A METHODOLOGY FOR THE DESIGN OF AN ELECTRICITY THEFT MONITORING SYSTEM
|
|
- Jennifer Payne
- 8 years ago
- Views:
Transcription
1 A METHODOLOGY FOR THE DESIGN OF AN ELECTRICITY THEFT MONITORING SYSTEM 1 SOLOMON NUNOO, 2 JOSEPH C. ATTACHIE 1 Lecturer, Department f Electrical and Electrnic Engineering, University f Mines and Technlgy, Tarkwa, Ghana 2 Lecturer, Department f Electrical and Electrnic Engineering, University f Mines and Technlgy, Tarkwa, Ghana ABSTRACT Utility cmpanies in Ghana estimate that electricity theft csts them ver a billin US dllars in annual revenues. The purpse f this wrk is t prvide an algrithm fr the design f electricity theft mnitring system which allws vilatrs t be detected at a remte lcatin. It begins with the analysis f lsses in electrical pwer systems. The bulk f these lsses are caused by electricity theft, rather than ther pssibilities such as pr maintenance and calculatin and accunting mistakes, thugh sme pwer systems may suffer frm bth. Other aspects discussed include the varius frms f theft practices, methdlgy fr detectin f theft, generating the theft case algrithm using the backtracking algrithm methd and cmmunicating these data frm the cnsumer premises t the substatin using the existing pwer lines. Apprpriate cnclusins and recmmendatins were given frm the infrmatin gathered. Keywrds: Electricity Theft, Mnitring System, Algrithm, Pwer Line Cmmunicatin 1. INTRODUCTION Accrding t Smith [1], electricity theft can be in the frm f fraud (meter tampering), stealing (illegal cnnectins), billing irregularities, and unpaid bills. The evidence f the extent f electricity theft in a sample f 102 cuntries between 1980 and 2000 shws that theft is increasing in mst regins f the wrld. The financial impacts f theft are reduced incme frm the sale f electricity and the necessity t charge mre t cnsumers. Electricity theft is clsely related t gvernance indicatrs where higher levels are recrded in cuntries withut effective accuntability, plitical instability, lw gvernment effectiveness and high levels f crruptin. Merely generating mre pwer is nt enugh t meet present day requirements. Pwer cnsumptin and lsses have t be clsely mnitred s that the generated pwer is utilised in an efficient manner. This illegal electricity usage may indirectly affect the ecnmic status f a cuntry. Als the planning f natinal energy may be difficult in case f unrecrded energy usage. This paper discusses the design f an algrithm t mnitr distributin systems fr theft. 2. OERIEW OF THE ELECTRICITY SECTOR IN GHANA The lta River Authrity (RA) and Ghana Grid Cmpany (GRIDC) are respnsible fr generatin and transmissin f electricity in Ghana respectively. Als, the Electricity Cmpany f Ghana (ECG) is respnsible fr the distributin f electricity t cnsumers in the suthern and middle belts f Ghana, viz., Ashanti, Central, Greater Accra, Eastern, Western, parts f Brng Ahaf and lta Regins f Ghana, whereas the Nrthern Electrificatin Department (NED) is respnsible fr the distributin f electricity t cnsumers in the nrthern belt f Ghana, viz., parts f Brng Ahaf, Nrthern, Upper East and Upper West Regins f Ghana. A sketch f the electric pwer generatin, transmissin and distributin netwrk in Ghana is as shwn in Figure 1. Cnsumers n the distributin system are categrized as industrial, cmmercial and residential. Industrial cnsumers use f energy is fairly cnstant, bth ver the day and ver seasns. 112
2 Figure 1 - Electric Pwer Generatin, Transmissin and Distributin Netwrk in Ghana Hwever, that f cmmercial users is less cnstant and varies ver the day and seasns. Residential and cmmercial uses are mre variable, smetimes changing rapidly ver the day in respnse t ccupant needs and appliance use. Amah [2] states that, as f December 2003, the entire distributin system f Ghana cmprised f 8,000 km f sub-transmissin lines, 30,000 km f distributin netwrks with 22 bulk supply pints and 1,800 MA f installed transfrmer capacity. Pwer distributin systems prvide pwer t custmers thrugh pwer lines. 