES [Go to Page]
- C-1 INTRODUCTION
- C-2 REQUIREMENTS
- C-3 SUBMITTAL [Go to Page]