At Enterprise, the safe operation of our assets is a top priority. Safety is at the core of our value system. We are committed to protecting the environment and the health and safety of the public and those working on our behalf by conducting our business activities in a safe and environmentally responsible manner. We promote a culture in which all personnel share the same commitment to health and safety, and recognize the importance of mitigating risks. Acting upon our commitment to safety, we engage all levels of employees and management, our Board of Directors, our contractors, and various external entities and organizations. We believe that safety breeds reliability and are committed to operating reliably to protect our people, the environment, and our communities.
Health & Safety Policy
Enterprise’s approach to corporate responsibility is governed by our strong values. Enterprise is committed to protecting the health and safety of our employees, contractors, customers, and the public.
All of our personnel are expected to adopt, embrace, promote, and follow these basic principles:
- No task is so important that it be performed at the risk of safety.
- Everyone takes personal responsibility for working safely every day.
- Employees have the obligation to stop work they consider unsafe, regardless of who is performing the task.
- Cardinal Rules, safety policies, procedures, and practices are critical to a safe work environment and should be followed at all times.
- All safety-related incidents and near misses are learning opportunities and must be reported.
- Safe operations are an expectation of our neighbors, fellow workers, contractors, unit holders, regulators, and other stakeholders.
Assisting Areas of Safety
- We have Health and Safety committees company wide.
The Safety Leadership Council is comprised of:
Randa Duncan, Chairman of the Board
Jim Teague, Co-Chief Executive Officer
Randy Fowler, Co-Chief Executive Officer & Chief Financial Officer
Graham Bacon, Executive Vice President & Chief Operating Officer
Brent Secrest, Executive Vice President & Chief Commercial Officer
Chris Nelly, Executive Vice President of Finance, Sustainability & Treasurer
Bob Sanders, Executive Vice President of Asset Optimization
Brad Motal, Senior Vice President of Liquid Hydrocarbons
Natalie Gayden, Senior Vice President of Natural Gas Assets
Tug Hanley, Senior Vice President of Pipelines & Terminals
Greg Watkins, Vice President of Corporate Risk
Ivan Zirbes, Vice President of EHS&T
Jeff Morton, Senior Director of Transportation Compliance
Gerry Stratmann, Senior Director of Safety
- Our overall cybersecurity strategy is designed to minimize cyber risk exposure to the company’s corporate network and the control systems of our plants and pipelines. This strategy includes multiple layers of preventative measures, an employee awareness program that includes educating employees about phishing and other cyber risks, an incident response plan to ensure preparedness, and a cross functional Cybersecurity Steering Committee to provide guidance around cyber risk management.
- Our corporate security is responsible for managing risks around our physical assets including liaising with local law enforcement maintaining, monitoring video surveillance, and communicating with management.
- Every morning starts with a Daily Safety Moment Initiative email.
Click Boxes Below for More Information
Safety Performance Records
Total Recordable Incidence Rate & Lost Time Incidence Rate
*Midstream Average includes data from various trade associations and regulatory agencies including: GPA Midstream Association, American Fuel and Petrochemical Manufacturers, and the Bureau of Labor and Statistics.
Maintenance Expenses & Sustaining Capital
Maintenance Expenses & Sustaining Capital
Enterprise spends ~$1 billion a year on maintaining our assets; including pipeline and mechanical integrity, storage well work-overs, and other maintenance projects.
|($ in MMs)||2015||2016||2017||2018||2019|
|Variable repair and maintenance expenses||$51.8||$50.0||$59.9||$68.8||$75.6|
|Fixed repair and maintenance expenses||576.6||514.7||518.2||613.7||641.7|
|Integrity management expenses||86.4||86.1||85.6||112.6||97.9|
|Subtotal maintenance expenses||714.8||650.8||663.8||795.1||815.2|
|Sustaining capital costs||272.6||252.0||243.9||320.9||325.2|
|Total maintenance expenses and sustaining capital||$987.4||$902.8||$907.7||$1,116.0||$1,140.4|
Safety & Audit Programs
Environmental, Health, Safety & Training (EHS&T) Audits
Audits play a crucial role in our compliance and risk management efforts. Enterprise has a mature EHS&T Audit process under which more than 100 audits are performed every year. Subject areas include Health and Safety, Process Safety Management, Environmental, and Focus Audits.