3. ANALYSIS OF LOSSES IN POWER SYSTEMS Lsses ccur at all levels, frm generatin, thrugh transmissin and distributin, t the cnsumer and the meter. It is nrmally at the distributin level where the majrity f avidable lsses ccur. All electrical pwer distributin cmpanies perate with sme accepted degree f lsses. This is n different frm the scenari in Ghana. Lsses incurred in electrical pwer systems have tw cmpnents: Technical lsses and Nn-technical lsses (Cmmercial lsses) 3.1 Technical Lsses Technical lsses will always arise as the physics f electricity transprt means that, n pwer system can be perfect in its delivery f energy t the end custmer. Technical lsses are naturally ccurring lsses (caused by actins internal t the pwer system) and cnsist mainly f pwer dissipatin in electrical system cmpnents such as transmissin lines, pwer transfrmers, measurement systems, etc. Technical lsses are pssible t cmpute and cntrl, prvided the pwer system in questin cnsists f knwn quantities, viz., resistance, reactance, capacitance, vltage, current and pwer. These are rutinely calculated by utility cmpanies as a way t specify what cmpnents will be added t the systems. Lads are nt included in the lsses because they are actually intended t receive as much energy as pssible. Technical lsses in pwer systems are caused by the physical prperties f the cmpnents f pwer systems. Example, I 2 R lss r cpper lss in the cnductr cables, transfrmers, switches and generatrs. The mst bvius example is the pwer dissipated in transmissin lines and transfrmers due t their internal impedance. Technical lsses are easy t simulate and calculate; cmputatin tls fr calculating pwer flw, lsses, and equipment status in pwer systems have been develped fr sme time. The instantaneus pwer lss, P lss (t) in a transmissin line can be expressed as: P lss ( t) P ( t) P ( t) = 1 surce lad where P surce (t) is the instantaneus pwer that the surce injects int the transmissin line and P lad (t) is the instantaneus pwer cnsumed by the lad at the ther end f the transmissin line. Thus the energy lss, W lss, is given by: = b lss a lss () t W P dt 2 where a and b are respectively the starting pint and ending pint f the time interval being evaluated. It must be nted that a fairly accurate descriptin f P lss (t) as a functin f time is always needed t make a reliable predictin f W lss. 3.2 Nn-Technical Lsses (Cmmercial Lsses) These refer t lsses that are independent f technical lsses in the pwer system. Tw cmmn 113
3 examples f surces f such lsses are cmpnent breakdwns that drastically increase lsses befre they are replaced and electricity theft. Lsses incurred by equipment breakdwn are quite rare. These include lsses frm equipment struck by lightning, equipment damaged by time and neglect. Mst pwer cmpanies d nt allw equipment t breakdwn in such a way and virtually all cmpanies maintain sme frm f maintenance plicies. Other prbable causes f cmmercial lsses are: Nn-payment f bills by custmers Errrs in technical lsses cmputatin Errrs in accunting and recrd keeping that distrt technical infrmatin. Inaccurate r missing inventries f data n custmers The mst prminent frms f cmmercial lsses in Ghana are electricity theft and nn-payment f bills. Nn-payment, as the name implies, refers t cases where custmers refuse r are unable t pay fr the electricity used. Hwever, the ther frms are nt analyzed thrughly in this prject. Nntechnical lsses are very difficult t quantify r detect and are mre prblematic than the ther lsses. Nn-technical lsses can als be viewed as undetected lad; custmers that the utilities d nt knw exist. When an undetected lad is attached t the system, the actual lsses increase while the lsses expected by the utilities remains the same. The increased lsses will shw n the utilities accunts, and the csts will be passed t custmers as transmissin and distributin charges. Research has shwn that, transmissin and distributin csts in Ghana are calculated as part f the custmers bills, while in ther cuntries, custmers are usually charged a single flat energy rate that includes all services. This means that, the transmissin and distributin lsses that increased due t cmmercial lsses wuld be charged either t the existing custmer whse pwer lines are illegally tapped, r the utility, depending n the methd f theft. Bth ECG and NED lsses range frm 24 t 30 percent f pwer generated, cllectin rates range frm 75 t 85 percent f billing and arrears frm gvernment agencies significantly weaken balance sheets [3]. In recent years, ECG has undertaken several measures t reduce lsses. Figure 2 shws the ttal distributin lsses f ECG frm 1985 t Frm the figure, it is bserved that lsses were relatively lw between 1993 and 1996 but increased thereafter. 3.3 Electricity Theft as a Majr Cmpnent f Cmmercial Lsses Cmmercial lsses arising thrugh electricity Figure 2 - Ttal Distributin Lsses f ECG,
