ENA Smart Metering Security & Privacy Control Points
|
|
|
- Sheila Terry
- 10 years ago
- Views:
Transcription
1 ENA Smart Metering Security & Privacy Control Points For: Energy Networks Association May 2010 Engage Consulting Limited Document Ref: ENA-CR Restriction: ENA authorised parties Engage Consulting Limited Page 1 of 80
2 Executive Summary Use Case Control Points The network operators smart meter functionality requirements will enable them to collect the to fulfil their business processes thereby enabling the implementation of Smart Grids in Great Britain. The uses of the have been detailed in a series of Use Cases that include a basic flow of steps to describe the interaction between the actors (such as the network operator) and the smart metering system. Each of the individual steps can be deemed to be a control point where security and privacy issues and risks can be assessed. This assessment has been completed for each of the Use Cases produced for the electricity and gas network operators and is discussed in this paper. Data Ownership The most critical issue that requires Government confirmation is in the area of identifying who will own the smart metering. If the consumer owns the then the network operator will require customer permission to access the smart metering information required to make a smart grid a reality. If not all customers provide that consent then the effectiveness of network operator planning, network management, balancing, and safety activities will be impaired, not to mention the impact this would have on the assumptions underpinning the cost benefit analysis case for smart metering in GB. Data Security and Privacy Assuming that the network operators are able to access all the they have specified at the required level of granularity, then that must remain confidential and secure. Access to smart metering must be via robust authentication processes that ensure that the party attempting to gain access is who they say they are. Once that access is achieved then robust authorisation processes must ensure that the party can only access the and meter functionality that their role entitles them to. Data that is extracted from the smart metering systems must be in such a way that only the intended recipient can decrypt and discern useful information from it. Most of the network operator uses of smart metering require knowledge of the location of the meter (or group of meters) in relation to where they connect to the LV network. Typically the network operator only needs this in an aggregated format to understand the impact on their network and it should be provided at the appropriate level. The privacy concern related to specific properties is that the information could be used to determine the habits and behaviour of the occupant of the property the meter is connected to, and hence may fall into the hands of unauthorised parties enabling them to use the to discern patterns in behaviour of the occupant. The inclusion of rigorous and robust security and privacy measures at the outset should resolve this issue. Unauthorised Access Some of the actions a network operator may take through a smart meter to manage their network will have significant impact on the end user, in the most extreme cases leaving them without power or gas. It is therefore essential that rigorous and robust authentication and authorisation processes are used to ensure that unauthorised parties cannot gain access to Engage Consulting Limited Page 2 of 80
3 the smart meters to initiate any of these functions as an accident or a deliberate attempt at disruption. Observations & Recommendation It is essential that the security and privacy aspects of any smart metering system and smart grid are given appropriate consideration early in the design process so that the required privacy arrangements and security protocols are baked in to the system. This will then minimise the risk of security or privacy breaches occurring once the smart metering system is in place, so avoiding a major negative impact on the public s view of smart meters and grids and avoiding the considerable extra cost of trying to retrofit additional security and privacy measures into an existing system. This report contains detail of the Risk Assessment undertaken for the Network Businesses based on their set of Use Cases illustrating the key aspects of their businesses requirements for smart metering to deliver a smart grid. This material should be used with detail from other key stakeholders e.g. Retailers, to help DECC/Ofgem E-Serve develop a complete list of High Level Privacy and Security Requirements that can be used to develop a balanced Privacy and Security architecture to deliver the roll-out of smart meters within GB that will also support the development of a Smart Grid. Engage Consulting Limited Page 3 of 80
4 Document Control Authorities Version Issue Date Author Comments 0.1 9th April 2010 Craig Handford & James Boraston Use Case control points th April 2010 James Boraston Report first draft th April 2010 James Boraston nd April 2010 Tom Hainey Update with comments and include Dutch smart experience in appendix Review and minor update prior to issuing to ENA members for review th April 2010 James Boraston Incorporate ENA member comments th April 2010 James Boraston / Tom Hainey Issue to ENA Members th May 2010 Tom Hainey Minor update to Executive Summary Version Issue Date Reviewer Comments th April 2010 Tom Hainey Review of first draft th April 2010 Tom Hainey Review after ENA Members comments incorporated th May 2010 Tom Hainey Minor update to Executive Summary Version Issue Date Authorisation Comments Related Documents Reference 1 Reference 2 Reference 3 Reference 4 ENA Smart Metering Project Initiation Document (ENA-CR ) ENA Smart Metering System Use Cases (ENA-CR ) DECC Towards a smarter future: Government response to the Consultation on Electricity and Gas Metering. High Level Smart Metering and Smart Grid Security Considerations (ENA-CR ) Distribution Engage Consulting Limited Page 4 of 80
5 Recipient 1 - Alan Claxton (ENA) Recipient 2 - ENA Members Engage Consulting Limited Page 5 of 80
6 Table of Contents Executive Summary...2 Use Case Control Points... 2 Data Ownership... 2 Data Security and Privacy... 2 Unauthorised Access... 2 Observations & Recommendation... 3 Document Control...4 Authorities... 4 Related Documents... 4 Distribution... 4 Table of Contents Introduction Background Purpose Scope Copyright and Disclaimer Use Case Security & Privacy Control Points Review Key Findings Data issues Authentication and Authorisation issues Observations & Recommendations Observations Recommendations Appendix A - Electricity Use Case Security Control Points Approach Security & Privacy Review Assessment of Network Performance Actively Manage Network / System Balancing Actively Manage Network Planned & Unplanned Outages Safety Support Network Activities Appendix B - Gas Use Case Security Control Points Approach Security & Privacy Review Gather Information for Planning Configure Gas Smart Metering System Disable Supply of Gas by GDN Display Messages from GDN Appendix C - U.S. NIST Smart Grid Cyber Security Strategy and Requirements Appendix D - A Dutch lesson in privacy and security Engage Consulting Limited Page 6 of 80
7 1 Introduction Since their production of an initial set of ENA Requirements for Smart Metering which formed part of their response to the DECC consultation on smart metering, the ENA and its member companies have recognised the importance of further developing their original functional specification in order to fully support the objectives of the ENSG Smart Grid Vision and Route map, and in recognition of the importance that DECC has placed on the development of Smart Grids. In order to achieve this objective, ENA has commissioned Engage Consulting Limited (Engage) to undertake a project (PID Reference 1) to address 4 key areas of work as follows: Workstream 1 ENA Smart Metering System Requirements: Update and enhance key network requirements needed to support current network businesses and the future needs of Smart Grids; Workstream 2 - Development of Appropriate Use Cases: To fully articulate the key aspects of the ENA requirements it is intended that specific Use Cases will be developed for critical areas related to energy network businesses and smart grids; Workstream 3 Performance Standards & Communication Requirements: This workstream will develop appropriate scenarios for each Use Case and undertake a traffic analysis to assess the impact this will have on the smart metering communications infrastructure; and Workstream 4 - Privacy & Security Considerations: This activity will provide an overview of the scope, principles and concepts that need to be considered when developing a secure smart metering system solution to take account of the Energy Networks additional requirements. This report represents the final output of Workstream Background 1.2 Purpose The Government s response to the DECC smart metering consultation process (Reference 3) included a number of statements emphasising the importance of developing a smart grid in Great Britain and of ensuring that network businesses were able to contribute by specifying the functional requirements of a smart metering system that would be required to support that objective. It is therefore imperative that the correct level of factual and detailed information is fed into Ofgem E-Serve s Phase 1 work. This will ensure that in developing the smart meter functionality and communications infrastructure requirements, full account can be taken of the short, medium and long term needs of network operators such that the key functionalities can be incorporated in an appropriate manner and within the relevant timescales. Purpose of this report is to: Identify the security and privacy issues and risks from the basic steps in the electricity use case flows; Engage Consulting Limited Page 7 of 80
8 1.3 Scope Identify the security and privacy issues and risks from the basic steps in the gas use case flows; and Highlight the key security and privacy issues and risks This project is focused on ensuring that the requirements of energy networks in respect of the short, medium and longer term functionality required of smart metering, and associated communication infrastructure - are clearly defined and aligned with work being undertaken by the DECC/Ofgem E-Serve Smart Metering Implementation Project. This particular report details some specific security and privacy issues and risks that may arise from the ENA members smart metering functionality requirements. 1.4 Copyright and Disclaimer The copyright and other intellectual property rights in this document are vested in ENA. Engage Consulting Limited has an unlimited licence to use any techniques or know-how developed by it under this Agreement on its future work. No representation, warranty or guarantee is made that the information in this document is accurate or complete. While care is taken in the collection and provision of this information, Engage Consulting Limited shall not be liable for any errors, omissions, misstatements or mistakes in any information or damages resulting from the use of this information or action taken in reliance on it. Engage Consulting Limited Page 8 of 80
9 2 Use Case Security & Privacy Control Points Review The detail of the ENA members Smart Metering requirements have been described in the electricity and gas Use Cases documented in the ENA Smart Metering System Use Cases (ENA-CR ) product from Workstream 2 of this project. Each Use Case includes steps from a basic (everything goes as expected) and alternative flow (problems are encountered) that detail the interaction between an actor (or actors) and the Smart Metering System. Each of the basic steps within a Use Case is a control point where the flow could cease or deviate if a problem arises. For the purposes of this analysis we have analysed the security and privacy issues and risks applicable at each of those control points and suggested some potential solutions. The full set of Use Case steps and identified issues and risks are included in Appendix A for electricity and Appendix B for gas. This section provides an overview of the findings from the analysis. 2.1 Key Findings The same security control point issues and risks were identified for both gas and electricity Use Cases. This section will therefore not differentiate between the two fuels. At a high level the security control point issues and risks identified fall into two categories: Data issues; and 2.2 Data issues Authentication and authorisation issues. There is the potential for a wide variety of issues with the Smart Metering that network operators may wish to use. The incorporates measurement (power flow, voltages, etc.), meter standing and messages (control, configuration, alarms, etc.) These issues include security and privacy and are summarised in Table 1 below including an indication of the priority of the issue / risk. Table 1 Summary of issues identified from analysing the electricity and gas use cases Issue / Risk Recommendation Priority Customer has not given consent for to be taken Develop robust consenting Suppliers as they have the H Incorrect configuration of validation rules Defined and robust rules must be specified in the early design of systems Data corrupted in transit Develop robust validation rules H Incorrect / non compliant is Develop robust validation rules H received / sent H Engage Consulting Limited Page 9 of 80
10 Issue / Risk Recommendation Priority Received isn t stored DNO s and Smart Metering H securely System need to have secure and robust management of Data no longer available / deleted Data needs to be secure and M / overwritten confidential Data not received in time Smart Meters are correctly M configured and updated Data lost Communication channels are secure allowing retrieval of lost through back-ups M Incorrect configuration for time period Develop robust authentication rules M Data loaded into incorrect system Incorrect collected Storage limits exceeded DNO s and Smart Metering System need to have secure and robust management of Clear and robust configuration rules required Develop robust validation rules Appropriate measured storage requirements at the DNOs and Smart Metering System M M L Data ownership The question of which party owns the that the smart meter measures, records and stores is one that has not been resolved as yet. This is however an issue with massive implications to the Great Britain cost benefit analysis case for Smart Grids and Smart Metering. In a recent on-line smart metering discussion 1, a representative from Consumer Focus (the statutory watchdog for UK consumers, including energy), stated that from their perspective consumers have the right to own their own and choose how it is used. In practice this means that all the collected by the meter should be kept within the home meter. If this view is adopted by Ofgem E-Serve and the Government, then network operators will require the consent of the consumer before they can extract the from the smart meters that they will need to fulfil their business processes captured in the use cases. An argument could be made that some of the items the network operators require, such as voltage, are measuring the quality of the delivered energy and as such is more the networks than the consumers. Other items such as meter standing, e.g. the Calorific Value, and command or configuration messages from network operators, could also be argued to not belong to the customer. 1 Zoe McLeod, Consumer Focus, 5 th March Engage Consulting Limited Page 10 of 80