Health and Safety Audits identify hazards and risks within the workplace, identify strengths and weaknesses in safety procedures and recommend improvements, confirm internal practices meet or exceed industry best practices, evaluate compliance, and determine if safety systems are operating effectively.
Process Safety Management (PSM) Audits provide a systematic review of facilities, evaluate the effectiveness of process safety management systems, evaluate protocols for the prevention of hazardous chemicals releases, and evaluate compliance with risk management plans, regulations, OSHA guidelines and API recommended practices.
Environmental Audits evaluate compliance with regulations and socially and environmentally responsible practices, evaluate performance relative to applicable permits, and perform environmental assessments on:
- Emissions of greenhouse gases (GHG), volatile organic compounds (VOC), and hazardous air pollutants;
- Water management practices and procedures, including handling of process wastewater and produced water; and
- Waste, chemicals, and cleanup compliance monitoring, including management of all types of solid waste, regardless of hazardous classification.
In certain circumstances, we will perform additional Focus Audits to provide technical support and customized enhancements to a particular business unit process.
We are additionally subject to, and comply with, regulatory audits from various governmental agencies. Enterprise teams are prepared for agency inspections and are equipped with guidelines to aid in the process.
Our overall cybersecurity strategy is designed to safeguard operational technology critical to providing services for our customers, and protecting information technology containing business-sensitive and personal information that is entrusted to the company. This strategy includes multiple layers of preventative measures, an employee awareness program that includes educating employees about phishing and other cyber risks, a Cybersecurity Incident Response Plan (CIRP) to ensure preparedness, and a cross-functional Cybersecurity Steering Committee to provide guidance around cyber risk management.
Layers of Cyber Defense – People, Processes, and Technology
The Enterprise approach to data security is a risk-based, layered, defense-in-depth approach.
Enterprise invests significant resources toward the protection of our Operation Technology (OT) systems. OT environments are commonly referred to as Industrial Control Systems, which include SCADA, and local control systems for plants, pipeline facilities and terminals. Enterprise focuses on the protection of information and control from theft or corruption, both intentional and accidental, with a focus on safety and the preservation of availability. A separate team, dedicated to securing the OT environment, is tasked with the protection of these systems using advanced cyber security techniques while working closely with Corporate IT Security on systems that connect to the corporate network. Our mature OT Cyber Security Program, validated by the Department of Homeland Security, is based on industry-recognized frameworks such as COBIT 5 and NIST CFS while utilizing industry standards such as API 1164, ISA 99 and other NIST Guidelines. This program includes incident response plans, Business Continuity Plans, Disaster Recovery Plans and other methods for securing our OT systems. Regular operating system patching, vendor-recommended cyber tools, next generation endpoint protection and continuous monitoring of system health and security metrics are some of the tools used to combat the continuous and evolving threats.
Redundant layers of access control and other preventative controls provide multiple opportunities to stop incoming cyber threats. Defensive technologies include multiple layers of antivirus, email filtering, web filtering, and firewalls. Access control is well defined and restricted, allowing only authorized personnel to access those systems required for business needs. Segregation of duties is applied to high risk processes. Accounts and access rights are reviewed regularly to ensure unnecessary access is removed. Password policies are enforced. There are effective processes for requesting and granting access, and access is immediately revoked upon termination.
Security patches are applied in a timely and well-managed process. Critical industrial control systems are segregated from the corporate network, are not accessible from the internet, and have additional security controls, such as application white listing, that afford protection. Finally, all staff are educated around cyber security through policy, communications, and monthly phishing awareness exercises.