4 theft and ther custmer malfeasances is a universal prblem in the electricity supply industry. Such lss may ccur by a number f means, such as meter tampering, illegal cnnectins, billing irregularities, and unpaid bills. The assciated identificatin, detectin, and predictin prcedures are imprtant fr many utilities, particularly thse in develping cuntries like Ghana. Currently, mst slutins are ad-hc and can nly be implemented after a lng perid f detectin and bservatin. The use f electricity is cnsidered illegal if: Electrical energy is cnsumed withut legal agreement between the prviders and cnsumers. The cnsumer des nt cmply with the agreement clauses fr the cnsumed energy such as entirely r partially nt measuring the energy cnsumed and intentinally enfrcing an errr t the measuring device (Watt-hur Energy Meter). In Ghana, meter inspectin is the main methd f cmmercial lsses detectin because the majrity f electricity theft cases invlve meter tampering r meter destructin. The principles f peratin fr watt-hur meters essentially have nt changed since the 1880s and the 1890s, when the watt-hur meter was invented. But the way f cnstructin keeps n changing. In sme areas in Ghana, the lads are nt metered r are metered cmmunally rendering any lss calculatins (technical r nt) fr that area useless. The majrity f electricity theft cases invlves meter tampering r meter destructin and ften after ne has been discnnected fr nnpayment f bill. 4. METHODOLOGY FOR DETECTION The methd includes receiving meter data f the measured pwer cnsumed by a custmer, receiving delivered pwer data that includes data f the pwer delivered t the custmer, determining a difference between the meter data and the delivered pwer data, determining that the difference between the meter data and the delivered pwer data is greater than a predetermined amunt, and indicating a discrepancy if the difference between the meter data and the delivered pwer data is greater than a predetermined amunt. In additin, the methd may include determining that a discrepancy varies ver time by a predetermined amunt and prviding a discrepancy ntificatin thrugh pwer lines. The blck diagram in Figure 3 shws the basic cmpnents f the system mentined. Figure 3 - Blck Diagram shwing the Methdlgy fr Detectin 115
5 4.1 Mathematical Mdeling f the Theft Case Algrithm In this paper, the backtracking algrithm was used fr the analysis. Backtracking is a refinement f the brute frce apprach, which systematically searches fr a slutin t a prblem amng all available ptins. Backtracking algrithms are distinguished by the way in which the space f pssible slutins is explred. Smetimes a backtracking algrithm can detect that an exhaustive search is unnecessary and, therefre, it perfrms much better. Figure 4 will be used fr generating the necessary algrithms. The pwer, P, in an electrical system is given as: Nte that fur scenaris can be derived frm Equatin 6. These are: {[ + φ )] [ 1 m + φ )]} ( ) + φ ) {[ ( ωt + φ )] [ sin( ω )]} sin t φ 8 {[ ( ω t φ )] [ sin( ω + )]} sin t φ 9 {[ φ )] [ 1 m φ )]} ( ) φ ) 7 Figure 4 - Blck Diagram f the Cmparisn Unit P = I csθ 3 and the instantaneus current is als given as: () t = I ( ω t ± φ ) I m sin 4 Let I 1 (t) = I sin(ωt ± ) be the input current t the meter and I 2 (t) = I sin(ωt ± ) be the utput current t the meter. Assuming that the internal circuitry f the meter is purely resistive, then the crrespnding input and utput vltage relatins are 1 (t) = sin(ωt ± ) and 2 (t) = sin(ωt ± ) respectively and these will frm as the input signals fr the cmparatr. Therefre the utput vltage,, frm the cmparatr is given as: ( ) Thus, {[ ( ω t ± φ )] [ sin( ω ± )]} sin t φ 6 10 Either Equatins 7 r 10 culd be used fr the cmparisn because fr a purely resistive circuit, the phase will remain the same at bth the input and the utput. Cnsequently, shuld the amplitude difference,, exceeds a predetermined value, then a theft case will have ccurred and it is fed int a vltage-t-frequency cnverter t generate a peridic utput wavefrm having a frequency prprtinal t the magnitude f an applied DC input vltage. Fr any discrepancies recrded, the current in the system will vary. Ntably, an n-ging theft case will lead t an increase in current. Figure 5 prvides flwchart f hw the cmparisn blck in Figure 3 will perate. When the mains is switched n, input and utput signals f the watt-hur meter is cmpared t check fr any discrepancies. When there is n discrepancy recrded, a green LED at the substatin will be ON till a discrepancy ccurs. With a discrepancy 116
