GGFR DATA TOOL GLOBAL GAS FLARING REDUCTION PARTNERSHIP.

Slides:



Advertisements
Similar presentations
Innovating Since 1998 Direct EDJE, we make A World of Difference Direct Response Order Management Software A Proven Solution Since.
Advertisements

Ed Duguid with subject: MACE Cloud
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
CSS Central: Central Management Utility Screen View Samples Next.
WSUS Presented by: Nada Abdullah Ahmed.
Crime and Security in the Networked Economy Part 4.
MyFloridaMarketPlace Roundtable Technical/Networking Presentation March 19, :00 a.m. – noon.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
System and Network Security Practices COEN 351 E-Commerce Security.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
CS 337 Project Presentation Asset Management and Tracking Developers: –Jimmy Hoo –Edwin Panameno –Manuel Segura –Sheng-Tian Lin Customers –Alexandre Lomovtsev.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
MAGNET ™ Sales Manual Storage Assets Real-Time Networks Projects
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
11-01: Get Started with SCP Supply Chain Platform Training Presentation Updated April 2009.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Nelson Androes Online Achievement Level Setting Software.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Group N – December 4 th, 2008 JEM Networking Solutions.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Introduction to our On-Line Self Service Center at
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
蓄勢待發迎WebSAMS Preparation Forum for WebSAMS Implementation Document 12
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
REDD+ FOR THE GUIANA SHIELD Technical Cooperation Project DATA MANAGEMENT Sabá Loftus, ONF International th December nd Steering Committee,
MOBILITY BILL DEFRAYMENT
INTRODUCTION TO SERVERS & INSTALLATION OF WINDOWS SERVER 2008 R2 Network Administration and Maintenance.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
HalFILE 2.1 Network Protection & Disaster Recovery.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Install, configure and test ICT Networks
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
2.0 PROJECT INITIATION AND PLANNING The initiating and planning are the phase where process or workflow to develop the system will identify and planning.
Online School Management System Supervisor Name: Ashraful Islam Juwel Lecturer of Asian University of Bangladesh Submitted By: Bikash Chandra SutrodhorID.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright 2008 © Mobile Telephone Networks. All rights reserved. MTN Business Hosting Services: Efficient Localization of Web & Digital Content Tolulope.
As business and traffic grows a company finds that shared hosting is inadequate to meet demands and even VPS is not sufficient. In both instances security.
UNIT V Security Management of Information Technology.
3.1 Types of Servers.
Maintaining Windows Server 2008 File Services
Facility Portal and Work Order Manager
3.1 Types of Servers.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
OpenStack Ani Bicaku 18/04/ © (SG)² Konsortium.
Introduction to Systems Security
Types of Software.
Reportin Integrates with Microsoft Office 365 to Provide an End-to-End Platform for Financial Teams That Simplifies Report Creation and Management OFFICE.
Designing IIS Security (IIS – Internet Information Service)
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

GGFR DATA TOOL GLOBAL GAS FLARING REDUCTION PARTNERSHIP

Flaring Data Reporting Tool Why develop the Data Tool ? Good quality data reporting is a part of the Standard. Therefore, there was a need to : better understand vented and flared gas volumes on country specific basis to manage it gather consistent data with flexibility track flaring reduction versus projected forecasts Include oil production to put flaring level in context

Information Flow country producing assets matrix Country Administrator (CA) General Public Government Oil and Gas Industry Users Local Players IOCsNOC flaring data input Operators Country Owned Database flaring data released Subject to CA approval Input Coordinator (INC) Operator Assurance (OAC)

country producing assets matrix Country Administrator (CA) General Public Government Oil and Gas Industry Users Local Players IOCsNOC flaring data input Operators Country Owned Database flaring data released CountryCA located in AlgeriaSONATRACH CameroonSNH NigeriaPresidential Advisor QatarHSE Regulation

Ministry/NOC Operators (located in country or in HQ) Flaring Data Reporting Tool

Country Sub-asset 1 Sub-asset 3 Sub-asset 4 Sub- asset 5 Sub-asset 6 Sub-asset 1 Sub- asset 2 CA INC C2 Operator 1 Operator 2 INC C1 Flaring Data Reporting Tool Asset AAsset B Asset C Sub- asset 2 OAC INC A1 INC A8 INC A9 INC A1

GGFR Data Tool “Granularity”” Well Group of wells Major cluster of Wells or group of platforms Prodn Block Country Monthly Quarterly Annually Bi-annually Pointless Data Data Tool area No-Go Area Typical current reporting level

Data Tool 2006 roll out schedule CountryCameroonNigeriaAlgeriaEG Roll out date Q2SeptQ42007

Country Ownership: Country Administrator (CA). Will usually be a NOC or Ministry representative. Controls, accesses and publishes relevant data Data Input and validation: Input coordinator (INC) and approver (OAC). Will both be from the asset operators. Website Support: Data Base Administrator (DA). By the World Bank. Reporting: Web users (NGOs, Multilateral organizations, universities, press, general public…) A useful tool to determine the baseline for gas flaring and venting and manage the reduction Flaring Data Reporting Tool

Muchas gracias! Para más información: Visión de GGFR

GGFR Data Tool Back Up slides

Country Administrator (CA) : Defines the hydrocarbon assets and their operators Defines the users, with login id and initial password Defines the data base rules (reporting timing & frequency, number of forecast years, sending of reminders, access rights to reports, …) Releases (final approval) of reports at the asset level. He/she may reject a data record and inform the OAC and INC by of the reason why Decides on release for public reporting at the country level Flaring Data Reporting Tool

Operator Assurance Coordinator (OAC) : Sole corporate responsibility for data quality and timing for all an operator’s assets vis-à-vis Country Administrator (CA) Defines list of sub assets in each asset Validates or rejects INC’s data input on sub-asset basis Cannot make any changes to the data. He/she may reject a data record and inform the INC by of the reason why Flaring Data Reporting Tool

Input Coordinator (INC): Responsible for: - Collecting actual and forecast data per agreed sub asset - Inputting the data - Correcting data records rejected by the OAC or CA Flaring Data Reporting Tool

Server Hardware/Site Dedicated Server: 3mhz processor, 512mb RAM, 80gb Raid 1 storage Unlimited bandwidth on redundant T-3 connections 72 hours back-up power supply w/21 days back-up generator Located in biometric entry controlled hardened site Nightly full rotating 10-day backup Weekly disaster recovery backups Server Software Window Advanced Server 2000 IIS 5.x SQL Server 2000 Flaring Data Reporting Tool

Security / Confidentiality Web Server and Database Server reside in a Private Network A Hardware Firewall separates Private Network from the Public Network (Internet) Public Network READ ONLY access to the website flows through public port in the Firewall (see next slide) Information stored on the Database Server is accessed by the Web Server on the Private Network Public Network access to the Database Server in not possible

Security / Confidentiality Virus/Spyware/Malware scanners run constantly on both the Web Server and Database Server to detect and block malicious intrusions Critical Operating System updates are applied immediately as published Each country’s data is stored in a separate database that is username/password controlled GGFR Tool Users may only access their own country’s website Country Administrator controls user access to asset data

Firewall Protected Private Network