11 2.2.2 Privacy Most of the network operator s uses of the smart metering require them to know where the meter is located in relation to the network. For some, though not all of the smart meter measured parameters, this locational information could allow parties to determine the habits of the occupants of the property, and hence by analysing the derive private information about them. Times of occupancy, use of specific equipment, and other information could be derived that would be of use for marketing purposes or even for criminals. Any stored in the meter, transmitted through the communication network, or stored within network operator systems, must be held securely, with robust authentication and authorisation rules ensuring access to the meter and only by authorised parties, and when in transit ensuring that should the be intercepted by an unauthorised party they cannot use it. If a unique method of identifying the location of the meter, similar to a computer IP address, is adopted then could be securely stored within network operator systems using a reference key to determine the location. This would then ensure that should the be accessed by unauthorised parties it would be useless without the reference key Data integrity Integrity is the assurance that any received are exactly as sent by an authorised entity i.e. they contain no modification, insertion or deletion. s need to be sure that the they receive from smart meters is from the meter they expect it to be from, and that it has not been tampered with, or become corrupt in transit. To ensure this the must be securely stored within the meter, must be on exit, and pass through robust validation processes to ensure that it is the same on receipt as it was when it left the meter. The Smart Meter must include validation of the before it is able to be sent. Validation must then also occur at the recipient before the is accepted. 2.3 Authentication and Authorisation issues The practise of authentication establishes that parties attempting to access the meter, network and are in fact who they say they are. Authorisation then defines what a party is allowed to do once they have been authenticated. There were several authentication and authorisation issues identified within the electricity and gas Use Case steps, which are summarised in the following table with an assessment of the priority of the issue / risk. Table 2 Summary of authentication and authorisation issues identified from analysing the electricity and gas use cases Issue / Risk Recommendation Priority Data intercepted by unauthorised recipient Develop robust authorisation and encryption rules Access to must be H Engage Consulting Limited Page 11 of 80
12 Data sent by unauthorised party Data sent to the wrong recipient Unauthorised party configures Smart Metering System to stop recording Unauthorised access to customer Incorrect configuration of validation rules Data obtained for the wrong customer Incorrect configuration for time period Data sent to wrong IHD Develop robust authentication rules Develop robust authorisation and encryption rules Access to configure the meter must be via robust authentication and authorisation rules Develop robust consenting Suppliers as they have the Defined and robust rules must be specified in the early design of systems Develop robust authorisation and encryption rules Develop robust authentication rules Develop robust authorisation and encryption rules H H H H H H M L Unauthorised access to the meter It is essential that only fully authenticated and authorised parties are able to access the smart meters. The must ensure that a party trying to access the meter is who they say they are, and then once that access has been granted, the authorisation rules must restrict access to only the functionality and associated that this party is entitled and authorised to see. This is particularly critical considering the functionality that network operators wish to have included in smart meters. There are forms of direct intervention with the smart meter systems that a network operator has proposed, such as: Maximum power threshold this sets an upper limit to the power that can be consumed at premises to enable more properties to remain on supply during system constraint or fault. Consumption over the specified level will result in a warning message followed by disconnection if energy use remains high. The assumption here is that the householder will have agreed to these actions being undertaken by the network operator under emergency conditions; Direct control of appliances - Smart Metering System to communicate with Energy Management System s within the premises to determine when appliances draw load. The assumption here is that the householder will have agreed to these actions being undertaken by the network operator; Direct control of micro-generation Smart Metering System to communicate with micro-generation installed at premises to reduce generation when network conditions require it. Again consent is assumed to have been given by the householder in advance; and Auto-disconnection / Auto-isolation the Smart Meters will be configured to detect conditions that may present a safety risk to the consumer or attached equipment, such as extremes in voltage or dangerous gas conditions, that will initiate auto-disconnection/isolation Engage Consulting Limited Page 12 of 80
13 from the network. This is linked to health and safety and overrides any privacy issues. If a malicious unauthorised party was able to access this functionality it could have major consequences such as consumers being left without power. Any successful attacks such as these would severely damage the customer view, and acceptance, of smart metering and smart grids and so must be robustly guarded against. There are other forms of interaction with the smart meter systems, such as the network operators sending messages to the meter and/or the In Home Display, e.g.: Notifying customers of planned outages; Notifying customers of network emergencies; Updating stored Calorific Values (potentially); and Updating the meter with tariff details. If unauthorised parties were able to hack into the system to send messages disrupting these uses it would have less of an extreme impact than the previous examples, but would still badly damage customer confidence in smart metering and smart grids. A further nuisance impact of unauthorised access to the meter, that would be unlikely to be noticeable to the customer, would be an unauthorised party changing the configuration settings within the meter, e.g. changing the frequency of reads, validation rules, etc Unauthorised access to Robust authorisation rules must ensure that parties authenticated as having permission to access the smart metering system can only access the functionality, and, they are authorised to use or see. To satisfy confidentiality requirements there must be robust encryption methods that ensure that only authorised parties in possession of the relevant encryption key will be able to decrypt any obtained from the smart metering system. There must be similarly tight security measures employed to protect smart metering stored within network operator systems to ensure that confidentiality requirements are met. Engage Consulting Limited Page 13 of 80
14 3 Observations & Recommendations 3.1 Observations The issues of security and privacy for smart metering systems and smart grids are becoming a key area of focus in many countries. For example: The publication of the draft Smart Grid Cyber Security Strategy and Requirements by the U.S. National Institute of Standards and Technology (NIST) focused mainly on the Security of smart grids and was criticised by privacy organisations regarding its approach to privacy when initially published. The updated draft issued in February 2010 has included additional detail regarding privacy provided by their Privacy Sub-group who conducted a privacy impact assessment (PIA) for the consumer-toutility portion of the Smart Grid. Appendix C provides a brief summary of the key tasks that NIST indicate should be part of any Smart Grid Cyber Security Strategy. The Dutch experience of getting to the point of seeking approval from their Senate for a mandated roll-out of smart meters which was to capture 15 minute, only to see it rejected due to Consumer groups lobbying that what they proposed broke Article 8 of the European Convention on Human Rights. This has resulted in extensive work in the Netherlands to ensure Privacy concerns are dealt with and seen to be at the heart of whatever proposal regarding smart meters they take forward. Brief details of this are provided in Appendix D for reference. For those countries that have already implemented smart metering roll-outs in Europe (e.g. Sweden and Italy) it is unclear how much emphasis was given to security and privacy issues in their overall system design. Only time will tell if they got the balance right between the Utility requirements for and end-toend system security and overall privacy of personal. Any problems will potentially be expensive to rectify. With GB just about to move into the design stage of their smart metering / smart grid solution it is imperative that the dual aspects of end-to-end system security and the privacy of personal are given appropriate consideration in the system design phase. This is an area where any time and cost of developing these aspects appropriately should be considered as a necessary cost of doing business, with any cost to deliver this being considered as ring-fenced and protected from any attempts to reduce it to control an overall project budget. Once installation occurs, and processes go live the cost of addressing exposed security or privacy risks will be many times any cost savings made in not addressing these concerns during the design phase. 3.2 Recommendations It is essential that the security and privacy aspects of any smart metering system and smart grid are given appropriate consideration early in the design process so that the required privacy arrangements and security protocols are baked in to the system. This will then minimise the risk of security or privacy breaches occurring once the smart metering system is in place, so avoiding a major Engage Consulting Limited Page 14 of 80
15 negative impact on the public s view of smart meters and grids and avoiding the considerable extra cost of trying to retrofit security and privacy measures into an existing system. This report contains detail of the Risk Assessment undertaken for the Network Businesses based on their set of Use Cases illustrating the key aspects of their businesses requirements for smart metering to deliver a smart grid. This material should be used with detail from other key stakeholders e.g. Retailers, to help DECC/Ofgem E-Serve develop a complete list of High Level Privacy and Security Requirements that can be used to develop a balanced Privacy and Security architecture to deliver the roll-out smart meters within GB that will also support the development of a Smart Grid. Engage Consulting Limited Page 15 of 80
16 Appendix A - Electricity Use Case Security Control Points 1. Approach Based on the final list of Use Cases it is intended that the Basic Steps that are shown for each Use Case will be reviewed to identify for each step any Security & Privacy Issues / Risks and identify any appropriate recommendations to address them. It should be noted that due to the structure of the Use Case documents created there will be repetition in the basic steps between several Use Cases. All of the Use Case basic steps have been included here for completeness. 2. Security & Privacy Review The security control points below majors on the security issues, but also covers key privacy areas related to consumer that might be an issue and need to be dealt with. 3.3 Assessment of Network Performance Monitor Power Flows and Voltage Levels to Identify Thermal Capacity and Statutory Voltage Headroom Scenario 1 Data is sent periodically from the Smart Metering System Control Point No Basic Flow 1 The Smart Metering System determines that the DNO configured time period that has been set to send has been reached and sends the half hourly to the Distribution Network Operator Security Control Points Activity Issues / Risks Recommendations Incorrect configuration for time period Data sent to the wrong recipient Data intercepted by unauthorised recipient Data corrupted in transit authorisation validation rules 2 The Distribution receives the and loads it into its system to use in monitoring power flows and voltage levels 3 The Smart Metering System continues to is received Data no longer available / deleted / overwritten Data intercepted by unauthorised recipient access rules to be confidential Engage Consulting Limited Page 16 of 80
17 make available to the DNO at the predetermined interval until the DNO configures it to stop Alternative Flows At Basic Flow step 2 2a 1 The Distribution does not receive the 2a 2 The Distribution checks and takes steps to ensure that the Smart Metering System has been configured correctly and is working properly 2a 3 Go back to Basic Flow step 1 Incorrect received Data loaded into incorrect system Received isn t stored securely Unauthorised party configures Smart Metering System to stop recording Data sent to wrong recipient Data intercepted by unauthorised recipient Data not received in time Data lost Smart Metering System accessed and configured by unauthorised party See Step 1 authorisation access and use rules Access to configure the meter must be via robust authentication and authorisation rules confidential DNO s and Smart Metering System need to have secure and robust management of authorisation access and use rules DNO s and Smart Metering System need to have secure and robust management of consenting Suppliers as they have Access to configure Smart Metering System via robust authentication and authorisation rules Engage Consulting Limited Page 17 of 80
18 Scenario 2 DNO requests Control Point No Basic Flow 1 The Distribution sends a message to the Smart Metering System requesting the stored half hourly power flow (including that of any collected generation ) and voltage 2 The Smart Metering System receives the message and validates it 3 The Smart Metering System retrieves the stored half hourly power flow (including that of any generation ), and voltage Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters Request sent to the wrong recipient Request sent by unauthorised party Request sent to wrong group of meters is retrieved Data no longer available / deleted / overwritten consenting Suppliers as they have authorisation authorisation access rules confidential 4 The Smart Metering System sends the to the Distribution 5 The Distribution receives the and loads it into its system to use in monitoring power flows and voltage levels Alternative Flows Data intercepted by unauthorised recipient Data sent to incorrect recipient Data corrupted in transit Incorrect received Data loaded into incorrect system Received isn t stored securely Data sent by unauthorised party authorisation validation rules access and use rules confidential DNO s and Smart Metering System need to have secure and robust management of Engage Consulting Limited Page 18 of 80
19 At Basic Flow step 2 2a 1 2a2 The Smart Metering System rejects the message as invalid The Smart Metering System sends notification to the Distribution Network Operator detailing error type along with date/time stamp Incorrect sent / received Incorrect validation rules Notification not sent access rules be confidential with system handshakes 2a 3 The Distribution receives the message and takes the required steps to resolve the error Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear 2a 3 Once error is resolved go back to Basic Flow step 1 See Step 1 At Basic Flow step 3 3a1 3a 2 The Smart Metering System does not have any measured stored The Smart Metering System sends a no found message to the Distribution being requested Data no longer available / deleted / overwritten Customer has not given consent to to be taken Error not sent / sent incorrectly access rules be confidential consenting Suppliers as they have 3a 3 The Distribution checks and takes steps to ensure that the Smart Metering System has been configured correctly Incorrectly configured Incorrect being requested consenting suppliers as they have Engage Consulting Limited Page 19 of 80