6 Figure 5 - Flw Chart f the Cmparisn Blck recrded, a red LED at the substatin turns ON t ntify the peratr. After ntifying the peratr that a discrepancy has ccurred, the cnsumer data will als be recrded. The data will include the meter number, the time the prblem started and the apprximate lcatin. When all the data has been taken, the nearest substatin is ntified and the peratin is stpped r the mains turned OFF. All the sensr devices in the cmparisn unit will be lcated alng the Lw ltage pwer lines and alng the Medium ltage pwer lines since they are the main lines where theft can take place. 5. CONCLUSIONS Electricity theft, a cmmn frm f cmmercial lsses, invlves tampering with meters t distrt the billing infrmatin r direct cnnectins t the pwer system. Cmmercial lsses are nearly impssible t measure using traditinal pwer system analysis tls. This is due t the lack f infrmatin n bth cmmercial and the legitimate lads in the system, which translates t insufficient inputs fr any meaningful lss calculatins. Despite the best effrts by utilities, the current results f cmmercial lsses measurements are ften inaccurate at best, because the figures rely heavily n the recrds f detected cases, rather than by actual measurement f the electrical pwer system. Certainly utilities have sme cntrl ver the magnitude f cmmercial lsses; but even with their best effrts, sme cmmercial lsses will still cntinue. An algrithm fr the design f electricity theft mnitring system has been generated using the backtracking algrithm type. ACKNOWLEDGEMENT The authrs will like t express their heartfelt gratitude t James Owusu Mintah fr his effrts during the data cllectin. REFRENCES: [1] T. B. Smith, Electricity Theft: a Cmparative Analysis, Energy Plicy, lume 32, Issue 18, December 2008; 2003, pp [2] A. Amah, Guide t Electric Pwer in Ghana, First Editin, Resurce Centre fr Energy Ecnmics and Regulatin, Legn; 2005, 89 pp. [3] PURC, Annual Reprt retrieved n 25th January, 2009 at 8:09pm frm rt.pdf;
Key Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More information4370.4 REV-1. cash flows from operating activities, cash flows from investing activities, and cash flows from financing activities.
CHAPTER 5 STATEMENT OF CASH FLOWS IN DETAIL 5-1 Cash is the lifebld f any nging cncern. Cash is INTRODUCTION the fuel that keeps the business aflat. As was stated in Chapter 2, the Balance Sheet and the
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationIN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
More informationPOLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES
POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES M. PĘCIŁŁO Central Institute fr Labur Prtectin ul. Czerniakwska
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationCommunal Property Institution Capacity Assessment Tool
Cmmunal Prperty Institutin Capacity Assessment Tl Intrductin t cmmunal prperty institutins Cmmunal prperty institutins (CPIs) Participants in the land refrm prgramme can hld prperty thrugh different frms
More informationBusiness Intelligence represents a fundamental shift in the purpose, objective and use of information
Overview f BI and rle f DW in BI Business Intelligence & Why is it ppular? Business Intelligence Steps Business Intelligence Cycle Example Scenaris State f Business Intelligence Business Intelligence Tls
More informationTrends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003
Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationNHPCO Guidelines for Using CAHPS Hospice Survey Results
Intrductin NHPCO Guidelines fr Using CAHPS Hspice Survey Results The Centers fr Medicare and Medicaid Services (CMS) has develped the Cnsumer Assessment f Healthcare Prviders and Systems (CAHPS ) Hspice
More informationPENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
More informationWHITE PAPER. Vendor Managed Inventory (VMI) is Not Just for A Items
WHITE PAPER Vendr Managed Inventry (VMI) is Nt Just fr A Items Why it s Critical fr Plumbing Manufacturers t als Manage Whlesalers B & C Items Executive Summary Prven Results fr VMI-managed SKUs*: Stck-uts
More informationCOUNTY OF SONOMA AGENDA ITEM SUMMARY REPORT
COUNTY OF SONOMA AGENDA ITEM SUMMARY REPORT Department: General Services Cntact: Phne: Dave Head (707) 565-2809 Bard Date: May 12, 2009 Clerk f the Bard Use Only Meeting Date Held Until / / / / Agenda
More information2. When logging is used, which severity level indicates that a device is unusable?
Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages
More informationSystem Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
More informationASSISTANCE TO ENERGY SECTOR TO STRENGTHEN ENERGY SECURITY AND REGIONAL INTEGRATION CONTRACT NUMBER EPP-I-08-03-00008-00
Methdlgy fr Evaluating the Ecnmics, Financial Viability, and Envirnmental Cnsequences f Prpsed Gergian Intercnnectin and Transmissin Line Optins ASSISTANCE TO ENERGY SECTOR TO STRENGTHEN ENERGY SECURITY
More informationThe Importance of Market Research
The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which
More informationAnnuities and Senior Citizens
Illinis Insurance Facts Illinis Department f Insurance January 2010 Annuities and Senir Citizens Nte: This infrmatin was develped t prvide cnsumers with general infrmatin and guidance abut insurance cverages
More informationPhi Kappa Sigma International Fraternity Insurance Billing Methodology
Phi Kappa Sigma Internatinal Fraternity Insurance Billing Methdlgy The Phi Kappa Sigma Internatinal Fraternity Executive Bard implres each chapter t thrughly review the attached methdlgy and plan nw t
More informationFACILITIES DESIGN & CONSTRUCTION OFFICE OF ENERGY MANAGEMENT UTILITY SERVICES, REPORT ON LONG-RANGE PLAN 2014
FACILITIES DESIGN & CONSTRUCTION OFFICE OF ENERGY MANAGEMENT UTILITY SERVICES, REPORT ON LONG-RANGE PLAN 2014 TABLE OF CONTENTS Intrductin......1 Descriptins f Current Cntract Gals and Strategies fr Lng
More informationPSI APPLICATION INSTRUCTIONS (PRE-POWERCLERK)
PSI APPLICATION INSTRUCTIONS (PRE-POWERCLERK) Prcess Summary Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Find Installer Size System Mail Applicatin Get Reservatin Building Permit
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationA96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationWatlington and Chalgrove GP Practice - Patient Satisfaction Survey 2011
Watlingtn and Chalgrve GP - Patient Satisfactin Survey 2011 Backgrund During ne week in Nvember last year patients attending either the Chalgrve r the Watlingtn surgeries were asked t cmplete a survey
More informationBusiness Plan Overview
Business Plan Overview Organizatin and Cntent Summary A business plan is a descriptin f yur business, including yur prduct yur market, yur peple and yur financing needs. Yu shuld cnsider that a well prepared
More informationCOUNTRY REPORT: Sweden
COUNTRY REPORT: Sweden Prepared by: SP Technical Research Institute f Sweden Versin 2.0 Date: April 19, 2011 Address: Bx 857, SE-501 15 Brås, Sweden Tel. : +46 10 516 56 62 Fax : +46 33 13 19 79 E-mail:
More informationSystem Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
More informationIFRS Discussion Group
IFRS Discussin Grup Reprt n the Public Meeting February 26, 2014 The IFRS Discussin Grup is a discussin frum nly. The Grup s purpse is t assist the Accunting Standards Bard (AcSB) regarding issues arising
More informationKnowledge Base Article
Knwledge Base Article Crystal Matrix Interface Cmparisn TCP/IP vs. SDK Cpyright 2008-2012, ISONAS Security Systems All rights reserved Table f Cntents 1: INTRODUCTION... 3 1.1: TCP/IP INTERFACE OVERVIEW:...