On top of the protective layers, security monitoring is employed to identify any threats that make it past the preliminary layers of defense. Intrusion detection is used to monitor for attacks and indications of a compromise. Event data that includes intrusion detection events, all traffic to and from the internet, all network logins and attempts, all emails sent within or outside of the company, and all detections from our other security tools are collected into a Security Information and Event Management (SIEM) tool where the events are correlated to identify malicious activity and allow our security analysts to search and review any suspect event. Regular vulnerability scans check systems for unpatched vulnerabilities. Third-party security assessments and penetration tests are used to identify any potential weaknesses in defensive layers. Critical applications are protected by backups, redundancy, and regular cross-functional disaster recovery testing.
Cybersecurity monitoring is aided by the use of cyber threat intelligence from multiple sources, including third-party cybersecurity experts, government agencies, and information shared from other companies. Enterprise is an active member of the Oil & Natural Gas Information Sharing & Analysis Center (ONG-ISAC), a “cyber neighborhood watch” for the oil & gas industry that facilitates timely and trusted sharing of cyber threat information between member companies.
Enterprise Pipeline Integrity Management Program
The Enterprise Pipeline Integrity Management Program maintains the ongoing integrity of operated pipelines and pipeline related facilities as defined in 49CFR Part 192 Subpart O and 49CFR Part 195.452 by:
- Identifying threats to pipeline safety and establishing the scope and frequency of integrity assessments.
- Performing integrity assessments, analyzing the results, and determining remediation requirements.
- Performing remediation.
- Updating processes and procedures for High Consequence Area Impact Analysis, Risk Assessment, and integrity management program evaluation.
Assessment of our Pipeline Assets Since 2014
|Year||Required by Regulation||Discretionary||Grand Total|| |
|Year||Required by Regulation||Discretionary||Grand Total|| |
Enterprise Corrosion Prevention Program
The Enterprise Corrosion Prevention Program covers all our operated pipeline systems and facilities. These services and programs include the following:
- Maintain compliance with federal and state agencies governing corrosion control.
- Prepare for and participate in regulatory audits by state and federal agencies.
- Create and maintain appropriate records/documentation for participation and presentation in regulatory inspections.
- Cathodic Protection.
- Operate and maintain over 3,200 cathodic protection systems.
- Perform periodic field surveys of approximately 74,000 monitoring sites that require the Corrosion Technician to physically traverse the right of way to each location.
- Conduct approximately 4,600 miles of close interval cathodic protection surveys annually.
- Install approximately 225 cathodic protection systems annually.
- Internal Corrosion Control.
- Perform and/or coordinate monitoring and mitigation for internal corrosion through approximately 800 monitoring locations.
- Review system-operating data to determine the need for additional internal corrosion monitoring, cleaning, pigging, and/or chemical treatment.
- Atmospheric Corrosion Control.
- Perform atmospheric corrosion inspections on above-ground facilities and pipe exposures at over 14,000 monitoring locations.
- Assist with prioritization and planning of coating projects based on inspection data.
- Protective Coatings and Linings
- Recoat an average of 55,440 feet (10.5 miles) of pipeline annually.
- Assist in the selection of appropriate coatings for new or existing assets.
- Materials Selection and Design/Project Support
- Assist in the selection of appropriate materials and design procedures for new or existing assets.
- Provide corrosion prevention system design review on new pipeline and facility projects.
Training & Certifications
We have a dedicated staff of over 50 employees that support the training and procedure development for personnel nationwide. We work to develop and upgrade our employees’ skills through targeted Safety, Technical, and Compliance training.
In Mont Belvieu, Texas, a primary hub of Enterprise’s operations, we maintain the Mont Belvieu Training Center - a 14,000 square foot facility capable of handling more than 70 students per class and averages 190 classes per year. Our training facility utilizes state-of-the-art simulation equipment to create a real-world learning experience for employees. We routinely partner with more than 25 different vendors and technical contractors to provide specific types of training (e.g. line locate, hot tapping, product sampling and bolting). In addition to classroom training, we offer over 300 online courses.