20 and is working properly 3a4 End flow At Basic Flow step 5 5a 1 The Distribution does not receive the from the Smart Metering System 5a 2 The Distribution checks and takes steps to ensure that the Smart Metering System has been configured correctly and is working properly being sent Unable to process No received for DNO purposes Incorrectly configured Incorrect being requested consenting suppliers as they have access rules consenting suppliers as they have 5a 3 Go back to Basic Flow step 1 See Step Determine Network Impact of Proposed New Demand / Generation Connections Control Point No Basic Flow 1 The Distribution sends a message to the Smart Metering System requesting the stored half hourly power flow and voltage (and micro generation where available) 2 The Smart Metering System receives the message and validates it Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters Request sent to the wrong recipient Request sent by unauthorised party Request sent to wrong consenting Suppliers as they have authorisation authorisation Engage Consulting Limited Page 20 of 80
21 3 The Smart Metering System retrieves the stored half hourly power flow and voltage 4 The Smart Metering System sends the to the Distribution 5 The Distribution receives the and loads it into its system / procedure for determining network capacity Alternative Flows At Basic Flow Step 5 5a 1 The Distribution does not receive the group of meters is retrieved Data no longer available / deleted / overwritten Data intercepted by unauthorised recipient Incorrect sent Data sent to incorrect recipient Data corrupted in transit Data intercepted by unauthorised recipient Incorrect received Data loaded into incorrect system Received isn t stored securely Data sent by unauthorised party Data no longer available / deleted / overwritten Customer has not given consent for to be taken access rules confidential authorisation access and use rules validation rules confidential DNO s and Smart Metering System need to have secure and robust management of authorisation access and use rules confidential DNO s and Smart Metering System need to have secure and robust management of access rules confidential consenting Suppliers as they have Engage Consulting Limited Page 21 of 80
22 5a 2 The Distribution checks and takes steps to ensure that the Smart Metering System has been configured correctly and is working properly Incorrectly configured Incorrect being requested Configuration changed by unauthorised party consenting Suppliers as they have Access to configure Smart Metering System via robust authentication and authorisation rules 5a 3 Go back to Basic Flow step 1 See step Determine Network Impact of Proposed Increases in Demand / Generation at Existing Connection Points Control Point No Basic Flow 1 The Distribution sends a message to the Smart Metering System requesting the stored half hourly power flow and voltage (and micro generation where available) 2 The Smart Metering System receives the message and validates it 3 The Smart Metering System retrieves the stored half hourly power flow and voltage 4 The Smart Metering System sends the to the Distribution Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters Request sent to wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters is received Data no longer available / deleted / overwritten Data intercepted by unauthorised recipient Incorrect sent Data sent to incorrect recipient consenting suppliers as they have authorisation authorisation access rules be confidential authorisation access and Engage Consulting Limited Page 22 of 80
23 5 The Distribution receives the and loads it into its system / procedure for determining network capacity Alternative Flows At Basic Flow Step 5 5a 1 The Distribution does not receive the 5a 2 The Distribution checks and takes steps to ensure that the Smart Metering System has been configured correctly and is working properly Data corrupted in transit Data intercepted by unauthorised recipient Incorrect received Data loaded into incorrect system Received isn t stored securely Data sent by unauthorised party being requested Data no longer available / deleted / overwritten Customer has not given consent for to be taken Incorrectly configured Incorrect being requested Meter configured by unauthorised party use rules be confidential DNO s and Smart Metering System need to have secure and robust management of authorisation access and use rules be confidential DNO s and Smart Metering System need to have secure and robust management of access rules be confidential consenting Suppliers as they have consenting Suppliers as they have Access to configure Smart Metering System via robust authentication and authorisation rules 5a 3 Go back to Basic Flow step 1 Engage Consulting Limited Page 23 of 80
24 Monitor Demand and Generation Profiles for Network Load Forecasting Control Point No Basic Flow 1 At the defined interval the Smart Metering System collects the and sends it to the Distribution 2 The Distribution receives the and loads it into their systems Alternative Flows At Basic Flow step 2 Security Control Points Activity Issues / Risks Recommendations Incorrect configuration for time period Data sent to the incorrect recipient Data intercepted by unauthorised recipient Incorrect sent Data corrupted in transit is retrieved Data no longer available / deleted / overwritten Data corrupted in transit Data loaded into incorrect system Received isn t stored securely Data sent by unauthorised party authorisation validation rules confidential DNO s and Smart Metering System need to have secure and robust management of access and use rules be confidential DNO s and Smart Metering System need to have secure and robust management of 2a 1 The Distribution does not receive the from the Smart Metering System 2a 2 The Distribution checks and takes steps to ensure the Smart Metering System is being requested Data no longer available / deleted / overwritten Customer has not given consent for to be taken Data corrupted in transit Incorrectly configured Configured by unauthorised party access rules be confidential consenting Suppliers as they have Access to configure Smart Metering System via robust authentication and authorisation rules Engage Consulting Limited Page 24 of 80
25 configured correctly and had to send 2a 3 The Distribution requests the Smart Metering System resends the Incorrect being requested Request intercepted by unauthorised party authorisation 2a 4 2a 5 The Smart Metering System resends the Back to Basic Flow step 2 Data intercepted by unauthorised recipient Data sent to wrong recipient Incorrect sent Data corrupted in transit See step 2 authorisation confidential DNO s and Smart Metering System need to have secure and robust management of Determine Latent Demand due to Embedded Generation Control Point No Basic Flow 1 At the defined interval the Smart Metering System sends the to the Distribution 2 The Distribution receives the and loads it into their Security Control Points Activity Issues / Risks Recommendations Incorrect configuration for time period Data sent to the incorrect recipient Data intercepted by unauthorised recipient Incorrect sent Data corrupted in transit is received Data no longer available / deleted / overwritten Data loaded into incorrect authorisation validation rules confidential DNO s and Smart Metering System need to have secure and robust management of access rules be confidential Engage Consulting Limited Page 25 of 80
26 systems Alternative Flows At Basic Flow step 2 2a 1 The Distribution does not receive the from the Smart Metering System 2a 2 The Distribution checks and takes steps to ensure the Smart Metering System is configured correctly and had to send 2a 3 The Distribution requests the Smart Metering System resends the 2a 4 The Smart Metering System resends the system Data corrupted in transit Information sent to wrong recipient Non compliant received Data no longer available / deleted / overwritten Customer has not given consent for to be taken Incorrectly configured Unable to communicate with metering system Configured by unauthorised party Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters Incorrect collected Data corrupted in transit Data sent to wrong recipient Data intercepted by unauthorised party DNO s and Smart Metering System need to have secure and robust management of authorisation DNO s and Smart Metering System need to have secure and robust management of be confidential consenting Suppliers as they have authorisation Access to configure Smart Metering System via robust authentication and authorisation rules authorisation access rules authorisation confidential Engage Consulting Limited Page 26 of 80
27 2a 5 Back to Basic Flow step 2 See step Identify Voltage Quality Issues Control Point No Basic Flow 1 The Smart Metering System accumulates time and date stamped voltage quality events 2 The Smart Metering System stores the recorded events for a period of three months (after which time the meter continues to record events but overwrites the most historic events) 3 The Distribution receives the information from the Smart Metering System at the Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Incorrect received Data isn t stored securely in the meter Unauthorised access to customer Customer has not given consent for to be taken Data isn t stored securely in the meter Wrong overwritten is retrieved Data no longer available / deleted / overwritten Data corrupted in transit Data sent from authentication and authorisation process consenting Suppliers as they have access and use rules be confidential DNO s and Smart Metering System need to have secure and robust management of authentication and authorisation process consenting Suppliers as they have access and use rules confidential DNO s and Smart Metering System need to have secure and robust management of access rules be confidential Engage Consulting Limited Page 27 of 80
28 intervals required unauthorised party validation rules 4 The information is Internal Process analysed to determine if further follow up investigation is required. 3.4 Actively Manage Network / System Balancing Collect Data for Active Management and System Balancing Control Point No Basic Flow 1 The Smart Metering System measures real and reactive power flow and voltage 2 The Smart Metering System sends the to the Distribution 3 The Distribution receives the and loads it into its system along with from sensors within networks and other information to identify whether actions are needed or actions that have been carried out have been successful. Alternative Flows Security Control Points Activity Issues / Risks Recommendations Incorrectly configured Unauthorised access to customer Customer has not given consent to to be taken Data sent to the incorrect recipient Data intercepted by unauthorised party Incorrect sent is received Data no longer available / deleted / overwritten Data corrupted in transit Data loaded into incorrect system Received isn t stored securely Data sent by unauthorised party Clear and robust configuration rules required DNO s and Smart Metering System need to have secure and robust management of consenting Suppliers as they have authorisation confidential access rules validation rules be confidential DNO s and Smart Metering System need to have secure and robust management of Engage Consulting Limited Page 28 of 80
29 At Basic Flow step 2: 2a 1 The Smart Metering System fails to send the message 2a 2 The Distribution s systems identify the missing, the Distribution Network Operator, investigates the cause of the failure and may reconfigure the meter Incorrect request being made Information sent to wrong recipient Incorrectly configured Wrong meter re configured authorisation DNO s and Smart Metering System need to have secure and robust management of DNO s and Smart Metering System need to have secure and robust management of 2a 3 The use case returns to Basic Flow step 1. See step Active Management of Network Voltage Scenario 1 Operation of (Distribution Use of System) Time of Use Tariff Control Point No Basic Flow 1 The Smart Metering System accumulates readings for registers according to the Time of Use tariff Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent to to be taken Incorrectly configured Storage limits exceeded Incorrect collected consenting Suppliers as they have Clear and robust configuration rules required DNO s and Smart Metering System need to have secure and robust management of Appropriate measured storage requirements at the DNO s and Smart Metering System Engage Consulting Limited Page 29 of 80
30 2 The Smart Metering System periodically (according to the schedule) provides readings for the registers associated with the Time of Use tariff to the Distribution Network Operator 3 The Distribution receives the readings and loads them into their system Incorrect collected Incorrectly configured Incorrect configuration for time period is retrieved Data no longer available / deleted / overwritten Data sent from unauthorised party Received isn t stored securely Data loaded into incorrect system Data corrupted in transit authorisation access rules validation rules confidential DNO s and Smart Metering System need to have secure and robust management of Scenario 2 Operation of (Distribution Use of System) Real Time Pricing Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Distribution periodically sends prices to the Smart Metering System Incorrect collected Incorrectly configured schedule Data sent to wrong meter/group of meters Data sent by unauthorised party authorisation 2 The Smart Metering System validates the prices and forwards them to the In Home Display (or other display device) 3 The Consumer uses the information on their In Home Display to influence their Incorrect configuration of validation rules IHD rejects / doesn t receive the Data sent to wrong IHD Defined and robust rules must be specified in the early design of systems authorisation Engage Consulting Limited Page 30 of 80
31 consumption behaviour either directly or via an Energy Management System 4 The Smart Metering System periodically sends consumption readings to the Distribution Network Operator 5 The Distribution receives the consumption readings and loads them into their system Unauthorised access to customer Customer has not given consent to to be taken Incorrect sent Data sent to the wrong recipient Data intercepted by unauthorised party is retrieved Data no longer available / deleted / overwritten Data sent by unauthorised party Data corrupted in transit consenting Suppliers as they have authorisation access rules validation be confidential Scenario 3 Power Sharing by Maximum Power Thresholds Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Smart Metering System recognises that power consumption has reached the threshold configured in the meter Incorrect configuration at the meter Meter configured by unauthorised party Defined and robust rules must be specified in the early design of systems Access to configure the meter must be via robust authentication and authorisation processes 2 The Smart Metering System sends a message to the In Home Display advising of excessive power use and warning the supply will be interrupted unless consumption is reduced 3 The In Home display receives and displays Incorrect configuration of validation rules IHD rejects / doesn t receive the Message intercepted / blocked by unauthorised party Data sent to wrong IHD Data intercepted by others Defined and robust rules must be specified in the early design of systems authorisation Engage Consulting Limited Page 31 of 80
32 the message 4 The Consumer notes the message and turns off some appliances 5 The Smart Metering System recognises that power consumption has dropped below the threshold configured in the meter 6 The Smart Metering System sends a command to the In Home Display to replace the previous message with one stating consumption has reduced below threshold 7 The Consumer notes the message and acknowledges it at the In Home Display Alternative Flows At Basic Flow step 4: The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Unauthorised access to customer Customer has not given consent to to be taken Data obtained for the wrong customer Data intercepted by others Data sent to wrong IHD Data intercepted by others The consumer ignores the message Message sent to the wrong consumer Message intercepted by others authorisation consenting Suppliers as they have authorisation authorisation authorisation 4a 1 The Consumer does not turn off some appliances Internal / Customer Process 4a 2 After a predetermined time the Smart Metering System cuts supply and logs the event Message intercepted by others authorisation 4a 3 The Smart Metering System sends a message to the In Home Display stating supply has been interrupted due to Data sent to wrong IHD Data intercepted by others authorisation Engage Consulting Limited Page 32 of 80
