Know Your Source! Introduction. Narration What would you do… If your production facility’s water source became contaminated? If you experienced a decline.

Slides:



Advertisements
Similar presentations
Source Water Protection Planning
Advertisements

A Guide to Localizing the Hyogo Framework for Action
DS-01 Disaster Risk Reduction and Early Warning Definition
Challenges in Finding and Connecting New Water Sources J. Tupling, P.Eng. June 22, 2009.
PROMOTING A COORDINATED GROUNDWATER MANAGEMENT FOR LAGOS STATE: WAY FORWARD By PROFESSOR E.O. LONGE, PhD FACULTY OF ENGINEERING DEPARTMENT OF CIVIL & ENVIRONMENTAL.
Metropolitan Council Environmental Services A Clean Water Agency Presented to the Environment Committee November 9, 2010 Information Item Master Water.
Using Mitigation Planning to Reduce Disaster Losses Karen Helbrecht and Kathleen W. Smith United States: Federal Emergency Management Agency (FEMA) May.
Montana’s 2007 Nonpoint Source Management Plan Robert Ray MT Dept Environmental Quality.
New technologies and disaster information resources Part 2. The right information, at the right time, the right way.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
ENVIRONMENTAL MANAGEMENT PLAN
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
Results-Based Management: Logical Framework Approach
Professional Growth= Teacher Growth
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Foster and sustain the environmental and economic well being of the coast by linking people, information, and technology. Center Mission Coastal Hazards.
EBusiness & IT Management Model of IT Management
Introduction to the Session 6 - Theme 4 – on “Water Resources Management and Governance”
Software Project Management Lecture # 8. Outline Chapter 25 – Risk Management  What is Risk Management  Risk Management Strategies  Software Risks.
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
HIT241 - RISK MANAGEMENT Introduction
Presented by: Pechanga Environmental Department Designing and Managing a Recycling Program Source Reduction Strategies for Tribal Solid Waste Programs.
Logistics and supply chain strategy planning
1. 2 IMPORTANCE OF MANAGEMENT Some organizations have begun to ask their contractors to provide only project managers who have been certified as professionals.
Marketing Management Marketing Plan Prepared by Kathleen Porter.
ROLE OF INFORMATION IN MANAGING EDUCATION Ensuring appropriate and relevant information is available when needed.
Chapter 5 ©2001 South-Western College Publishing Pamela S. Lewis Stephen H. Goodman Patricia M. Fandt Slides Prepared by Bruce R. Barringer University.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
Characterization, Inventory and Monitoring of trends in indigenous livestock Dr. E. D. Ilatsia D. N. Kamiti 23-Oct-15Animal Breeding and Genomics Group1.
1 Welcome to the International Right of Way Association’s Course 703 Real Property Asset Management 703-PT – Revision 2 – INT.
Watersheds Human activities and structures, as depicted
Environmental Management Plan (EMP) Required for: Full EIA based on Palestinian EIA Policy Category A projects based on World Bank Policy.
Risk management and disaster preparedness
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES The Disaster Mitigation Act of 2000.
The Business Plan: Creating and Starting the Venture
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
Rebuilding the System Reducing the Risk California Water Plan Plenary Session October 22-23, 2007.
Software Project Management Lecture # 9. Outline Chapter 25 – Risk Management  What is Risk Management  Risk Management Strategies  Software Risks.
California Water Plan Update Advisory Committee Meeting January 20, 2005.
ORDER ENVIRONMENTAL PROTECTION PROGRAM WORKSHOP OVERVIEW OF ORDER Larry Stirling
Copyright ©2005 by South-Western, a division of Thomson Learning. All rights reserved. Introduction to Marketing.
Draft Seventh Power Plan Meets RTF. Key Finding: Least Cost Resource Strategies Rely on Conservation and Demand Response to Meet Nearly All Forecast Growth.
The Marketing Plan Chapter 2. Section 2.1: Marketing Planning  Good marketing requires good planning Research your company Study your business environment.
Session 2: Developing a Comprehensive M&E Work Plan.
" The Importance of RM in strategic in sustainable service delivery How to avoid Service Delivery Protest ” Institute of Municipal Finance Officers & Related.
Modeling with WEAP University of Utah Hydroinformatics - Fall 2015.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
MGT 498EDU The learning interface/mgt498edudotcom.
April 4, 2011 Princesa VanBuren Hansen Environmental Quality Board.
For more course tutorials visit
MGT 498 Entire Course (2 Sets) FOR MORE CLASSES VISIT This Tutorial contains 2 Sets of Papers/Presentation for all weeks (Individual.
Phase-1: Prepare for the Change Why stepping back and preparing for the change is so important to successful adoption: Uniform and effective change adoption.
MGT 498 ACADEMIC PROFESSOR/TUTORIALRANK For more course Tutorials
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES
MGT 498 TUTORIAL Success trials - mgt498tutorial.com
Water, Environment, & development
Hazards Planning and Risk Management Risk Analysis and Assessment
MGT 498 Education for Service-- snaptutorial.com.
MGT 498 EDU Lessons in Excellence-- mgt498edu.com.
MGT 498 TUTORIAL Lessons in Excellence -- mgt498tutorial.com.
MGT 498 Education for Service-- snaptutorial.com
MGT 498 TUTORIAL Education for Service--mgt498tutorial.com.
MGT 498 Teaching Effectively-- snaptutorial.com
MGT 498 EDU Education for Service-- mgt498edu.com.
Building Competitive advantage through functional level strategies
Building Competitive advantage through functional level strategies
Business Continuity Program Overview
Investing in Source Water Protection
Building Competitive Advantage Through Functional-Level Strategies
Presentation transcript:

Know Your Source! Introduction

Narration

What would you do… If your production facility’s water source became contaminated? If you experienced a decline in the quantity of water from your source? Do you really know?

Course Objectives ●To gain an understanding of the potential business impacts from source vulnerabilities ●To gain an understanding of source water vulnerability and sustainability ●To gain the knowledge necessary to complete the Source Vulnerability Assessment (SVA)

Course Objectives ●To understand how the SVA can help protect the quality and quantity of our products and to ensure future growth ●To be introduced to the iLearn, iManage, and iProtect systems

Source Water, Vulnerability & Sustainability

What is Source Water? Source Water ●Is the water that is supplied to a facility for use in manufacturing operations ●Can be derived from a variety of sources such as: –Surface water –Groundwater It is the main ingredient in all of our products and is essential for our operations

Source Water ●The quality of our source water has a direct impact on the quality of our products ●The available quantity of source water is key to sustaining our growth ●Threats to our source water represent threats to our business

What is Vulnerability? ●Vulnerabilities to a source are the potential threats that can cause contamination or reduction in a water supply ●It is related to susceptibility, which is the likelihood that those identified vulnerabilities, or potential threats, will impact the source

Water Crisis Hits Africa the Hardest April 1, 2005 Factors Affecting Vulnerability Bottled Water Plant Runs into Opposition April 7, Central Coast, Australia Water Scarcity: A Looming Crisis? December 19, 2004 ●Reality of threats to source water vulnerability can be seen everyday ●These threats can impact: –Source water quality –Source water quantity

●Contamination caused by human activities ●Naturally occurring elements, such as arsenic ●Overuse of an aquifer or surface water source ●Contamination due to natural disasters Source Water Threats Can Include:

Negative Business Impact from Contamination and Naturally Occurring Elements ●Poor source water quality requires more thorough and costly treatment to meet applicable standards ●Poor source water quality if not properly treated can lead to contamination of products ●Contaminated products can negatively impact our Trademark ●Reduction in quality can lead to deceased water supply and production volumes

Negative Business Impact from Overuse of an Aquifer or Surface Water ●Competition with other source water users can lead to a decrease in water supply ●Production increases, without consideration for long-term sustainability, can lead to brand growth limitations or production facility closures ●Public perception of source water over-use can negatively impact the Trademark and the reputation of The Coca-Cola Company

Negative Business Impact from Contamination: Natural Disasters ●Natural disasters, such as hurricanes or floods can also result in: –Contamination of source water –A reduction in the quality of source water ●Reduction in quality can lead to decreased water supply and production volumes Negative Business Impacts effect the long term sustainability of our business and water resources

What is Sustainability? What is Sustainability? At its most basic level, sustainability is meeting the needs of the present without compromising the ability of future generations to meet their own needs

Sustainability is Linked to Three Areas of Interest Sustainability is Linked to Three Areas of Interest Narration

What is Sustainability to The Coca-Cola Company? What is Sustainability to The Coca-Cola Company? The Coca-Cola Company’s Manifesto for Growth outlines five key business components for sustainable growth.