More informationN Retail Australia - Factors Affecting Fuel Prices & Costs
FACTS ABOUT THE AUSTRALIAN RETAIL FUELS MARKET & PRICES RETAIL PRICES & INFLUENCES The mst imprtant influences n retail fuel prices in Australia are: the internatinal price f refined fuel the exchange
More informationBLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
More informationTO: Chief Executive Officers of all National Banks, Department and Division Heads, and all Examining Personnel
AL 96-7 Subject: Credit Card Preapprved Slicitatins TO: Chief Executive Officers f all Natinal Banks, Department and Divisin Heads, and all Examining Persnnel PURPOSE The purpse f this advisry letter is
More informationChange Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
More informationCMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
More informationUNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES
UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative
More information2013 CAS In Focus: Elephants in the Room Seminar. Jun Yan, PhD Hua Lin, PhD, FCAS, MAAA Chicago September, 2013
2013 CAS In Fcus: Elephants in the Rm Seminar BIG DATA: Big Benefits and Big Challenges Data Challenges in Underwriting Mdel Develpment fr China s Aut Business Jun Yan, PhD Hua Lin, PhD, FCAS, MAAA Chicag
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationLeadStreet Broker Guide
RE/MAX f Western Canada LeadStreet Brker Guide Ver. 2.0 Revisin Histry Name Date Versin Descriptin Tamika Anglin 09/04/13 1.0 Initial Creatin Tamika Anglin 11/05/13 2.0 Inclusin f instructins n reprting
More informationPrivacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
More informationUNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. Statement of Thomas F. O Brien. Vice President & Chief Information Officer
UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION Revised Critical Infrastructure Prtectin Reliability Standards Dcket N. RM15-14-000 Statement f Thmas F. O Brien Vice President & Chief Infrmatin
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationIn connection with the SEC's Money Market Reform proposal, DST Systems, Inc. respectfully submits our comments for your consideration.
DST September 18, 2013 Ms. Elizabeth M. Murphy Secretary Securities and Exchange Cmmissin 100 F. Street, NE Washingtn, DC 20549-1090 Subject: Mney Market Fund Refrm, File# 57-03-13 Dear Ms. Murphy: In
More informationWhat broader insights would you want to explore first to answer the CEO s questions?
Setup The CEO f a majr client has requested a shrt-term study examining a small part f the client s prduct prtfli. The cmpany has a small divisin that manufactures autmatic drip cffeemakers fr the US and
More informationPatient Participation Report
Patient Participatin Reprt In 2011, Westngrve Partnership decided t establish a PPG (Patient Participatin Grup) that wuld allw us t engage with ur patients, receive feedback frm them and ensure that they
More informationSmall Business, Enterprise and Employment Bill: Insolvency fact sheets Contents
1 Small Business, Enterprise and Emplyment Bill: Inslvency fact sheets Cntents Directr Disqualificatin and Inslvency General Aims... 2 Administratin: sales t cnnected persns (prepack administratins)...
More informationDefining Sales Campaign Automation How e-mail, the Killer App, is best applied to marketing
Defining Sales Campaign Autmatin Hw e-mail, the Killer App, is best applied t marketing Summary: Cmpanies tday are steadily adpting strategies and technlgies t reach prspects, custmers, and partners thrugh
More informationProject Startup Report Presented to the IT Committee June 26, 2012
Prject Name: SOS File 2.0 Agency: Secretary f State Business Unit/Prgram Area: Secretary f State Prject Spnsr: Al Jaeger Prject Manager: Beverly Maitland Prject Startup Reprt Presented t the IT Cmmittee
More informationCorporations Q&A. Shareholders. 2006 Edward R. Alexander, Jr.
Crpratins Q&A. What is a crpratin and why frm ne? A crpratin is a business entity that is separate and distinct frm its wners. It can enter cntracts, sue and be sued withut invlving its wners (the sharehlders).
More informationBetter Practice Guide Financial Considerations for Government use of Cloud Computing
Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.