33 excessive power use 4a 4 4a 5 The Consumer notes the message and acknowledges it at the In Home Display The Consumer turns off some appliances The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Internal / Customer Process authorisation 4a 6 The Consumer restarts supply with an action at the meter (such as pressing a button) Internal / Customer Process 4a 7 The Smart Metering System restarts supply and logs the event Internal process Scenario 4 Direct Control by DNO s of Appliances or Micro generation Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Distribution sends a message to the Smart Metering System of an event requiring greater or less demand or greater or less generation for a known duration Incorrect collected Incorrectly configured Message sent to wrong recipient Message intercepted by others Message sent by unauthorised party authorisation 2 The Smart Metering System validates the message 3 The Smart Metering System acknowledges to the Distribution that the event has been received Incorrect configuration of validation rules Smart Metering System rejects / doesn t receive the Data sent to wrong meter Data intercepted by others Defined and robust rules must be specified in the early design of systems authorisation 4 The Smart Metering Data sent to wrong system Engage Consulting Limited Page 33 of 80
34 System forwards the message to the Energy Management System which co ordinates the change to demand event 5 The Energy Management System recognises the end of the change to demand event and allows consumption or generation to return to unfettered use. Data intercepted by others Incorrect configuration authorisation Defined and robust rules must be specified in the early design of systems Perform Active Management of Network Power Flow Scenario 1 Operation of Time of Use Tariff Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Smart Metering System accumulates readings for registers according to the Time of Use tariff 2 The Smart Metering System periodically (according to the schedule) provides readings for the registers associated with the Time of Use tariff to the Network Operator Unauthorised access to customer Customer has not given consent for to be taken Incorrectly configured Storage limits exceeded Incorrect collected Incorrect collected Incorrectly configured Incorrect configuration for time period consenting Suppliers as they have Clear and robust configuration rules required DNO s and Smart Metering System need to have secure and robust management of Appropriate measured storage requirements at the DNO s and Smart Metering System authorisation 3 The receives the readings is retrieved access rules Engage Consulting Limited Page 34 of 80
35 and loads them into their system Data no longer available / deleted / overwritten Data sent from unauthorised party Received isn t stored securely Data loaded into incorrect system Data corrupted in transit be confidential DNO s and Smart Metering System need to have secure and robust management of Scenario 2 Operation of Real Time Pricing Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The periodically sends prices to the Smart Metering System 2 The Smart Metering System validates the prices and forwards them to the In Home Display (or other display device) Incorrect collected Incorrectly configured schedule Data sent to wrong meter/group of meters Data sent by unauthorised party Incorrect configuration of validation rules IHD rejects / doesn t receive the authorisation Defined and robust rules must be specified in the early design of systems 3 The Consumer uses the information on their In Home Display to influence their consumption behaviour either directly or via an Energy Management System 4 The Smart Metering System periodically sends consumption readings to the Data sent to wrong IHD Unauthorised access to customer Customer has not given consent to to be taken Incorrect sent Data sent to the wrong recipient Data intercepted by unauthorised party authorisation consenting Suppliers as they have authorisation Engage Consulting Limited Page 35 of 80
36 5 The receives the consumption readings and loads them into their system is retrieved Data no longer available / deleted / overwritten Data sent by unauthorised party Data corrupted in transit access rules validation be confidential Scenario 3 Power Sharing by Maximum Power Thresholds Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Smart Metering System recognises that power consumption has reached the threshold configured in the meter Incorrect configuration at the meter Meter configured by unauthorised party Defined and robust rules must be specified in the early design of systems Access to configure the meter must be via robust authentication and authorisation processes 2 The Smart Metering System sends a message to the In Home Display advising of excessive power use and warning the supply will be interrupted unless consumption is reduced 3 The In Home display receives and displays the message 4 The Consumer notes the message and turns off some appliances 5 The Smart Metering System recognises that power consumption has dropped below the threshold configured in the meter Incorrect configuration of validation rules IHD rejects / doesn t receive the Message intercepted / blocked by unauthorised party Data sent to wrong IHD Data intercepted by others The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Unauthorised access to customer Customer has not given consent for to be taken Data obtained for the wrong customer Defined and robust rules must be specified in the early design of systems authorisation authorisation consenting Suppliers as they have authorisation Engage Consulting Limited Page 36 of 80
37 6 The Smart Metering System sends a command to the In Home Display to replace the previous message with one stating consumption has reduced below threshold 7 The Consumer notes the message and acknowledges it at the In Home Display Alternative Flows At Basic Flow step 4: Data intercepted by others Data sent to wrong IHD Data intercepted by others The consumer ignores the message Message sent to the wrong consumer Message intercepted by others authorisation authorisation 4a 1 The Consumer does not turn off some appliances Internal / Customer Process 4a 2 After a predetermined time the Smart Metering System cuts supply and logs the event Message intercepted by others authorisation 4a 3 The Smart Metering System sends a message to the In Home Display stating supply has been interrupted due to excessive power use Data sent to wrong IHD Data intercepted by others authorisation 4a 4 4a 5 The Consumer notes the message and acknowledges it at the In Home Display The Consumer turns off some appliances The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Internal / Customer Process authorisation 4a 6 The Consumer restarts supply with an action at the meter (such as Internal / Customer Process Engage Consulting Limited Page 37 of 80
38 pressing a button) 4a 7 The Smart Metering System restarts supply and logs the event Internal process Scenario 4 Direct Control of Appliances or Micro generation Security Control Points Control Point No Activity Issues / Risks Recommendations Basic Flow 1 The sends a message to the Smart Metering System of an event requiring greater or less demand or greater or less generation for a known duration Incorrect collected Incorrectly configured Message sent to wrong recipient Message intercepted by others Message sent by unauthorised party authorisation 2 The Smart Metering System validates the message 3 The Smart Metering System acknowledges to the Network Operator that the event has been received 4 The Smart Metering System forwards the message to the Energy Management System which co ordinates the change to demand event 5 The Energy Management System recognises the end of the change to demand event and allows consumption or generation to return to unfettered use. Incorrect configuration of validation rules Smart Metering System rejects / doesn t receive the Data sent to wrong meter Data intercepted by others Data sent to wrong system Data intercepted by others Incorrect configuration Defined and robust rules must be specified in the early design of systems authorisation authorisation Defined and robust rules must be specified in the early design of systems Engage Consulting Limited Page 38 of 80
39 Perform System Balancing Scenario 1 Operation of Time of Use Tariff Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Smart Metering System accumulates readings for registers according to the Time of Use tariff 2 The Smart Metering System periodically (according to the schedule) provides readings for the registers associated with the Time of Use tariff to the Network Operator Unauthorised access to customer Customer has not given consent to to be taken Incorrectly configured Storage limits exceeded Incorrect collected Incorrect collected Incorrectly configured schedule Incorrect configuration for time period consenting Suppliers as they have Clear and robust configuration rules required DNO s and Smart Metering System need to have secure and robust management of Appropriate measured storage requirements at the DNO s and Smart Metering System authorisation 3 The Network Operator receives the readings and loads them into their system is retrieved Data no longer available / deleted / overwritten Data sent from unauthorised party Received isn t stored securely Data loaded into incorrect system Data corrupted in transit access rules validation rules be confidential DNO s and Smart Metering System need to have secure and robust management of Engage Consulting Limited Page 39 of 80
40 Scenario 2 Operation of Real Time Pricing Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The periodically sends prices to the Smart Metering System 2 The Smart Metering System validates the prices and forwards them to the In Home Display (or other display device) Incorrect collected Incorrectly configured schedule Data sent to wrong meter/group of meters Data sent by unauthorised party Incorrect configuration of validation rules IHD rejects / doesn t receive the authorisation Defined and robust rules must be specified in the early design of systems 3 The Consumer uses the information on their In Home Display to influence their consumption behaviour either directly or via an Energy Management System 4 The Smart Metering System periodically sends consumption readings to the 5 The receives the consumption readings and loads them into their system Data sent to wrong IHD Unauthorised access to customer Customer has not given consent to to be taken Incorrect sent Data sent to the wrong recipient is retrieved Data no longer available / deleted / overwritten Data sent by unauthorised party Data corrupted in transit authorisation consenting Suppliers as they have authorisation access rules validation be confidential Engage Consulting Limited Page 40 of 80
41 Scenario 3 Power Sharing by Maximum Power Thresholds Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Smart Metering System recognises that power consumption has reached the threshold configured in the meter Incorrect configuration at the meter Meter configured by unauthorised party Defined and robust rules must be specified in the early design of systems Access to configure the meter must be via robust authentication and authorisation processes 2 The Smart Metering System sends a message to the In Home Display advising of excessive power use and warning the supply will be interrupted unless consumption is reduced 3 The In Home display receives and displays the message 4 The Consumer notes the message and turns off some appliances 5 The Smart Metering System recognises that power consumption has dropped below the threshold configured in the meter 6 The Smart Metering System sends a command to the In Home Display to replace the previous message with one stating consumption Incorrect configuration of validation rules IHD rejects / doesn t receive the Message intercepted / blocked by unauthorised party Data sent to wrong IHD Data intercepted by others The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Unauthorised access to customer Customer has not given consent to to be taken Data obtained for the wrong customer Data intercepted by others Data sent to wrong IHD Data intercepted by others Defined and robust rules must be specified in the early design of systems authorisation authorisation consenting Suppliers as they have authorisation authorisation Engage Consulting Limited Page 41 of 80
42 has reduced below threshold 7 The Consumer notes the message and acknowledges it at the In Home Display Alternative Flows At Basic Flow step 4: 4a 1 The Consumer does not turn off some appliances The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Internal / Customer Process authorisation 4a 2 After a predetermined time the Smart Metering System cuts supply and logs the event Message intercepted by others authorisation 4a 3 The Smart Metering System sends a message to the In Home Display stating supply has been interrupted due to excessive power use Data sent to wrong IHD Data intercepted by others authorisation 4a 4 4a 5 The Consumer notes the message and acknowledges it at the In Home Display The Consumer turns off some appliances The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Internal / Customer Process authorisation 4a 6 The Consumer restarts supply with an action at the meter (such as pressing a button) Internal / Customer Process 4a 7 The Smart Metering System restarts supply and logs the event Internal process Engage Consulting Limited Page 42 of 80
43 Scenario 4 Direct Control of Appliance or Micro generation Security Control Points Control Point No Activity Issues / Risks Recommendations Basic Flow 1 The sends a message to the Smart Metering System of an event requiring greater or less demand or greater or less generation for a known duration Incorrect collected Incorrectly configured Message sent to wrong recipient Message intercepted by others Message sent by unauthorised party authorisation 2 The Smart Metering System validates the message 3 The Smart Metering System acknowledges to the Network Operator that the event has been received 4 The Smart Metering System forwards the message to the Energy Management System which co ordinates the change to demand event 5 The Energy Management System recognises the end of the change to demand event and allows consumption or generation to return to unfettered use. Incorrect configuration of validation rules Smart Metering System rejects / doesn t receive the Data sent to wrong meter Data intercepted by others Data sent to wrong system Data intercepted by others Incorrect configuration Defined and robust rules must be specified in the early design of systems authorisation authorisation Defined and robust rules must be specified in the early design of systems Engage Consulting Limited Page 43 of 80