What is Sustainability to The Coca-Cola Company? What is Sustainability to The Coca-Cola Company? Water is directly linked to our sustainability. Water is a main ingredient in our products as well as a final product in itself. It is critical that we maintain a cost effective and reliable source of water to our facilities. Water is directly linked to our sustainability. Water is a main ingredient in our products as well as a final product in itself. It is critical that we maintain a cost effective and reliable source of water to our facilities.

What is Sustainability to The Coca-Cola Company? What is Sustainability to The Coca-Cola Company?

What is Sustainability to The Coca-Cola Company?

What is Sustainability to The Coca-Cola Company?

What is Sustainability to The Coca-Cola Company?

What is Sustainability to The Coca-Cola Company?

Water Resource Sustainability Water resource sustainability is the development and use of water resources in a manner that can be maintained for an indefinite time without causing adverse environmental, economic or social consequences. The Source Water Protection Program is a critical component in the sustainability of this vital resource.

Quiz 1 Narration

Vision ●This Vision is an essential part of the business model for The Coca-Cola Company manufacturing facilities ●It is socially responsible, cost effective and profitable, which collectively leads to the success of our product in markets around the world ●Each facility will develop their own vision for source water protection

Vision We must ensure that everyone in our system understands water as a natural resource, an important ingredient for our product, and an integral part of our lives and business

Assessment The Assessment is designed to: ●Aid facilities in characterizing their source vulnerabilities ●Assist facilities with watershed management and protection ●Develop mitigation strategies to protect the quality and quantity of the source

Assessment ●The first step is completing a Source Vulnerability Assessment (SVA) ●The SVA must be completed by technical experts and company personnel

Goals and Objectives Goals and objectives should be created based on the results of the SVA, using the S.M.A.R.T. methodology ●Specific ●Measurable ●Attainable ●Realistic ●Timebound

Action Plan The action plan is created based on the identified goals and objectives in an effort to reduce all vulnerabilities and increase sustainability

Action Plan The SVA team: ●Determines and prioritizes specific projects, programs and other activities needed to achieve these goals and objectives ●Integrates projects into the budgetary process

Implementation During the Implementation phase, the following should occur: ●Determine the timeline and schedule for implementing the action plan ●Identify the resources required to implement the action plan

Implementation During the Implementation phase, the following should occur: ●Understand potential problems and obstacles and create mitigating strategies to overcome obstacles ●Implement an evaluation process to monitor progress and control funding and budgetary restraints

Evaluation (and Revision) In order to maintain source protection a system should be put into place which provides: ●Constant monitoring of the action plan ●Evaluation and revision of the plan on a regular basis ●Audits ●Periodic updates to the SVA

Evaluation (and Revision) In order to maintain source protection a system should be put into place which provides: ●Quantity and quality tracking ●Trend Analysis ●Capacity Planning ●Sharing of Best Management Practices ● Sharing of cost avoidance “stories”

The iLMP System

iLearn, iManage, iProtect An integrated system consisting of three components: Training Tools Guidelines And Standards Narration

iLearn ●iLearn consists of courses related to the Source Vulnerability Assessment (SVA) and water resource management ●Courses contain: –Objectives –Quizzes and exams –Links to definitions –Movies –Key terms

The iLearn system begins with the introductory course “Know Your Source” and continues through the “Final Plan” course

iLearn is divided into two (2) levels. Level 1 consists of introductory courses to source water protection while Level 2 consists of more advanced courses. iLearn is divided into two (2) levels. Level 1 consists of introductory courses to source water protection while Level 2 consists of more advanced courses.