More informationData Warehouse Scope Recommendations
Rensselaer Data Warehuse Prject http://www.rpi.edu/datawarehuse Financial Analysis Scpe and Data Audits This dcument describes the scpe f the Financial Analysis data mart scheduled fr delivery in July
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationDocument Management Versioning Strategy
1.0 Backgrund and Overview Dcument Management Versining Strategy Versining is an imprtant cmpnent f cntent creatin and management. Versin management is a key cmpnent f enterprise cntent management. The
More informationResearch Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
More informationJune 29, 2009 Incident Review Dallas Fort Worth Data Center Review Dated: July 8, 2009
The purpse f this dcument is t capture the events and subsequent respnse t the incident that tk place in the DFW datacenter n 29 June, 2009. I. Executive Summary On 29 June, an area f the Rackspace DFW
More informationGroup 3 Flip Chart Notes
MDH-DLI Sympsium -- Meeting Mandates, Making the Cnnectin: Wrkers Cmpensatin Electrnic Health Care Transactins -- Nvember 5, 2014 Grup 3 Flip Chart Ntes Meeting Mandates, Making the Cnnectin: Wrkers Cmpensatin
More informationSmall Business Fraud Custom Study among Small Business Owners Conducted for SunTrust Banks/National Small Business Association/Edelman
Small Business Fraud Custm Study amng Small Business Owners Cnducted fr SunTrust Banks/Natinal Small Business Assciatin/Edelman Octber 17, 2007 Objective & Methdlgy Objective In cllabratin with SunTrust
More informationTHE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM
THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant
More informationDesign for securability Applying engineering principles to the design of security architectures
Design fr securability Applying engineering principles t the design f security architectures Amund Hunstad Phne number: + 46 13 37 81 18 Fax: + 46 13 37 85 50 Email: amund@fi.se Jnas Hallberg Phne number:
More informationCOE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are:
COE: Hybrid Curse Request fr Prpsals The gals f the Cllege f Educatin Hybrid Curse Funding Prgram are: T supprt the develpment f effective, high-quality instructin that meets the needs and expectatins
More information2010 AT&T Business Continuity Study CENTRAL REGION (Missouri) Results
2010 Business Cntinuity Study: Missuri 2010 AT&T Business Cntinuity Study CENTRAL REGION (Missuri) Results Key Findings IT Plans fr 2010 IT budgets fr 2010 are abut the same r higher than thse f the previus
More informationMSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend
More informationAim The aim of a communication plan states the overall goal of the communication effort.
Develping a Cmmunicatin Plan- Aim Aim The aim f a cmmunicatin plan states the verall gal f the cmmunicatin effrt. Determining the Aim Ask yurself r yur team what the verall gal f the cmmunicatin plan is.
More informationUNIVERSITY OF WINCHESTER
UNIVERSITY OF WINCHESTER INTRODUCTION DEBT MANAGEMENT POLICY: STUDENTS ACADEMIC YEAR 15/16 This dcument sets ut the plicy f the University in relatin t student debt, alng with the debt management prcedures
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationSymantec User Authentication Service Level Agreement
Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed
More informationNetwork of International Business Schools
Netwrk f Internatinal Business Schls WORLDWIDE CASE COMPETITION Sample Case Analysis #4 Qualificatin Rund submissin frm the 2015 NIBS Wrldwide Case Cmpetitin, Ottawa, Canada Case: Ethipian Airlines: Bringing
More informationEconomic Justification: Measuring Return on Investment (ROI) and Cost Benefit Analysis (CBA)
Advancing Statewide Spatial Data Infrastructures in Supprt f the Natinal Spatial Data Infrastructure (NSDI) Ecnmic Justificatin: Measuring Return n Investment (ROI) and Cst Benefit Analysis (CBA) Intrductin
More informationGravesham Borough Council
Classificatin: Part 1 Public Key Decisin: Please specify - N Gravesham Brugh Cuncil Reprt t: Perfrmance and Administratin Cmmittee Date: 12 Nvember 2015 Reprting fficer: Subject: Crprate Perfrmance Manager
More informationBig Data Applications and Privacy Issues in Customer Service, Distribution Planning, and Rate Design
Big Data Applicatins and Privacy Issues in Custmer Service, Distributin Planning, and Rate Design EEI Fall Rates & Regulatry Affairs Cmmittee Meeting Russell.Garwacki@sce.cm Pricing Design & Research -
More informationSystems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
More informationNAVIPLAN PREMIUM LEARNING GUIDE. Analyze, compare, and present insurance scenarios
NAVIPLAN PREMIUM LEARNING GUIDE Analyze, cmpare, and present insurance scenaris Cntents Analyze, cmpare, and present insurance scenaris 1 Learning bjectives 1 NaviPlan planning stages 1 Client case 2 Analyze
More information7 October 2011. Re: Themed Inspection into Third Party Personal Injury Claims. Dear
7 Octber 2011 Re: Themed Inspectin int Third Party Persnal Injury Claims Dear During 2011 the Central Bank f Ireland ( Central Bank ) undertk a themed inspectin prject in relatin t the prcessing f third
More informationThinking Different About Alternative Financing Options
Thinking Different Abut Alternative Financing Optins Christpher Mills Senir Business Develpment Officer Federal Natinal Cmmercial Credit This whitepaper will make yu think differently abut alternative
More informationAccident Investigation
Accident Investigatin APPLICABLE STANDARD: 1960.29 EMPLOYEES AFFECTED: All emplyees WHAT IS IT? Accident investigatin is the prcess f determining the rt causes f accidents, n-the-jb injuries, prperty damage,
More informationA Walk on the Human Performance Side Part I
A Walk n the Human Perfrmance Side Part I Perfrmance Architects have a license t snp. We are in the business f supprting ur client rganizatins in their quest fr results that meet r exceed gals. We accmplish
More information6101 - DEPARTMENT OF ADMINISTRATION 14-BANKING AND FINANCIAL DIVISION
Prgram Budget Cmparisn The fllwing table summarizes the ttal executive budget fr the prgram by year, type f expenditure, and surce f funding. Prgram Budget Cmparisn Budget Item Base Fiscal 2012 Apprp.