44 Check Effectiveness of Active Network Management / System Balancing Measures Control Point No Basic Flow 1 The Smart Metering System measures power flow and voltage 2 The Smart Metering System sends the to the Network Operator Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Incorrect configuration for time period Data sent to the wrong recipient Data intercepted by unauthorised recipient authentication and authorisation process consenting Suppliers as they have access and use rules be confidential DNO s and Smart Metering System need to have secure and robust management of authorisation 3 The receives the and loads it into its system to analyse the effectiveness of load management mechanisms. Alternative Flows At Basic Flow step 2: 2a 1 The Smart Metering System fails to send the message 2a 2 The Network Operator s systems identify the missing, the Network Operator, investigates the cause of the is retrieved Data no longer available / deleted / overwritten Data corrupted in transit Data sent by unauthorised party No stored Incorrect configuration Wrong meter re configured access rules validation rules be confidential Secure storage arrangements required configuration rules DNO s and Smart Metering System need to have secure and robust management of Engage Consulting Limited Page 44 of 80
45 failure and may reconfigure the meter 2a 3 The flow returns to step 1. See Step Actively Manage Network Planned & Unplanned Outages Notify Customer of Planned Outage Scenario 1 Consumer notification of planned / emergency outage Control Point No Basic Flow 1 The Distribution sends an instruction to the Smart Metering System to display notification of planned / emergency outage message for the Consumer Security Control Points Activity Issues / Risks Recommendations Data sent to the wrong recipient Data intercepted by unauthorised recipient Data sent by unauthorised party authorisation 2 The Smart Metering System validates the request 3 The Smart Metering System forwards the message to an In Home Display (or alternative display device) 4 The message is displayed until the Consumer acknowledges it, or it expires 5 The Smart Metering System sends a delivery receipt and message displayed Incorrect configuration of validation rules Smart Metering System rejects / doesn t receive the Data sent to wrong IHD Data intercepted by others The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Data sent to wrong recipient Data intercepted by others Defined and robust rules must be specified in the early design of systems authorisation authorisation authorisation Engage Consulting Limited Page 45 of 80
46 message to the Distribution Network Operator Alternative Flows At Basic Flow step 2 2a 1 2a 2 The Smart Metering System deems the request invalid The Smart Metering System sends notification to the Distribution Network Operator detailing error type along with date/time stamp Incorrect sent / received Incorrect validation rules Notification not sent access rules confidential with system handshakes 2a 3 The Distribution takes the required steps to resolve the error 2a 4 Once the error is resolved back to Basic Flow step 1 Alternative Flows At Basic Flow step 5 5a 1 The Distribution does not receive the delivery receipt message from the Smart Metering System 5a 2 The Distribution is aware that a failure has occurred 5a 3 The Distribution arranges for a card notifying of the planned outage to be Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear See Step 1 being sent Unable to process No received for purposes Data corrupted in transit Internal process Internal process access rules Engage Consulting Limited Page 46 of 80
47 delivered to the Consumer s address Scenario 2 Consumer Notified that Outage is Over Control Point No Basic Flow 1 The Distribution sends an instruction to the Smart Metering System to display notification that the planned / emergency outage is over message for the Consumer. This could include a reminder to reset clocks / check trips, etc. Security Control Points Activity Issues / Risks Recommendations Data sent to the wrong recipient Data intercepted by unauthorised recipient Data sent by unauthorised party authorisation 2 The Smart Metering System validates the request 3 The Smart Metering System forwards the message to an In Home Display (or alternative display device) 4 The message is displayed until the Consumer acknowledges it, or it expires 5 The Smart Metering System sends a delivery receipt and message displayed message to the Distribution Network Incorrect configuration of validation rules Smart Metering System rejects / doesn t receive the Data sent to wrong IHD Data intercepted by others The consumer ignores the message Message sent to the wrong consumer Message intercepted by others Data sent to wrong recipient Data intercepted by others Defined and robust rules must be specified in the early design of systems authorisation authorisation authorisation Engage Consulting Limited Page 47 of 80
48 Operator Alternative Flows At Basic Flow step 2 2a 1 2a 2 The Smart Metering System deems the request invalid The Smart Metering System sends notification to the Distribution Network Operator detailing error type along with date/time stamp Incorrect sent / received Incorrect validation rules Notification not sent access rules be confidential with system handshakes 2a 3 The Distribution takes the required steps to resolve the error 2a 4 Once the error is resolved back to Basic Flow step 1 Alternative Flows At Basic Flow step 5 5a 1 The Distribution does not receive the delivery receipt message from the Smart Metering System 5a 2 The Distribution is aware that a failure has occurred 5a 3 The Distribution arranges for an alternative contact method to be used to notify the Consumer that the planned / Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear See Step 1 being sent Unable to process No received for purposes Data corrupted in transit Internal process Internal process access rules Engage Consulting Limited Page 48 of 80
49 emergency outage is over Query Meter Energisation Status to Determine Outage Source and Location Scenario 1 False Outage Report Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 Consumer telephones Internal process Distribution Network Operator informing them that they are experiencing a power outage 2 The Distribution Network Operator identifies the relevant meter(s) and sends an energisation status request message to the Smart Metering System 3 The Smart Metering System receives and validates the message 4 The Smart Metering System checks the power supply from the network and finds it is supplied 5 The Smart Metering System sends a date and time stamped network power available message to the Distribution Network Operator 6 The Distribution Network Operator requests the status Incorrect / non compliant being sent Unable to process No received for purposes Incorrect configuration of validation rules Smart Metering System rejects / doesn t receive the Internal process Incorrect / non compliant being sent Data corrupted in transit Data intercepted by unauthorised party Data sent to incorrect recipient Incorrect / non compliant access rules Defined and robust rules must be specified in the early design of systems validation process access rules Engage Consulting Limited Page 49 of 80
50 of the contact / or switch that may be used under a Supplier s contract to control supply 7 The Smart Metering System reports the status of the switch 8 The Distribution Network Operator receives the message and explains to the customer the nature of the supply problem the network operator may offer advice that the customer would need to contact the Supplier or an electrical contractor. Alternative Flows At Basic Flow step 3 being sent Incorrectly reported information Internal process access rules authorisation 3a 1 3a 2 The Smart Metering System rejects the message as invalid The Smart Metering System sends notification to the Distribution Network Operator detailing error type along with date/time stamp Incorrect sent / received Incorrect validation rules Notification not sent access rules be confidential with system handshakes Alternative Flows At Basic Flow step 5 5a 1 The Distribution Network Operator does not receive the message 5a 2 The Distribution Network Operator takes the lack of response to indicate a network outage or a Incorrect / non compliant being sent Unable to process No received for purpose Internal process access rules Engage Consulting Limited Page 50 of 80
51 communications outage and initiates their restoration process or investigates the integrity of the communications system. Scenario 2 Confirmed Network Outage Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Distribution Network Internal process Operator knows / identifies which meter(s) are to be queried 2 The Distribution Network Operator sends an energisation status query message to the Smart Metering System 3 The Smart Metering System is not receiving power from the network so the communications system is not in operation 4 The Distribution Network Operator receives no confirmation that the message has been received by the Smart Metering System 5 After a defined period of time (based on the normal time a response is received in scenario 1 above) the Distribution deduces that the Smart Metering System is either experiencing a network outage or a communications failure being sent Data sent to the wrong Metering System Data intercepted by others Internal process being sent Unable to process No received for purposes Internal process authorisation and encryption rules access rules Engage Consulting Limited Page 51 of 80
52 6 The Distribution queries the energisation status of further Smart Metering Systems to determine the extent of the network outages/communicatio ns failures 7 The Distribution instigates their network fault management procedures being sent Data sent to the wrong Metering System Data intercepted by others Internal process authorisation and encryption rules Send Alarm to DNO during Network Outage Control Point No Basic Flow 1 The Smart Metering System detects a loss of power from the network and sends a date and time stamped outage alarm to the Distribution Network Operator Security Control Points Activity Issues / Risks Recommendations Data sent to the wrong recipient Data intercepted by unauthorised recipient Incorrect detection authorisation and encryption rules 2 The Distribution receives the message 3 The flow is repeated by other meters in the outage affected area Alternative Flows At Basic Flow step 1 1a 1 A Smart Metering System is unable to DNO rejects / doesn t receive the Data corrupted in transit Data sent to the wrong recipient Data intercepted by unauthorised recipient Data sent to the wrong recipient Defined and robust rules must be specified in the early design of systems validation rules authorisation and encryption rules Engage Consulting Limited Page 52 of 80
53 1a 2 send the outage alarm message, e.g. due to insufficient battery power remaining however it is assumed that at least one Smart Metering System in the affected area will succeed in sending the outage message, or a Consumer will ring the Distribution Network Operator to notify of the outage The flow is continued by other meters in the outage affected area Alternative Flows At alternative flow step 1a1 1a 1a Distribution Network Operator receives neither an outage alarm nor a telephone call from a Consumer informing them of an outage Data intercepted by unauthorised recipient Incorrect detection Data sent to the wrong recipient Data intercepted by unauthorised recipient Internal process authorisation and encryption rules authorisation and encryption rules 1a 1b Through monitoring their network Distribution detects conditions suggesting an outage has occurred Internal process 1a 1c Go to Use Case Verify Restoration of Supplies after Outage Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Smart Metering Internal process System detects restoration of power Engage Consulting Limited Page 53 of 80
54 supplied from the network 2 The Smart Metering System sends a date and time stamped power restored message to the Distribution Network Operator 3 The Distribution Network Operator receives the message Alternative Flows At Basic Flow step 1 1a 1 Although power has been restored to the premises due to an internal fault the Smart Metering System fails to detect this Data sent to the wrong recipient Data intercepted by unauthorised recipient DNO rejects / doesn t receive the Data corrupted in transit Internal process authorisation and encryption rules Defined and robust rules must be specified in the early design of systems 1a 2 The Distribution Network Operator will receive power restored messages from Smart Metering Systems connected to the part of the network affected by the fault Data sent to the wrong recipient Data intercepted by unauthorised recipient authorisation and encryption rules 1a 3 The Distribution Network Operator will send an operative to the site to determine whether power has been restored or whether the meter is faulty. The Operative will deal with any network fault if the smart metering system is not faulty. On visit Engineer finds that meter is ok 1a 4 On identifying that the Smart Metering System is faulty the Distribution will initiate their faulty meter Internal Process Engage Consulting Limited Page 54 of 80
55 detected procedure Alternative Flows At Basic Flow step 3 3a 1 3a 2 The Distribution Network Operator does not receive the message The Distribution Network Operator is aware a failure has occurred being sent Unable to process No received for purposes Ensure that any customer is confidential access rules Data needs to be secure and be confidential 3a 3 Go to alternative flow step 1a3 above See step 1a Regulatory Reporting of Outages Control Point No Basic Flow 1 The Distribution Network Operator sends a message to the Smart Metering System requesting stored outage information 2 The Smart Metering System receives the message and validates it Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Incorrect received Data loaded into incorrect system Data isn t stored securely being requested Data no longer available / deleted / overwritten Unauthorised access to customer Validation / authentication failure Customer has not given authentication and authorisation process consenting Suppliers as they have access and use rules Data needs to be secure and be confidential DNO s and Smart Metering System need to have secure and robust management of access rules authentication and authorisation process consenting Suppliers as they have Engage Consulting Limited Page 55 of 80
56 3 The Smart Metering System extracts the required information from internal storage, packages it, and sends it to the Distribution 4 The Distribution Network Operator receives the information and loads it into its systems 5 The Distribution Network Operator analyses the information and compares it to its own outage records to build a complete picture of outage incidents and periods of supply interruption Alternative Flows At Basic Flow step 2 2a 1 The Smart Metering System rejects the message as invalid 2a 2 The Smart Metering System sends notification to the Distribution Network Operator detailing error type along with date/time stamp consent for to be taken Incorrect configuration for time period Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters is retrieved Data no longer available / deleted / overwritten Data corrupted in transit Internal Process Incorrect sent / received Incorrect validation rules Notification not sent authorisation and encryption rules access rules validation process Data needs to be secure and be confidential access rules Data needs to be secure and be confidential with system handshakes 2a 3 The Distribution Network Operator receives the message and takes the required steps to resolve the error Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear Engage Consulting Limited Page 56 of 80
57 2a 4 Once error is resolved go back to Basic Flow step 1 See step 1 Alternative Flows At Basic Flow step 3 3a 1 The Smart Metering System does not have any of the requested information stored 3a 2 The Smart Metering System sends a message to the Distribution stating no records found (or similar) is retrieved Data no longer available / deleted / overwritten is retrieved access rules Data needs to be secure and confidential access rules Data needs to be secure and be confidential 3a3 Distribution Network Operator receives the message and loads it into its systems 3a 4 End of flow Alternative Flows At Basic Flow step 4 Data from unauthorised party Data corrupted in transit authentication and authorisation processes validation rules 4a 1 The Distribution Network Operator does not receive the information from the Smart Metering System being sent Unable to process No received for purposes access rules 4a 2 The Distribution Network Operator performs a communication test with the Smart Metering System Internal Process 4a 3 The communication test fails indicating a problem with the Smart Metering System Internal Process 4a 4 The Distribution Network Operator informs the Smart Metering System owner of the fault with the Smart Metering Unauthorised access to customer Customer has not given consent to to be taken authentication and authorisation process consenting Engage Consulting Limited Page 57 of 80