On the bottom right corner of your screen you will see three buttons; iLearn iManage iProtect. Each button will navigate to the corresponding system when clicked on. On the bottom right corner of your screen you will see three buttons; iLearn iManage iProtect. Each button will navigate to the corresponding system when clicked on.

iManage ●The iManage system is a Web-based Geographic Information System (GIS) tool that: –Can be used at production facilities world-wide –Provides a powerful mapping tool with database management functions that allow the storage of site specific data –Allows production facilities to be depicted using x,y coordinates in a mapping environment to allow the analysis of source vulnerability

iManage Provides the following tools to assess source water vulnerability: ●Mapping capabilities ●GIS database

Mapping Capabilities ●The mapping capabilities in iManage include the following: –Watershed delineation determines the watershed boundaries your production facility exists in –Stream tracing allows you to locate the areas your surface water originates from (upstream trace), and where contamination can occur (downstream trace) Watershed DelineationUpstream TracingDownstream Tracing

GIS Database With the GIS Database, the user can store site specific monitoring data

Video 1 Narration

Video 2 Narration

Video 3 Narration

Video 4 Narration

iProtect ●iProtect provides users with guidelines to evaluate source vulnerability ●iProtect contains worksheets that are directly related to each course in the iLearn system –These worksheets provide a systematic method for collecting information and a rating system to score vulnerability

iProtect Worksheets ●Other iProtect worksheets include Scoring Tables that reflect your production facility operations ●As you go through the iLearn modules, you will be provided with a pre-view of some of the corresponding worksheets in iProtect

iProtect Worksheets As an example, in iProtect, you will start out by identifying information about your source water using the following worksheet:

Vulnerability Scoring This iProtect worksheet summarizes the water quality vulnerability: 3 Narration

Significance of Scoring Tables ●Scoring Tables are significant in that they: –Provide a baseline scoring mechanism that reflects potential risks to your production facility –Help target mitigation efforts to focus on specifically identified vulnerabilities Once mitigation activities have been completed, production facilities can rescore their vulnerabilities on a periodic basis

Summary

●Source water: –Is utilized by production facilities for manufacturing operations –May be derived from a variety of sources such as surface water or groundwater ●Vulnerabilities to source water are potential threats to quality and quantity

Summary ●The vulnerability of source water is associated with ●The susceptibility, or likelihood, of source water to contamination or reduction in volume ●The quality and quantity of source water may have direct business impacts ●Sustainability means fulfilling the current needs of source water demand without compromising the needs of the future

Summary ●Sustainability is related to three major interests: –Economic –Social –Environmental ●The Coca-Cola Company’s Manifesto for Growth is a course of action toward sustainable growth

Summary ●Water resource sustainability is the development and use of water resources in a manner that can be maintained for an indefinite time without causing adverse environmental, economic or social consequences ●The Source Water Protection Program is a critical component in the sustainability of this vital resource and our business

Course Summary ●Source water protection is a six step process: 1.Vision 2.Assessment 3.Goals and objectives 4.Action planning 5.Implementation 6.Evaluation and revision

Course Summary… ●Together, iLearn, iManage, and iProtect will help to prepare you for completing the Source Vulnerability Assessment (SVA) ●iLearn consists of courses that teach the user about source water quality and quantity, which greatly affects source vulnerability and sustainability

Course Summary ●iManage incorporates information presented in iLearn and allows users to apply it interactively ●The iManage system includes a web-based Geographic Information System with database management capabilities ●iProtect contains worksheets that are directly related to each course in the iLearn system ●iProtect provides users with the ability to characterize their source water vulnerability

Final Exam Narration

Glossary ●Groundwater: Any water that is found beneath the earth’s surface ●Surface water: All water sources naturally exposed to the atmosphere (rivers, lakes, reservoirs, ponds, streams, Impoundments, etc.) (return) (return) ●Susceptibility: The tendency or likelihood that contamination will occur and affect a water supply. (return)(return) ●Vulnerability: The threats that can cause contamination in a water supply. (return)(return)