Well Integrity Management at Premier Oil and the Benefits of Implementing a Well Integrity Data Management System

2015 ◽  
Author(s):  
C. Gell ◽  
M. Dawson ◽  
M. Emslie ◽  
B. Cruickshank ◽  
N. Fairnie
Author(s):  
Evelyn Choong ◽  
John Beets

Worldwide, regulatory bodies are applying increasing pressure on pipeline operators to manage their pipeline systems in a safe and reliable manner. To respond to these escalating requirements, operators are developing comprehensive integrity management systems. Integrity management begins with developing strong data management capabilities to host and integrate numerous sources of physical data. A key issue in today’s integrity data management system development is integration of all pipeline data from multiple levels of the organization to one central location for easy and effective utilization of the information. Data are often scattered throughout the organization, which often tends towards data duplication, poor decisions, errors, and inefficiencies. The lack of an effective data management process leads to time and resource constrains. In the long run; development of a comprehensive integrated system has proven to be worth the investment. The primary objective of the data model is to account for a common/standard linear referencing of all pipeline features occurring along the pipeline route, and/or within the pipeline right of way. This paper describes the key factors to consider when developing a full data management system and provides some insights into how these integrated data are used to address the need for integrity management.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2014 ◽  
Vol 36 (7) ◽  
pp. 1485-1499 ◽  
Author(s):  
Jie SONG ◽  
Tian-Tian LI ◽  
Zhi-Liang ZHU ◽  
Yu-Bin BAO ◽  
Ge YU

1991 ◽  
Author(s):  
Douglas E. Shackelford ◽  
John B. Smith ◽  
Joan Boone ◽  
Barry Elledge

Sign in / Sign up

Export Citation Format

Share Document