58 4a 5 System End of flow Incorrect received Data loaded into incorrect system Received isn t stored securely Suppliers as they have access and use rules Data needs to be secure and be confidential DNO s and Smart Metering System need to have secure and robust management of Restore and Maintain Supply during Outages Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 Power is restored to the Smart Metering System Internal Process 2 The Smart Metering System sends a date and time stamped power restored message to the Distribution Network Operator 3 The Distribution Network Operator receives the message and sends a message to the Smart Metering System activating the maximum power consumption threshold 4 The Smart Metering System receives the message and validates it 5 The Smart Metering System activates the Incorrect configuration for time period Message sent to the wrong recipient Message intercepted by unauthorised recipient Unauthorised access to customer Customer has not given consent to to be taken Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters Incorrect validation process Request sent to the wrong recipient Request intercepted by unauthorised recipient Message sent to the wrong recipient authorisation and encryption rules consenting Suppliers as they have authorisation and encryption rules authorisation and encryption rules Engage Consulting Limited Page 58 of 80
59 maximum power consumption threshold and sends a confirmation response to the Distribution Network Operator Message intercepted by unauthorised recipient authorisation and encryption rules Alternative Flow At Basic Flow step 3 3a 1 3a 2 The Distribution Network Operator does not receive the power restored message The Distribution Network Operator checks that the Smart Metering System is configured and working correctly, and that communications are working No sent Unable to process is received Internal Process access rules Data needs to be secure and be confidential 3a 3 The Distribution Network Operator is aware that power has been restored so sends a message to the Smart Metering System activating the maximum power consumption threshold Unauthorised access to customer Customer has not given consent to to be taken Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters 3a 4 Back to Basic Flow step 4 See step 4 consenting Suppliers as they have authorisation and encryption rules Alternative Flow At Basic Flow step 4: 4a 1 The Smart Metering System deems the request invalid 4a 2 The Smart Metering System sends notification to the Distribution Network Incorrect sent / received Incorrect validation rules Notification not sent access rules Data needs to be secure and be confidential with system handshakes Engage Consulting Limited Page 59 of 80
60 Operator detailing error type along with date/time stamp 4a 3 The Distribution Network Operator takes the required steps to resolve the error 4a 4 Back to Basic Flow step 3 See step 3 Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear Alternative Flow At Basic Flow step 5: 5a 1 5a 2 The Distribution Network Operator does not receive the confirmation response The Distribution Network Operator checks that the Smart Metering System is configured and working correctly, and that communications are working No sent Unable to process is received Internal Process access rules Data needs to be secure and confidential 5a 3 5a 4 The Distribution Network Operator sends a message to the Smart Metering System checking whether the maximum power consumption threshold has been activated End of flow Unauthorised access to customer Customer has not given consent to to be taken Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters consenting Suppliers as they have authorisation and encryption rules Engage Consulting Limited Page 60 of 80
61 3.6 Safety Manage Meter Safety Alarm Control Point No Basic Flow 1 Interference Responsible Entity changes conditions at the Smart Metering System to render it unsafe and requiring Distribution Network Operator intervention Security Control Points Activity Issues / Risks Recommendations Internal / Customer Process 2 The Smart Metering System detects the change in condition and sends a date and time stamped alarm to the Distribution Network Operator 3 The Distribution Network Operator receives the alarm and analyses the content 4 The Distribution Network Operator dispatches a crew to investigate the conditions at the meter 5 If the Distribution deems the conditions to be dangerous enough they will send a message to the Smart Metering System supply switch to remotely disconnect the meter until an on site investigation has been undertaken by skilled DNO staff 6 The Smart Metering System receives the Data not sent Message sent to the wrong recipient Message intercepted by unauthorised recipient Message sent to wrong DNO DNO rejects / doesn t receive the Internal Process Message sent to the wrong recipient Message intercepted by unauthorised recipient being sent authorisation and encryption rules Defined and robust rules must be specified in the early design of systems authentication and authorisation process access and use rules access rules Engage Consulting Limited Page 61 of 80
62 disconnect message and validates it 7 The Smart Metering System activates the supply switch and sends a date and time stamped confirmation message to the Distribution Network Operator 8 The Distribution Network Operator receives the message and updates their system in case an outage query is received Alternative Flows At Basic Flow step 2 2a 1 The Smart Metering System fails to detect the change in conditions 2a 2 The Distribution Network Operator is unaware of the change in conditions at the meter Data no longer available / deleted / overwritten Validation / authentication failure Incorrect received Data loaded into incorrect system Received isn t stored securely is retrieved No sent Unable to process is received No Data Action authentication and authorisation process authentication and authorisation process access and use rules Data needs to be secure and confidential DNO s and Smart Metering System need to have secure and robust management of access rules Data needs to be secure and confidential access rules Data needs to be secure and be confidential 2a 3 The change in conditions is detected during the next routine meter inspection Internal Process 2a 4 The Supplier informs the DNO of any DNO required intervention Unauthorised access to customer Customer has not given consent to to be taken Incorrect received Data loaded into incorrect system Received isn t stored authentication and authorisation process consenting Suppliers as they have access and use rules Engage Consulting Limited Page 62 of 80
63 2a 5 Flow ends securely Data needs to be secure and be confidential DNO s and Smart Metering System need to have secure and robust management of Alternative Flows At Basic Flow step 3 3a 1 3a 2 The Distribution Network Operator fails to receive the alarm from the Smart Metering System Go to alternative flow step 2 above No sent Unable to process is received See step 2 access rules Data needs to be secure and be confidential Alternative Flows At Basic Flow step 6 6a 1 The Smart Metering System rejects the message as invalid 6a 2 The Smart Metering System sends notification to the Distribution Network Operator detailing error type along with date/time stamp Incorrect sent / received Incorrect validation rules Notification not sent access rules Data needs to be secure and confidential with system handshakes 6a 3 The Distribution Network Operator receives the message and takes the required steps to resolve the error Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear 6a 4 Once error is resolved go back to Basic Flow step 5 See step 5 Alternative Flows At Basic Flow step 8 8a 1 The Distribution Network Operator does not No sent Unable to process access rules Engage Consulting Limited Page 63 of 80
64 receive confirmation of the supply switch activating to cut off supply is received Data needs to be secure and be confidential 8a 2 8a 3 The Distribution Network Operator informs the dispatched crew that the Smart Metering System may not have been disconnected so to test on arrival Flow ends Internal Process Manage Extreme Voltage at Meter Security Control Points Control Point Activity Issues / Risks Recommendations No Basic Flow 1 The Smart Metering Internal Process System detects a voltage level outside its configured tolerance levels 2 The Smart Metering System sends a date and time stamped extreme voltage level alarm detailing the voltage level detected to the Distribution Network Operator 3 (Optionally) the Smart Metering System autodisconnects itself from the network supply of electricity sending confirmation of disconnection to the Distribution Network Operator 4 The Distribution Network Operator receives the extreme voltage level Data not sent Message sent to the wrong recipient Message intercepted by unauthorised recipient Message sent to wrong DNO Data not sent Data sent to the wrong recipient Data intercepted by unauthorised recipient Data sent to wrong DNO DNO rejects / doesn t receive the authorisation and encryption rules authorisation and encryption rules Defined and robust rules must be specified in the early design of systems Engage Consulting Limited Page 64 of 80
65 alarm and uses the information to determine the corrective action to be taken to resolve the extreme voltage level 5 The Distribution Network Operator receives the confirmation of disconnection due to extreme voltage detected and loads it into its systems to use for any outage queries Internal Process Alternative Flows At Basic Flow step 1 1a 1 The Smart Metering System fails to detect the extreme voltage level 1a 2 The extreme voltage level impairs equipment within/attached to the premises No sent Unable to process is received Internal Process access rules Data needs to be secure and confidential 1a 3 1a 4 1a 5 The Consumer contacts the Distribution Network Operator to complain The Distribution Network Operator investigates the cause of the extreme voltage and compensates the Consumer (where appropriate) End of flow Alternative Flow At Basic Flow step 2 Internal Process Internal Process 2a1 The Smart Metering System fails to send the extreme voltage alarm Unable to process is sent access rules Data needs to be secure and be confidential Engage Consulting Limited Page 65 of 80
66 2a2 The distribution Network Operator receives the confirmation of autodisconnection due to extreme voltage but no alarm DNO rejects / doesn t receive the Defined and robust rules must be specified in the early design of systems 2a3 The Distribution Network Operator dispatches a crew to investigate the conditions on site and determine the corrective action required Internal Process 2a4 End of flow Alternative Flow At Basic Flow step 3 3a 1 The Smart Metering System fails to autodisconnect 3a 2 The Smart Metering System sends a date and time stamped extreme voltage level alarm detailing the voltage level detected to the Distribution Network Operator No sent Unable to process is received Data not sent Data sent to the wrong recipient Data intercepted by unauthorised recipient Data sent to wrong DNO access rules Data needs to be secure and confidential authorisation and encryption rules 3a 3 3a 4 The Distribution Network Operator receives the extreme voltage alarm but no confirmation of auto disconnection The Distribution Network Operator uses the information from the voltage alarm to determine the corrective action required to resolve the extreme voltage level DNO rejects / doesn t receive the Internal Process Defined and robust rules must be specified in the early design of systems 3a 5 End of flow Engage Consulting Limited Page 66 of 80
67 Alternative Flow At Basic Flow step 2 & 3 2b 1 or 3b 1 2b 2 or 3b 2 The Smart Metering System fails to autodisconnect or send the extreme voltage alarm Go to step 2a1 of the first alternative flow Configuration error See step 2a Support Network Activities Configure Smart Metering System Control Point No Basic Flow 1 The Distribution Network Operator sends a message to configure the Smart Metering System to perform (or cease performing) a set functionality according to supplied parameters 2 The Smart Metering System receives the message and validates it 3 The Smart Metering System activates the requested functionality and sends a date and time stamped confirmation response to the Distribution Network Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent to to be taken Request sent to the wrong recipient Request intercepted by unauthorised recipient Request sent to wrong group of meters being requested Data no longer available / deleted / overwritten Unauthorised access to customer Validation / authentication failure Customer has not given consent to to be taken Data intercepted by unauthorised recipient Data sent to incorrect party consenting Suppliers as they have authorisation and encryption rules access rules authentication and authorisation process consenting Suppliers as they have authorisation and encryption rules Engage Consulting Limited Page 67 of 80
68 Operator 4 The Distribution Network Operator receives the confirmation response Alternative Flow At Basic Flow step 3 3a 1 The Smart Metering System rejects the message as invalid 3a 2 The Smart Metering System sends a date and time stamped notification to the Distribution Network Operator detailing the error type Incorrect received Data loaded into incorrect system Received isn t stored securely Data corrupted in transit Incorrect sent / received Incorrect validation rules Notification not sent access and use rules Data needs to be secure and confidential DNO s and Smart Metering System need to have secure and robust management of access rules Data needs to be secure and confidential with system handshakes 3a 3 The Distribution Network Operator receives the message and takes the required steps to resolve the error Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear 3a 4 Once error is resolved go back to Basic Flow step 1 See step 1 Alternative Flow At Basic Flow step 4 4a 1 4a 2 The Distribution Network Operator does not receive a confirmation response The Distribution Network Operator checks the current configuration of the Smart Metering No sent Unable to process is received Internal Process access rules Data needs to be secure and confidential Engage Consulting Limited Page 68 of 80
69 System and takes steps to ensure that it is working properly 4a 3 Back to Basic Flow step 1 See step 1 Engage Consulting Limited Page 69 of 80
70 Appendix B - Gas Use Case Security Control Points 1. Approach Based on the final list of Use Cases it is intended that the Basic Steps that are shown for each Use Case will be reviewed to identify for each step any Security & Privacy Issues / Risks and identify any appropriate recommendations to address them. 2. Security & Privacy Review The security control points below majors on the security issues, but also covers key privacy areas related to consumer that might be an issue and need to be dealt with Gather Information for Planning Control Point No Basic Flow 1 The Smart Metering System sends the recorded gas demand to the Gas Distribution Network Operator 2 The Gas Distribution receives the and loads it into their system Alternative Flows At Basic Flow step 2 Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Incorrect received Data loaded into incorrect system Received isn t stored securely is retrieved Data no longer available / deleted / overwritten Data corrupted in transit authentication and authorisation process consenting Suppliers as they have access and use rules confidential DNO s and Smart Metering System need to have secure and robust management of access rules be confidential validation rules 2a 1 The Gas Distribution does not receive the correct or it is Data sent to wrong recipient Data intercepted by unauthorised recipient authorisation Engage Consulting Limited Page 70 of 80
