The Government Is More Brave With The Implementation Of The Gross Split Scheme

By : Hariyanto And Aldo Bella Putra | Wednesday, January 10 2018 - 20:00 IWST

Wakil Menteri Energi Dan Sumber Daya Mineral, Arcandra Tahar
Wakil Menteri Energi Dan Sumber Daya Mineral, Arcandra Tahar

INDUSTRY.co.id - Belitung - Government increasingly confident with the implementation of the scheme for gross split which is considered to provide certainty, simplicity and efficiency.

This is evident from the interest of five blocks of oil and gas (oil and gas) at the conventional oil and gas Working Area (WK) auction late 2017. This scheme is considered to be better compared to the WK Migas auction which uses the cost recovery scheme in 2015 and 2016 which are quiet enthusiasts.

"Implementation of the gross split scheme has shown results in 2017, after 2 years no WK Migas sold, last year we can contractors interested in 5 WK Migas We hope the process is completed in the first quarter of 2018," said Deputy Minister of Energy and Mineral Resources (ESDM) Arcandra Tahar at The Asia Pacific Hub Course in Belitung, Tuesday (9/1/2018).

Arcandra explains the main principle of gross split scheme is the certainty, simplicity, and efficiency. "Gross split will provide certainty for investors, because the parameters in the split division are transparent and measurable, the parameters are determined based on field characteristics and complexity of development and production," he said.

Arcandra added that the gross split scheme would also simplify budgeting approval, procurement processes, and accountability. Production costs no longer affect the Government and the Government also does not need to waste a lot of manpower to do the monitoring of the budget.

This scheme will also drive efficiency. Because of the savings that the contractor did, then the money would go into the contractor itself.

As is known, in 2017, the Government opened the auction of Conventional and Non-Conventional WK oil and gas auction stage I. Since May 29 until December 22, 2017, as many as 20 documents of tender auction of WK Migas Conventional have been accessed, with 10 blocks of interest by 13 companies. As for non-conventional WK Migas, 2 tender offer documents are accessed and sought by 1 company.

News Comment

Today's Industry

Oleg Mogilevsky - Product Marketing Manager at Check Point Software Technologies (Photo by Linkedin)

Selasa, 10 November 2020 - 11:00 WIB

Five Reasons to Reevaluate Your Endpoint Protection

With the new emerging threats caused by remote working standards, security professionals need to reevaluate their approach to protecting endpoints. In order to do so, it’s vital that organisations…

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Selasa, 10 November 2020 - 10:30 WIB

Collaborative Robots Open New Horizons in Quality Control Processes

Collaborative robots (cobots) offer suitable solutions to manufacturers. Hence, cobot-based quality control and inspection systems that can transition between different end products in very…

Ilustration Hackers (Photo by Microwire.info)

Jumat, 30 Oktober 2020 - 11:20 WIB

Organisations Paid Hackers US$23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and information disclosure top list of most common and impactful vulnerabilities.

Clean Earth Technologies (CET)

Jumat, 30 Oktober 2020 - 10:30 WIB

Clean Earth Technologies’ New Class Of Polymers Invented By Associate Professor, Justin Chalker, Receives Australian Pm’s New Innovator Award

Associate Professor Justin Chalker has invented a novel class of polymers synthesised directly from elemental sulphur which is a waste by-product of the petrochemical industry and renewable…

Adi Ikan - Network Research & Protection Group Manager, at Check Point Software Technologies (Photo by Linkedin)

Jumat, 30 Oktober 2020 - 10:05 WIB

Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild

NSA’s list of top vulnerabilities were used to launch 3 million attacks in 2020, with 2.5 million of those attacks occurring in the last 6 months.