API RP 70 2003 pdf download.Security for Offshore Oil and Natural Gas Operations.
1 Scope, Purpose and Objective This publication is intended to assist the offshore oil and natural gas drilling and producing operators and contractors in assessing security needs during the performance of oil and natural gas operations. The offshore oil and natural gas indus- try uses a wide variety of contractors in drilling, production, and construction activities. Contractors typically are in one of the following categories: drilling, workover, well servicing, construction, electrical, mechanical, transportation, painting, operating, and catering/janitorial. 2 Definitions 2.1 company security officer (CSO): The CSO is responsible for the maintenance of the Security Plan. The CSO shall have access to relevant security information. The CSO shall determine which information, and by what means, it is communicated. The CSO may delegate duties as neces- sary to assure timely completion of responsibilities. The CSO may be assigned other duties and responsibilities unrelated to security. 2.2 contractor: The individual, partnership, Þrm, or cor- poration that is hired to do a speciÞc job or service, such as a production operator, drilling or well servicing contractor or to provide contract employees to an owner/operator; a contrac- tor is also the individual, partnership, Þrm, or corporation retained by the owner or operator to perform other work or provide supplies or equipment. The term contractor shall also include subcontractors. 2.3 facility: Any artiÞcial island, installation, or other device permanently or temporarily attached to the subsoil or seabed of offshore locations, erected for the purpose of exploring for, developing, or producing oil, natural gas or mineral resources. This deÞnition includes mobile offshore drilling units (MODUs), but does not include pipelines or deepwater ports. 2.4 facility owner/operator: The individual, partner- ship, Þrm, or corporation having control or management of offshore operations. 2.6 point of embarkation: The heliport or dock facility from which personnel and materials are shipped to or received from the offshore facility. 2.7 security vulnerability assessment (SVA): A sec- ondary evaluation that examines a facilityÕs characteristics and operations to identify potential threats or vulnerabilities and existing and prospective security measures and proce- dures designed to protect a facility. 2.8 threshold characteristics: Criteria established and published by the U.S. Coast Guard for screening offshore facilities. 3 Relevant Operational Standards and Industry Practices API and the oil and gas industry maintain a number of design and operational recommended practices that address aspects of safety and security in offshore oil and natural gas operations. While none of these were developed speciÞcally for security reasons, aspects of them are directly applicable. In many cases, prudent safety procedures would also serve to address appropriate security precautions. These recom- mended practices provide a starting point for developing guidance on security, if needed, at offshore oil and natural gas operating facilities. The following list of recommended practices address oper- ational measures: ¥ Recommended Practice 2A Planning, Designing, Con- structing Fixed Offshore Platforms . Contains engineer- ing design principles and practices for Þxed offshore platforms including assessment of existing platforms, and Þre, blast, and accidental overloading. ¥ Recommended Practice 2FPS Planning, Designing, Constructing Floating Production Systems (FPSOs). This recommended practice provides guidelines for design, fabrication, installation, inspection and opera- tion of ßoating production systems. ¥ Recommended Practice 2T Planning, Designing, and Constructing Tension Leg Platforms (TLPs). Summa- rizes available information and guidance for the design, fabrication and installation of a tension leg platform.
5.2 Facility owners/operators and contractors should keep abreast of the latest security alerts and government intelli- gence information and disseminate this information, as appropriate, throughout the organization. Facility owners/ operators should evaluate and respond appropriately to this information to safeguard personnel and assets. 5.3 Facility owners/operators should report, as appropriate, suspicious activities and behaviors, attempted incursions, ter- rorist threats, or actual events to the appropriate agencies. See Appendix A for an example communications protocol devel- oped by the Gulf Safety Committee. 5.4 Each facility owner/operator should establish clear communication channels and procedures for assessing, pre- paring for, and responding to potential or actual threats. 5.5 Each facility owner/operator should establish and maintain effective liaison with local emergency response agencies and organizations, as appropriate. 5.6 Each facility owner/operator should be aware of exist- ing security regulations, standards and operating practices as they relate to their assets. 5.7 Each facility owner/operator should develop a policy for control of relevant security sensitive information (SSI). 6 Security Vulnerability Assessment (SVA) If a facility meets or exceeds any of the threshold charac- teristics established and published by the U.S. Coast Guard, a SVA will be required. Additionally, a facility may by deemed critical by a particular owner/operator for a variety of other reasons. Each owner/operator should not only review the threshold characteristics, they should also determine if a SVA is warranted based on their own unique criteria.