71 2a 2 corrupt. Back to Basic Flow step 1 Data configured incorrectly Data corrupted in transit See step 1 access and use rules validation rules Configure Gas Smart Metering System Control Point No Basic Flow 1 The Gas Distribution sends a message to configure the Smart Metering System to perform (or cease performing) a set functionality according to supplied parameters 2 The Smart Metering System receives the message and validates it 3 The Smart Metering System activates/updates the requested functionality and sends a date and time stamped confirmation response to the Gas Distribution Network Operator Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent for to be taken Incorrect sent Data loaded into incorrect metering system Received isn t stored securely Message sent from unauthorised party is retrieved is sent Data intercepted by others authentication and authorisation process consenting Suppliers as they have access and use rules be confidential DNO s and Smart Metering System need to have secure and robust management of access rules confidential access rules confidential Engage Consulting Limited Page 71 of 80
72 4 The Gas Distribution receives the confirmation response Alternative Flows At Basic Flow step 3 is received Data intercepted by others access rules confidential 3a 1 3a 2 The Smart Metering System rejects the message as invalid The Smart Metering System sends a date and time stamped notification to the Distribution Network Operator detailing the error type Incorrect sent / received Incorrect validation rules Data not sent Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear access rules confidential with system handshakes 3a 3 The Distribution receives the message and takes the required steps to resolve the error Data not received Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear with system handshakes 3a 4 Once error is resolved go back to Basic Flow step 1 See step 1 Alternative Flows At Basic Flow step 4 4a 1 The Distribution does not receive a confirmation response 4a 2 The Distribution checks the current configuration of the Smart Metering System and takes steps to ensure that it is working properly being sent Unable to process No received for DNO purposes Internal Process access rules 4a 3 Back to Basic Flow See step 1 Engage Consulting Limited Page 72 of 80
73 step Disable Supply of Gas by GDN Control Point No Basic Flow 1 The Gas Distribution Network sends a message to the Smart Metering System to operate the valve 2 The Smart Metering System receives the message and validates it 3 The Smart Metering System activates the gas valve and sends a confirmation response message to the Gas Distribution Network Operator Security Control Points Activity Issues / Risks Recommendations Message sent to wrong metering system Message sent from unauthorised party Message intercepted by unauthorised party is retrieved is sent Data intercepted by others authentication and authorisation process access and use rules access rules confidential access rules confidential 4 The Gas Distribution receives the confirmation response that the gas valve has operated 5 On completion of works, a Competent Person would open gas valve on site following necessary safety checks and soundness testing. Alternative Flows At Basic Flow step 2 is received Data intercepted by others Internal Process access rules confidential 2a 1 The Smart Metering System rejects the Incorrect sent / received access rules Engage Consulting Limited Page 73 of 80
74 2a 2 message as invalid Incorrect validation rules confidential The Smart Metering System sends notification to the Gas Distribution Network Operator detailing the error type along with a date/time stamp Notification not sent Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear with system handshakes 2a 3 The Gas Distribution resolves the issue and goes back to Basic Flow step 1 See step 1 Alternative Flows At Basic Flow step 4 4a 1 4a 2 The Gas Distribution does not receive the confirmation response The Gas Distribution ensures that the Smart Metering System is configured and working correctly being sent Unable to process No received for DNO purposes Internal Process access rules 4a 3 The Gas Distribution remotely checks the status of the gas valve Metering system incorrectly configured Incorrect being sent validation rules 4a 4 Go back to Basic Flow step 4 See step 4 Engage Consulting Limited Page 74 of 80
75 Display Messages from GDN Control Point No Basic Flow 1 The Gas Distribution sends a message to the Smart Metering System 2 The Smart Metering System receives the message, validates it and displays it 3 The Smart Metering System sends a message displayed confirmation to the Gas Distribution Security Control Points Activity Issues / Risks Recommendations Unauthorised access to customer Customer has not given consent to to be taken Incorrect sent Data loaded into incorrect metering system Received isn t stored securely Message sent by unauthorised party Message intercepted by unauthorised party is retrieved is sent Data intercepted by others authentication and authorisation process consenting Suppliers as they have access and use rules be confidential DNO s and Smart Metering System need to have secure and robust management of access rules be confidential access rules be confidential 4 The Gas Distribution can send updates to the message. Unauthorised access to customer Customer has not given consent to to be taken Incorrect sent Data loaded into incorrect metering system Received isn t stored securely authentication and authorisation process consenting Suppliers as they have access and use rules be confidential Engage Consulting Limited Page 75 of 80
76 5 The Gas Distribution sends a message to update the message, i.e. clear message or send situation resolved message. Alternative Flows At Basic Flow step 2 Unauthorised access to customer Customer has not given consent to to be taken Incorrect sent Data loaded into incorrect metering system Received isn t stored securely DNO s and Smart Metering System need to have secure and robust management of authentication and authorisation process consenting suppliers as they have access and use rules be confidential DNO s and Smart Metering System need to have secure and robust management of 2a 1 2a 2 The Smart Metering System rejects the message as invalid The Smart Metering System sends notification to the Gas Distribution Network Operator detailing the error type along with a date/time stamp Incorrect sent / received Incorrect validation rules Notification not sent Unsure how to correct Insufficient information sent to resolve the error i.e. error unclear access rules be confidential with system handshakes 2a 3 The Gas Distribution resolves the issue and goes back to Basic Flow step 1 See step 1 Engage Consulting Limited Page 76 of 80
77 Appendix C - U.S. NIST Smart Grid Cyber Security Strategy and Requirements Figure C.1 below illustrates the tasks that NIST are following as part of the development of a Smart Grid Cyber Security Strategy. Figure C.1 Tasks in the Smart Grid Cyber Security Strategy The tasks shown in Figure C.1 are as follows: Task 1 Selection of Use Cases with Cyber Security Considerations: NIST selected Use Cases from several existing sources e.g. IntelliGrid, Electric Power Research Institute (EPRI) and Southern California Edison (SCE) and used these Use Cases to provide a common framework for performing the risk assessment, developing the security architecture and selecting and tailoring the security requirements. Task 2 Performance of a risk assessment: This risk assessment involved identifying vulnerabilities, impacts and threats undertaken from a high-level overall functionality perspective. The output of this will be the basis for the selection of security requirements and the identification of security requirements gaps. The bottom-up analysis focused on well understood problems that need to be addressed such as authenticating and authorising users, key management for meters, and intrusion detection. This also considered interdependencies between smart grid domains / systems Engage Consulting Limited Page 77 of 80
78 when considering the impacts of a cyber or physical security incident. An incident in one infrastructure can cascade to failures in other domains / systems. The top-down analysis developed logical interface diagrams for the six functional priority areas that were the focus of the initial draft of this paper (NISTIR 7628) of Electric Transportation Electric Storage Wide area situational awareness Demand Response Advanced Metering Infrastructure Distribution Grid Management Task 3 Specification of high level security requirements: NIST made use of standards in existence that were directly relevant to a Smart Grid and information applicable to Control Systems to help develop their cyber security requirements. Privacy Impact Assessment: because the evolving Smart Grid presents potential privacy risks, a privacy impact assessment was performed. Several general privacy principles were used to assess the Smart Grid and findings and recommendations developed. The results will be used in the identification and tailoring of security requirements. Task 4a - Development of a security architecture: As specified in Task 2 above, the first phase in this task is to assess and revise the six functional priority areas. This functional architecture identifies logical communication interfaces between actors. This detail will be used in the next phase of work where the smart grid conceptual reference model and this functional architecture will be used in developing a single Smart Grid security architecture. The Smart Grid security architecture will overlay the security requirements on this architecture. The objective is to ensure that cyber security is addressed as a critical crosscutting requirement of the Smart Grid. Task 4b Assessment of Smart Grid Standards: Standards identified as relevant to the Smart Grid will be assessed to determine if the security requirements are addressed. In this process, security requirements gaps will be identified and recommendations will be made on how to address these gaps. Also, conflicting standards and standards with security requirements not consistent with the security requirements included in NISTIR 7628 will be identified with appropriate recommendations made. Task 5 Conformity Assessment: The final task is to develop a conformity assessment programme for security requirements. This programme will be coordinated with the activities defined by the testing and certification standing committee of the Smart Grid Interoperability Panel. This task is due to begin in the Spring of Engage Consulting Limited Page 78 of 80
79 Appendix D - A Dutch lesson in privacy and security In 2008 the Dutch government published a law proposal mandating the roll out of smart meters within the Netherlands. Consumer Group initiated analysis indicated that the mandated roll-out contravened Article 8 of the European Convention on Human Rights - right to respect for private and family life and that the requirement for all consumers to provide 15 minute readings was not in accordance with the Dutch Data Protection Law. Based on this the Dutch Senate in 2009 voted against the proposed law requiring it to be reworked so that the consumer s privacy formed its foundation. Article 8 ECHR: Right to Respect for Private and Family Life 2 1. Everyone has the right to respect for his private and family life, his home and his correspondence 2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic wellbeing of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others. Article 8 is a qualified right which means that an interference with the right can be justified in certain circumstances. The circumstances are given in point 2 above. While Smart Metering and the Smart Grid could be argued to be for the economic well-being of the country, whether mandating the roll out of smart meters for all domestic consumers is necessary in a democratic society is open to debate. It will be necessary to prove that the collection of smart metering that interferes with Article 8 is proportionate and no more than is necessary. The legal recommendation is that if there is an alternative, less intrusive, way of achieving the same aim then the alternative measure should be used. Ofgem E-Serve and DECC will need to be able to meet any such challenge from consumer groups, or other parties for GB. Privacy Violations The privacy violations the proposed Dutch smart metering law was believed to invoke were: Limitation of freedom of choice (consumers right to refuse the smart meter) Smart Meter processing allows insight into: Customer behaviours Occupancy levels Use and life-cycle of technical appliances Data storage: Vulnerable to commercial interest Vulnerable to criminal interest Vulnerable to police interest Restriction in primary necessity of life the supply of energy 2 Engage Consulting Limited Page 79 of 80
80 Security measures After the 2008 proposal was rejected significant work on smart metering privacy and security was undertaken. This has led to the adoption of various smart metering security measures, some of which are summarised in the following table: Figure 1 - Dutch smart metering security suggestions 3 A further suggestion is the application of end-to-end encryption between islands of trust. For example the smart meter could be an island that can securely send information to another island of trust, such as a concentrator, using encryption keys. The concentrator can then securely send information to the end recipient, another island of trust, using different encryption keys. The critical lesson learnt from the Dutch smart metering roll out is that the later privacy and security is considered, the more expensive it will be to incorporate into the design of the solution. 3 From netbeheer nederland presentation, Practical lessons on developing privacy and security requirements for smart metering in the Netherlands, April 12 th 2010 by Boas Bierings. Engage Consulting Limited Page 80 of 80
High-level Smart Meter Data Traffic Analysis
High-level Smart Meter Data Traffic Analysis For: ENA May 2010 Engage Consulting Limited Document Ref: ENA-CR008-001-1.4 Restriction: ENA Authorised Parties Engage Consulting Limited Page 1 of 62 Document
Smart Metering Implementation Programme: Data Privacy and Security
Smart Metering Implementation Programme: Data Privacy and Security Document type: Supporting Document Ref: 94e/10 Date of publication: 27 July 2010 Deadline for response: 28 October 2010 Target audience:
Our Services for Partners
Our Services for Partners ElectraLink as the central body providing the infrastructure for the British retail electricity industry can provide unique services to support Partner s projects with utility
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
ITIL A guide to event management
ITIL A guide to event management Event management process information Why have event management? An event can be defined as any detectable or discernable occurrence that has significance for the management
ENA Submission to the Parliamentary Renewable and Sustainable Energy Group Inquiry into the access and management of renewables and the Grid
1 ENA Submission to the Parliamentary Renewable and Sustainable Energy Group Inquiry into the access and management of renewables and the Grid 1.0 Introduction 1.1 Energy Networks Association (ENA) is
ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0
ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Co-operative Energy, Co-operative House Warwick Technology Park, Warwick CV34 6DA.