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationCASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
More informationGREEN MOUNTAIN ENERGY COMPANY
GREEN MOUNTAIN ENERGY COMPANY INDEPENDENT ACCOUNTANT S REPORT ON APPLYING AGREED-UPON PROCEDURES DECEMBER 31, 2012 INDEPENDENT ACCOUNTANT S REPORT ON APPLYING AGREED-UPON PROCEDURES T Green Muntain Energy
More informationSources of Federal Government and Employee Information
Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities
More information101 E-Commerce Start-up Checklist
101 E-Cmmerce Start-up Checklist 1. Wh are yu and what d yu want t d? (1) Define yur business activity (r what yur business is). (2) What are yu three main business bjectives? (3) Wh are yur custmers?
More informationPlus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
More informationCHANGE MANAGEMENT STANDARD
The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationPolicy on Free and Open-source Software. Government Policy of Iceland
Plicy n Free and Open-surce Sftware Gvernment Plicy f Iceland Prime Minister s Office December 2007 Intrductin Free and pen-surce sftware is sftware based n a surce cde which the authrs chse t make public
More informationNet Metering. Chandra Shah, NREL. May 8, 2014. chandra.shah@nrel.gov 303-384-7557. FUPWG Spring 2014
Net Metering FUPWG Spring 2014 Chandra Shah, NREL chandra.shah@nrel.gv 303-384-7557 May 8, 2014 1 Energy Efficiency and Renewable Energy eere.energy.gv Overview Net metering definitin and key cnsideratins
More informationProcess for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
More informationVulnerability Management:
Vulnerability Management: Creating a Prcess fr Results Kyle Snavely Veris Grup, LLC Summary Organizatins increasingly rely n vulnerability scanning t identify risks and fllw up with remediatin f thse risks.
More informationFundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs
Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths
More informationTerms of Reference for the Fire Review Panel
Terms f Reference fr the Fire Review Panel Purpse The Fire Review Panel (the Panel) is appinted t prvide independent advice t the Minister f Internal Affairs (the Minister) abut hw the Gvernment can achieve:
More informationDALBAR Due Diligence: Trust, but Verify
BEST INTEREST INVESTMENT RECOMMENDATIONS Advisr Rle under Best Interest Regulatins January 27, 2016 In the era when the cntractual bligatin is t act in the client s best interest, investment decisins can
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationFRAUD AND ABUSE SAFEGUARDS
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL FRAUD AND ABUSE SAFEGUARDS IN SEPARATE STATE CHILDREN S HEALTH INSURANCE PROGRAMS Daniel R. Levinsn Inspectr General March 2007 OEI-06-04-00380
More informationADMINISTRATION AND FINANCE POLICIES AND PROCEDURES TABLE OF CONTENTS
CONTROL Revisin Date: 1/21/03 TABLE OF CONTENTS 10.01 OVERVIEW OF ACCOUNTING FOR INVESTMENT IN PLANT... 2 10.01.1 CURRENT POLICY... 2 10.02 INVENTORY MAINTENANCE AND CONTROL... 3 10.02.1 PROCEDURES FOR
More informationWhite Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
More informationCDC UNIFIED PROCESS PRACTICES GUIDE
Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Risk Management and t describe the practice verview, requirements, best practices, activities, and key terms related t these
More information