Terms and Conditions May 2014 Co-operative Energy: General Terms and Conditions for Domestic Customers Only Applicable from 1st June 2014. Co-operative Energy Limited is a limited liability company registered
Balancing and Settlement Code BSC PROCEDURE BSCP537. QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs
Balancing and Settlement Code BSC PROCEDURE BSCP537 QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs APPENDIX 3 GUIDANCE NOTES ON COMPLETING THE SAD Version 2.0 Date: 10 September 2007
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
Data Communications Company (DCC) price control guidance: process and procedures
Guidance document Contact: Tricia Quinn, Senior Economist Publication date: 27 July 2015 Team: Smarter Metering Email: [email protected] Overview: The Data and Communications Company (DCC) is required
Appendix 10: Improving the customer experience
Appendix 10: Improving the customer experience Scottish Water is committed to delivering leading customer service to all of our customers. This means we deliver the following activities: We will ensure
Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce
Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO
Smart Meters Executive Paper
Smart Meters Executive Paper Smart infrastructure overview The ever growing global demand for energy, combined with increasing scarcity of resources and the threat of climate change, have prompted governments
SOFTWARE DEVELOPMENT AGREEMENT
SOFTWARE DEVELOPMENT AGREEMENT THIS AGREEMENT dated the day of 20. BETWEEN: AND: ACN of (the Customer ; 1iT Pty Ltd ACN 092 074 247 of 41 Oxford Close West Leederville (the Contractor. BACKGROUND A. The
Heslop & Platt Solicitors Limited
TERMS OF BUSINESS Heslop & Platt Solicitors Limited 1. Introduction and Definitions 1.1 In these terms of business, the following words and phrases have the following meanings: Initial Client Letter Client
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
CIPS Chartered Status Assessment Terms and Conditions (v1.0 12.01.15)
CIPS Chartered Status Assessment Terms and Conditions (v1.0 12.01.15) This page (together with the documents referred to on it) tells you ( you means the party contracting with CIPS) the terms and conditions
CRM Support Services Agreement
CRM Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: Points Purchased in Initial Minimum Term: This Agreement sets forth the terms and conditions under which The CRM
Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)
Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
CRM in a Day Support Services Agreement
CRM in a Day Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: This Agreement sets forth the terms and conditions under with CRM in a Day shall support the Microsoft
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
SLA, Terms & Conditions Website
Subject / SLA, Terms & Conditions Website 1. DEFINITION OF TERMS Design Limited (AJA Design),,,,. trading as AJA Design having its principal place of business at,,,.. The Client - the entity which enters
IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM
IMPLEMENTATION OF AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM TECHNICAL SPECIFICATIONS FOR AGENCIES AND BROKERS ACTING ON THEIR ACCOUNT DATA PRESERVATION EXPLANATORY NOTES : The preservation of information
ITIL A guide to Event Management
ITIL A guide to Event Management An event can be defined as any detectable or discernable occurrence that has significance for the management of the IT Infrastructure of the delivery of IT service and
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
GUIDE TO MANAGING DATA BREACHES
8 MAY 2015 CONTENT PURPOSE OF THE GUIDE 3 INTRODUCTION 4 HOW DATA BREACHES COULD OCCUR 5 RESPONDING TO A DATA BREACH 6 i. DATA BREACH MANAGEMENT PLAN 6 ii. CONTAINING THE BREACH 7 iii. ASSESSING RISK AND
Electricity Contract. Standard Retail Contract between Aurora Energy and you. www.auroraenergy.com.au 1
Electricity Contract Standard Retail Contract between Aurora Energy and you www.auroraenergy.com.au 1 Contents Introduction... 3 Your electricity contract with Aurora Energy... 3 Privacy Collection Statement...3
Norwegian Data Inspectorate
Norwegian Data Inspectorate Narvik kommune Postboks 64 8501 NARVIK Norway Your reference Our reference (please quote in any reply) Date 1111/1210-6/PEJA 11/00593-7/SEV 16 January 2012 Notification of decision
Supplement to Gaming Machine Technical Standards Consultation
Supplement to Gaming Machine Technical Standards Consultation Downloadable, Wireless and Cashless Gaming Machine Systems Consultation paper, September 2006 Introduction 1. This paper is a supplement to
We can be contacted by post at the above address or by e-mail to [email protected]
Terms&Conditions This is the official website of Abarth. On this site you will find also find information provided by Fiat Financial Services relating to Abarth vehicles. You should read these conditions
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
No. 22 663 SUPPLEMENTARY GAZETTE THE SOUTH AUSTRALIAN GOVERNMENT GAZETTE. www.governmentgazette.sa.gov.au PUBLISHED BY AUTHORITY
No. 22 663 SUPPLEMENTARY GAZETTE THE SOUTH AUSTRALIAN GOVERNMENT GAZETTE www.governmentgazette.sa.gov.au PUBLISHED BY AUTHORITY ALL PUBLIC ACTS appearing in this GAZETTE are to be considered official,
Everything you should know about smart meters
Everything you should know about smart meters And getting them to work for you Our goal is to help you to understand and get the most out of your smart meter 2 Contents 4 Smart meters and you 5 Your electricity
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Disconnection for arrears
Chapter 8.. Disconnection for arrears This chapter covers: 1. When you can be disconnected for arrears (below) 2. Protection from disconnection (p120) 3. Preventing disconnection (p121) 4. At the point
License Agreement Software as a Service (SaaS)
License Agreement Software as a Service (SaaS) Please read the following terms and conditions carefully. By clicking the accept option, downloading or installing the Software, paying for or using the Service,
End User Agreement. between. Secure Backup Limited. and [END USER]
End User Agreement between Secure Backup Limited and [END USER] Commercial in Confidence Secure Backup Limited 1 Table of Contents 1. THE SERVICE 3 2. SOFTWARE LICENCE 3 4. PAYMENT 4 5. OWNERSHIP OF DATA
Appendix A. Call-off Terms and Conditions for the Provision of Services
Appendix A Call-off Terms and Conditions for the Provision of Services Where an Order Form is issued by the Authority that refers to the Framework Agreement, the Contract is made between the Authority
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
E-Gap Terms and Conditions of Use
E-Gap Terms and Conditions of Use User Terms and Conditions The following paragraphs specify the basis on which you may use the e-gap System and provides information on how we will handle your data. This
ONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
Data Subscription Service. Data descriptions Order form Licence agreement
Data Subscription Service Data descriptions Order form Licence agreement Introduction Background The General Pharmaceutical Council (GPhC) is the regulator for pharmacists, pharmacy technicians and registered
MynxNet Broadband Terms and Conditions
MynxNet Broadband Terms and Conditions Updated 10/12/15 Introduction These terms form the basis of the services provided by MynxNet (referred to as Mynx, Mynxnet, we, us, or our ) to yourself and your
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
BUSINESS BROADBAND SERVICE
BUSINESS BROADBAND SERVICE 1 DEFINITIONS AND INTERPRETATION 1.1 The following additional terms and conditions apply to the provision of the Business Broadband Service. TERM / EXPRESSION ADSL Annex A Annex
GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987
GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987 CONTENTS Page 1. Introduction 3-4 2. The Commission s Policy 5 3. Outsourcing
TERMS & CONDITIONS GAS BOILER SERVICE
TERMS & CONDITIONS GAS BOILER SERVICE These Terms and Conditions constitute the entire Agreement between you and Airtricity Home Energy Services for our Gas Boiler Service. IT IS IMPORTANT that you read
FACOGAZ Association of European Gas Meter Manufacturers
Page 1 of 13 GAS SMART METERING SYSTEM DRAFT MARCOGAZ/FACOGAZ POSITION PAPER FINAL 1. Introduction Marcogaz Members representing more than 100 million installed domestic gas meter in Europe owned by Distribution
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q. Exam Code: EX0-001. Exam Name: ITIL Foundation (syllabus 2011) Exam
EXIN.Passguide.EX0-001.v2014-10-25.by.SAM.424q Number: EX0-001 Passing Score: 800 Time Limit: 120 min File Version: 24.5 http://www.gratisexam.com/ Exam Code: EX0-001 Exam Name: ITIL Foundation (syllabus
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
Terms and Conditions for the Supply of Electricity or Gas with fixed term renewal (Version 9.1A)
Terms and Conditions for the Supply of Electricity or Gas with fixed term renewal (Version 1 Words and Phrases 9.1A) The words and expressions used in the contract have the meanings set out in the glossary
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
SCHEDULE 16. Exit Plan. sets out the strategy to be followed on the termination (including Partial Termination) or expiry of this Agreement; and
SCHEDULE 16 Exit Plan 1. Scope 1.1 This schedule: (A) sets out the strategy to be followed on the termination (including Partial Termination) or expiry of this Agreement; and requires the Service Provider
BANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
Adlib Hosting - Service Level Agreement
Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities
One Education Internet Services SLA 2014-2015
One Education Internet Services SLA 2014-2015 1. Commencement a. The Contract begins on the date One Education or agents working on its behalf communicate its acceptance of the customer s order for the
Customer Installation Safety Plan. March 2015
Customer Installation Safety Plan March 2015 Document History Issue No. Date Approved By Summary of Changes 1 June 2014 Chief Engineer Updated and revised in line with requirement for biennial review under
GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK
GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK This Guideline does not purport to be a definitive guide, but is instead a non-exhaustive
Government Response on Home Area Network Solutions: Implementation of 868MHz
Government Response on Home Area Network Solutions: Implementation of 868MHz Government Response to the Consultation on Home Area Network (HAN) Solutions: Implementation of 868MHz and Alternative HAN solutions
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...
Sure Unlimited and Pro Broadband Service
Sure Unlimited and Pro Broadband Service SURE UNLIMITED AND PRO BROADBAND PRODUCT DESCRIPTION The Sure Unlimited and Pro Broadband services from Sure Jersey Limited are always-on Internet connections.
Schedule 2Z Virtual Servers, Firewalls and Load Balancers
Schedule 2Z Virtual Servers, Firewalls and Load Balancers Definitions Additional Charges means the charges payable in accordance with this schedule. Customer Contact Centre means Interoute s Incident management
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
How To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
Privacy Policy. Federal Insurance Company, Singapore Branch Singapore Personal Data Protection Privacy Policy. 1. Introduction
Privacy Policy 1. Introduction Federal Insurance Company, Singapore Branch ( we, our or us ) recognise the importance of protecting the privacy and the rights of individuals in relation to their personal
a description of the various categories of embedded generators
Guidance Embedded Generation This document provides: a description of the various categories of embedded generators an outline of the types of bilateral agreements that owners/lead Parties of embedded
1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data
1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Internet and Phone Banking. Terms and Conditions and Important Information
Internet and Phone Banking Terms and Conditions and Important Information Effective Date: 20 March 2013 This booklet sets out terms and conditions for Bank of Melbourne Internet and Phone Banking, along
Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0
1 Module 3 Licensed Software Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. LICENCE TERMS... 3 3. SUPPLY OF... 8 4. UPDATES AND NEW RELEASES... 9 5. OPEN SOURCE SOFTWARE... 10
The Asset Management Landscape
The Asset Management Landscape ISBN 978-0-9871799-1-3 Issued November 2011 www.gfmam.org The Asset Management Landscape www.gfmam.org ISBN 978-0-9871799-1-3 Published November 2011 This version replaces
TERMS AND CONDITIONS OF PURCHASE
TERMS AND CONDITIONS OF PURCHASE The following terms and conditions regulate the business relationship between You ( You or Your ) and APS 000 Pty Ltd trading as 3G Safety Watch (ABN 52 602 590 152) of
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...
DEFINITIONS... 5. Glossary of Terms... 5. Section A... 9. The Code of Practice... 9 1. SCOPE OF THE CODE... 10. 1.1. In Scope...
Contents DEFINITIONS... 5 Glossary of Terms... 5 Section A... 9 The Code of Practice... 9 1. SCOPE OF THE CODE... 10 1.1. In Scope... 10 1.2. Not in Scope... 10 1.3. Third Parties... 11 1.4. Code Structure...
Lumous standard terms and conditions web design and development
Lumous standard terms and conditions web design and development 1. DEFINITION OF TERMS Lumous Limited, 17 Rubens Close, Swindon, Wiltshire SN25 4GR, trading as Lumous Limited having its principal place
Conditions means the standard terms and conditions set out in this document;
October 2014 Conditions of Supply for Electricity SME Business Customers These are our terms and conditions which are applicable to Commercial Customers with tariffs in Duos Group DG1, DG2, DG 5 or DG
ICT SUPPORT SERVICES
ICT SUPPORT SERVICES SERVICE LEVEL AGREEMENT 2008 2009 Period of agreement: This document will run from 1st April 2008 to 31 st March 2009 and remains valid until superseded by a revised document. The
TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE
TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE Welcome to the Textura Construction Payment Management ( CPM ) System. By clicking
Personal data privacy protection: what mobile apps developers and their clients should know
Personal data privacy protection: what mobile Introduction This technical information leaflet aims to highlight the privacy implications that mobile applications ( mobile apps ) developers (including organisations
